Practice Free CISA Exam Online Questions
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
- A . Process and resource inefficiencies
- B . Irregularities and illegal acts
- C . Noncompliance with organizational policies
- D . Misalignment with business objectives
D
Explanation:
The most significant risk that IS auditors are required to consider for each engagement is the misalignment with business objectives. This is because IS audit engagements are intended to provide assurance that the IT systems and processes support the achievement of the business objectives and strategies. If there is a misalignment, it could result in wasted resources, missed opportunities, inefficiencies, errors, or failures that could adversely affect the organization’s performance and reputation12.
Reference: 1: CISA Review Manual (Digital Version), Chapter 1: The Process of Auditing Information Systems, Section 1.3: Audit Risk, page 28 2: CISA Online Review Course, Module 1: The Process of Auditing Information Systems, Lesson 1.3: Audit Risk
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor’s BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
- A . the Internet.
- B . the demilitarized zone (DMZ).
- C . the organization’s web server.
- D . the organization’s network.
A
Explanation:
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor’s best recommendation is to place an intrusion detection system (IDS) between the firewall and the Internet, as this would provide an additional layer of security and alert the organization of any malicious traffic that bypasses or penetrates the firewall. Placing an IDS between the firewall and the demilitarized zone (DMZ), the organization’s web server, or the organization’s network would not be as effective, as it would only monitor the traffic that has already passed through the firewall.
Reference: CISA Review Manual (DigitalVersion), Chapter 5, Section 5.4.3
Which of the following provides the BE ST method for maintaining the security of corporate applications pushed to employee-owned mobile devices?
- A . Enabling remote data destruction capabilities
- B . Implementing mobile device management (MDM)
- C . Disabling unnecessary network connectivity options
- D . Requiring security awareness training for mobile users
B
Explanation:
The best method for maintaining the security of corporate applications pushed to employee-owned mobile devices is implementing mobile device management (MDM). MDM is a software solution that allows an organization to remotely manage, configure, and secure the mobile devices that access its network and data. MDM can help protect corporate applications on employee-owned devices by:
Enforcing security policies and settings, such as encryption, password, firewall, antivirus, and VPN.
Controlling the installation, update, and removal of corporate applications and data.
Separating corporate and personal data and applications on the device using containers or profiles.
Monitoring and auditing the device’s compliance status, activity, and location.
Performing remote actions, such as lock, wipe, backup, or restore, in case of loss, theft, or compromise.
MDM can provide a comprehensive and centralized approach to maintain the security of corporate applications on employee-owned devices, regardless of the device type, platform, or ownership. MDM can also help the organization comply with regulatory and industry standards for data protection and privacy.
Enabling remote data destruction capabilities is a useful feature for maintaining the security of corporate applications on employee-owned devices, but it is not the best method by itself. Remote data destruction allows the organization to erase the corporate data and applications from the device in case of loss, theft, or compromise. However, this feature does not prevent unauthorized access or misuse of the corporate data and applications before they are destroyed. Remote data destruction is usually part of an MDM solution.
Disabling unnecessary network connectivity options is a good practice for maintaining the security of corporate applications on employee-owned devices, but it is not the best method by itself. Network connectivity options, such as Wi-Fi, Bluetooth, NFC, or USB, can expose the device to potential attacks or data leakage. Disabling these options when they are not needed can reduce the attack surface and improve battery life. However, this practice does not address other security risks or requirements for the corporate applications on the device. Disabling network connectivity options can also be part of an MDM solution.
Requiring security awareness training for mobile users is an important measure for maintaining the security of corporate applications on employee-owned devices, but it is not the best method by itself. Security awareness training can educate the users about the potential threats and best practices for using their devices securely. It can also help foster a culture of security and responsibility among the users. However, security awareness training cannot guarantee that the users will follow the security policies and guidelines consistently and correctly. Security awareness training should be complemented by technical controls, such as MDM.
Reference: Protecting Corporate Data on Mobile Devices for All Companies1 Mobile Device Security: Corporate-Owned Personally-Enabled (COPE)23
A white box testing method is applicable with which of the following testing processes?
- A . Integration testing
- B . Parallel testing
- C . Sociability testing
- D . User acceptance testing (UAT)
Which of the following should be the GREATEST concern for an IS auditor reviewing recent disaster recovery operations?
- A . The recovery point objective (RPO) was not defined.
- B . Test data was lost during a recovery operation.
- C . A warm site was used as a recovery strategy.
