SlideShare a Scribd company logo
1 of 24
DISA 3.0 new questions 100 (Collected from various sources)
1. Whichof the followingisthe best Risk ManagementPractice?
a. EstablishRiskmanagementCommittee
b. IdentifyRisksrelatedtothe business
c. Manage Risksi.e. identify,assessandremediationonyearlybasis
d. Manage risksi.e.identify,assessandremediationoncontinuousbasis
Ex: OptionD representsthe bestriskmanagementpractice.
2. A large business house is planning to implement a CSA program. Which of
the following could be the primary objective of the implementation
a. Leverage the internal audit function and its responsibilities
b. Gain more control over to the IT functional areas
c. Provide confidence to the statutory auditor to the compliance of internal
controls to the management's objectives
d. Shift some of the following controls to the internal audit function
Ex: Control self assessment actually helps in building more IT controls.
3. An IS auditor discoversthat several IT-basedprojects were implementedthatwere not
approved by the steeringcommittee.What isthe greatest concernfor the IS Auditor?
a. IT projectswill notbe adequatelyfunded
b. IT projectsare not followingthe systemdevelopmentlife cycle process
c. IT projectsare not consistentlyformallyapproved
d. The IT departmentmaynotbe workingtowardsa commongoal.
Ex: a) fundingof the projectsmaybe addressedthroughvariousbudgetsandmaynotrequire
steeringcommitteeapproval.The primaryconcernwouldbe toensure thatthe projectisworking
towardsmeetingthe goalsof the company.
b) althoughrequiringsteeringcommittee approvalmaybe partof the SDLC process,the greater
concernwouldbe whetherthe projectsare workingtowardsthe corporate goal.Withoutsteering
committee approval,itwouldbe difficulttodetermine whetherthese projectsare followingthe
directionof the corporate goals.
c) Althoughhavingaformal approval processisimportant,the greatestconcernwouldbe forthe
steeringcommitteetoprovide corporate directionfor the projects.
d) The steeringcommitteeprovidesdirectionandcontrolsoverprojectstoensure thatthe company
ismakingappropriate investments.Withoutapproval,the projectmayormay not be working
towardsthe company’sgoal.
4. 4. While reviewingaquality managementsystem the IS auditor should primarilyfocus on
collectingevidence toshow that:
a. Qualitymanagementsystemscomplywithbestpractices
b. Continuousimprovementtargetsare beingmonitored
c. Standardoperatingproceduresof ITare updatedannually
d. Keyperformance indicatorsare defined.
Ex: Continuousandmeasurableimprovementof qualityisthe primaryrequirementtoachieve the
businessobjectivesforthe qualitymanagementsystems.
5. The primary benefitofan enterprise architecture initiative wouldbe:
a. Enable the organisationtoinvestinthe mostappropriate technology
b. Ensure that securitycontrolsare implementedoncritical platforms
c. Allowdevelopmentteamstobe more responsive tobusinessrequirements
d. Provide businessunitswithgreater autonomytoselectITsolutionsthatfittheirneeds.
Ex: The primaryfocusof the enterprise architectureistoensure thattechnologyinvestmentare
consistentwiththe platform, dataanddevelopmentstandardsof the ITorganisation;therefore,the
goal of the EA is to helpthe organisationtoimplementthe technologythatismosteffective.
6. While doing planning under risk based audit approach if the IS auditor
found inherent risk, control risks are high then
A. Detection Risk should be low
B. Detection Risk can be high or low depending on the resources
C. Detection Risk can be high
D. Detection risk does not matter
Ex: : Inherent risk means overall risk of management which is on account of entity’s
business operations as a whole. Control risk is the risk present in the internal control
system. Detection risk is the risk of the IS Auditor when he is not able to detect the
inherent risk or the control risk. Hence when inherent and control risk is high,
detection risk should be low.
7. The primary objective for an IS auditor to review organisational chart and
job description is to:
A. Understand how organisation works.
B. Check reporting and escalation path
C. Ensure segregation of duties and authority
D. Determine span of control for each individual employee.
Ex: Organisational chart depicts the reporting hierarchy and thus an important tool to
ensure segregation of duties and authority.
8. Controls are implemented to:
A. Eliminate risk and reduce potential for loss
B. Mitigate risk and eliminate the potential for loss
C. Mitigate risk and reduce the potential for loss
D. Eliminate risk and eliminate the potential for loss
Ex: Definition of controls state the purpose as to mitigate the risk to the maximum
extent possible. It is not possible to eliminate the risk, but to reduce the potential for
loss.
9. IS auditor observed that the organization’s policy requires approval for
using new software. During the course of audit it was observed that there
are few instances of installing software without approval of management.
The Auditor should:
A. Verify whether proper controls are established and working for the software
B. Communicate to the Management risks associated with installing unapproved
Software.
C. Report non-compliance of policies in the audit report.
D. Recommend to update policy and procedure for installing software.
Ex: Option 1 is the preventive control, which is the first to activate by an IS auditor.
Other options are subsequent.
10. Which of the following actions impairs the IS auditors independence?
A. Auditor Designs Controls
B. Auditor Tests controls
C. Auditor advises on Controls
D. Auditor designs an Audit tool
Ex: Auditor should be involved in testing controls, designing audit trails, advising on
controls. But designing controls impair the independence of Auditor.
11. To assist in testing a core banking system being acquired, an organisation has provided the
vendorwith sensitive data from itsexistingproductionsystem.An IS auditor’sprimary concern
is that the data should be:
a. Sanitised
b. Completed
c. Representative
d. Current
Ex: Sanctityof productiondatausedfor testingisthe primary concernfor an auditor.Data shouldbe
properlymaskedorsanitisedbeforeit’suse.Allotheroptionisrequiredforcorrectanalysisandresult.
12. An IS Auditor is performing a project review to identify whether a new application has met
businessobjectives.Whichofthe followingtestreportsoffersthe mostassurance that business
objectives are met?
a. User acceptance
b. Performance
c. Sociability
d. Penetration
Ex:Useracceptance isthe bestindicationthatbusinessobjectivesare made.Performance isafinancial
indicator, sociability is acceptance indicator and penetration is control weakness measurement.
13. When conducting a review of business process re-engineering, an IS auditor found that a key
preventive control had been removed. In this case the IS auditor should:
a. Inform management of the finding and determine whether management is willing to
accept the potential material risk of not having that preventive control.
b. Determine if a detective control has replacedthe preventive control during the process
and, if it has not, report the removal of the preventive control.
c. Recommend that this and all control procedures that existed before the process was
reengineered be included in the new process.
d. Develop a continuous audit approach to monitor the effects of the removal of the
preventive control.
Ex: BPR is a process of un-learning and re-learning where there could be a complete change of
controls.Ratherthancompleteremoval of apreventivecontrol,acompensatorycontrollike detective
control is acceptable compare to only reporting or continuing the earlier process.
14. A hash total of employee numbersis part of the input to a payroll master file update program.
The program comparesthe hash total withthe correspondingcontrol total. Whatis the purpose
of this procedure?
a. Verify that employee numbers are valid
b. Verify that only authorised employees are paid
c. Detect errors in payroll calculation
d. Detect the erroneous update of records.
Ex: Hash total compare withthe control total isa batch control processwhichis a file levelcontrol.It
can confirmthe filelevelauthoritycompare toindividual validityof record.Itcannotdetectanyerror.
15. When auditing the requirements phase of a software acquisition, the IS auditor should:
a. Assess the feasibility of the project timetable
b. Assess the vendor’s proposed quality processes
c. Ensure that the best software package is acquired
d. Review the completeness of the specifications.
Ex: Requirement phase in SDLC verify the completeness. Option A done in feasibilitystudy phase,
option b is in analysis phase, option c is not the purpose of requirement analysis phase.
16. An organisationdecidestopurchase a software package insteadofdevelopingit.Insucha case,
the design and development phases of a traditional software development life cycle (SDLC)
would be replaced with:
a. Selection and configuration phases
b. Feasibility and requirements phases
c. Implementation and testing phases
d. Nothing: replacement is not required.
Ex: Activitiesindesignanddevelopmentphase forsoftware developmentshouldbe replacedwith
selectionandrightconfigurationforthirdpartysoftware acquisition.Optionb& c is commonfor
acquiredsoftware aswell.
17. When introducing thin client architecture, which of the following risks regarding servers is
significantly increased?
a. Integrity
b. Concurrency
