Test 1
Test 1
During an IS audit, which is the BEST method for an IS auditor to evaluate the
implementation of segregation of duties within an IT department?
(Correct)
Explanation
(Correct)
Explanation
Role-based access control (RBAC) is correct. Authorization in this case can best be
addressed by RBAC technology. RBAC controls access according to job roles or functions.
RBAC is easy to manage and can enforce strong and efficient access controls in large-scale
web environments including VoIP implementation. Fine-grained access control is incorrect.
This control on Voice-over Internet Protocol (VoIP) web applications does not scale to
enterprise-wide systems because it is primarily based on individual user identities and their
specific technical privileges. Access control lists is incorrect. This approach on VoIP web
applications does not scale to enterprise-wide systems because they are primarily based on
individual user identities and their specific technical privileges. Network/service access
control is incorrect. This addresses VoIP availability but does not address application-level
access or authorization.
Question 3: Skipped
An advantage in using a bottom-up vs. a top-down approach to software testing is
that -
errors in critical modules are detected earlier.
(Correct)
Explanation
Errors in critical modules are detected earlier is correct. The bottom-up approach to
software testing begins with the testing of atomic units, such as programs and modules, and
works upward until a complete system testing has taken place. The advantages of using a
bottom-up approach to software testing are the fact that errors in critical modules are
found earlier. Interface errors are detected earlier is incorrect. Interface errors will not be
found until later in the testing process—as a result of integration or system testing.
Confidence in the system is achieved earlier is incorrect. Confidence in the system cannot be
obtained until the testing is completed. Major functions and processing are tested earlier is
incorrect. Bottom-up testing tests individual components and major functions and
processing will not be adequately tested until systems and integration testing is completed.
Question 4: Skipped
In the context of effective information security governance, the primary objective of
value delivery is to -
(Correct)
Explanation
(Correct)
Explanation
(Correct)
Explanation
Assurance reports
Process maturity
Performance indicators
Business risk
(Correct)
Explanation
Business risk is correct. Priority should be given to those areas that represent a known risk
to the enterprise operations. Process maturity is incorrect. The level of process maturity will
evolve as the implementation of the IT governance program occurs and may feed into the
decision-making process. Those areas that represent real risk to the business should be
given priority. Performance indicators is incorrect. The level of process performance will
demonstrate the effectiveness of the program but will not be the means to establish
priorities for governance. Those areas that represent real risk to the business should be
given priority. Assurance reports is incorrect. Audit reports will provide assurance of the
effectiveness of the implementation of governance but will not determine the priorities for
program. Those areas that represent real risk to the business should be given priority.
Question 8: Skipped
Which of the following is the GREATEST concern associated with the use of peer-to-
peer computing?
Data leakage
(Correct)
Virus infection
Explanation
Data leakage is correct. Peer-to-peer computing can share the contents of a user hard drive
over the Internet. The risk that sensitive data could be shared with others is the greatest
concern. Virus infection is incorrect. While peer-to-peer computing does increase the risk of
virus infection, the risk of data leakage is more severe, especially if it contains proprietary
data or intellectual property. Network performance issues is incorrect. Peer-to-peer
computing may use more network bandwidth and, therefore, may create performance
issues. However, data leakage is a more severe risk. Unauthorized software usage is
incorrect. Peer-to-peer computing may be used to download or share unauthorized
software, which users could install on their PCs unless other controls prevent it. However,
data leakage is a more severe risk.
Question 9: Skipped
When reviewing the IT strategic planning process, an IS auditor should ensure that the
plan-
(Correct)
Explanation
Articulates the it mission and vision is correct. The IT strategic plan must include a clear
articulation of the IT mission and vision. Incorporates state of the art technology is incorrect.
The plan does not need to address state of the art technology; the decision to implement
new technology is dependent on the approach to risk and management strategy. Addresses
the required operational controls is incorrect. The plan does not need to address
operational controls because those are too granular for strategic planning. Specifies project
management practices is incorrect. The plan should be implemented with proper project
management, but the plan does not need to address project management practices.
Question 10: Skipped
An IS auditor of a large organization is reviewing the roles and responsibilities of the
IT function and finds some individuals serving multiple roles. Which one of the
following combinations of roles should be of GREATEST concern for the IS auditor?
(Correct)
Explanation
help detect spam.
(Correct)
provide confidentiality.
Explanation
Help detect spam is correct. Validated electronic signatures are based on qualified
certificates that are created by a certificate authority, with the technical standards required
to ensure the key can neither be forced nor reproduced in a reasonable time. Such
certificates are only delivered through a registration authority after a proof of identity has
been passed. Using strong signatures in email traffic, nonrepudiation can be assured, and a
sender can be tracked. The recipient can configure his/her email server or client to
automatically delete emails from specific senders. Provide confidentiality is incorrect. For
confidentiality issues, one must use encryption, not a signature. Add to the workload of
gateway servers is incorrect. Without any filters directly applied on mail gateway servers to
block traffic without strong signatures, the workload will not increase. Using filters directly
on a gateway server will result in an overhead less than antivirus software imposes.
Significantly reduce available bandwidth is incorrect. Digital signatures are only a few bytes
in size and will not slash bandwidth. Even if gateway servers were to check certificate
revocation lists, there is little overhead.
Question 12: Skipped
Which of the following would effectively verify the originator of a transaction?
(Correct)
Explanation
Digitally signing the transaction with the source’s private key is correct. A digital signature is
an electronic identification of a person, created by using a public key algorithm, to verify the
identity of the source of a transaction and the integrity of its content to a recipient. Using a
secret password between the originator and the receiver is incorrect. Because they are a
“shared secret” between the user and the system itself, passwords are considered a weaker
means of authentication. Encrypting the transaction with the recipient’s public key is
incorrect. This will provide confidentiality for the information but will not verify the source.
Using a portable document format to encapsulate transaction content is incorrect. This will
protect the integrity of the content but not necessarily authorship.
Question 13: Skipped
When developing a disaster recovery plan, the criteria for determining the acceptable
downtime should be the:
(Correct)
Explanation
Maximum tolerable outage is correct. Recovery time objective is determined based on the
acceptable downtime in case of a disruption of operations. It indicates the maximum
tolerable outage that an organization considers to be acceptable before a system or process
must resume following a disaster. Annual loss expectancy (ALE) is incorrect. The acceptable
downtime would not be determined by the ALE; ALE is related to risk management
calculations, not disaster recovery. Service delivery objective is incorrect. This is relevant to
business continuity, but it is not determined by acceptable downtime. Quantity of orphan
data is incorrect. This is relevant to business continuity, but it is not determined by
acceptable downtime.
Question 14: Skipped
While conducting a business continuity audit, which of the following would be MOST
important for an IS auditor to verify?
(Correct)
Explanation
Human safety procedures are in place is correct. The most important element in any
business continuity process is the protection of human life. This takes precedence over all
other aspects of the plan. Data backups are performed on a timely basis is incorrect.
Performing data backups is necessary for a business continuity plan, but the IS auditor will
always be most concerned with human safety. A recovery site is contracted for and available
as needed is incorrect. A recovery site is important for business continuity, but life safety is
always the first priority. Insurance coverage is adequate and premiums are current is
incorrect. Insurance coverage is not as important as life safety.
Question 15: Skipped
An IS auditor reviewing wireless network security determines that the Dynamic Host
Configuration Protocol is disabled at all wireless access points. This practice:
(Correct)
Explanation
Reduces the risk of unauthorized access to the network is correct. Dynamic Host
Configuration Protocol (DHCP) automatically assigns IP addresses to anyone connecting to
the network. With DHCP disabled, static IP addresses must be used, and this requires either
administrator support or a higher level of technical skill to attach to the network and gain
Internet access. Is not suitable for small networks is incorrect. DHCP is suitable for networks
of all sizes from home networks to large complex organizations. Automatically provides an
IP address to anyone is incorrect. DHCP does not provide IP addresses when disabled.
Increases the risk associated with Wireless Encryption Protocol (WEP) is incorrect. Disabling
of the DHCP makes it more difficult to exploit the well-known weaknesses in WEP.
Question 16: Skipped
An IS auditor is evaluating a newly developed IT policy for an organization. Which of
the following factors does the IS auditor consider MOST important to facilitate
compliance with the policy upon its implementation?
(Correct)
Current and future technology initiatives
Explanation
(Correct)
inadequate procedures for ensuring adequate system portability.
Explanation
An inadequate software escrow agreement is correct. The inclusion of a clause in the
agreement that requires software code to be placed in escrow helps to ensure that the
customer can continue to use the software and/or obtain technical support if a vendor were
to go out of business. Inadequate procedures for ensuring adequate system portability is
incorrect. Procedures to ensure that systems are developed so that they can be ported to
other system platforms will help ensure that the system can still continue functioning
without affecting the business process if changes to the infrastructure occur. This is less
important than availability of the software. Inadequate operational documentation for the
system is incorrect. This is a risk but would be less significant than the risk of unavailability
of the software. An inadequate alternate service provider listing is incorrect. While alternate
service providers could be used if a vendor goes out of business, having access to the
source code via a software escrow agreement is more important.
Question 18: Skipped
The PRIMARY benefit of an enterprise architecture initiative is to -
(Correct)
provide business units with greater autonomy to select IT solutions that fit their needs.
Explanation
Enable the organization to invest in the most appropriate technology is correct. The primary
focus of the enterprise architecture (EA) is to ensure that technology investments are
consistent with the platform, data and development standards of the IT organization;
therefore, the goal of the EA is to help the organization to implement the technology that is
most effective. Ensure security controls are implemented on critical platforms is incorrect.
Ensuring that security controls are implemented on critical platforms is important, but this is
not the function of the EA. The EA may be concerned with the design of security controls;
however, the EA would not help to ensure that they were implemented. The primary focus
of the EA is to ensure that technology investments are consistent with the platform, data
and development standards of the IT organization. Allow development teams to be more
responsive to business requirements is incorrect. While the EA process may enable
development teams to be more efficient, because they are creating solutions based on
standard platforms using standard programming languages and methods, the more critical
benefit of the EA is to provide guidance for IT investments of all types, which encompasses
much more than software development. Provide business units with greater autonomy to
select it solutions that fit their needs is incorrect. A primary focus of the EA is to define
standard platforms, databases and interfaces. Business units that invest in technology would
need to select IT solutions that meet their business needs and are compatible with the EA of
the enterprise. There may be instances when a proposed solution works better for a
business unit but is not at all consistent with the EA of the enterprise, so there would be a
need to compromise to ensure that the application can be supported by IT. Overall, the EA
would restrict the ability of business units in terms of the potential IT systems that they may
wish to implement. The support requirements would not be affected in this case.
Question 19: Skipped
As an IS auditor, you find a small number of user access requests that were not
authorized by managers through the normal predefined workflow steps and
escalation rules. You should-
(Correct)
recommend that the owner of the identity management system fix the workflow issues.
Explanation
Perform an additional analysis is correct. The IS auditor needs to perform substantive testing
and additional analysis to determine why the approval and workflow processes are not
working as intended. Before making any recommendation, the IS auditor should gain a
good understanding of the scope of the problem and the factors that caused this incident.
The IS auditor should identify whether the issue was caused by managers not following
procedures, a problem with the workflow of the automated system or a combination of the
two. Report the problem to the audit committee is incorrect. The IS auditor does not yet
have enough information to report the problem. Conduct a security risk assessment is
incorrect. Changing the scope of the IS audit or conducting a security risk assessment
requires more detailed information about the processes and violations being reviewed.
Recommend that the owner of the identity management system fix the workflow issues is
incorrect. The IS auditor must first determine the root cause and impact of the findings and
does not have enough information to recommend fixing the workflow issues.
Question 20: Skipped
Which of the following is the PRIMARY objective of an IT performance measurement
process?
Minimize errors
Optimize performance
(Correct)
Explanation
(Correct)
Secure Shell
Explanation
Advanced encryption standard (AES) is correct. This is a secure encryption algorithm that is
appropriate for encrypting passwords. Secure hash algorithm-256 is incorrect. Hashing
functions are often used to protect passwords, but hashing is not encryption. Secure Shell is
incorrect. This may encrypt passwords that are being transmitted but does not encrypt data
at rest. Triple data encryption standard is incorrect. This is a valid encryption method;
however, AES is a stronger and more recent encryption algorithm.
Question 22: Skipped
The cryptographic hash sum of a message is recalculated by the receiver. This is to
ensure:
(Correct)
Explanation
The integrity of data transmitted by the sender is correct. If the hash sum is different from
what is expected, it implies that the message has been altered. This is an integrity test. The
confidentiality of the message is incorrect. A hash function ensures integrity of a message;
encrypting with a secret key provides confidentiality. Nonrepudiation by the sender is
incorrect. Signing the message with the private key of the sender ensures nonrepudiation
and authenticity. The authenticity of the message is incorrect. This is provided by the digital
signature.
Question 23: Skipped
The BEST overall quantitative measure of the performance of biometric control
devices is:
false-acceptance rate.
estimated-error rate.
false-rejection rate.
equal-error rate.
(Correct)
Explanation
A low equal-error rate (EER) is correct. This is a combination of a low false-rejection rate
(FRR) and a low false-acceptance rate (FAR). EER, expressed as a percentage, is a measure of
the number of times that the FRR and FAR are equal. A low EER is the measure of the more
effective biometrics control device. False-rejection rate (FRR) is incorrect This only measures
the number of times an authorized person is denied entry. False-acceptance rate (FAR) is
incorrect. This only measures the number of times an unauthorized person may be accepted
as authorized. Estimated-error rate is incorrect. This is not a valid biometric term.
Question 24: Skipped
An IS auditor is assessing a biometric system used to protect physical access to a data
center containing regulated data. Which of the following observations is the
GREATEST concern to the auditor?
Data transmitted between the biometric scanners and the access control system do not use
a securely encrypted tunnel.