- D . A full backup was only performed once a week.
An IS auditor is assigned to perform a post-implementation review of an application system.
Which of the following would impair the auditor’s independence?
- A . The auditor implemented a specific control during the development of the system.
- B . The auditor provided advice concerning best practices.
- C . The auditor participated as a member of the project team without operational responsibilities
- D . The auditor designed an embedded audit module exclusively for audit
A
Explanation:
The auditor implemented a specific control during the development of the system. This would impair the auditor’s independence, as it would create a self-review threat, which is a situation where an auditor has to evaluate or review the results of his or her own work or judgment1. A self-review threat may compromise the auditor’s objectivity and impartiality, as the auditor may be biased or influenced by his or her own involvement or interest in the system1. The auditor may also face a conflict of interest or a loss of credibility if he or she has to report on any issues or deficiencies related to the control he or she implemented.
A small organization is experiencing rapid growth and plans to create a new information security policy.
Which of the following is MOST relevant to creating the policy?
- A . Business objectives
- B . Business impact analysis (BIA)
- C . Enterprise architecture (EA)
- D . Recent incident trends
What is the MAIN reason to use incremental backups?
- A . To improve key availability metrics
- B . To reduce costs associates with backups
- C . To increase backup resiliency and redundancy
- D . To minimize the backup time and resources
D
Explanation:
Incremental backups are backups that only copy the data that has changed since the last backup, whether it was a full or incremental backup. The main reason to use incremental backups is to minimize the backup time and resources, as they require less storage space and network bandwidth than full backups. Incremental backups can also improve key availability metrics, such as recovery point objective (RPO) and recovery time objective (RTO), but that is not their primary purpose. Reducing costs associated with backups and increasing backup resiliency and redundancy are possible benefits of incremental backups, but they depend on other factors, such as the backup frequency, retention policy, and media type.
Reference: CISA Review Manual (Digital Version): Chapter 5 – Information Systems Operations and Business Resilience
Which of the following should an IS auditor recommend be done FIRST when an organization is made aware of a new regulation that is likely to impact IT security requirements?
- A . Update security policies based on the new regulation.
- B . Determine which systems and IT-related processes may be impacted.
- C . Evaluate how security awareness and training content may be impacted.
- D . Review the design and effectiveness of existing IT controls.
B
Explanation:
The first thing that an IS auditor should recommend when an organization is made aware of a new regulation that is likely to impact IT security requirements is to determine which systems and IT-related processes may be impacted. This is because the impact assessment is a crucial step to understand the scope and magnitude of the changes that the new regulation may entail, as well as the potential risks and gaps that need to be addressed. The impact assessment can help the organization to prioritize and plan the necessary actions and resources to comply with the new regulation in a timely and effective manner12.
Updating security policies based on the new regulation is not the first thing to do, because it requires a clear understanding of the impact and implications of the new regulation, which can only be obtained after conducting an impact assessment. Updating security policies without an impact assessment may result in incomplete, inconsistent, or ineffective policies that may not meet the regulatory requirements or the organizational needs12.
Evaluating how security awareness and training content may be impacted is not the first thing to do, because it is a secondary or supporting activity that depends on the results of the impact assessment and the policy updates. Evaluating security awareness and training content without an impact assessment or policy updates may result in inaccurate, outdated, or irrelevant content that may not reflect the regulatory requirements or the organizational expectations34.
Reviewing the design and effectiveness of existing IT controls is not the first thing to do, because it is a monitoring or assurance activity that follows the implementation of the changes based on the impact assessment and the policy updates. Reviewing IT controls without an impact assessment or policy updates may result in misleading, incomplete, or invalid findings that may not capture the regulatory requirements or the organizational performance
An IS auditor assessing the controls within a newly implemented call center would First
- A . gather information from the customers regarding response times and quality of service.
- B . review the manual and automated controls in the call center.
- C . test the technical infrastructure at the call center.
- D . evaluate the operational risk associated with the call center.
D
Explanation:
The first step in assessing the controls within a newly implemented call center is to evaluate the operational risk associated with the call center. This will help the IS auditor to identify the potential threats, vulnerabilities, and impacts that could affect the call center’s objectives, performance, and availability. The evaluation of operational risk will also provide a basis for determining the scope, objectives, and approach of the audit. The other options are possible audit procedures, but they are not the first step in the audit process.
Reference: ISACA Frameworks: Blueprints for Success, CISA Review Manual (Digital Version)