c. Confidentiality
d. Availability
Ex: In the thin client major processing is taking place at the server level. There is no end-point
processing because the devices having less or no memory. Hence risk of concurrency control
(processing many input at the same time) is the major concerns. CIA has no relevance in this case.
18. Which of the following is an example of addressing social feasibility issue in SDLC project?
a. Organisation decides to use existing infrastructure
b. Beta version of application is made available to users
c. Configuration of purchased software requires more cost
d. Allowing employees to access social media sites.
Ex: Beta version is distributed to all types of intended user. Using beta version free will provide
adequate indication of it’s acceptability socially. Hence option b is the right answer.
19. Whichof the followingisnot an indicator to assessbenefitrealisationfrominternal application
software developed in-house?
a. Increase in number of customers because of new application
b. Decrease in audit findings related to regulatory non-compliance
c. Reduced number of virus attacks after implementing new software.
d. Increase inproductivityof employeesafterimplementation
Ex: Auditfindingsthattoorelatedtoregulatorynon-compliance isnotanindicatortoassessbenefit
realisationof securedin-house software.Otheroptionsare the benefitof in-house developed
software applications.
20. In a webserver,a common gateway interface (CGI) isMOST often usedas a(n):
A. consistent way for data transfer to the application program and back to the
user.
B. computer graphics imaging method for movie and TV.
C. graphic user interface for web design.
D. interface to access the private gateway domain.
Ex: The commongatewayinterface (CGI) isastandard wayfor a webservertopass a webuser's
requesttoan applicationprogramandto receive databackand forthto the user. Whenthe user
requestsawebpage (forexample,byclickingonahighlightedwordorenteringawebsite address),
the serversendsbackthe requestedpage.However,whenauserfillsoutaformon a Web page and
sendsitin,it usuallyneedstobe processedbyanapplicationprogram.The webservertypically
passesthe forminformationtoa small applicationprogramthatprocessesthe dataandmay send
back a confirmationmessage.Thismethod,orconventionforpassingdatabackand forthbetween
the serverand the applicationiscalledthe commongatewayinterface (CGI).Itispart of the web's
HTTP protocol
21. Which one of the following types of firewalls would BEST protect a network
from an Internet attack?
A. Screened sub-net firewall
B. Application filtering gateway
C. Packet filtering router
D. Circuit level gateway
Ex: A screenedsub-netfirewall wouldprovide the bestprotection.The screeningroutercanbe a
commercial routerora node withroutingcapabilitiesthatcanfilterpackages,havingthe abilityto
letor avoidtrafficbetweennetsornodesbasedonaddresses,ports,protocols,interfaces,etc.
Applicationlevelgatewaysare mediatorsbetweentwoentitiesthatwanttocommunicate,also
knownas proxygateways.The applicationlevel (proxy) worksatapplicationlevel,notonlyata
package level.The screeningonlycontrolsatpackage level,addresses,ports,etc.butdonotsee the
contentsof the package.Packetfilteringrouterexaminesthe headerof everypacketordata
travelingbetweenthe Internetandthe corporate network
22. Congestion control is BEST handled by which OSI layer?
A. Data link
B. Session layer
C. Transport layer
D. Network layer
Ex: The transportlayeris responsible forreliabledatadelivery.Thislayer implementssophisticated
flowcontrol mechanismthatcandetectcongestionandreduce datatransmissionratesandalso
increase transmissionrateswhenthe networkappearstonolongerbe congested(e.g.,TCPflow
controls).The networklayerisnotcorrect because congestioncontrol (flowcontrol) occursbasedon
routerimplementationsof flowcontrol atthe sub-netlevel (i.e.,source quenchmessagessentout
whenroutermemoryorbuffercapacityreachescapacity;howevernomessage tocancel or discard
messages,whichinactuallymayincrease congestionproblems).Sessionlayeranddatalinkdonot
have any functionalityfornetworkmanagement.
23. Which of the following can a local area network (LAN) administrator use to
protect against exposure to illegal or unlicensed software usage by the
network user?
A. Software metering
B. Virus detection software
C. Software encryption
D. Software inventory programs
Ex: The control that a LAN administratorcanuse to protectagainstthe use of illegal or unlicensed
software inventoryprograms.Software inventoryprogramsensure the accurate use of the
authorizednumberof licenses.Software meteringwouldonlycountthe numberof licenses,
whereasvirusdetectionsoftwarepreventsfromvirusinfection,but doesnotpertaintolicenses.
Software encryptionisnotuseful because itsfunctionistociphermessages.
24. Which of the following is most suitable method for ensuring up‐to‐date
Business Continuity Plan (BCP)?
(a) Regular structured walk through tests
(b) Yearly full functional tests
(c) Continuous Liaison among BCP team members
(d) Keep on changing the team members with the more experienced ones
Ex: a) Regular Structured walkthrough teststakesplaceto get idea aboutthe possibleservice
disruption by majorparticipantsinvolved in plan execution.Ithelps in keeping the plan up‐to‐date.
(b) Yearly fully functionaltestsare quite expensiveaswell as damaging thesystemresourcemany a
times asit actually imitates the disaster.Hence, fully functionaltestis notadvisable.
(c) ContinuousLiaison among BCPteammembersmay initiatethe changein BCPbut to keep it up‐
todate,regularstructured walkthrough testsaremust.
(d) Keep on changing theteammemberswith the more experienced oneswill not makethe BCPup‐
todate.
25. When Recovery Point Objective is zero and Recovery Time Objective is 5
hrs, which of the following recovery strategies is advisable?
(a) Hot Site – Shadow File Processing
(b) Cold Site – Shadow File Processing
(c) Hot Site –Tape Back Up
(d) Cold Site – Tape Back Up
Ex: (a) Recovery PointObjective(RPO) isfocused on data and organization’slosstolerancein
relation to the data.And Recovery Time Objective (RTO) is the targeted duration of time and a
service level within which a businessprocessmustbe restored aftera disaster.If RPO is to be Zero
then we need a mirror backup continuously being taken ata remote site called Shadow file
processing.Moreover,if RTO is to be 5 hoursthen we need Hotsite which gets ready within couple of
hoursof disaster.
(b) ShadowFileprocessing is desirablefor zero RPO butCold Site will notbe usefulas it takes
numbersof daystogetherto makeCold site ready foralternateprocessing and it will go beyond the
RTO i.e. 5 hrs.
(c) Hot Site is desirableas we need to resumeoperationswithin 5 hrs of disaster butTapeBackup will
notbe usefulas it will not beable to maintain continuesreal time backup of data so as to keep RPO
as zero.
(d) Cold Site will not be usefulasit takesdaystogetherto makeCold site ready foralternate
processing and it will go beyond theRTO i.e. 5 hrs.Tape Backup will also notbe usefulas it will not
be able to maintain continuesreal time backup of data so asto keep RPO aszero.
26. In Disaster Recovery Planning, who is responsible for determining the
requirements of Recovery Time Objective and Recovery Point Objective for the
organization?
(a) Steering committee
(b) Board Of Directors
(c) IT management
(d) Process owners
Ex: (a) Steering Committeeis an administrativebody thatreviews,monitorsand prioritizesmajorIT
projectsfroma cross‐functionalperspectiveand isresponsibleforalignmentof IT strategy with
strategicgoalsof the organization.Thus,determining therequirementsof RTO and RPOis the
responsibilityof steering committeeonly.
(b) Board of Directors (BODs) are responsibleforinitiating BCP and approving BCP.However,
determining requirementsof RTO and RPOis notthe responsibility of BODs.
(c) IT managementisresponsibleforcarrying outthe BCP developmentplan rightfrominitialization
stageto the execution stageasper the strategy.However,determining requirementsof RTOand
RPOis notthe responsibilityof IT management.
(d) Processownersarevery importantstakeholdersof BCP.However,determining requirementsof
RTO and RPOis notthe responsibilityof processowners.
27. ABC Private Limited. Head‐quartered in Mumbai, has 8 branches across
India and the company has limited recovery budget. Which among the
following is the BEST recovery strategy for the company?
(a) Internal reciprocal arrangements among the branches
(b) Hot site maintained in Mumbai
(c) Multiple cold sites at all branches
(d) Reciprocal agreement with another company in Mumbai
Ex: (a) Internalreciprocal arrangementsamong thebranchesaretheBEST recovery strategy fora
limited recovery budgetcompany provided thepairof branchesselected for reciprocity is subjectto
differentgeographiclocationsand environments.
(b) To maintain a Hot site is a costly affairand notviable forlimited recovery budget.
(c) Even though cold site is relatively cheaper option compared to a hotsite, multiple cold sites at all
brancheswould entailunnecessary fixed rentaloverheadsultimately shooting up thebudgetof the
company.
(d) In the given case company has8 branchesacrossIndia.Hence,reciprocalagreementwith another
company of Mumbaimay notservethepurposeof overall disasterrecovery strategy of thecompany.
28. An IS auditor conducting a review of software usage and licensing
discovers that numerous PCs contain unauthorized software. What action