(Correct)
Biometric system risk analysis was last conducted three years ago.
Administrative access to the biometric scanners or the access control system is permitted
over a virtual private network.
Explanation
Data transmitted between the biometric scanners and the access control system do not use
a securely encrypted tunnel is correct. Data transmitted between the biometric scanners and
the access control system should use a securely encrypted tunnel to protect the
confidentially of the biometric data. Administrative access to the biometric scanners or the
access control system is permitted over a virtual private network is incorrect. Generally,
virtual private network software provides a secure tunnel so that remote administration
functions can be performed. This is not a concern. Biometric scanners are not installed in
restricted areas is incorrect. Biometric scanners are best located in restricted areas to
prevent tampering, but video surveillance is an acceptable mitigating control. The greatest
concern is lack of a securely encrypted tunnel between the scanners and the access control
system. Biometric system risk analysis was last conducted three years ago is incorrect. The
biometric risk analysis should be reperformed periodically, but an analysis performed three
years ago is not necessarily a cause for concern.
Question 25: Skipped
In order to establish a security awareness program, which of the following would
MOST likely be a part of the program?
(Correct)
Installing an efficient user log system to track the actions of each user
Explanation
Training provided on a regular basis to all current and new employees is correct. Regular
training is an important part of a security awareness program. Using an intrusion detection
system to report incidents is incorrect. This is an implementation of a security program and
is not effective in establishing a security awareness program. Mandating the use of
passwords to access all software is incorrect. This is a policy decision, not an awareness
issue. Installing an efficient user log system to track the actions of each user is incorrect. This
is not a part of an awareness program.
Question 26: Skipped
During an implementation review of a recent application deployment, it was
determined that several incidents were assigned incorrect priorities and, because of
this, failed to meet the business service level agreement (SLA). What is the GREATEST
concern?
The support model was not approved by senior management.
(Correct)
Explanation
The support model was not properly developed and implemented is correct. The greatest
concern for the IS auditor is that the support model was not developed and implemented
correctly to prevent or react to potential outages. Incidents could cost the business a
significant amount of money and a support model should be implemented with the project.
This should be a step within the system development life cycle and procedures and, if it is
missed on one project, it may be a symptom of an overall breakdown in process. The
support model was not approved by senior management is incorrect. While senior
management involvement is important, the more critical issue is whether the support model
was not properly developed and implemented. The incident resolution time specified in the
service level agreement (SLA) is not realistic is incorrect. While the incident resolution time
specified in the service level agreement may not always be attainable, the more critical issue
is whether the support model was not properly developed and implemented. There are
inadequate resources to support the applications is incorrect. While adequate support
resources are important, the more critical issue is whether the support model was not
properly developed and implemented.
Question 27: Skipped
Which of the following forms of evidence would an IS auditor consider the MOST
reliable?
(Correct)
An internally generated computer accounting report
Explanation
(Correct)
Explanation
consult with external legal counsel to determine the course of action to be taken.
(Correct)
Explanation
Expand activities to determine whether an investigation is warranted is correct. An IS
auditor’s responsibilities for detecting fraud include evaluating fraud indicators and
deciding whether any additional action is necessary or whether an investigation should be
recommended. Report the matter to the audit committee is incorrect. The IS auditor should
notify the appropriate authorities within the organization only if it has determined that the
indicators of fraud are sufficient to recommend an investigation. Report the possibility of
fraud to management is incorrect. The IS auditor should report the possibility of fraud to
top management only after there is sufficient evidence to launch an investigation. This may
be affected by whether management may be involved in the fraud. Consult with external
legal counsel to determine the course of action to be taken is incorrect. Normally, the IS
auditor does not have authority to consult with external legal counsel.
Question 30: Skipped
Which technique would BEST test for the existence of dual control when auditing the
wire transfer systems of a bank?
Interviewing personnel
Observation
(Correct)
Re-performance
Explanation
Observation is correct. Dual control requires that two people carry out an operation. The
observation technique helps to ascertain whether two individuals do get involved in
execution of the operation and an element of oversight exists. It is obvious if one individual
is masquerading and filling in the role of the second person. Analysis of transaction logs is
incorrect. This would help to show that dual control is in place but does not necessarily
guarantee that this process is being followed consistently. Therefore, observation is the
better test technique. Re-performance is incorrect. Although re-performance could provide
assurance that dual control was in effect, re-performing wire transfers at a bank would not
be an option for an IS auditor. Interviewing personnel is incorrect. This is useful to
determine the level of awareness and understanding of the personnel carrying out the
operations. However, it does provide direct evidence confirming the existence of dual
control, because the information provided may not accurately reflect the process being
performed.
Question 31: Skipped
An organization is considering connecting a critical PC-based system to the Internet.
Which of the following would provide the BEST protection against hacking?
A proxy server
Port scanning
An application-level gateway
(Correct)
Explanation
An application-level gateway is correct. This is the best way to protect against hacking
because it can be configured with detailed rules that describe the type of user or connection
that is or is not permitted. It analyzes, in detail, each package—not only in layers one
through four of the Open System Interconnection model, but also layers five through seven,
which means that it reviews the commands of each higher-level protocol (Hypertext
Transmission Protocol, File Transfer Protocol, Simple Network Management Protocol, etc.). A
remote access server is incorrect. In this situation, there is a device (server) that asks for a
username and password before entering the network. This is good when accessing private
networks, but it can be mapped or scanned from the Internet, creating security exposure. A
proxy server is incorrect. This can provide excellent protection, but depending on the type
of proxy, they may not be able to examine traffic as effectively as an application gateway.
For proxy servers to work, an individual is needed who really knows how to do this, and
applications can use different ports for the different sections of the program. Port scanning
is incorrect. This is used to detect vulnerabilities or open ports on a network, but not when
trying to control what comes from the Internet, or when all the ports available need to be
controlled. For example, the port for Ping (echo request) could be blocked and the IP
addresses would be available for the application and browsing but would not respond to
Ping.
Question 32: Skipped
An IS auditor who has discovered unauthorized transactions during a review of
electronic data interchange (EDI) transactions is likely to recommend improving the -
(Correct)
Explanation
Authentication techniques for sending and receiving messages is correct. They play a key
role in minimizing exposure to unauthorized transactions. The electronic data interchange
trading partner agreements is incorrect. These minimize exposure to legal issues but do not
resolve the problem of unauthorized transactions. Physical control for terminals is incorrect.
This is important and may provide protection from unauthorized people accessing the
system but does not provide protection from unauthorized transactions by authorized users.
Program change control procedures is incorrect. Change control procedures do not resolve
the issue of unauthorized transactions.
Question 33: Skipped
A decision support system is used to help high-level management -
Explanation
Make decisions based on data analysis and interactive models is correct. A decision support
system (DSS) emphasizes flexibility in the decision-making approach of management
through data analysis and the use of interactive models, not fixed criteria. Solve highly
structured problems is incorrect. A DSS is aimed at solving less structured problems.
Combine the use of decision models with predetermined criteria is incorrect. A DSS
combines the use of models and analytic techniques with traditional data access and
retrieval functions but is not limited by predetermined criteria. Support only structured
decision-making tasks is incorrect. A DSS supports semistructured decision-making tasks.
Question 34: Skipped
The editing/validation of data entered at a remote site is performed MOST effectively
at the -
remote processing site after transmission of the data to the central processing site.
remote processing site prior to transmission of the data to the central processing site.
(Correct)
Explanation
Remote processing site prior to transmission of the data to the central processing site is
correct. It is important that the data entered from a remote site is edited and validated prior
to transmission to the central processing site.
Central processing site after running the application system is incorrect. Validating data
prior to transmission is the most efficient method and saves the effort of transmitting or
processing invalid data. However, due to the risk of errors being introduced during
transmission it is also good practice to re-validate the data at the central processing site.
Central processing site during the running of the application system is incorrect. Validating
data prior to transmission is the most efficient method and saves the effort of transmitting
or processing invalid data. However, due to the risk of errors being introduced during
transmission it is also good practice to re-validate the data at the central processing site.
Remote processing site after transmission of the data to the central processing site is
incorrect. Validating the data after it has been transmitted is not a valid control.
(Correct)
Explanation
Perform user acceptance testing is correct. It would be most important to complete the user
acceptance testing to ensure that the system to be implemented is working correctly. Finish
writing user manuals is incorrect. The completion of the user manuals is less important than
the need to test the system adequately. Add last-minute enhancements to functionalities is
incorrect. If time is tight, the last thing one would want to do is add another enhancement
because it would be necessary to freeze the code and complete the testing, then make any
other changes as future enhancements. Ensure that the code has been documented and
reviewed is incorrect. It would be appropriate to have the code documented and reviewed,
but unless the acceptance testing is completed, there is no guarantee that the system will
work correctly and meet user requirements.
Question 36: Skipped
Which of the following specifically addresses how to detect cyberattacks against an
organization's IT systems and how to recover from an attack?
An IT contingency plan
(Correct)
Explanation
An incident response plan (IRP) is correct. This determines the information security
responses to incidents such as cyberattacks on systems and/or networks. This plan
establishes procedures to enable security personnel to identify, mitigate and recover from
malicious computer incidents such as unauthorized access to a system or data, denial-of-
service or unauthorized changes to system hardware or software. An IT contingency plan is
incorrect. This addresses IT system disruptions and establishes procedures for recovering
from a major application or general support system failure. The contingency plan deals with
ways to recover from an unexpected failure, but it does not address the identification or
prevention of cyberattacks. A business continuity plan (BCP) is incorrect. This addresses
business processes and provides procedures for sustaining essential business operations
while recovering from a significant disruption. While a cyberattack could be severe enough
to require use of the BCP, the IRP would be used to determine which actions should be
taken—both to stop the attack as well as to resume normal operations after the attack. A
continuity of operations plan is incorrect. This addresses the subset of an organization’s
missions that are deemed most critical and contains procedures to sustain these functions
at an alternate site for a short time period.
Question 37: Skipped
Corrective action has been taken by an auditee immediately after the identification of
a reportable finding. The auditor should-
include the finding in the closing meeting for discussion purposes only.
not include the finding in the final report because management resolved the item.
not include the finding in the final report, because corrective action can be verified by the IS
auditor during the audit.
include the finding in the final report, because the IS auditor is responsible for an accurate
report of all findings.
(Correct)
Explanation
Include the finding in the final report, because the IS auditor is responsible for an accurate
report of all findings is correct and is a generally accepted audit practice. If an action is
taken after the audit started and before it ended, the audit report should identify the finding
and describe the corrective action taken. An audit report should reflect the situation, as it
existed at the start of the audit. All corrective actions taken by the auditee should be
reported in writing. Not include the finding in the final report because management
resolved the item is incorrect. The audit report should contain all relevant findings and the
response from management even if the finding has been resolved. This would mean that
subsequent audits may test for the continued resolution of the control. Not include the
finding in the final report, because corrective action can be verified by the IS auditor during
the audit is incorrect. The audit report should contain the finding so that it is documented
and the removal of the control subsequent to the audit would be noticed. Include the
finding in the closing meeting for discussion purposes only is incorrect. The audit report
should contain the finding and resolution, and this can be mentioned in the final meeting.
The audit report should list all relevant findings and the response from management.
Question 38: Skipped
Which of the following would BEST ensure uninterrupted operations in an
organization with IT operation centers in several countries?
(Correct)
Explanation
Employee training on the business continuity plan (BCP) is correct. During a disaster, the
chain of command might be interrupted. Therefore, it is important that employees know
their roles in the BCP, including where to report and how to perform their job functions.
Employee training on the plan is especially important for businesses with offices that are
geographically separated because there is a greater chance of communication disruption.
Distribution of key procedural documentation is incorrect. Procedural documentation
should always be up to date and distributed to major locations. However, documents alone
are insufficient if employees do not know their role in the plan. Reciprocal agreement
between business partners is incorrect. A reciprocal agreement is an emergency processing
agreement between two or more enterprises with similar equipment or applications.
Typically, participants of a reciprocal agreement promise to provide processing time to each
other when an emergency arises. While it is integral to business continuity to have a
location for business operations, it does not necessarily need to be a reciprocal agreement.
For example, in some cases, business operations may be carried out from each employee’s
home. Strong senior management leadership is incorrect. Senior management may not be
readily available to provide leadership during a disaster. Therefore, it is most important that
employees fully understand their roles in the BCP.
Question 39: Skipped
An organization's IS audit charter should specify the-
(Correct)
Explanation
Role of the IS audit function is correct. An IS audit charter establishes the role of the
information systems audit function. The charter should describe the overall authority, scope
and responsibilities of the audit function. It should be approved by the highest level of
management and, if available, by the audit committee. Plans for IS audit engagements is
incorrect. Planning is the responsibility of audit management. The objectives and scope of
each IS audit is incorrect. These should be agreed on in an engagement letter. The charter
would specify the objectives and scope of the audit function but not of individual
engagements. Detailed training plan for the IS audit staff is incorrect. A training plan that is
based on the audit plan should be developed by audit management.
Question 40: Skipped
Which of the following is the MOST reliably effective method for dealing with the
spread of a network worm that exploits vulnerability in a protocol?
(Correct)
Explanation
Stop the services that the protocol uses is correct. This is the most effective way to prevent a
worm from spreading, because it directly addresses the means of propagation at the lowest
practical level. Install the latest vendor security patches immediately is incorrect. This will
improve the situation only if a patch has been released that addresses the particular
vulnerability in the protocol. Also, patches should not be installed prior to testing, because
patching systems can create new vulnerabilities or impact performance. Block the protocol
on the perimeter firewall is incorrect. This does not stop the worm from spreading if it is
introduced via portable media. Block the protocol traffic between internal network
segments is incorrect. This helps to slow the spread, but also prohibits any software that
uses it from working between segments.
Question 41: Skipped
Which of the following is the MOST important function to be performed by IT
management when a service has been outsourced?