should the IS auditor perform FIRST?
A. Personally delete all copies of the unauthorized software.
B. Inform auditee of the unauthorized software and follow-up to confirm
deletion.
C. Report the use of the unauthorized software to auditee management and
the need to prevent recurrence.
D. Take no action, as it is a commonly accepted practice and operations
management is responsible for monitoring such use.
Ex: Ans B
29. Which of the following represents the MOST significant exposure for an
organization that leases personal computers?
A. Accounting for shared peripherals
B. Frequent reassignment of hardware
C. Obsolescence prior to lease termination
D. Software licensing issues on leased machines
Ex: AnsC
30. An IS auditor is assigned to perform a post implementation review of an
application system. Which of the following situations may have impaired the
independence of the IS auditor?
A. He implemented a specific control during the development of the
application system.
B. He designed an embedded audit module exclusively for auditing the
application system.
C. He participated as a member of the application system project team, but
did not have operational responsibilities.
D. He provided consulting advice concerning application system best
practices.
Ex: AnsA
31. In a risk-based audit approach, an IS auditor is not only influenced by risk
but also by:
A. the availability of CAATs.
B. management's representations.
C. organizational structure and job responsibilities.
D. the existence of internal and operational controls.
Ex: AnsD
32. While conducting a control self-assessment (CSA) program, an IS auditor
facilitated workshops involving management and staff in judging and
monitoring the effectiveness of existing controls. Which of the following is an
objective of a CSA program?
A. to enhance audit responsibilities.
B. to identify problems.
C. to brainstorm solutions.
D. to complete the entire audit.
Ex: Ans A
33. The IS auditor should be able to identify and evaluate various types of risks
and their potential effects. Accordingly, which of the following risks is
associated with trap doors?
A. Inherent risk.
B. Detection risk.
C. Audit risk.
D. Error risk.
Ex: AnsB
34. When performing a procedure to identify the value of inventory that has
been kept for more than eight weeks, an IS auditor would MOST likely use:
A. test data.
B. statistical sampling.
C. an integrated test facility.
D. generalized audit software.
Ex: Ans D
35. When reviewing a system development project at the project initiation
stage, an IS auditor finds that the project team is not proposing to strictly
follow the organization's quality manual. To meet critical deadlines the project
team proposes to fast track the validation and verification processes,
commencing some elements before the previous deliverable is signed-off.
Under these circumstances the IS auditor would MOST likely:
A. report this as a critical finding to senior management.
B. accept that different quality processes can be adopted for each project
C. report to IS management the team's failure to follow appropriate
procedures.
D. report the risks associated with fast tracking to the project steering
committee
Ex: AnsD
36. When there is Audit participation in the systems development process, the
IS Auditor should be aware of :
A. An Auditor’s ability to perform an independent evaluation of the application
after implementation will be impaired.
B. An attitude and appearance of independence should be reflected in the
Auditor’s conduct when conducting development reviews.
C. As a control specialist, the Auditor can provide significant value to the
project team by making the final decision on specific controls
D. For ongoing evaluation capability, the Auditor should ensure the computer
Audit Software be implemented in all applications
Ex: Ans A
37. An IS Auditor’s primary objective in testing the integrity of information is to
ensure that
A. sensitive information is protected
B. data are accurate, complete and valid
C. information is critical for making decisions
D. data are relevant to achieving business objectives
Ex: AnsB
38. An IS Audit Report would normally include all of the following EXCEPT :
A. scope, objective and period of coverage
B. nature and extent of audit work performed
C. findings, conclusions and recommendations
D. details of programs, procedures and software used
Ex: Ans D
39. Which of the following is a substantive audit test ?
A. verifying that a management check has been regularly performed
B. observing that user Ids and passwords are required to sign on to the
computer
C. Reviewing reports listing short shipments of goods received
D. Reviewing an aged trial balance of accounts receivable
Ex: Ans D
40. An IS Auditor, performing a review of an application’s controls, discovers
a weakness in system software which could materially impact the application.
The IS Auditor should :
A. Ignore these control weaknesses as a system software review is beyond
the scope of this review.
B. Conduct a detailed system software review and report the control
weaknesses.
C. Include in the report a statement that the Audit was limited to a review of
the application’s controls.
D. Review the system software controls as relevant and recommend a
detailed system software review.
Ex: Ans D
41. Which of the following choices best helps information owners to properly
classify data?
A. Understanding of technical controls that protect data
B. Training on organisational policies and standards
C. Use of an automated data leak prevention tool
D. Understanding which people need to access the data.
Ex: While implementing data classification, it is most essential that organization
policies and standards, including the data classification schema, are understood by
the owner or custodian of the data so they can be properly classified. Automated
DLP may not help in understanding classification schema. It is more important that
owner understand the requirement compare to end-user.
Ex: Ans B
42. Which of the following would be of concern for an information system
auditor auditing BPO (Business Process Outsourcing) Service provider?
A. BPO has identified all External Compliance requirements.
B. BPO exceeds Turn Around Time defined in SLA
C. BPO has a documented security policy
D. BPO has a proper Background checks for staff
Ex: Ans B
43. Whichof the followingchoicesis the most effective control that shouldbe implementedto
ensure accountabilityfor applicationusersaccessing sensitive datain the human resource
managementsystem and among interfacingapplicationsto the HRMS.
a. Two-factorauthentication
b. A digital certificate
c. Audittrails
d. Single sign-onauthentication.
Ex: Audittrailscapture whichuser,atwhat time anddate along withotherdetails,hasperformed
the transactionand thishelpsinestablishingaccountabilityamongapplicationusers.Otherthree
optionsare authenticationmechanism,nottouse for establishingaccountability.
44. During a review of a large data center an IS auditor observed computer
operator acting as backup tape librarians and security administrators. Which
of the these situations would be MOST critical to report to senior
management?
a. Computer operation acting as tape librarians
b. Computer operators acting as security administrator
c. Computer operators acting as tape librarian and security administrator
d. It is not necessary to report any of these situations to senior management
Ex: Ans C
45. An IS Auditor has found that employees are emailing sensitive company
information to public web-based email domains. Which of the following is the
best remediation option for the IS Auditor to recommend?
a. Encrypted mail accounts
b. Training and awareness
c. Activity monitoring
d. Data Loss prevention (DLP)
Ex: data loss prevention is an automated preventive tool that can block sensitive
information from leaving the network, while at the same time logging the offenders.
Encryption will not prevent sending information to unauthorized person. Activity
monitoring is a detective control. Training and awareness is not a strong control
compare to DLP.
46. The primary objective ofvalue optimisationprocess is to ensure:
a. IT-enabledinvestmentsare made atthe lowestcost
b. Appropriate IT-enabledinitiativesare selected
c. Cost-efficientdeliveryof solutionsandservices
d. Qualificationof ITcosts and likelybenefits
Ex: The primaryobjective of value optimisationprocessistoensure cost-efficientdeliveryof
solutionsandservices.The focusof value optimisationprocessisnotensuringlowestcostbut
optimal costof all IT-enabledinvestments.Selectionof appropriate ITenabledinitiative isone of the
operational activitiesof value optimisation.Althoughitiscritical butitisnot the primaryobjective.
All IT investmentsbenefitscannotbe quantified.Hence,the optionof quantificationof ITcostsand
likelybenefitsisnotcorrect.Further,thisisnotthe objective butamechanismof performance
monitoring.
47. Whichof the followingisthe key benefitofcapacity management
a. Meetlongterm businessgoalsinacost effectiveandtimelymanner
b. Meetscurrent andfuture requirementsinacost-effectivemanner
c. Define andmaintainrelationshipsbetweenkeyresourcesandcapabilities
d. Assessthe impactof changesand deal withservice incidents
Ex: The keybenefitof capacitymanagementistoensure thatnotjustthe current but the future
businessrequirementsare metinacost effective manner.Capacitymanagementlooksatbothlong-