(Correct)
Explanation
Functional
Full-scale
Deskcheck
Tabletop
(Correct)
Explanation
provide the project management team with more control over the project design.
(Correct)
Explanation
Require that changes after that point be evaluated for cost-effectiveness is correct. Projects
often tend to expand, especially during the requirements definition phase. This expansion
often grows to a point where the originally anticipated cost-benefits are diminished because
the cost of the project has increased. When this occurs, it is recommended that the project
be stopped or frozen to allow a review of all of the cost-benefits and the payback period.
Prevent further changes to a project in process is incorrect. The stop point is intended to
provide greater control over changes but not to prevent them. Indicate the point at which
the design is to be completed is incorrect. The stop point is used for project control but not
to create an artificial fixed point that requires the design of the project to cease. Provide the
project management team with more control over the project design is incorrect. A stop
point is used to control requirements, not systems design.
Question 44: Skipped
Which of the following backup techniques is the MOST appropriate when an
organization requires extremely granular data restore points, as defined in the
recovery point objective?
(Correct)
Disk-to-tape backup
Disk-based snapshots
Explanation
Continuous data backup is correct. Recovery point objective (RPO) is based on the
acceptable data loss in the case of a disruption. In this scenario the organization needs a
short RPO and continuous data backup is the best option. Virtual tape libraries is incorrect.
These would require time to complete the backup, while continuous data backup happens
online (in real time). Disk-based snapshots is incorrect. These would require time to
complete the backup and would lose some data between the times of the backup and the
failure, while continuous data backup happens online (in real time). Disk-to-tape backup is
incorrect This would require time to complete the backup, while continuous data backup
happens online (in real time).
Question 45: Skipped
A database administrator (DBA) who needs to make emergency changes to a database
after normal working hours should log in:
(Correct)
with the shared DBA account to make the changes.
Explanation
With their named account to make the changes is correct. Logging in using the named user
account before using the database administrator (DBA) account provides accountability by
noting the person making the changes. The DBA account is typically a shared user account.
The shared account makes it difficult to establish the identity of the support user who is
performing the database update. The server administrative accounts are shared and may be
used by multiple support users. In addition, the server privilege accounts may not have the
ability to perform database changes. The use of a normal user account would not have
sufficient privileges to make changes on the database.
Question 46: Skipped
An organization is implementing an enterprise resource planning application. Of the
following, who is PRIMARILY responsible for overseeing the project to ensure that it is
progressing in accordance with the project plan and that it will deliver the expected
results?
(Correct)
Project sponsor
Explanation
A project steering committee is correct. A project steering committee that provides an
overall direction for the enterprise resource planning (ERP) implementation project is
responsible for reviewing the project’s progress to ensure that it will deliver the
expected results. A project sponsor is incorrect. A project sponsor is typically the senior
manager in charge of the primary business unit that the application will support. The
sponsor provides funding for the project and works closely with the project manager to
define the critical success factors or metrics for the project. The project sponsor is not
responsible for reviewing the progress of the project. System development project team is
incorrect. A system development project team (SDPT) completes the assigned tasks, works
according to the instructions of the project manager and communicates with the user
project team. The SDPT is not responsible for overseeing the progress of the project. A user
project team (UPT) is incorrect. A user project team (UPT) completes the assigned tasks,
communicates effectively with the system development team and works according to the
advice of the project manager. A UPT is not responsible for reviewing the progress of the
project.
Question 47: Skipped
An organization is planning to replace its wired networks with wireless networks.
Which of the following would BEST secure the wireless network from unauthorized
access?
(Correct)
Explanation
Implement Wi-Fi Protected Access (WPA) 2 is correct. This implements most of the
requirements of the IEEE 802.11i standard. The Advanced Encryption Standard used in
WPA2 provides better security. Also, WPA2 supports both the Extensible Authentication
Protocol and the pre-shared secret key authentication model. Implement Wired Equivalent
Privacy is incorrect. Wired Equivalent Privacy can be cracked within minutes. WEP uses a
static key that has to be communicated to all authorized users, thus management is difficult.
Also, there is a greater vulnerability if the static key is not changed at regular intervals.
Permit access to only authorized media access control addresses is incorrect. The practice of
allowing access based on media access control is not a solution because MAC addresses can
be spoofed by attackers to gain access to the network. Disable open broadcast of service set
identifiers is incorrect. This is not an effective access control because many tools can detect
a wireless access point that is not broadcasting.
Question 48: Skipped
Which of the following would contribute MOST to an effective business continuity
plan?
(Correct)
Explanation
Planning involves all user departments is correct. The involvement of user departments in
the business continuity plan (BCP) is crucial for the identification of the business processing
priorities and the development of an effective plan. The document is circulated to all
interested parties is incorrect. The BCP circulation will ensure that the BCP document is
received by all users. Although essential, this does not contribute significantly to the success
of the BCP. The plan is approved by senior management is incorrect. A BCP approved by
senior management would not necessarily ensure the effectiveness of the BCP. An audit is
performed by an external IS auditor is incorrect. An audit would not necessarily improve the
quality of the BCP.
Question 49: Skipped
In reviewing the IT short-range (tactical) plan, an IS auditor should determine whether
-
(Correct)
Explanation
system integrity is ensured.
(Correct)
Explanation
Fraud can be detected more quickly is correct. Continuous auditing techniques assist the
auditing function in reducing the use of auditing resources through continuous collection of
evidence. This approach assists the IS auditors in identifying fraud in a timely fashion and
allows the auditors to focus on relevant data. Effective preventive controls are enforced is
incorrect. Continuous monitoring is detective in nature and, therefore, does not necessarily
assist the IS auditor in monitoring for preventive controls. The approach will detect and
monitor for errors that have already occurred. In addition, continuous monitoring will
benefit the internal audit function in reducing the use of auditing resources and in the
timely reporting of errors or inconsistencies. System integrity is ensured is incorrect. System
integrity is typically associated with preventive controls such as input controls and quality
assurance reviews. These controls do not typically benefit an internal auditing function
implementing continuous monitoring. Continuous monitoring benefits the internal audit
function because it reduces the use of auditing resources. Errors can be corrected in a timely
fashion is incorrect. Continuous audit will detect errors but not correct them. Correcting
errors is the function of the organization’s management and not the internal audit
function. Continuous auditing benefits the internal audit function because it reduces the use
of auditing resources to create a more efficient auditing function.
Question 51: Skipped
When using a digital signature, the message digest is computed by the:
receiver only.
(Correct)
sender only.
certificate authority.
Explanation
The organization and client must comply with open source software license terms.
(Correct)
The client did not pay for the open source software components.
Explanation
The organization and client must comply with open source software license terms is correct.
There are many types of open source software licenses and each has different terms and
conditions. Some open source software licensing allows use of the open source software
component freely but requires that the completed software product must also allow the
same rights. This is known as viral licensing, and if the development organization is not
careful, its products could violate licensing terms by selling the product for profit. The IS
auditor should be most concerned with open source software licensing compliance to avoid
unintended intellectual property risk or legal consequences. The client did not pay for the
open source software components is incorrect. A major benefit of using open source
software is that it is free. The client is not required to pay for the open source software
components; however, both the developing organization and the client should be
concerned about the licensing terms and conditions of the open source software
components that are being used. Open source software has security vulnerabilities is
incorrect. Open source software, just like any software code, should be tested for security
flaws and should be part of the normal system development life cycle (SDLC) process. This is
not more of a concern than licensing compliance. Open source software is unreliable for
commercial use is incorrect. Open source software does not inherently lack quality. Like any
software code, it should be tested for reliability and should be part of the normal SDLC
process. This is not more of a concern than licensing compliance.
Question 53: Skipped
Effective IT governance ensures that the IT plan is consistent with the organization's -
security plan.
audit plan.
investment plan.
business plan.
(Correct)
Explanation
Business plan is correct. To govern IT effectively, IT and business should be moving in the
same direction, requiring that the IT plans are aligned with an organization’s business
plans. Audit plan is incorrect and is not part of the IT plan. Security plan is incorrect and not
a responsibility of IT and does not need to be consistent with the IT plan. Investment plan is
incorrect and is not part of the IT plan.
Question 54: Skipped
An accuracy measure for a biometric system is:
false-acceptance rate.
(Correct)
registration time.
Explanation
False-acceptance rate is correct. Three main accuracy measures are used for a biometric
solution: false-rejection rate (FRR), cross-error rate (CER) and false-acceptance rate (FAR).
FRR is a measure of how often valid individuals are rejected. FAR is a measure of how often
invalid individuals are accepted. CER is a measure of when the false-rejection rate equals the
false-acceptance rate. System response time is incorrect. An important consideration in the
implementation of biometrics is the time required to process a user. If the system is too
slow then it will impact productivity and lead to frustration. However, this is not an accuracy
measure. Registration time is incorrect. The registration time is a measure of the effort taken
to enroll a user in the system. This is not an accuracy measure. Input file size is incorrect. The
file size to retain biometric information varies depending on the type of biometric solution
selected. This is not an accuracy measure.
Question 55: Skipped
A company has contracted with an external consulting firm to implement a
commercial financial system to replace its existing system developed in-house. In
reviewing the proposed development approach, which of the following would be of
GREATEST concern?
Prototyping is being used to confirm that the system meets business requirements.
(Correct)
Explanation
A quality plan is not part of the contracted deliverables is correct. A quality plan is an
essential element of all projects. It is critical that the contracted supplier be required to
produce such a plan. The quality plan for the proposed development contract should be
comprehensive and encompass all phases of the development and include which business
functions will be included and when. Acceptance testing is to be managed by users is
incorrect. Acceptance is normally managed by the user area because users must be satisfied
that the new system will meet their requirements. Not all business functions will be available
on initial implementation is incorrect. If the system is large, a phased-in approach to
implementing the application is a reasonable approach. Prototyping is being used to
confirm that the system meets business requirements is incorrect. Prototyping is a valid
method of ensuring that the system will meet business requirements.
Question 56: Skipped
There is a concern that the risk of unauthorized access may increase after
implementing a single sign-on process. To prevent unauthorized access, the MOST
important action is to:
(Correct)
Explanation
Mandate a strong password policy is correct. Strong passwords are important in any
environment but take on special importance in an SSO environment, where a user enters a
password only one time and thereafter has general access throughout the environment. Of
the options given, only a strong password policy offers broad preventative effects. Monitor
failed authentication attempts is incorrect. Ensuring that all failed authentication attempts
are monitored is a good practice but is not a preventive control. Review the log files
regularly is incorrect. This can increase the probability of detecting unauthorized access but
will not prevent unauthorized access. Deactivate unused accounts promptly is incorrect.
Ensuring that all unused accounts are deactivated is important; however, unauthorized
access may occur via a regularly used account.
Question 57: Skipped
Which of the following would be the MOST cost-effective recommendation for
reducing the number of defects encountered during software development projects?
(Correct)
Explanation
Implement formal software inspections is correct. Inspections of code and design are a
proven software quality technique. An advantage of this approach is that defects are
identified before they propagate through the development life cycle. This reduces the cost
of correction because less rework is involved. Increase the time allocated for system testing
is incorrect. Allowing more time for testing may discover more defects; however, little is
revealed as to why the quality problems are occurring, and the cost of the extra testing and
the cost of rectifying the defects found will be greater than if they had been discovered
earlier in the development process. Increase the development staff is incorrect. The ability of
the development staff can have a bearing on the quality of what is produced; however,
replacing staff can be expensive and disruptive, and the presence of a competent staff
cannot guarantee quality in the absence of effective quality management processes. Require
the sign-off of all project deliverables is incorrect. Sign-off of deliverables may help detect
defects if signatories are diligent about reviewing deliverable content; however, this is
difficult to enforce and may occur too late in the process to be cost-effective. Deliverable
reviews normally do not go down to the same level of detail as software inspections.
Question 58: Skipped
The purpose of a mantrap controlling access to a computer facility is PRIMARILY to:
prevent piggybacking.
(Correct)
Explanation
Prevent piggybacking is correct. The intended purpose of a mantrap controlling access to a
computer facility is primarily to prevent piggybacking. Prevent toxic gases from entering the
data center is incorrect. This could be accomplished with a single self-closing door. Starve a
fire of oxygen is incorrect. This could be accomplished with a single self-closing fire door.
Prevent rapid movement in or out of the facility is incorrect. A rapid exit may be necessary in
some circumstances (e.g., a fire).
Question 59: Skipped
Which of the following activities should the business continuity manager perform
FIRST after the replacement of hardware at the primary information processing
facility?
(Correct)
Explanation
Update the IT assets inventory is correct. An IT assets inventory is the basic input for the
business continuity/disaster recovery plan, and the plan must be updated to reflect changes
in the IT infrastructure. Verify compatibility with the hot site is incorrect. Before validating
that the new hardware is compatible with the recovery site, the business continuity manager
should update the listing of all equipment and IT assets included in the business continuity
plan. Review the implementation report is incorrect. The implementation report will be of
limited value to the business continuity manager because the equipment has been installed.
Perform a walk-through of the disaster recovery plan is incorrect. The walk-through of the
plan should only be done after the asset inventory has been updated.
Question 60: Skipped
IS management recently replaced its existing wired local area network with a wireless
infrastructure to accommodate the increased use of mobile devices within the
organization. This will increase the risk of which of the following attacks?
Port scanning
Man-in-the-middle
War driving
(Correct)
Back door
Explanation
War driving is correct. This attack uses a wireless Ethernet card, set in promiscuous mode,
and a powerful antenna to penetrate wireless systems from outside. Port scanning is
incorrect. This will often target the external firewall of the organization. Use of wireless will
not affect this. Back door is incorrect. This is an opening implanted into or left in software
that enables an unauthorized entry into a system. Man-in-the-middle is incorrect. These
attacks intercept a message and can read, replace or modify it.
Question 61: Skipped
Due to unexpected resource constraints of the IS audit team, the audit plan, as
originally approved, cannot be completed. Assuming the situation is communicated in
the audit report, which course of action is MOST acceptable?
Rely on management testing of controls.
(Correct)
Explanation
Focus on auditing high-risk areas is correct. Reducing the scope and focusing on auditing
high-risk areas is the best course of action. Test the adequacy of the control design is
incorrect. Testing the adequacy of control design is not the best course of action because
this does not ensure that controls operate effectively as designed. Test the operational
effectiveness of controls is incorrect. Testing control operating effectiveness does not
ensure that the audit plan is focused on areas of greatest risk. Rely on management testing
of controls is incorrect. The reliance on management testing of controls does not provide an
objective verification of the control environment.
Question 62: Skipped
An organization has implemented an online customer help desk application using a
software as a service (SaaS) operating model. An IS auditor is asked to recommend
the best control to monitor the service level agreement (SLA) with the SaaS vendor as
it relates to availability. What is the BEST recommendation that the IS auditor can
provide?
Implement an online polling tool to monitor the application and record outages.
(Correct)
Log all application outages reported by users and aggregate the outage time weekly.
Explanation
Implement an online polling tool to monitor and record application outages is correct. This
is the best option for an organization to monitor the software as a service application
availability. Comparing internal reports with the vendor’s service level agreement (SLA)
reports would ensure that the vendor’s monitoring of the SLA is accurate and that all
conflicts are appropriately resolved. Ask the software as a service (SaaS) vendor to provide a
weekly report on application uptime is incorrect. Weekly application availability reports are
useful, but these reports represent only the vendor’s perspective. While monitoring these
reports, the organization can raise concerns of inaccuracy; however, without internal
monitoring, such concerns cannot be substantiated. Log all application outages reported by
users and aggregate the outage time weekly is incorrect. Logging the outage times reported
by users is helpful but does not give a true picture of all outages of the online application.
Some outages may go unreported, especially if the outages are intermittent. Contract an
independent third party to provide weekly reports on application uptime is incorrect.
Contracting a third party to implement availability monitoring is not a cost-effective option.
Additionally, this results in a shift from monitoring the SaaS vendor to monitoring the third
party.
Question 63: Skipped
An IS auditor is to assess the suitability of a service level agreement (SLA) between the
organization and the supplier of outsourced services. To which of the following
observations should the IS auditor pay the MOST attention? The SLA does not contain
a-
transition clauses from the old supplier to a new supplier or back to internal in the case of
expiration or termination.
(Correct)
Explanation
Transition clauses from the old supplier to a new supplier or back to internal in the case of
expiration or termination is correct. The delivery of IT services for a specific customer always
implies a close linkage between the client and the supplier of the service. If there are no
contract terms to specify how the transition to a new supplier may be performed, there is
the risk that the old supplier may simply “pull the plug” if the contract expires or is
terminated or may not make data available to the outsourcing organization or new supplier.
This would be the greatest risk to the organization. Late payment clause between the
customer and the supplier is incorrect. Contractual issues regarding payment, service
improvement and dispute resolution are important but not as critical as ensuring that
service disruption, data loss, data retention, or other significant events occur in the event
that the organization switches to a new firm providing outsourced services. Contractual
commitment for service improvement is incorrect. The service level agreement (SLA) should
address performance requirements and metrics to report on the status of services provided;
it’s nice to have commitment for performance improvement, although it’s not mandated.
Dispute resolution procedure between the contracting parties is incorrect. The SLA should
address a dispute resolution procedure and specify the jurisdiction in case of a legal dispute,
but this is not the most critical part of an SLA.
Question 64: Skipped
What is the MAJOR benefit of conducting a control self-assessment over a traditional
audit?
(Correct)
Explanation
It detects risk sooner is correct. Control self-assessments (CSAs) require employees to assess
the control stature of their own function. CSAs help to increase the understanding of
business risk and internal controls. Because they are conducted more frequently than audits,
CSAs help to identify risk in a timelier manner. It replaces the internal audit function is
incorrect. CSAs do not replace the internal audit function; an audit must still be performed
to ensure that controls are present. It reduces the audit workload is incorrect. CSAs may not
reduce the audit function’s workload and are not a major difference between the two
approaches. It reduces audit resource requirements is incorrect. CSAs do not affect the need
for audit resources. Although the results of the CSA may serve as a reference point for the
audit process, they do not affect the scope or depth of audit work that needs to be
performed.
Question 65: Skipped
While reviewing the process for continuous monitoring of the capacity and
performance of IT resources, an IS auditor should PRIMARILY ensure that the process
is focused on:
(Correct)
providing data to enable timely planning for capacity and performance requirements.
Explanation
(Correct)
Explanation
(Correct)
Monitoring vendor-controlled change control and testing
Explanation
Approving and monitoring the status of IT plans and budgets is correct. The IT steering
committee typically serves as a general review board for major IT projects and should not
become involved in routine operations; therefore, one of its functions is to approve and
monitor major projects, such as the status of IT plans and budgets. Monitoring vendor-
controlled change control and testing is incorrect. Vendor change control is a sourcing issue
and should be monitored by IT management. Ensuring a separation of duties within the
information’s processing environment is incorrect. This is an IT management
responsibility. Liaising between the IT department and end users is incorrect. This is a
function of the individual parties and not a committee responsibility.
Question 68: Skipped
When developing a risk management program, what is the FIRST activity to be
performed?
Classification of data
Threat assessment
Inventory of assets
(Correct)
Criticality analysis
Explanation
Inventory of assets is correct. Identification of the assets to be protected is the first step in
the development of a risk management program. Threat assessment is incorrect. The assets
need to be identified first. A listing of the threats that can affect the assets is a later step in
the process. Classification of data is incorrect. Data classification is required for defining
access controls and in criticality analysis, but the assets (including data) need be identified
before doing classification. Criticality analysis is incorrect. This is a later step in the process
after the assets have been identified.
Question 69: Skipped
After reviewing the disaster recovery planning process of an organization, an IS
auditor requests a meeting with organization management to discuss the findings.
Which of the following BEST describes the main goal of this meeting?
(Correct)
Explanation
Confirm factual accuracy of the findings is correct. The goal of the meeting is to confirm the
factual accuracy of the audit findings and present an opportunity for management to agree
on or respond to recommendations for corrective action. Obtain management approval of
the corrective action plan is incorrect. Management approval of the corrective action plan is
not required. Management can elect to implement another corrective action plan to address
the risk. Assist management in the implementation of corrective actions is incorrect.
Implementation of corrective actions should be done after the factual accuracy of findings is
established, but the work of implementing corrective action is not typically assigned to the
IS auditor, because this impairs the auditor’s independence. Prioritize the resolution of
the items is incorrect. Rating the audit findings provides guidance to management for
allocating resources to the high-risk items first.
Question 70: Skipped
Effective IT governance requires organizational structures and processes to ensure
that-
(Correct)
Explanation
The IT strategy extends the organization’s strategies and objectives is correct. Effective IT
governance requires that board and executive management extend governance to IT and
provide the leadership, organizational structures and processes that ensure that the
organization’s IT sustains and extends the organization’s strategies and objectives,
and that the strategy is aligned with business strategy. Risk is maintained at a level
acceptable for IT management is incorrect. Risk acceptance levels are set by senior
management, not by IT management. The business strategy is derived from an IT strategy is
incorrect. The business strategy drives the IT strategy, not the other way around. IT
governance is separate and distinct from the overall governance is incorrect. IT governance
is not an isolated discipline; it must become an integral part of the overall enterprise
governance.
Question 71: Skipped
Which of the following is MOST important for an IS auditor to understand when
auditing an e-commerce environment?
The nature and criticality of the business process supported by the application
(Correct)
Explanation
The nature and criticality of the business processes supported by the application is correct.
The e-commerce application enables the execution of business transactions. Therefore, it is
important to understand the nature and criticality of the business process supported by the
e-commerce application to identify specific controls to review. The technology architecture
of the e-commerce environment is incorrect. Understanding the technology architecture of
the e-commerce environment is important; however, it is vital that the nature and criticality
of the business process supported by the e-commerce application are well understood. The
policies, procedures and practices forming the control environment is incorrect. Although
the policies, procedure and practices that form the internal control environment need to be
in alignment with the e-commerce environment, this is not the most important element that
the IS auditor needs to understand. Continuous monitoring of control measures for system
availability and reliability is incorrect. The availability of the e-commerce environment is
important, but this is only one of the aspects to be considered with respect to business
processes that are supported by the e-commerce application.
Question 72: Skipped
A web server is attacked and compromised. Organizational policy states that incident
response should balance containment of an attack with retaining freedom for later
legal action against an attacker. Under the circumstances, which of the following
should be performed FIRST?
Disconnect the web server from the network.
(Correct)
Explanation
Disconnect the web server from the network is correct. The first action is to disconnect the
web server from the network to secure the device for investigation, contain the damage and
prevent more actions by the attacker. Dump the volatile storage data to a disk is incorrect.
This may be used at the investigation stage but does not contain an attack in progress. Run
the server in a fail-safe mode is incorrect. In order to do this, the server needs to be shut
down. Shut down the web server is incorrect. This could potentially erase information that
might be needed for a forensic investigation or to develop a strategy to prevent future
similar attacks.
Question 73: Skipped
While auditing an internally developed web application, an IS auditor determines that
all business users share a common access profile. Which of the following is the MOST
relevant recommendation to prevent the risk of unauthorized data modification?
(Correct)
Explanation
Customize user access profiles per job responsibility is correct. The strongest control is a
preventive control that is automated through the system. Developing additional access
profiles would ensure that the system restricts users to privileges defined by their job
responsibilities and that an audit trail exists for those user actions. Enable detailed logging
of user actions is incorrect. Logging is a detective control and often a secondary
recommendation in the event that technical issues or costs prohibit implementation of
preventive controls. Enforce strong password policy for all accounts is incorrect. While a
enforcing password policy is a type of preventive control, it is not as effective as removing
excessive access rights from users who do not need it to perform their job duties.
Implement regular access rights review is incorrect. Access right review will not help in this
scenario, because all profiles have similar set of access rights.
Question 74: Skipped
The BEST method for assessing the effectiveness of a business continuity plan is to
review the -
(Correct)
Explanation
Results from previous tests is correct. Previous test results will provide evidence of the
effectiveness of the business continuity plan. Plans and compare them to appropriate
standards is incorrect. Comparisons to standards will give some assurance that the plan
addresses the critical aspects of a business continuity plan but will not reveal anything
about its effectiveness. Emergency procedures and employee training is incorrect. Reviewing
emergency procedures would provide insight into some aspects of the plan but would fall
short of providing assurance of the plan’s overall effectiveness. Offsite storage and
environmental controls is incorrect. Reviewing offsite storage and environmental controls
would provide insight into some aspects of the plan but would fall short of providing
assurance of the plan’s overall effectiveness.
Question 75: Skipped
During an audit, which of the following situations are MOST concerning for an
organization that significantly outsources IS processing to a private network?
The contract does not contain a right-to-audit clause for the third party.
(Correct)
The contract was not reviewed by an information security subject matter expert prior to
signing.
Explanation
The contract does not contain a right-to-audit clause for the third party is correct. Lack of a
right-to-audit clause in the contract impacts the IS auditor’s ability to perform the IS
audit. Hence, the IS auditor is most concerned with such a situation. In the case of
outsourcing to a private network, the organization should ensure that the third party has a
minimum set of IT security controls in place and that they are operating effectively. The
contract was not reviewed by an information security subject matter expert prior to signing
is incorrect. Having an information security subject matter expert review a contract is a good
practice, but it is not a requirement in all industries. The IS outsourcing guidelines are not
approved by the board of directors is incorrect. Approval of the IS outsourcing guidelines by
the board is a good practice of governance, and lack of approval is an audit issue. However,
it does not impact the IS auditor’s ability to perform IS audit. There is a lack of well-
defined IS performance evaluation procedures is incorrect. Lack of well-defined procedures
does not enable objective evaluation of IS performance and is an audit issue. However, it
does not result into major risk or repercussions and also does not impact the IS auditor’s
ability to perform an IS audit.
Question 76: Skipped
Which of the following data validation edits is effective in detecting transposition and
transcription errors?
Check digit
(Correct)
Duplicate check
Validity check
Range check
Explanation
A check digit is correct. This is a numeric value that is calculated mathematically and is
appended to data to ensure that the original data have not been altered (e.g., an incorrect,
but valid, value substituted for the original). This control is effective in detecting
transposition and transcription errors. A range check is incorrect. This is checking data that
matches a predetermined range of allowable values. A validity check is incorrect. This is
programmed checking of the data validity in accordance with predetermined criteria.
Duplicate check is incorrect. In a duplicate check, new or fresh transactions are matched to
those previously entered to ensure that they are not already in the system.
Question 77: Skipped
During the review of an enterprise's preventive maintenance process for systems at a
data center, the IS auditor has determined that adequate maintenance is being
performed on all critical computing, power and cooling systems. Additionally, it is
MOST important for the IS auditor to ensure that the organization:
(Correct)
Explanation
Performs maintenance during noncritical processing times is correct. The biggest risk to
normal operations in a data center would be if an incident or mishap were to happen during
critical peak processing times; therefore, it would be prudent to ensure that no type of
system maintenance be performed at these critical times. Has performed background
checks on all service personnel is incorrect. While the trustworthiness of the service
personnel is important, it is normal practice for these individuals to be escorted and
supervised by the data center personnel. It is also expected that the service provider would
perform this background check, not the customer. Escort service personnel at all times when
performing their work is incorrect. This is common and a good practice, but the greater risk
in this case would be if work were performed during critical processing times. Independently
verifies that maintenance is being performed is incorrect. It is possible that the service
provider is performing inadequate maintenance; therefore, this issue may need to be
investigated; however, the bigger risk is maintenance being performed at critical processing
times.
Question 78: Skipped
If inadequate, which of the following would be the MOST likely contributor to a
denial-of-service attack?