termas well asshort termbusinessgoalsinacost effective andtimelymanner.Defining,describing
and maintainingrelationshipsbetweenkeyresourcesandcapabilitiesisaprimaryrequirementof
capacitymanagementandnot a benefit.Assessingthe impactof changesanddeal withservice
incidentsisone of the benefitsof capacitymanagementbutcomparedtooptionA,thisisnot a ket
benefit.
48. Whichof the followingismost critical for ensuringsustainedalignmentofIT strategic plans?
The IT strategic plans provide:
a. DirectiontoIT departmentondeployment of informationsystems
b. Keyfunctionariesare involvedindevelopmentandimplementation
c. IT longand short range plansare communicatedtostake holders
d. Feedbackiscaptured,reportedandevaluatedforinclusioninfuture ITplanning.
Ex: Capturing,reportingandevaluatingfeedbackforinclusioninfuture ITplanningismostcritical for
ensuringsustainedalignmentof ITstrategicplansasthisprovidesmetricsformonitoringandalso
ensuringthatperformance ismaintainednotonlyforthe currentbutalso forthe future.Top
managementsharesthe enterprise strategybasedonwhichITstrategyispreparedbythe IT
department.There isnodirectiontoITdepartmentondeploymentof informationsystemsprovided
as part of IT strategicplanning.The involvementof keyfunctionariesindevelopmentand
implementationiscritical toensure successbutitisrequiredinthe initial stages.However,thisdoes
not guarantee the sustainabilityof the initiative.The communicationof ITlongandshort range plans
isimportantto getbuy-inandto keepall stakeholdersinformedbutthisisonlyareportingprocess.
49. From an IT governance perspective,whatis the primary responsibilityofthe board of directors
to ensure that the IT strategy:
a. Is cost effective
b. Is future thinkingandinnovative
c. Is alignedwiththe businessstrategy
d. Has the appropriate prioritylevel assigned.
Ex: AnsC
50. An IS Auditor has beenasked to reviewa contract for a vendor beingconsideredtoprovide
data centre services.Whichis the best way to determine whetherthe termsof the contract are
adheredto after the contract is signed?
a. Require the vendortoprovide monthlystatusreports
b. Have periodicmeetingswiththe clientITmanager
c. Conductperiodicauditreviewsof the vendor
d. Require the performance parametersbe statedwithinthe contract
Ex: AnsC
51. Whichof the followingchoicesisthe primary benefitofrequiringa steeringcommittee to
oversee IT investment?
a. To conduct a feasibilitystudytodemonstrateITvalue
b. To ensure thatinvestmentsare made accordingtobusinessrequirements
c. To ensure thatpropersecuritycontrolsare enforced
d. To ensure thata standarddevelopmentmethodologyisimplemented.
Ex: AnsB
52. An IS Auditor is evaluatinga newly developedITpolicyfor an organisation. Whichof the
followingfacilitywouldthe IS auditor considermost important to facilitate compliance
with the policy upon its implementation.
a. ExistingITmechanismsthatenable compliance
b. Alignmentof the policytothe businessstrategy
c. Currentand future technologyinitiatives
d. Regulatorycompliance objectivesthatare definedinthe policy.
Ex: AnsA
53. An IS Auditor isreviewinga DRP and discoversthat a critical applicationis missingfrom the
plan. Whichof the followingrecommendationswouldbe the best option for the IS auditor
working with an organisation with limited IT resources.
a. Active-active clusters
b. A reciprocal agreement
c. A warm site
d. Active-passive cluster.
Ex: Inactive-passivecluster,the applicationisrunningonlyone (active) node while othernodesare
usedonlyif the applicationfailsonthe active node.Active-activeclusterandwarmsite will require
more resources.Reciprocal arrangementmaynotbe a goodoptionforcritical application.Anactive-
passive clusterwouldbe the bestoptioninthiscase because the passiveclusterwouldrestore the
application.
54. An IS Auditor is reviewing the backup strategy and the backup technology in use by an
organisation. The IS Auditor would be most concerned if:
a. Data restoration tests are not being regularly performed.
b. Disk subsystem are being backed up to other disks, and not to tape.
c. Daily backup logs purged quarterly.
d. Backups of critical company data are not encrypted.
Ex:The onlywaytoensure withcertaintythatabackupisworkingistoperformadatarestoration
test.If thiswere notbeingdoneregularly,itwouldbe aconcern.Otheroptions are concernedbut
option a is the most concerned.
55. An organisation is reviewing its contract with cloud computing provider. For which of the
followingreasonswouldthe organisationwanttoremove alock-inclause fromthe contract.
a. Availability
b. Portability
c. Agility
d. Scalability
Ex: When drawing up a contract with a cloud service provider, the ideal practice is to remove the
customerlock-inclause.Itmaybe importantforthe clienttosecure portabilityof theirsystemassets,
i.e., the right to transfer from one vendor to another. Removing lock-in period will not improve
availability.Agilityreferstoefficiencyof solutionenablingorganisationtorespondtobusinessneeds
further.Scalabilityisthe abilitytoadjustservice levelsaccordingtochangingbusinesscircumstances.
56. Which of the following ways is the best for an IS Auditor to verify that critical production
servers are running the latest security updates released by the vendor?
a. Ensure that automatic updates are enabled on critical production servers.
b. Verify manually that the patches are applied on a sample of production servers.
c. Review the change management log for critical production servers.
d. Run an automated tool to verify the security patches on production servers.
Ex: An automated tool can immediately provide a report on which patches have been applied and
which are missing. Ensuring automatic update will not provide assurance that all servers are being
patchedappropriately.Manual testingisdifficultandtime consuming.Change management logmay
not accurately reflect the patch update status.
57. Whichofthe followingchoicesbestensuresaccountabilitywhenupdatingdata directlyin a
production database?
a. Before and after screen images
b. Approved implementation plan
c. Approved validation plan.
d. Data File security.
Ex:Creatingbeforeandafterimageisthebestwaytoensure thatappropriatedatahave beenupdated
in a direct data change. The screen shots would include the data prior to and after the change.
Approved plans may not ensure that appropriate changes were made. Approved validation plan will
also not ensuring that data changes were appropriate and correct. Data file security will also not
ensuring that data changes were correct.
58. A financial institutionhas decidedto outsource its customer service divisionto an offshore
vendor. The most important consideration would be to ensure that the contract contains:
a. A limited liability clause
b. A right-to-audit clause
c. A data ownership clause
d. An early termination clause.
Ex: Data ownership is the most important aspect of outsourced operations. An ownership clause
establishesthatoutsourcingcompanymaintainscomplete ownershipof the informationprovidedto
the vendor and the vendor must maintain confidentiality over the information with which it comes
intocontact. The ownershipclause alsoprohibitsthe vendorfromusinganyof the customerdata for
its internal purpose.
59. An IS Auditor of a healthcare organisationis reviewingcontractual termsand conditionsof
a third party cloud provider beingconsideredto host patient health information.Whichof
the following contractual terms would be the greatest risk to the customer organisation.
a. Data ownership is retained by the customer organisation.
b. The third partyproviderreservesthe righttoaccess data to perform certain operations.
c. Bulk data withdrawal mechanisms are identified.
d. The customer organisation is responsible for backup, archive and restore.
Ex: Some service providersreservethe righttoaccesscustomerinformation(thirdpartyaccess) to
performcertaintransactionsandprovide certainservices.Inthe case of protectedhealth
information(PHI),regulationsmayrestrictcertainaccess.Organisationmustreview the regulatory
environmentinwhichthe cloudprovideroperatesbecauseitmayhave requirementsorrestrictions
of itsown.Organisationsmustthendeterminewhetherthe cloudproviderprovidesappropriate
controlsto ensure thatdata are appropriatelysecure.
60. A vendor has released several critical security patches over the past few months and this
has puta strain on the abilityofthe administratorsto keepthe patchestestedanddeployed
in a timely manner. The administrators have asked if they could reduce the testing of the
patches. What approach should the organisation take?
a. Continue the current process of testing and applying patches.
b. Reduce testing and ensure that an adequate backout plan is in place.
c. Delay patching until resources for testing are available.
d. Rely on the vendor’s testing of the patches.
Ex: Applying security software patches promptly is critical to maintain the security of the servers;
further,testingthe patchesisimportantbecause the patchesmay affectother systemsandbusiness
operations.Because the vendorhasrecentlyreleasedseveral criticalpatchesinashorttime,itcanbe
hoped that this is a temporary problem and does not need a revision to policy or procedures.
61. A new business requirement required changing database vendors. Which of the following
areas should the IS Auditor primarily examine in relation to this implementation?
a. Integrity of the data
b. Timing of the cutover