(Correct)
Explanation
Router configuration and rules is correct. Improper router configuration and rules could lead
to an exposure to denial-of-service (DoS) attacks. Design of the internal network is incorrect.
An inefficient design of the internal network may also lead to a DoS but this is not as high a
risk as router misconfiguration errors. Updates to router system software is incorrect. This
has led to a DoS in the past, but this is a subset of router configuration and rules. Audit
testing and review techniques is incorrect. This can cause a DoS if tests disable systems or
applications, but this is not the most likely risk.
Question 79: Skipped
An IS auditor conducting a review of software usage and licensing discovers that
numerous PCs contain unauthorized software.
Which of the following actions should the IS auditor take?
Report the use of the unauthorized software and the need to prevent recurrence.
(Correct)
Warn the end users about the risk of using illegal software.
Explanation
"Report the use of the unauthorized software and the need to prevent recurrence" is
correct. The use of unauthorized or illegal software should be prohibited by an
organization. An IS auditor must convince the user and management of the risk and
the need to eliminate the risk. For example, software piracy can result in exposure and
severe fines.
"Delete all copies of the unauthorized software" is incorrect. An IS auditor should not
assume the role of the enforcing officer and take on any personal involvement in removing
the unauthorized software.
(Correct)
both a data loss and a processing interruption longer than one minute.
Explanation
A data loss of up to one minute, but the processing must be continuous is correct. Recovery
time objective (RTO) measures an organization’s tolerance for downtime and recovery point
objective (RPO) measures how much data loss can be accepted. A one-minute processing
interruption but cannot tolerate any data loss is incorrect. A processing interruption of one
minute would exceed the zero RTO set by the organization. A processing interruption of one
minute or more is incorrect. This would exceed the continuous availability requirements of
an RTO of zero. Both a data loss and a processing interruption longer than one minute is
incorrect. An RPO of one minute would only allow data loss of one minute.
Question 81: Skipped
During a disaster recovery test, an IS auditor observes that the performance of the
disaster recovery site's server is slow. To find the root cause of this, the IS auditor
should FIRST review the:
(Correct)
Explanation
Configurations and alignment of the primary and disaster recovery sites is correct. Because
the configuration of the system is the most probable cause, the IS auditor should review
that first. Event error log generated at the disaster recovery site is incorrect. If the issue
cannot be clarified, the IS auditor should then review the event error log. Disaster recovery
test plan is incorrect. This would not identify any issues related to system performance
unless the test was poorly designed and inefficient, but that would come after checking the
configuration. Disaster recovery plan is incorrect. Reviewing the disaster recovery plan
would be unlikely to provide any information about system performance issues.
Question 82: Skipped
A firewall is being deployed at a new location. Which of the following is the MOST
important factor in ensuring a successful deployment?
Explanation
Testing and validating the rules is correct. A mistake in the rule set can render a firewall
ineffective or insecure. Therefore, testing and validating the rules is the most important
factor in ensuring a successful deployment. Reviewing logs frequently is incorrect. A regular
review of log files would not start until the deployment has been completed. Training a local
administrator at the new location is incorrect. This may not be necessary if the firewalls are
managed from a central location. Sharing firewall administrative duties is incorrect. Having
multiple administrators is a good idea, but not the most important for successful
deployment.
Question 83: Skipped
A new application has been purchased from a vendor and is about to be implemented.
Which of the following choices is a key consideration when implementing the
application?
Preventing the compromise of the source code during the implementation process
Ensuring that vendor default accounts and passwords have been disabled
(Correct)
Removing the old copies of the program from escrow to avoid confusion
Explanation
Ensuring that vendor default accounts and passwords have been disabled is correct.
Disabling vendor default accounts and passwords is a critical part of implementing a new
application. Preventing the compromise of the source code during the implementation
process is incorrect. The source code may not even be available to the purchasing
organization, and it is the executable or object code that must be protected during
implementation. Removing the old copies of the program from escrow to avoid confusion is
incorrect. Because this is a new application, there should not be any problem with older
versions in escrow. Verifying that the vendor is meeting support and maintenance
agreements is incorrect. It is not possible to ensure that the vendor is meeting support and
maintenance requirements until the system is operating.
Question 84: Skipped
Emergency changes that bypass the normal change control process are MOST
acceptable if:
management reviews and approves the changes after they have occurred.
(Correct)
the changes are documented in the change control system by the operations department.
Explanation
Management reviews and approves the changes after they have occurred is correct. Because
management cannot always be available when a system failure occurs, it is acceptable for
changes to be reviewed and approved within a reasonable time period after they occur. The
changes are reviewed by a peer at the time of the change is incorrect. Although peer review
provides some accountability, management should review and approve all changes, even if
that review and approval must occur after the fact. The changes are documented in the
change control system by the operations department is incorrect. Documenting the event
does not replace the need for a review and approval process to occur. Management has
preapproved all emergency changes is incorrect. It is not a good control practice for
management to ignore its responsibility by preapproving all emergency changes in advance
without reviewing them. Unauthorized changes could then be made without management’s
knowledge.
Question 85: Skipped
When identifying an earlier project completion time, which is to be obtained by
paying a premium for early completion, the activities that should be selected are
those -
(Correct)
Explanation
That have zero slack time is correct. A critical path’s activity time is longer than that for
any other path through the network. This path is important because if everything goes as
scheduled, its length gives the shortest possible completion time for the overall project.
Activities on the critical path become candidates for crashing (i.e., for reduction in their time
by payment of a premium for early completion). Activities on the critical path have zero
slack time and conversely, activities with zero slack time are on a critical path. By
successively relaxing activities on a critical path, a curve showing total project costs versus
time can be obtained. Whose sum of activity time is the shortest is incorrect. Attention
should focus on the tasks within the critical path that have no slack time. That give the
longest possible completion time is incorrect. The critical path is the longest time length of
the activities but is not based on the longest time of any individual activity. Whose sum of
slack time is the shortest is incorrect. A task on the critical path has no slack time.
Question 86: Skipped
Which of the following is the BEST method for an IS auditor to verify that critical
production servers are running the latest security updates released by the vendor?
Verify manually that the patches are applied on a sample of production servers.
(Correct)
Explanation
Run an automated tool to verify the security patches on production servers is correct. An
automated tool can immediately provide a report on which patches have been applied and
which are missing. Ensure that automatic updates are enabled on production servers is
incorrect. This may be a valid way to manage the patching process; however, this would not
provide assurance that all servers are being patched appropriately. Verify manually that the
patches are applied on a sample of production servers is incorrect. This will be less effective
than automated testing and introduces a significant audit risk. Manual testing is also
difficult and time consuming. Review the change management log for critical production
servers is incorrect. The change management log may not be updated on time and may not
accurately reflect the patch update status on servers. A better testing strategy is to test the
server for patches, rather than examining the change management log.
Question 87: Skipped
The most common reason for the failure of information systems to meet the needs of
users is that -
(Correct)
Explanation
User participation in defining the system’s requirements was inadequate is correct. Lack
of adequate user involvement, especially in the system’s requirements phase, will usually
result in a system that does not fully or adequately address the needs of the user. Only users
can define what their needs are and, therefore, what the system should accomplish. User
needs are constantly changing is incorrect. Although changing user needs has an effect on
the success or failure of many projects, the core problem is usually a lack of getting the
initial requirements correct at the beginning of the project. The growth of system
requirements was forecast inaccurately is incorrect. Projects may fail as the needs of the
users increase; however, this can be mitigated through better change control procedures.
The hardware system limits the number of concurrent users is incorrect. Rarely do hardware
limitations affect the usability of the project as long as the requirements were correctly
documented at the beginning of the project.
Question 88: Skipped
In a risk-based IS audit, where both inherent and control risk have been assessed as
high, an IS auditor would MOST likely compensate for this scenario by performing
additional -
substantive testing.
(Correct)
stop-or-go sampling.
compliance testing.
discovery sampling.
Explanation
Substantive testing is correct. Because both the inherent and control risk are high in this
case, additional testing is required. Substantive testing obtains audit evidence on the
completeness, accuracy or existence of activities or transactions during the audit period.
Stop-or-go sampling is incorrect. This is used when an IS auditor believes few errors will be
found in the population, and, thus, is not the best type of testing to perform in this case.
Compliance testing is incorrect. This is evidence gathering for the purpose of testing an
enterprise’s compliance with control procedures. Although performing compliance
testing is important, performing additional substantive testing is more appropriate in this
case. Discovery sampling is incorrect. This is a form of attribute sampling that is used to
determine a specified probability of finding at least one example of an occurrence
(attribute) in a population, typically used to test for fraud or other irregularities. In this case,
additional substantive testing is the better option.
Question 89: Skipped
Before implementing controls in a newly developed system, management should
PRIMARILY ensure that the controls -
(Correct)
Explanation
re-scope the audit to include the separate project as part of the current audit.
(Correct)
Explanation
Report this issue as a finding in the audit report is correct. It is critical for the EA to include
the future state because the gap between the current state and the future state will
determine IT strategic and tactical plans. If the EA does not include a future-state
representation, it is not complete, and this issue should be reported as a finding.
Recommend that this separate project be completed as soon as possible is incorrect. The IS
auditor does not ordinarily provide input on the timing of projects, but rather provides an
assessment of the current environment. The most critical issue in this scenario is that the
enterprise architecture (EA) is undergoing change, so the IS auditor should be most
concerned with reporting this issue. Recommend the adoption of the Zachmann framework
is incorrect. The organization is free to choose any EA framework, and the IS auditor should
not recommend a specific framework. Re-scope the audit to include the separate project as
part of the current audit is incorrect. Changing the scope of an audit to include the
secondary project is not required, although a follow-up audit may be desired.
Question 91: Skipped
A hard disk containing confidential data was damaged beyond repair. If the goal is to
positively prevent access to the data by anyone else, what should be done to the hard
disk before it is discarded?
Degaussing
Low-level formatting
Destruction
(Correct)
Overwriting
Explanation
Destruction is correct. Physically destroying the hard disk is the most effective way to ensure
that data cannot be recovered. Overwriting is incorrect. Rewriting data is impractical
because the hard disk is damaged and offers less assurance than physical destruction even
when done successfully. Low-level formatting is incorrect. This is impractical because the
hard disk is damaged and offers less assurance than physical destruction even when done
successfully. Degaussing is incorrect. This is highly effective but offers less assurance than
physical destruction.
Question 92: Skipped
The head of human resources has requested an IS audit to identify payroll
overpayments for the previous year. Which would be the BEST audit technique to use
in this situation?
Generate sample test data
(Correct)
Explanation
(Correct)
The policy has not been updated in more than one year.
The company does not have an information security policy committee.
Explanation
The policy is approved by the security administrator is correct. The information security
policy should have an owner who has management responsibility for the development,
review, approval and evaluation of the security policy. The position of security administrator
is typically a staff-level position (not management), and therefore does not have the
authority to approve the policy. In addition, an individual in a more independent position
should also review the policy. Without proper management approval, enforcing the policy
may be problematic, leading to compliance or security issues. The policy has not been
updated in more than one year is incorrect. Although the information security policy should
be updated on a regular basis, the specific time period may vary based on the organization.
Although reviewing policies annually is a good practice, the policy may be updated less
frequently and still be relevant and effective. An outdated policy is still enforceable, whereas
a policy without proper approval is not enforceable. The policy includes no revision history
is incorrect. The lack of a revision history with respect to the IS policy document is an issue
but not as significant as not having it approved by management. A new policy, for example,
may not have been subject to any revisions yet. The company does not have an information
security policy committee is incorrect. Although a policy committee drawn from across the
company is a good practice and may help write better policies, a good policy can be written
by a single person, and the lack of a committee is not a problem by itself.
Question 94: Skipped
During which of the following phases in system development would user acceptance
test plans normally be prepared?
Requirements definition
(Correct)
Feasibility study
Postimplementation review
Implementation planning
Explanation
Requirements definition is correct. During requirements definition, the project team will be
working with the users to define their precise objectives and functional needs. At this time,
the users should be working with the team to consider and document how the system
functionality can be tested to ensure that it meets their stated needs. An IS auditor should
know at what point user testing should be planned to ensure that it is most effective and
efficient. The feasibility study is incorrect and is too early for such detailed user involvement.
Implementation planning is incorrect. The implementation planning phase is when the tests
are conducted. It is too late in the process to develop the test plan. Post-implementation
review is incorrect. User acceptance testing should be completed prior to implementation.
Question 95: Skipped
Consider an organization that has outsourced its help desk activities. As an IS auditor,
your GREATEST concern when reviewing the contract and associated service level
agreement between the organization and vendor should be the provisions for -
(Correct)
Explanation
Independent audit reports or full audit access is correct. When the functions of an IT
department are outsourced, an IS auditor should ensure that a provision is made for
independent audit reports that cover all essential areas, or that the outsourcer has full audit
access. Documentation of staff background checks is incorrect. Although it is necessary to
document the fact that background checks are performed, this is only one of the provisions
that should be in place for audits. Reporting the year-to-year incremental cost reductions is
incorrect. Financial measures such as year-to-year incremental cost reductions are desirable
to have in a service level agreement (SLA); however, cost reductions are not as important as
the availability of independent audit reports or full audit access. Reporting staff turnover,
development or training is incorrect. An SLA might include human relationship measures
such as resource planning, staff turnover, development or training, but this is not as
important as the requirements for independent reports or full audit access by the
outsourcing organization.
Question 96: Skipped
Which of the following is the MOST critical step when planning an IS audit?