c. Authorisation level of users
d. Normalisation of data.
Ex: A critical issue whenmigratingdatafromone database to anotheristhe integrityof the data and
ensuringthatthe data are migratedcompletelyandcorrectly.
62. Due to resource constraints, a developerrequiresfull access to production data to support
certain problemsreported by productionusers. Which of the followingchoiceswould be a
good compensating control for controlling unauthorised changes in production?
a. Provide andmonitorseparate loginIds that the developerwill use forprogrammingand
production support.
b. Capture activitiesof the developerinthe productionenvironmentbyenablingaudittrails.
c. Back up all effectedrecordsbefore allowingthe developertomake production changes.
d. Ensure that all changes are approved by the change manager.
Ex: Providingseparate loginIDsthatwouldonlyallow adeveloperprivilegedaccesswhenrequiredis
a good compensatingcontrol,butitmustalsobe backedup withmonitoringandsupervisionof the
activityof the developer.
63. While conducting an audit on the CRM application, the IS Auditor observes that it takes a
significantly long time for users to log on to the system during peak business hours as
compared with other times of the day. Once loggedon, the average response time for the
system is within acceptable limits. Which of the following choices should the IS Auditor
recommend?
a. The IS Auditorshouldrecommendnothingbecause the systemiscompliantwithcurrent
business requirements.
b. IT should increase the network bandwidth to improve performance.
c. Users should be provided with detailed manuals to use the system properly.
d. The ISAuditorshouldrecommendestablishingperformancemeasurementcriteriaforthe
authentication servers.
Ex: Performance criteriaforthe authenticationserverswouldhelptoquantifyacceptable thresholds
for system performance, which can be measured and remediated.
64. Which of the following controls would be most effective to reduce the risk of loss due to
fraudulent online payment request?
a. Transaction monitoring
b. Protecting web sessions using secured socket layer (SSL)
c. Enforcing password complexity for authentication
d. Inputting validation checks on web forms.
Ex: An electronic payment system could be the target of fraudulent activities. An unauthorised user
could potentially enter false transactions. By monitoring transactions, the payment processor could
identifypotentiallyfraudulent transactions based on the typical usage patterns, monetary amounts,
physical location of purchases, and other data that are part of the transaction process.
65. Whichofthe followingcriteriaare most neededtoensure thatloginformationisadmissible
in court? Ensure that dat have been:
a. Independently time stamped
b. Recorded by multiple logging systems.
c. Encrypted by the most secure algorithm
d. Verified to ensure log integrity.
Ex: It isimportantto assure thatlog informationexistedatacertainpoint of time andit hasnot been
alerted. Therefore, evidential credibility of log informationis enhanced when there is proof that no
one has tampered with this information.
66. The greatest benefit of having well-defined data classification policies and procedures is:
a. A more accurate inventory of information assets
b. A decreased cost of controls.
c. A reduced risk of inappropriate system access.
d. An improved regulatory compliance.
Ex: An important benefit of a well-defined data classificationprocess wouldbe to lower the cost of
protectingdatabyensuringthatthe appropriate controlsare appliedwithrespecttothe sensitivityof
the data. Without proper classification framework, some security controls may be greater and
therefore, more costly than is required based on the data classification.
67. An IS Auditor who is auditing an application determines that, due to resource constraints,
one user holdsrolesas both a developeranda release co-ordinator.Whichofthe following
options would the IS Auditor most likely recommend?
a. Revoke the user’s developer access
b. Revoke the user’s release coordinator access
c. Management review of user activities
d. Periodic audit of user activities.
Ex: If an individual requires role with conflicting segregation of duties, the best control given the
circumstances is to monitor that individual’s access in the productionenvironment.Although this is
notpreferredmethodof resolvingsegregationof dutiesconflicts,itisthe bestcompensationgcontrol
given the current business circumstances.
68. A companyisplanningtoinstall a network-basedintrusiondetectionsystem(IDS) toprotect
the web site that it hosts. Where should the device be installed?
a. On the local network
b. Outside the firewall
c. In the de-militarised zone
d. On the server that hosts the website.
Ex: NetworkbasedIDSsdetectattackattemptsbymonitoringnetworktraffick.A publicwebserveris
typically placed on the protected network segment known as the demilitarised zone( DMZ). An IDS
installedinthe DMZ detectsandreportson maliciousactivityoriginatingfromthe internetaswell as
the internal network, thus allowing the administrator to take action.
69. An ISAuditoris workingwiththe DBA group to mitigate riskassociatedwithindividual users
who have direct access to SQL databases. The IS Auditor recommends using lightweight
directory access protocol (LDAP) groups. What approval should be requiredto ensure least
privilege?
a. Manager approval
b. Database ownerapproval
c. Systemadministratorapproval
d. DBA approval
Ex: Requiringdatabase ownerapproval willensurethatafterthe groupis createdonlyuserswho
require accesswill be added.The groupownerwouldbe the dataownerandwouldbe the best
personto understandaccessneeds.
70. An IS Auditor isreviewinganorganisation’s networkoperationscentre (NOC).Whichof the
following choices is of the greatest concern? The use of
a. A wetpipe-basedfire suppressionsystem
b. A rentedrack space inthe NOC.
c. A CO2-basedfire suppressionsystem.
d. An uninterruptedpowersupplywith10minsof backup power.
Ex: CO2 systemsare a dangerto the people andshouldnotbe usedbecause theycause suffocation
inthe eventof a fire.Controlsshouldconsiderpersonal safetyfirst.
71. An IS Auditor is reviewing access for an accounting system and notices a segregation of
dutiesissue;however,the businessissmall and additional workers are not available.What
is the best recommended compensating control in this situation?
a. Implementingrole-basedaccess.
b. Reviewingaudittrails
c. Performingperiodicaccessreviews
d. Reviewingthe errorlog.
Ex: Reviewingaudittrailswouldbe the bestcompensatingcontrol forasegregationof dutiesissue
that cannot be eliminatedbyaddingemployees.
72. An IS Auditor is reviewing a manufacturing company and finds that mainframe users at a
remote site connect to the mainframe at headquarters over the internet via telnet. Which
of the following is the best recommendation to ensure proper security controls.
a. Use of a point-to-pointleasedline
b. Use of a firewallrule toallow onlythe IPaddressof the remote site
c. Use of two-factorauthentication
d. Use of a non-standardportfortelnet
Ex: A leasedlinewilleffectivelyextendthe LAN of the headquarters tothe remote site,adthe
mainframe Telnetconnectionwouldtravel overthe private line,whichwouldbe lessof asecurity
riskwhenusingan insecure protocol suchastelnet.
73. The primary purpose of installingdata leakpreventionsoftware is to control which of the
followingchoices?
a. Accessprivilegestoconfidentialfilesstoredonservers
b. Attemptstodestroycritical dataon the internetnetwork
c. Whichexternal systemscanaccessinternal resources
d. Confidential documentsleavingthe internal network.
Ex: A serverrunningaDLP software applicationusespredefinedcriteriatocheckwhetherany
confidentialdocumentsordataare leavingthe internal network.
74. Whichof the followinggroupswouldcreate most concern to an IS Auditor ifthey have
direct full access to the productiondatabase?
a. Applicationtesters
b. Systemadministrators
c. The database owner
d. The data recoveryteam.
Ex: Applicationtestersshouldbe restrictedtothe nonproductionenvironmentand,if theyhave full
access to the productiondatabase, the confidentialityandintegrityof databecome questionable.
75. Which of the following tests should be prohibited during peak hours as part of a network
security assessment of a bank’s production environment?
a. Port scanningforopenfirewall ports
b. Testingdatabase serversforweakorblankpasswords
c. Port scanningforopenportsin database server
d. Networkpacketsniffing.
Ex: Testingfordatabase blankor weakpasswordscouldleadtoproductionaccountsbeinglocked
out frommultiple failedlogins,whichcould affectproductionsystems.
76. Whichof the followingchoiceswouldbe consideredan attack vector for social
engineering?
a. A fake email message designedtosteal banklogingcredential.
b. Malware installedonawebsite thatinfectsvisitorstothe site.
c. An attackerstealingthe laptopof a systemadministratortotry to gainaccess.
d. An attackersearchingthroughthe trash dumpsterforconfidential data.
Ex: Social engineering,inthe contextof informationsecurity,referstopsychological manipulationof
people intoperformingactionsordivulgingconfidentialinformation.A fake email message designed
to steal banklogincredentialsisanexampleof one type of social engineeringattackcommonly
calledphishing.
77. A warning message from a public web application system displays specific database error
messages to the user. Which of the following choices would be the major concern?
a. The abilitytopost false transactionstothe database.
b. Unauthorisedaccesstothe database byhijackingthe administratorssession
c. SusceptibilitytoDOSattacks
d. Susceptibilitytohackingattemptstodatabase.
Ex: If database error messagesare disclosed,perpetratorscouldknow the database type (vendor,
versionetc.).Thiswouldincreasethe riskof applicationlayerattackssuchas SQL injection.
78. A company determinedthatitswebsite wascompromisedandarootkit was installedonthe
server hosting the application. Which of the following choices would be most likely
prevented the incident.
a. HIPS
b. NIDS
c. A Firewall
d. OS patching.
Ex: A host-basedintrusionpreventionsystempreventsunauthorisedchangestothe host.If a
malware attackattemptedtoinstall arootkit,the IPSwouldrefuse topermitthe installationwithout
the consentof an administrator.
79. An IS Auditor performing an audit has determined that developers have been granted
administrative access to the virtual machine management console to manage their own
servers used for software development and testing. Which of the following choices would
be most concern for the IS Auditor?
a. Developershave the abilitytocreate or de-provisionservers.
b. Developerscouldgainelevatedaccesstoproductionservers.
c. Developerscanaffectthe performance of productionserverswiththeirapplications
d. Developerscouldinstallunapprovedapplicationsto anyservers.
Ex: Virtualisationoffersthe abilitytocreate ordestroyvirtual machines(VMs) throughthe
administrativeinterface withadministrative access.Whileadeveloperwouldbe unlikelytode-
provisionaproductionserver,the administrative console wouldgranthim/herthe abilitytodothis,
whichwouldbe a significantrisk.
80. An IS Auditor performingan audit has discussedserver virtualisationimplementationwith
the system administrators who indicate that the ability to quickly replicate a production
server and create an identical host has saved considerable time and effort.What would be
the greatest risk that the ISAuditor shouldlook for whenauditingthe virtual environment?
a. Making copies of servers will violate the terms of the software licenses for the OS.
b. The copied servers have identical host names and IP addresses
c. Virtual server mis-configurations will be propagated across all servers.
d. The administratormaycreate performance issuesbycreatingtoomany virtual machines
(VMs).
Ex: Like any other technology, the VMs must be configured correctly to provide the security and
performance necessary to support business requirements. If a VMis configured incorrectly, it could
lead to compromise of the physical device and unauthorised activity. The VM configuration that is
used as a template should be reviewed carefully to ensure that it is correctly defined.
81. An IS Auditor is reviewing security incident management procedures for the company.
Which of the following choices is the most important consideration?
a. Chain of custody of electronic evidence
b. System breach notification procedures
c. Escalation procedures to external agencies
d. Procedures to recover lost data.
Ex: The preservationof evidence isthe mostimportantconsiderationinregardtosecurityincident
management.If dataand evidenceare notcollectedproperly,valuableinformationcouldbe lostand
wouldnotbe admissible inthe courtof law shouldthe companydecide topursue litigation.
82. AnIS Auditorisreviewinganetworklogdiscoversthatanemployee ranelevatedcommands
on his/her PC by invoking the task scheduler to launch restricted applications. This is an
example of what type of attack?
a. A race condition
b. A privilege escalation
c. A buffer overflow
d. An impersonation
Ex:A privilegeescalationisatype of attackwhere higherlevelsystemauthorityisobtainedbyvarious
methods. In this example, the task scheduler service runs with administrator permissions, and a
security flaw allows programs launched by the scheduler to run at the same permission level.
83. An IS Auditor performing an IS audit of the newly installed voice-over-internet protocol
system was inspecting the wiring closets on each floor of the building. What would be the
greatest concern?
a. LAN switches are not connected to the UPS units
b. Network cabling is disorganised and not properly labelled.
c. The telephones are using the same cable used for LAN connections.
d. The wiring closet also contain power lines and breaker panels.
Ex: VOIPtelephone systemsuse standard networkcablingandtypicallyeachtelephonegetspower
overthe networkcable fromthe wiringclosetwhere the networkswitchisinstalled.If the LAN
switchesdonothave backup power,the phoneswilllose powerif there isautilityinterruptionand
potentiallynotbe able tomake emergencycalls.
84. Sign-onproceduresinclude the creationof aunique user-idandpassword.However,anIS
auditordiscoversthatinmanycases the username and passwordare the same.The Best
control to mitigate thisriskisto:
a. Change the company’ssecuritypolicy
b. Educate usersabout the riskof weakpasswords
c. Buildinvalidationstopreventthisduringusercreationandpasswordchange
d. Require aperiodicreviewof matchingof user-IDandpasswordsfordetectionand
correction.
Ex: Ansb
85. Whichof the followinglogical accessexposuresinvolveschangingdatabefore,orasit is
enteredintothe computer?
a. Data diddling
b. Trojan horse
c. Worm
d. Salami technique
Ex: Ansa
86. All of the followingare commonformsof internetattacksexcept:
a. Exploitationof vulnerabilitiesinvendorprograms
b. Denial of service attacks
c. Sendinghostilecode andattackprograms as mail attachments
d. Systematichackerfoot-printingof anorganization.
Ex: AnsA
87. The scope of a logical accesscontrolsreview would include the evaluationof:
a. Effectivenessandefficiencyof ITsecurityandrelatedcontrols
b. Confidentiality,integrityandavailabilityof informationof authorizedusers.
c. Accessto systemsoftware andapplicationsoftware toensure compliance withthe
access policy.
d. Accessto the userauthorizationlevels,parametersandoperational functionsthrough
applicationsoftware.
Ex: AnsC
88. Whichof the followingconcernsassociatedwiththe worldwide webwouldbe addressedby
a firewall?
a. Unauthorizedaccessfrom outside the organization
b. Unauthorizedaccessfromwithinthe organization
c. Delayininternetconnectivity
d. Delayindownloadingusingfiletransferprotocol.
Ex: AnsA
89. If inadequate,whichof the followingwouldmostlikelycontribute toadenial of service
attack?
a. Routerconfigurationandrules
b. Designof the internal network
c. Updatesto the router systemsoftware
d. Audittestingandreviewtechniques
Ex: AnsC
90. Whichof the followingmethodsof providingtelecommunicationcontinuityinvolvesrouting
trafficthroughsplitor duplicate cable facilities?
a. Diverse routing
b. Alternate routing
c. Redundancy
d. Long haul networkdiversity
Ex: Ans a
91. Passwordshouldbe:
a. Assignedbythe securityadministrator
b. Changedevery30 daysat the discretionof the user
c. Reusedoftentoensure the userdoesnotforgetthe password
d. Displayedonthe screensothat the usercan ensure thatit has beenproperlyentered.
Ex: Ans B
92. Whichof the followingdatabase administratoractivitiesisunlikelytobe recordedon
detective control log
a. Deletion of arecord
b. Change of a password
c. Disclosure of password
d. Changesto accessrights.
Ex: AnsC
93. Confidential datastoredona laptopisbestprotectedby:
a. Storage on optical disk
b. Log-onID and password
c. Data encryption
d. Physical locks
Ex: AnsB
94. Whichof the followingisthe mosteffective techniqueforprovidingsecurityduringdata
transmission?
a. Communicationlog
b. Systemssoftware log
c. Encryption
d. Standardprotocol
Ex: AnsC
95. An ISauditorwhointendstouse penetrationtestingduringanauditof internetconnections
would:
a. Evaluate configuration
b. Examine securitysettings
c. Ensure virus-scanningsoftware inuse
d. Use toolsandtechniquesthatare available toahacker.
Ex: Ans D
96. Bestapproach formonitoringthe performance of ITresourcesis?
a. Compare lagindicators againstexpectedthresholds
b. Monitorleadindicatorswithindustrybestpractices
c. Define thresholdsforlagindicatorsbasedonlongtermplan
d. Lead indicatorshave correspondinglagindicators.
Ex: Ans b
97. An ISAuditordetectedthatseveral PCsconnectedto the internethave alow securitylevel
that isallowingforfree recordingof cookies.Thiscreatesariskbecause cookieslocally
stores
a. Informationaboutthe internetsite
b. Informationaboutthe user
c. Informationforthe internetconnection
d. Internetpages.
Ex: AnsB
98. Whichof the followingbestensuresthe integrityof aserver’soperatingsystem?
a. Protectingthe serverina secure location
b. Settinga bootpassword
c. Hardeningthe serverconfiguration
d. Implementingactivitylogin
Ex: AnsC
99. When an employee notifies the companythat he/she has
forgotten his/her password,what should be done FIRST by the
security administrator?
A. Allowthe system to randomlygenerate a new password
B. Verify the user’s identificationthrough a challenge/response
system
C. Provide the employee with the default password and explain that
it should be changed as soon as possible
D. Ask the employee to move to the administratorterminal to
generate a new password in order to assure confidentiality
Ex: Ans B
100. Which of the followingwould be of MOST concern to an IS
auditorreviewinga VPN implementation?Computers on the
network that are located:
A. on the enterprise’s internal network.
B. at the backup site.
C. in employees’homes.
D. at the enterprise’s remote offices.
Ex: Ans C