(Correct)
Explanation
Perform a risk assessment is correct. Of all the steps listed, performing a risk assessment is
the most critical. Risk assessment is required by ISACA IS Audit and Assurance Standard
1202 (Risk Assessment in Planning), statement 1202.2: “IS audit and assurance
professionals shall identify and assess risk relevant to the area under review, when planning
individual engagements.†In addition to the standards requirement, if a risk assessment is
not performed, then high-risk areas of the auditee systems or operations may not be
identified for evaluation. Review findings from prior audits is incorrect. The findings of a
previous audit are of interest to the auditor, but they are not the most critical step. The most
critical step involves finding the current issues or high-risk areas, not reviewing the
resolution of older issues. A review of historical audit findings could indicate that
management is not resolving the items or the recommendation was ineffective. Executive
management’s approval of the audit plan is incorrect. Executive management is not
required to approve the audit plan. It is typically approved by the audit committee or board
of directors. Management could recommend areas to audit. Review information security
policies and procedures is incorrect. Reviewing information security policies and procedures
is normally be conducted during fieldwork, not planning.
Question 97: Skipped
What is the MOST prevalent security risk when an organization implements remote
virtual private network (VPN) access to its network?
(Correct)
Explanation
Malicious code could be spread across the network is correct. Virtual private network (VPN)
is a mature technology; VPN devices are hard to break. However, when remote access is
enabled, malicious code in a remote client could spread to the organization’s network. One
problem is when the VPN terminates inside the network and the encrypted VPN traffic goes
through the firewall. This means that the firewall cannot adequately examine the traffic. The
VPN logon could be spoofed is incorrect. A secure VPN solution would use two-factor
authentication to prevent spoofing. Traffic could be sniffed and decrypted is incorrect.
Sniffing encrypted traffic does not generally provide an attack vector for its unauthorized
decryption. The VPN gateway could be compromised is incorrect. A misconfigured or poorly
implemented VPN gateway could be subject to attack, but if it is located in a secure subnet,
then the risk is reduced.
Question 98: Skipped
To address the risk of operations staff's failure to perform the daily backup,
management requires that the systems administrator sign off on the daily backup.
This is an example of risk -
avoidance.
acceptance.
transfer.
mitigation.
(Correct)
Explanation
Mitigation is correct. Risk mitigation is the strategy that provides for the definition and
implementation of controls to address the risk described. By requiring the system’s
administrator to sign off on the completion of the backups, this is an administrative control
that can be validated for compliance. Avoidance is incorrect. Risk avoidance is a strategy
that provides for not implementing certain activities or processes that would incur risk.
Transfer is incorrect. Risk transfer is the strategy that provides for sharing risk with partners
or purchasing insurance coverage. Acceptance is incorrect. Risk acceptance is a strategy that
provides for formal acknowledgment of the existence of a risk but not taking any action to
reduce the risk, and the monitoring of that risk.
Question 99: Skipped
Which of the following is the MOST likely reason an organization implements an
emergency change to an application using the emergency change control process?
(Correct)
Explanation
There is a high probability of a significant impact on operations is correct. Emergency
releases to an application are fixes that require implementation as quickly as possible to
prevent significant user downtime. Emergency release procedures are followed in such
situations. The application owner requested new functionality is incorrect. Requests for new
functionality by the application owner generally follow normal change control procedures,
unless they have an impact on the business function. Changes are developed using an agile
methodology is incorrect. The agile system development methodology breaks down
projects into short time-boxed iterations. Each iteration focuses on developing end-to-end
functionality from user interface to data storage for the intended architecture. However, the
release does not need to follow emergency release procedures unless there is a significant
impact on operations. The operating system vendor has released a security patch is
incorrect. Operating system security patches are applied after testing, and therefore there is
no need for an emergency release.
Question 100: Skipped
Which of the following findings would be of GREATEST concern to an IS auditor
during a review of logical access to an application?
The file storing the application ID password is in cleartext in the production code.
(Correct)
Some developers have update access to production data.
Explanation
The file storing the application ID password is in cleartext in the production code is correct.
Compromise of the application ID password can result in untraceable, unauthorized changes
to production data; storing the password in cleartext poses the greatest risk. While the
production code may be protected from update access, it is viewable by development
teams. Some developers have update access to production data is incorrect. Developers
might need limited update access to production data to perform their jobs and this access,
when approved and reviewed by management, is acceptable even though it does pose a
risk. The change control team has knowledge of the application ID password is incorrect.
Knowledge of the application ID password by the change control team does not pose a
great concern if adequate separation of duties exists between change control and
development activities. There may be occasions when the application ID needs to be used
by change control in the production environment. The application does not enforce the use
of strong passwords is incorrect. While the lack of a strong password policy and
configuration can result in compromised accounts, the risk is lower than if the application ID
password is compromised because the application ID password does not allow for
traceability.
Question 101: Skipped
The PRIMARY purpose for meeting with auditees prior to formally closing a review is
to-
(Correct)
confirm that the auditors did not overlook any important issues.
Explanation
Gain agreement on the findings is correct. The primary purpose for meeting with auditees
prior to formally closing a review is to gain agreement on the findings and responses from
management. Confirm that the auditors did not overlook any important issues is incorrect.
The closing meeting identifies any misunderstandings or errors in the audit but does not
identify any important issues overlooked in the audit. Receive feedback on the adequacy of
the audit procedures is incorrect. The closing meeting may obtain comments from
management on the conduct of the audit but is not intended to be a formal review of the
adequacy of the audit procedures. Test the structure of the final presentation is incorrect.
The structure of an audit report and the presentation follows accepted standards and
practices. The closing meeting may indicate errors in the audit or presentation but is not
intended to test the structure of the presentation.
Question 102: Skipped
Which of the following should an IS auditor review to understand project progress in
terms of time, budget and deliverables for early detection of possible overruns and
for projecting estimates at completion?
Cost budget
(Correct)
Explanation
Earned value analysis (EVA) is correct. This is an industry standard method for measuring a
project’s progress at any given point in time, forecasting its completion date and final
cost, and analyzing variances in the schedule and budget as the project proceeds. It
compares the planned amount of work with what has actually been completed to determine
if the cost, schedule and work accomplished are progressing in accordance with the plan.
EVA works most effectively if a well-formed work breakdown structure exists. Function point
analysis is incorrect. This is an indirect measure of software size and complexity and,
therefore, does not address the elements of time and budget. Cost budgets is incorrect.
These do not address time. Program evaluation and review technique is incorrect. This aids
time and deliverables management but lacks projections for estimates at completion and
overall financial management.
Question 103: Skipped
Which of the following insurance types provide for a loss arising from fraudulent acts
by employees?
Fidelity coverage
(Correct)
Extra expense
Business interruption
Explanation
Fidelity coverage is correct. This type of insurance covers the loss arising from dishonest or
fraudulent acts by employees. Business interruption is incorrect. Business interruption
insurance covers the loss of profit due to the disruption in the operations of an
organization. Errors and omissions is incorrect. This type of insurance provides legal liability
protection in the event that the professional practitioner commits an act that results in
financial loss to a client. Extra expense is incorrect. This type of insurance is designed to
cover the extra costs of continuing operations following a disaster/disruption within an
organization.
Question 104: Skipped
The MAIN purpose of the annual IS audit plan is to -
(Correct)
Explanation
Secondary key
Primary key
Foreign key
(Correct)
Public key
Explanation
Foreign key is correct. In a relational database with referential integrity, the use of foreign
keys would prevent events such as primary key changes and record deletions, resulting in
orphaned relations within the database. Primary key is incorrect. It should not be possible to
delete a row from a customer table when the customer number (primary key) of that row is
stored with live orders on the orders table (the foreign key to the customer table). A primary
key works in one table so it is not able to provide/ensure referential integrity by itself.
Secondary key is incorrect. Secondary keys that are not foreign keys are not subject to
referential integrity checks. Public key is incorrect. A public key is related to encryption and
not linked in any way to referential integrity.
Question 106: Skipped
An audit charter should -
clearly state audit objectives for, and the delegation of, authority to the maintenance and
review of internal controls.
document the audit procedures designed to achieve the planned audit objectives.
outline the overall authority, scope and responsibilities of the audit function.
(Correct)
be dynamic and change to coincide with the changing nature of technology and the audit
profession.
Explanation
Outline the overall authority, scope and responsibilities of the audit function is correct. An
audit charter should state management’s objectives for and delegation of authority to IS
auditors. Be dynamic and change to coincide with the changing nature of technology and
the audit profession is incorrect. The audit charter should not be subject to changes in
technology and should not significantly change over time. The charter should be approved
at the highest level of management. Clearly state audit objectives for, and the delegation of,
authority to the maintenance and review of internal controls is incorrect. An audit charter
states the authority and reporting requirements for the audit but not the details of
maintenance of internal controls. Document the audit procedures designed to achieve the
planned audit objectives is incorrect. An audit charter is not at a detailed level and,
therefore, does not include specific audit objectives or procedures.
Question 107: Skipped
During an IS audit of a global organization, the IS auditor discovers that the
organization uses Voice-over Internet Protocol over the Internet as the sole means of
voice connectivity among all offices. Which of the following presents the MOST
significant risk for the organization's VoIP infrastructure?
(Correct)
Explanation
Distributed denial-of-service (DDoS) attack is correct. This would potentially disrupt the
organization’s ability to communicate among its offices and have the highest impact. In a
traditional voice network, a DDoS attack would only affect the data network, not voice
communications. Network equipment failure is incorrect. The use of Voice-over Internet
Protocol does not introduce any unique risk with respect to equipment failure, and
redundancy can be used to address network failure. Premium-rate fraud (toll fraud) is
incorrect. Toll fraud occurs when someone compromises the phone system and makes
unauthorized long- distance calls. While toll fraud may cost the business money, the more
severe risk would be the disruption of service. Social engineering attack is incorrect. This
involves gathering sensitive information to launch an attack and can be exercised over any
kind of telephony.
Question 108: Skipped
During an application audit, the IS auditor finds several problems related to corrupt
data in the database. Which of the following is a corrective control that the IS auditor
should recommend?
(Correct)
Explanation
Proceed with restore procedures is correct as this is a corrective control. Restore procedures
can be used to recover databases to their last-known archived version. Define the standards,
and closely monitor them for compliance is incorrect. Establishing standards is a preventive
control, and monitoring for compliance is a detective control. Ensure that only authorized
personnel can update the database is incorrect as this is a preventive control. Establish
controls to handle concurrent access problems is incorrect as this is a preventive control.
Question 109: Skipped
As an IS auditor, you review one day of logs for a remotely managed server and finds
one case where logging failed, and the backup restarts cannot be confirmed. What
should you do?
Review the classifications of data held on the server.
(Correct)
Explanation
Expand the sample of logs reviewed is correct. IS Audit and Assurance Standards require
that an IS auditor gather sufficient and appropriate audit evidence. The IS auditor has found
a potential problem and now needs to determine whether this is an isolated incident or a
systematic control failure. Issue an audit finding is incorrect. At this stage it is too
preliminary to issue an audit finding. Seeking an explanation from management is advisable,
but it is better to gather additional evidence to properly evaluate the seriousness of the
situation. Seek an explanation from IS management is incorrect. Without gathering more
information on the incident and the frequency of the incident, it is difficult to obtain a
meaningful explanation from management. Review the classifications of data held on the
server is incorrect. A backup failure, which has not been established at this point, will be
serious if it involves critical data. However, the issue is not the importance of the data on the
server, where a problem has been detected, but whether a systematic control failure that
impacts other servers exists.
Question 110: Skipped
When developing a risk-based audit strategy, an IS auditor should conduct a risk
assessment to ensure that-
(Correct)
Explanation
Vulnerabilities and threats are identified is correct. While developing a risk-based audit
strategy, it is critical that the risk and vulnerabilities are understood. They determine the
areas to be audited and the extent of coverage. Controls needed to mitigate risk are in place
is incorrect. Understanding whether appropriate controls that are required to mitigate risk
are in place is a resultant effect of an audit. Audit risk is considered is incorrect. Audit risk is
an inherent aspect of auditing, directly related to the audit process and not relevant to the
risk analysis of the environment to be audited. A gap analysis is appropriate is incorrect. A
gap analysis is normally done to compare the actual state to an expected or desirable state.
Question 111: Skipped
Which of the following procedures would MOST effectively detect the loading of
illegal software packages onto a network?
(Correct)
Explanation
Periodic checking of hard drives is correct. This would be the most effective method of
identifying illegal software packages loaded onto the network. The use of diskless
workstations is incorrect. These act as a preventive control and are not totally effective in
preventing users from accessing illegal software over the network. The use of current
antivirus software is incorrect. Antivirus software will not necessarily identify illegal software,
unless the software contains a virus. Policies that result in instant dismissal if violated is
incorrect. Policies are a preventive control to lay out the rules about loading the software,
but will not detect the actual occurrence.
Question 112: Skipped
Which of the following MOST likely indicates that a customer data warehouse should
remain in-house rather than be outsourced to an offshore operation?
(Correct)
Explanation
Privacy laws can prevent cross-border flow of information is correct. Privacy laws prohibiting
the cross-border flow of personally identifiable information make it impossible to locate a
data warehouse containing customer information in another country. Time-zone differences
can impede communications between IT teams is incorrect. These are usually manageable
issues for outsourcing solutions. Telecommunications cost can be much higher in the first
year is incorrect. Higher telecommunications costs are a part of the cost-benefit analysis and
not usually a reason to retain data in-house. Software development may require more
detailed specifications is incorrect. Software development typically requires more detailed
specifications when dealing with offshore operations, but that is not a factor that should
prohibit the outsourcing solution.
Question 113: Skipped
A data center has a badge-entry system. Which of the following is MOST important to
protect the computing assets in the center?
All badge entry attempts are logged, whether or not they succeed.
(Correct)
Explanation
A process for promptly deactivating lost or stolen badges is followed is correct. The biggest
risk is from unauthorized individuals who can enter the data center, whether they are
employees or not. Thus, having and following a process of deactivating lost or stolen
badges is important. Badge readers are installed in locations where tampering would be
noticed is incorrect. Tampering with a badge reader cannot open the door, so this is
irrelevant. The computer that controls the badge system is backed up frequently is incorrect.