More Related Content

Similar to DISA 3-qbank with exp.docx

IT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management ProcessIT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management ProcessYolanda Williams
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit ProcessRam Srivastava
 
Chap005 tb-sample
Chap005 tb-sampleChap005 tb-sample
Chap005 tb-sampleYing Sun
 
Risk 3 simplelearn-exam2-ans
Risk 3 simplelearn-exam2-ansRisk 3 simplelearn-exam2-ans
Risk 3 simplelearn-exam2-ansMohamed Saeed
 
08 pmp quality management exam
08 pmp quality management exam08 pmp quality management exam
08 pmp quality management examJamil Faraj , PMP
 
Cisa Certification Overview
Cisa Certification OverviewCisa Certification Overview
Cisa Certification OverviewAl Imran, CISA
 
AUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptxAUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptxMohamed Fazil M
 
ISTQB Foundation level Sample Paper - Part 3
ISTQB Foundation level Sample Paper - Part 3 ISTQB Foundation level Sample Paper - Part 3
ISTQB Foundation level Sample Paper - Part 3 Parul Chotalia
 
Ctfl 001 q&a-demo-exam-area
Ctfl 001 q&a-demo-exam-areaCtfl 001 q&a-demo-exam-area
Ctfl 001 q&a-demo-exam-areaSamanthaGreen16
 
Are my RCM Analysts effective?
Are my RCM Analysts effective?Are my RCM Analysts effective?
Are my RCM Analysts effective?Daryl Mather
 
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docxEcon 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docxjack60216
 

Similar to DISA 3-qbank with exp.docx (20)

Chap5
Chap5Chap5
Chap5
 
IT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management ProcessIT Quality Testing and the Defect Management Process
IT Quality Testing and the Defect Management Process
 
Sqa 2 marks
Sqa 2 marksSqa 2 marks
Sqa 2 marks
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit Process
 
Chap005 tb-sample
Chap005 tb-sampleChap005 tb-sample
Chap005 tb-sample
 
Risk 3 simplelearn-exam2-ans
Risk 3 simplelearn-exam2-ansRisk 3 simplelearn-exam2-ans
Risk 3 simplelearn-exam2-ans
 
Topic 5 chapter 7
Topic 5 chapter 7Topic 5 chapter 7
Topic 5 chapter 7
 
Chapter 11, Tests of Controls
Chapter 11, Tests of ControlsChapter 11, Tests of Controls
Chapter 11, Tests of Controls
 
08 pmp quality management exam
08 pmp quality management exam08 pmp quality management exam
08 pmp quality management exam
 
Cisa Certification Overview
Cisa Certification OverviewCisa Certification Overview
Cisa Certification Overview
 
AUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptxAUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptx
 
ISTQB Foundation level Sample Paper - Part 3
ISTQB Foundation level Sample Paper - Part 3 ISTQB Foundation level Sample Paper - Part 3
ISTQB Foundation level Sample Paper - Part 3
 
Ctfl 001 q&a-demo-exam-area
Ctfl 001 q&a-demo-exam-areaCtfl 001 q&a-demo-exam-area
Ctfl 001 q&a-demo-exam-area
 
Are my RCM Analysts effective?
Are my RCM Analysts effective?Are my RCM Analysts effective?
Are my RCM Analysts effective?
 
Pm chapter 6
Pm chapter 6Pm chapter 6
Pm chapter 6
 
Pm chapter 6
Pm chapter 6Pm chapter 6
Pm chapter 6
 
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docxEcon 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
 
Pm chapter 6...
Pm chapter 6...Pm chapter 6...
Pm chapter 6...
 
Ackerman-p99.ppt
Ackerman-p99.pptAckerman-p99.ppt
Ackerman-p99.ppt
 
Quality Assurance
Quality AssuranceQuality Assurance
Quality Assurance
 

More from CAVEDPRAKASHPALIWAL

Legal and Regulatory Frame work-REVISED OCT 2020.pptx
Legal and Regulatory Frame work-REVISED OCT 2020.pptxLegal and Regulatory Frame work-REVISED OCT 2020.pptx
Legal and Regulatory Frame work-REVISED OCT 2020.pptxCAVEDPRAKASHPALIWAL
 
Effective Concurrent Audit-2020.pptx
Effective Concurrent Audit-2020.pptxEffective Concurrent Audit-2020.pptx
Effective Concurrent Audit-2020.pptxCAVEDPRAKASHPALIWAL
 

More from CAVEDPRAKASHPALIWAL (8)

Legal and Regulatory Frame work-REVISED OCT 2020.pptx
Legal and Regulatory Frame work-REVISED OCT 2020.pptxLegal and Regulatory Frame work-REVISED OCT 2020.pptx
Legal and Regulatory Frame work-REVISED OCT 2020.pptx
 
KYC PMLA 2002 - OCT 2020.pptx
KYC PMLA 2002 - OCT 2020.pptxKYC PMLA 2002 - OCT 2020.pptx
KYC PMLA 2002 - OCT 2020.pptx
 