The configuration of the system does not change frequently; therefore, frequent backup is
not necessary. All badge entry attempts are logged, whether or not they succeed is
incorrect. Logging the entry attempts is important, but not as important as ensuring that a
lost or stolen badge is disabled as quickly as possible.
Question 114: Skipped
An IS auditor discovers that uniform resource locators (URLs) for online control self-
assessment questionnaires are sent using URL shortening services. The use of URL
shortening services would MOST likely increase the risk of which of the following
attacks?
Phishing
(Correct)
Denial-of-service
Spoofing
Buffer overflow
Explanation
Phishing is correct. URL shortening services have been adopted by hackers to fool users and
spread malware (i.e., phishing). Spoofing is incorrect. This applies to source addressing,
while uniform resource locator (URL) shortening applies to destination addressing. Buffer
overflow is incorrect. This is not generally associated with URL shortening. Denial-of-service
is incorrect. These attacks are not affected by URL shortening services.
Question 115: Skipped
In a review of the human resources policies and procedures within an organization, an
IS auditor is MOST concerned with the absence of a -
termination checklist.
(Correct)
Explanation
Termination checklist is correct. A termination checklist is critical to ensure the logical and
physical security of an enterprise. In addition to preventing the loss of enterprise property
that was issued to the employee, there is the risk of unauthorized access, intellectual
property theft and even sabotage by a disgruntled former employee. Requirement for
periodic job rotations is incorrect. Job rotation is a valuable control to ensure continuity of
operations, but not the most serious human resources policy risk. Process for formalized exit
interviews is incorrect. Holding an exit interview is desirable when possible to gain feedback
but is not a serious risk. Requirement for new employees to sign a nondisclosure agreement
(NDA) is incorrect. Signing a NDA is a recommended human resources practice, but a lack of
an NDA is not the most serious risk listed.
Question 116: Skipped
Which of the following is an appropriate test method to apply to a business continuity
plan?
Paper
(Correct)
Unit
Pilot
System
Explanation
Paper is correct. A paper test (sometimes called a deskcheck) is appropriate for testing a
business continuity plan (BCP). It is a walk-through of the entire BCP, or part of the BCP,
involving major players in the BCP’s execution who reason out what may happen in a
particular disaster. Pilot is incorrect. A pilot test is used for implementing a new process or
technology and is not appropriate for a BCP. Unit is incorrect. A unit test is used to test new
software components and is not appropriate for a BCP. System is incorrect. A system test is
an integrated test used to test a new IT system but is not appropriate for a BCP.
Question 117: Skipped
The output of the risk management process is an input for making – what?
(Correct)
audit charters.
business plans.
Explanation
Security policy decisions is correct. The risk management process is about making specific,
security-related decisions, such as the level of acceptable risk. Business plans is incorrect.
Making a business plan is not the ultimate goal of the risk management process. Audit
charters is incorrect. Risk management can help create the audit plan, but not the audit
charter. Software design decisions is incorrect. Risk management will drive the design of
security controls in software but influencing security policy is more important.
Question 118: Skipped
Which of the following would normally be the MOST reliable evidence for an IS
auditor?
(Correct)
Ratio analysis developed by the IS auditor from reports supplied by line management
Explanation
A confirmation letter received from a third party verifying an account balance is correct.
Evidence obtained from independent third parties is almost always considered to be more
reliable than assurance provided by local management. Assurance from line management
that an application is working as designed is incorrect. Because management is not
objective and may not understand the risk and control environment, and they are only
providing evidence that the application is working correctly (not the controls), their
assurance is not an acceptable level of trust for audit evidence. Trend data obtained from
Internet sources is incorrect. Data collected from the Internet is not always trustworthy or
independently validated. Ratio analysis developed by the IS auditor from reports supplied
by line management is incorrect. Ratio analysis can identify trends and deviations from a
baseline but is not reliable evidence.
Question 119: Skipped
An IS auditor is reviewing a project risk assessment and notices that the overall
residual risk level is high due to confidentiality requirements. Which of the following
types of risk is normally high due to the number of unauthorized users the project
may affect?
Residual risk
Compliance risk
Inherent risk
(Correct)
Control risk
Explanation
Inherent risk is correct. This is normally high due to the number of users and business areas
that may be affected. Inherent risk is the risk level or exposure without considering the
actions that management has taken or might take. Control risk is incorrect. This can be high,
but it is not due to internal controls not being identified, evaluated or tested, and is not due
to the number of users or business areas affected. Compliance risk is incorrect. Compliance
risk is the penalty applied to current and future earnings for nonconformance to laws and
regulations and may not be impacted by the number of users and business areas affected.
Residual risk is incorrect. This is the remaining risk after management has implemented a
risk response and is not based on the number of users or business areas affected.
Question 120: Skipped
Which of the following is the PRIMARY purpose for conducting parallel testing?
(Correct)
Explanation
To ensure the new system meets user requirements is correct. The purpose of parallel
testing is to ensure that the implementation of a new system will meet user requirements by
comparing the results of the old system with the new system to ensure correct processing.
To determine whether the system is cost-effective is incorrect. Parallel testing may show
that the old system is, in fact, more cost-effective than the new system, but this is not the
primary reason for parallel testing. To enable comprehensive unit and system testing is
incorrect. Unit and system testing are completed before parallel testing. To highlight errors
in the program interfaces with files is incorrect. Program interfaces with files are tested for
errors during system testing.
Question 121: Skipped
During a logical access controls review, an IS auditor observes that user accounts are
shared. The GREATEST risk resulting from this situation is that:
(Correct)
Explanation
User accountability is not established is correct. The use of a single user ID by more than
one individual precludes knowing who, in fact, used that ID to access a system; therefore, it
is more difficult to hold anyone accountable. An unauthorized user may use the ID to gain
access is incorrect. This risk is no greater than an unauthorized user accessing the system
with a unique user ID. User access management is time consuming is incorrect. Access
management would not be any different with shared IDs. Passwords are easily guessed is
incorrect. Shared user IDs do not necessarily have easily guessed passwords.
Question 122: Skipped
Determining the service delivery objective should be based PRIMARILY on:
(Correct)
Explanation
The minimum acceptable operational capability is correct. The service delivery objective
(SDO) is the level of service to be reached during the alternate process mode until the
normal situation is restored. This is directly related to the business needs. The cost-
effectiveness of the restoration process is incorrect. This is not the main consideration of
determining the SDO. Meeting the recovery time objectives is incorrect. This may be one of
the considerations in determining the SDO, but it is a secondary factor. The allowable
interruption window is incorrect. This may be one of the factors secondary to determining
the SDO.
Question 123: Skipped
When evaluating the collective effect of preventive, detective, and corrective controls
within a process, an IS auditor should be aware of which of the following?
The point at which controls are exercised as data flow through the system
(Correct)
Explanation
"The point at which controls are exercised as data flow through the system" is correct.
An IS auditor should focus on when controls are exercised as data flow through a
computer system.
"Only preventive and detective controls are relevant" is incorrect. Corrective controls may
also be relevant because they allow an error or problem to be corrected.
"Classification allows an IS auditor to determine which controls are missing" is incorrect. The
existence and function of controls are important but not the classification.
(Correct)
Explanation
Each plan is consistent with one another is correct. Depending on the complexity of an
organization, there could be more than one plan to address various aspects of business
continuity and disaster recovery, but the plans must be consistent to be effective. All plans
are integrated into a single plan is incorrect. The plans do not necessarily have to be
integrated into one single plan. Each plan is dependent on one another is incorrect.
Although each plan may be independent, each plan has to be consistent with other plans to
have a viable business continuity planning strategy. The sequence for implementation of all
plans is defined is incorrect. It may not be possible to define a sequence in which plans have
to be implemented because it may be dependent on the nature of disaster, criticality,
recovery time, etc.
Question 125: Skipped
Errors in audit procedures PRIMARILY impact which of the following risk types?
Control risk
Business risk
Detection risk
(Correct)
Inherent risk
Explanation
Detection risk is correct. This is the probability that the audit procedures may fail to detect
existence of a material error or fraud. Inherent risk is incorrect. This refers to the risk
involved in the nature of business or transaction and is not affected by human error. Control
risk is incorrect. This is the risk that a material error exists that would not be prevented or
detected on a timely basis by the system of internal controls. Business risk is incorrect. This
is not a component of audit risk.
Question 126: Skipped
Which of the following potentially blocks hacking attempts?
Honeypot system
(Correct)
Explanation
The 'Intrusion prevention system (IPS)' is correct. This is deployed as an inline device
on a network or host that can detect and block hacking attempts. It is a system
designed to not only detect an attack but also to prevent the intended victim hosts
from being affected by the attacks.
The 'Intrusion detection system (IDS)' is incorrect. This is a detective control and does not
block any hacking attempts. The role of IDS is to just report only. IDS inspects network and
host security activity to identify suspicious patterns that may indicate a network or system
attack.
The 'Honeypot system' is incorrect. A honeypot solution captures intruder activity or traps
the intruders when they attempt to explore a simulated target. It is a specially configured
server, also known as a decoy server, designed to attract and monitor intruders in a manner
such that their actions do not affect production systems. It is also known as the "decoy
server".
'Network security scanner' is incorrect. This identifies vulnerabilities but does not remediate
them.
(Correct)
Explanation
Provide a basis for drawing reasonable conclusions is correct. The scope of an IS audit is
defined by its objectives. This involves identifying control weaknesses relevant to the scope
of the audit. Obtaining sufficient and appropriate evidence assists the auditor in not only
identifying control weaknesses but also documenting and validating them. Comply with
regulatory requirements is incorrect. This is relevant to an audit but is not the most
important reason why sufficient and relevant evidence is required. Ensure complete audit
coverage is incorrect. Ensuring coverage is relevant to conducting an IS audit but is not the
most important reason why sufficient and relevant evidence is required. The reason for
obtaining evidence is to ensure that the audit conclusions are factual and accurate. Perform
the audit according to the defined scope is incorrect. The execution of an audit to meet its
defined scope is relevant to an audit but is not the reason why sufficient and relevant
evidence is required.
Question 128: Skipped
Which of the following security measures BEST ensures the integrity of information
stored in a data warehouse?
A read-only restriction
(Correct)
Explanation
A read-only restriction is correct. Because most data in a data warehouse are historic and do
not need to be changed, applying read-only restrictions prevents data manipulation.
Validated daily backups is incorrect. Backups address availability, not integrity. Validated
backups ensure that the backup will work when needed. Change management procedures is
incorrect. Adequate change management procedures protect the data warehouse and the
systems with which the data warehouse interfaces from unauthorized changes but are not
usually concerned with the data. Data dictionary maintenance is incorrect. These procedures
provide for the definition and structure of data that are input to the data warehouse. This
will not affect the integrity of data already stored.
Question 129: Skipped
During an IS audit of the disaster recovery plan of a global enterprise, the auditor
observes that some remote offices have very limited local IT resources. Which of the
following observations would be the MOST critical for the IS auditor?
Corporate security measures have not been incorporated into the test plan.
A test has not been made to ensure that tape backups from the remote offices are usable.
The corporate business continuity plan does not accurately document the systems that exist
at remote offices.
A test has not been made to ensure that local resources could maintain security and service
standards when recovering from a disaster or incident.
(Correct)
Explanation
A test has not been made to ensure that local resources could maintain security and service
standards when recovering from a disaster or incident is correct. Regardless of the capability
of local IT resources, the most critical risk would be the lack of testing, which would identify
quality issues in the recovery process. The corporate business continuity plan does not
accurately document the systems that exist at remote offices is incorrect. The corporate
business continuity plan may not include disaster recovery plan (DRP) details for remote
offices. It is important to ensure that the local plans have been tested. Corporate security
measures have not been incorporated into the test plan is incorrect. Security is an important
issue because many controls may be missing during a disaster. However, not having a
tested plan is more important. A test has not been made to ensure that tape backups from
the remote offices are usable is incorrect. The backups cannot be trusted until they have
been tested. However, this should be done as part of the overall tests of the DRP.
Question 130: Skipped
While reviewing a quality management system, the IS auditor should PRIMARILY
focus on collecting evidence to show that -
(Correct)
Explanation
Continuous improvement targets are being monitored is correct. Continuous and
measurable improvement of quality is the primary requirement to achieve the business
objective for the quality management system (QMS). Quality management systems comply
with good practices is incorrect. Generally, good practices are adopted according to
business requirements. Therefore, conforming to good practices may or may not be a
requirement of the business. Standard operating procedures of it are updated annually is
incorrect. Updating operating procedures is part of implementing the QMS; however, it
must be part of change management and not an annual activity. Key performance indicators
are defined is incorrect. Key performance indicators may be defined in a QMS, but they are
of little value if they are not being monitored.
Question 131: Skipped
During a data center audit, an IS auditor observes that some parameters in the tape
management system are set to bypass or ignore tape header records. Which of the
following is the MOST effective compensating control for this weakness?
(Correct)
(Correct)
Explanation
Delaying deployment until testing the impact of the patch is correct. Deploying patches
without testing exposes an organization to the risk of system disruption or failure. The
training needs for users after applying the patch is incorrect. Normally, there is no need for
training users when a new operating system patch has been installed. Any beneficial impact
of the patch on the operational systems is incorrect. Any beneficial impact is less important
than the risk of unavailability, which could be avoided with proper testing. The necessity of
advising end users of new patches is incorrect. Normally, there is no need for advising users
when a new operating system patch has been installed except to ensure that the patch is
applied at a time that will have minimal impact on operations.
Question 133: Skipped
Which of the following should an IS auditor review to gain an understanding of the
effectiveness of controls over the management of multiple projects?
Project database
Policy documents
(Correct)
Program organization
Explanation
A project portfolio database is correct. This is the basis for project portfolio management. It
includes project data such as owner, schedules, objectives, project type, status and cost.
Project portfolio management requires specific project portfolio reports. A project database
is incorrect. This may contain the information about control effectiveness for one specific
project and updates to various parameters pertaining to the current status of that single
project. Policy documents is incorrect. These on project management set direction for the
design, development, implementation and monitoring of the project. Program organization
is incorrect. This is the team required (steering committee, quality assurance, systems
personnel, analyst, programmer, hardware support, etc.) to meet the delivery objectives of
the projects.
Question 134: Skipped
To minimize the cost of a software project, quality management techniques should be
applied -
mainly at project close-down to capture lessons learned that can be applied to future
projects.
as close to their writing (i.e., point of origination) as possible.
primarily at project start to ensure that the project is established in accordance with
organizational governance standards.
continuously throughout the project with an emphasis on finding and fixing defects
primarily through testing to maximize the defect detection rate.
(Correct)
Explanation
Continuously throughout the project with an emphasis on finding and fixing defects
primarily through testing to maximize the defect detection rate is correct. Although it is
important to properly establish a software development project, quality management
should be effectively practiced throughout the project. The major source of unexpected
costs on most software projects is rework. The general rule is that the earlier in the
development life cycle that a defect occurs, and the longer it takes to find and fix that
defect, the more effort will be needed to correct it. A well-written quality management plan
is a good start, but it must also be actively applied. Simply relying on testing to identify
defects is a relatively costly and less effective way of achieving software quality. For
example, an error in requirements discovered in the testing phase can result in scrapping
significant amounts of work. As close to their writing (i.e., point of origination) as possible is
incorrect. Quality assurance (QA) should start as early as possible but continue through the
entire development process. Primarily at project start to ensure that the project is
established in accordance with organizational governance standards is incorrect. Only
performing QA during the start of the project will not detect problems that appear later in
the development cycle. Mainly at project close-down to capture lessons learned that can be
applied to future projects is incorrect. Capturing lessons learned will be too late for the
current project. Additionally, applying quality management techniques throughout a project
is likely to yield its own insights into the causes of quality problems and assist in staff
development.
Question 135: Skipped
In planning an IS audit, the MOST critical step is the identification of the -
Explanation
Areas of significant risk is correct. When designing a risk-based audit plan, it is important to
identify the areas of highest risk to determine the areas to be audited. The skill sets of the
audit staff is incorrect. This should have been considered before deciding and selecting the
audit. Where the skills are inadequate, the organization should consider using external
resources. Test steps in the audit is incorrect. These are not as critical during the audit
planning process as identifying the areas of risk that should be audited. The time allotted
for an audit is incorrect. This is determined during the planning process based on the areas
to be audited and is primarily based on the requirement for conducting an appropriate
audit.
Question 136: Skipped
Which of the following tests performed by an IS auditor would be the MOST effective
in determining compliance with change control procedures in an organization?
(Correct)
Ensure that only appropriate staff can migrate changes into production.
Review software migration records and verify approvals.
Explanation
Identify changes that have occurred and verify approvals is correct. The most effective
method is to determine what changes have been made (check logs and modified dates) and
then verify that they have been approved. Review software migration records and verify
approvals is incorrect. Software migration records may not have all changes listed—changes
could have been made that were not included in the migration records. Review change
control documentation and verify approvals is incorrect. Change control records may not
have all changes listed. Ensure that only appropriate staff can migrate changes into
production is incorrect. Ensuring that only appropriate staff can migrate changes into
production is a key control process but, in itself, does not verify compliance.
Question 137: Skipped
An IS auditor reviewing database controls discovered that changes to the database
during normal working hours were handled through a standard set of procedures.
However, changes made after normal hours required only an abbreviated number of
steps. In this situation, which of the following would be considered an adequate set of
compensating controls?
Make changes to the database after granting access to a normal user account.
Use the normal user account to make changes, log the changes and review the change log
the following day.
Allow changes to be made only with the database administrator (DBA) user account.
Use the DBA user account to make changes, log the changes and review the change log the
following day.
(Correct)
Explanation
Use the database administrator (DBA) user account to make changes, log the changes and
review the change log the following day The use of a DBA user account is normally set up to
log all changes made and is most appropriate for changes made outside of normal hours.
The use of a log, which records the changes, allows changes to be reviewed. Because an
abbreviated number of steps are used, this represents an adequate set of compensating
controls. Allow changes to be made only with the DBA user account is incorrect. The use of
the database administrator (DBA) user account without logging would permit uncontrolled
changes to be made to databases after access to the account was obtained. Make changes
to the database after granting access to a normal user account is incorrect. A normal user
account should not have access to a database. This would permit uncontrolled changes to
any of the databases. Use the normal user account to make changes, log the changes and
review the change log the following day is incorrect. Users should not be able to make
changes. Logging would only provide information on changes made but would not limit
changes to only those who were authorized.
Question 138: Skipped
The BEST filter rule for protecting a network from being used as an amplifier in a
denial-of-service attack is to deny all:
(Correct)
Explanation
Outgoing traffic with source addresses external to the network is correct. Outgoing traffic
with an Internet Protocol (IP) source address different than the internal IP range in the
network is invalid. In most of the cases, it signals a denial-of-service attack originated by an
internal user or by a previously compromised internal machine; in both cases, applying this
filter will stop the infected machine from participating in the attack. Incoming traffic with
discernible spoofed IP source addresses is incorrect. Denying incoming traffic will not
prevent an internal machine from participating in an attack on an outside target. Incoming
traffic that includes options set in the Internet Protocol is incorrect. Incoming traffic will
have the IP options set according to the type of traffic. This is a normal condition. Incoming
traffic whose destination address belongs to critical hosts is incorrect. Denying incoming
traffic to internal hosts will prevent legitimate traffic.
Question 139: Skipped
Responsibility for the governance of IT should rest with the-
audit committee.
board of directors.
(Correct)
IT strategy committee.
Explanation
Board of directors is correct. Governance is the set of responsibilities and practices exercised
by the board and executive management with the goal of providing strategic direction,
ensuring that objectives are achieved, ascertaining that risk is managed appropriately and
verifying that the enterprise’s resources are used responsibly. IT strategy committee is
incorrect. This group plays a significant role in the successful implementation of IT
governance within an organization, but the ultimate responsibility resides with the board of
directors. Chief information officer is incorrect. This individual plays a significant role in the
successful implementation of IT governance within an organization, but the ultimate
responsibility resides with the board of directors. Audit committee is incorrect. This group
plays a significant role in monitoring and overseeing the successful implementation of IT
governance within an organization, but the ultimate responsibility resides with the board of
directors.
Question 140: Skipped
Recovery procedures for an information processing facility are BEST based on:
maximum tolerable outage.
(Correct)
Explanation
The recovery time objective (RTO) is correct. This is the amount of time allowed for the
recovery of a business function or resource after a disaster occurs; the RTO is the desired
recovery time frame based on maximum tolerable outage (MTO) and available recovery
alternatives. The recovery point objective (RPO) is incorrect. This has the greatest influence
on the recovery strategies for given data. It is determined based on the acceptable data loss
in case of a disruption of operations. The RPO effectively quantifies the permissible amount
of data loss in case of interruption. Maximum tolerable outage is incorrect. MTO is the
amount of time allowed for the recovery of a business function or resource after a disaster
occurs; it represents the time by which the service must be restored before the organization
is faced with the threat of collapse. An information security policy is incorrect. This does not
address recovery procedures.
Question 141: Skipped
An IS auditor is reviewing a manufacturing company and finds that mainframe users
at a remote site connect to the mainframe at headquarters over the Internet via
Telnet. Which of the following offers the STRONGEST security?
Use of a firewall rule to allow only the Internet Protocol address of the remote site
Use of two-factor authentication
(Correct)
Explanation
Use of a point-to-point leased line is correct. A leased line will effectively extend the local
area network of the headquarters to the remote site, and the mainframe Telnet connection
would travel over the private line, which would be less of a security risk when using an
insecure protocol such as Telnet. Use of a firewall rule to allow only the Internet Protocol
address of the remote site is incorrect. A firewall rule at the headquarters network to only
allow Telnet connections from the Internet Protocol (IP) address assigned to the remote site
would make the connection more secure than the current arrangement, but a dedicated
leased line is the most secure option of those listed. Use of two-factor authentication is
incorrect. While two-factor authentication would enhance the login security, it would not
secure the transmission channel against eavesdropping, and, therefore, a leased line would
be a better option. Use of a nonstandard port for Telnet is incorrect. Attacks on network
services start with the assumption that network services use the standard Transmission
Control Protocol/IP port number assigned for the service, which is port 23 for Telnet. By
reconfiguring the host and client, a different port can be used. Assigning a nonstandard
port for services is a good general security practice because it makes it more difficult to
determine what service is using the port; however, in this case, creating a leased-line
connection to the remote site would be a better solution.
Question 142: Skipped
When protecting an organization's IT systems, which of the following is normally the
next line of defense after the network firewall has been compromised?
Personal firewall
Antivirus programs
Explanation
Intrusion detection system (IDS) is correct. An IDS would be the next line of defense after
the firewall. It would detect anomalies in the network/server activity and try to detect the
perpetrator. Personal firewall is incorrect. This would occur later in the defensive strategy,
being located on the endpoints. Antivirus programs is incorrect. These would be installed on
endpoints as well as on the network, but the next layer of defense after a firewall is an
IDS/intrusion protection system. Virtual local area network configuration is incorrect. This is
not intended to compensate for a compromise of the firewall. It is an architectural good
practice.
Question 143: Skipped
A proposed transaction processing application will have many data capture sources
and outputs in paper and electronic form. To ensure that transactions are not lost
during processing, an IS auditor should recommend the inclusion of – what?
validation controls.
(Correct)
Explanation
Automated systems balancing is correct. This would be the best way to ensure that no
transactions are lost as any imbalance between total inputs and total outputs would be
reported for investigation and correction. Validation controls is incorrect. Input and output
validation controls are certainly valid controls but will not detect and report lost
transactions. Internal credibility checks is incorrect. These are valid controls to detect errors
in processing but will not detect and report lost transactions. Clerical control procedures is
incorrect. A clerical procedure could be used to summarize and compare inputs and
outputs; however, an automated process is less susceptible to error.
Question 144: Skipped
An IS auditor has been asked to participate in project initiation meetings for a critical
project. The IS auditor's MAIN concern should be that the -
complexity and risk associated with the project have been analyzed.
(Correct)
a contract for external parties involved in the project has been completed.
Explanation
Complexity and risk associated with the project have been analyzed is correct.
Understanding complexity and risk, and actively managing these throughout a project are
critical to a successful outcome. Resources needed throughout the project have been
determined is incorrect. The resources needed will be dependent on the complexity of the
project. Technical deliverables have been identified is incorrect. It is too early to identify the
technical deliverables. A contract for external parties involved in the project has been
completed is incorrect. Not all projects will require contracts with external parties.
Question 145: Skipped
Which of the following should an IS auditor recommend for the protection of specific
sensitive information stored in a data warehouse?
Explanation
(Correct)
Explanation
Makes other users’ certificates available to applications is correct. A directory server makes
other users’ certificates available to applications. Encrypts the information transmitted over
the network is incorrect. This is a role performed by a security server. Facilitates the
implementation of a password policy is incorrect. This is not relevant to public key
infrastructure. Stores certificate revocation lists is incorrect. This is a role performed by a
security server.
Question 147: Skipped
What method might an IS auditor use to test wireless security at branch office
locations?
War driving
(Correct)
War dialing
Social engineering
Password cracking
Explanation
War driving is correct. This is a technique for locating and gaining access to wireless
networks by driving or walking around a building with a wireless-equipped computer. War
dialing is incorrect. This is a technique for gaining access to a computer or a network
through the dialing of defined blocks of telephone numbers, with the hope of getting an
answer from a modem. Social engineering is incorrect. This is a technique used to gather
information that can assist an attacker in gaining logical or physical access to data or
resources. Social engineering exploits human weaknesses. Password cracking is incorrect.
Password crackers are tools used to guess users’ passwords by trying combinations and
dictionary words. Once a wireless device has been identified, password crackers may be
used to try to attack it.
Question 148: Skipped
Distributed denial-of-service attacks on Internet sites are typically evoked by hackers
using which of the following?
Logic bombs
Phishing site
Botnets
(Correct)
Spyware
Explanation
(Correct)
Explanation
Senior management has limited involvement is correct. To ensure that the IT governance
framework is effectively in place, senior management must be involved and aware of roles
and responsibilities. Therefore, it is most essential to ensure the involvement of senior
management when evaluating the soundness of IT governance. Return on investment is not
measured is incorrect. Ensuring revenue management is a part of the objectives in the IT
governance framework. Therefore, it is not effective in verifying the soundness of IT
governance. Chargeback of IT cost is not consistent is incorrect. Introduction of a cost
allocation system is part of the objectives in an IT governance framework. Therefore, it is not
effective in verifying the soundness of IT governance. Risk appetite is not quantified is
incorrect. Estimation of risk appetite is important; however, at the same time, management
should ensure that controls are in place. Therefore, checking only on risk appetite does not
verify soundness of IT governance.
Question 150: Skipped
While reviewing the IT infrastructure, an IS auditor notices that storage resources are
continuously being added. The IS auditor should:
(Correct)
Explanation
Review the capacity management process is correct. Capacity management is the planning
and monitoring of computer resources to ensure that available IT resources are used
efficiently and effectively. This will look at capacity from a strategic viewpoint and allow a
plan to forecast and purchase additional equipment in a planned manner. Recommend the
use of disk mirroring is incorrect. A disk mirroring solution would increase storage
requirements. This would not be advisable until a proper capacity management plan is in
place. Review the adequacy of offsite storage is incorrect. Offsite storage is unrelated to the
problem. Recommend the use of a compression algorithm is incorrect. Though data
compression may save disk space, it could affect system performance. This is not the first
choice—the auditor should recommend more investigation into the increased demand for
storage before providing any recommended solutions.