Effective Concurrent Audit-2020.pptx
Effective Concurrent Audit-2020.pptxEffective Concurrent Audit-2020.pptx
Effective Concurrent Audit-2020.pptx
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 
STOCK AND BOOK DEBT AUDIT.pptx
STOCK AND BOOK DEBT AUDIT.pptxSTOCK AND BOOK DEBT AUDIT.pptx
STOCK AND BOOK DEBT AUDIT.pptx
 
DISA 3-qbank with exp.docx
DISA 3-qbank with exp.docxDISA 3-qbank with exp.docx
DISA 3-qbank with exp.docx
 
STOCK AND BOOK DEBT AUDIT.pptx
STOCK AND BOOK DEBT AUDIT.pptxSTOCK AND BOOK DEBT AUDIT.pptx
STOCK AND BOOK DEBT AUDIT.pptx
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 

Recently uploaded

Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012sapnasaifi408
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfDivyeshPatel234692
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfjtzach
 
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...Suhani Kapoor
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Suhani Kapoor
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of JobRemote DBA Services
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...Suhani Kapoor
 
VIP Kolkata Call Girl Lake Gardens 👉 8250192130 Available With Room
VIP Kolkata Call Girl Lake Gardens 👉 8250192130  Available With RoomVIP Kolkata Call Girl Lake Gardens 👉 8250192130  Available With Room
VIP Kolkata Call Girl Lake Gardens 👉 8250192130 Available With Roomdivyansh0kumar0
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjLewisJB
 
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...Suhani Kapoor
 
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位obuhobo
 
Full Masii Russian Call Girls In Dwarka (Delhi) 9711199012 💋✔💕😘We are availab...
Full Masii Russian Call Girls In Dwarka (Delhi) 9711199012 💋✔💕😘We are availab...Full Masii Russian Call Girls In Dwarka (Delhi) 9711199012 💋✔💕😘We are availab...
Full Masii Russian Call Girls In Dwarka (Delhi) 9711199012 💋✔💕😘We are availab...shivangimorya083
 
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceanilsa9823
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Madekojalkojal131
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsNiya Khan
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 

Recently uploaded (20)

Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
 
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdf
 
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
 
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
Low Rate Call Girls Gorakhpur Anika 8250192130 Independent Escort Service Gor...
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Job
 
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Amravati Deepika 8250192130 Independent Escort Serv...
 
VIP Kolkata Call Girl Lake Gardens 👉 8250192130 Available With Room
VIP Kolkata Call Girl Lake Gardens 👉 8250192130  Available With RoomVIP Kolkata Call Girl Lake Gardens 👉 8250192130  Available With Room
VIP Kolkata Call Girl Lake Gardens 👉 8250192130 Available With Room
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbj
 
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
 
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
 
Full Masii Russian Call Girls In Dwarka (Delhi) 9711199012 💋✔💕😘We are availab...
Full Masii Russian Call Girls In Dwarka (Delhi) 9711199012 💋✔💕😘We are availab...Full Masii Russian Call Girls In Dwarka (Delhi) 9711199012 💋✔💕😘We are availab...
Full Masii Russian Call Girls In Dwarka (Delhi) 9711199012 💋✔💕😘We are availab...
 
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
 

DISA 3-qbank with exp.docx

  • 1. DISA 3.0 new questions 100 (Collected from various sources) 1. Whichof the followingisthe best Risk ManagementPractice? a. EstablishRiskmanagementCommittee b. IdentifyRisksrelatedtothe business c. Manage Risksi.e. identify,assessandremediationonyearlybasis d. Manage risksi.e.identify,assessandremediationoncontinuousbasis Ex: OptionD representsthe bestriskmanagementpractice. 2. A large business house is planning to implement a CSA program. Which of the following could be the primary objective of the implementation a. Leverage the internal audit function and its responsibilities b. Gain more control over to the IT functional areas c. Provide confidence to the statutory auditor to the compliance of internal controls to the management's objectives d. Shift some of the following controls to the internal audit function Ex: Control self assessment actually helps in building more IT controls. 3. An IS auditor discoversthat several IT-basedprojects were implementedthatwere not approved by the steeringcommittee.What isthe greatest concernfor the IS Auditor? a. IT projectswill notbe adequatelyfunded b. IT projectsare not followingthe systemdevelopmentlife cycle process c. IT projectsare not consistentlyformallyapproved d. The IT departmentmaynotbe workingtowardsa commongoal. Ex: a) fundingof the projectsmaybe addressedthroughvariousbudgetsandmaynotrequire steeringcommitteeapproval.The primaryconcernwouldbe toensure thatthe projectisworking towardsmeetingthe goalsof the company. b) althoughrequiringsteeringcommittee approvalmaybe partof the SDLC process,the greater concernwouldbe whetherthe projectsare workingtowardsthe corporate goal.Withoutsteering committee approval,itwouldbe difficulttodetermine whetherthese projectsare followingthe directionof the corporate goals. c) Althoughhavingaformal approval processisimportant,the greatestconcernwouldbe forthe steeringcommitteetoprovide corporate directionfor the projects. d) The steeringcommitteeprovidesdirectionandcontrolsoverprojectstoensure thatthe company ismakingappropriate investments.Withoutapproval,the projectmayormay not be working towardsthe company’sgoal. 4. 4. While reviewingaquality managementsystem the IS auditor should primarilyfocus on collectingevidence toshow that: a. Qualitymanagementsystemscomplywithbestpractices b. Continuousimprovementtargetsare beingmonitored c. Standardoperatingproceduresof ITare updatedannually d. Keyperformance indicatorsare defined. Ex: Continuousandmeasurableimprovementof qualityisthe primaryrequirementtoachieve the businessobjectivesforthe qualitymanagementsystems. 5. The primary benefitofan enterprise architecture initiative wouldbe: a. Enable the organisationtoinvestinthe mostappropriate technology b. Ensure that securitycontrolsare implementedoncritical platforms
  • 2. c. Allowdevelopmentteamstobe more responsive tobusinessrequirements d. Provide businessunitswithgreater autonomytoselectITsolutionsthatfittheirneeds. Ex: The primaryfocusof the enterprise architectureistoensure thattechnologyinvestmentare consistentwiththe platform, dataanddevelopmentstandardsof the ITorganisation;therefore,the goal of the EA is to helpthe organisationtoimplementthe technologythatismosteffective. 6. While doing planning under risk based audit approach if the IS auditor found inherent risk, control risks are high then A. Detection Risk should be low B. Detection Risk can be high or low depending on the resources C. Detection Risk can be high D. Detection risk does not matter Ex: : Inherent risk means overall risk of management which is on account of entity’s business operations as a whole. Control risk is the risk present in the internal control system. Detection risk is the risk of the IS Auditor when he is not able to detect the inherent risk or the control risk. Hence when inherent and control risk is high, detection risk should be low. 7. The primary objective for an IS auditor to review organisational chart and job description is to: A. Understand how organisation works. B. Check reporting and escalation path C. Ensure segregation of duties and authority D. Determine span of control for each individual employee. Ex: Organisational chart depicts the reporting hierarchy and thus an important tool to ensure segregation of duties and authority. 8. Controls are implemented to: A. Eliminate risk and reduce potential for loss B. Mitigate risk and eliminate the potential for loss C. Mitigate risk and reduce the potential for loss D. Eliminate risk and eliminate the potential for loss Ex: Definition of controls state the purpose as to mitigate the risk to the maximum extent possible. It is not possible to eliminate the risk, but to reduce the potential for loss. 9. IS auditor observed that the organization’s policy requires approval for using new software. During the course of audit it was observed that there are few instances of installing software without approval of management. The Auditor should: A. Verify whether proper controls are established and working for the software B. Communicate to the Management risks associated with installing unapproved Software. C. Report non-compliance of policies in the audit report. D. Recommend to update policy and procedure for installing software. Ex: Option 1 is the preventive control, which is the first to activate by an IS auditor. Other options are subsequent. 10. Which of the following actions impairs the IS auditors independence? A. Auditor Designs Controls B. Auditor Tests controls C. Auditor advises on Controls D. Auditor designs an Audit tool
  • 3. Ex: Auditor should be involved in testing controls, designing audit trails, advising on controls. But designing controls impair the independence of Auditor. 11. To assist in testing a core banking system being acquired, an organisation has provided the vendorwith sensitive data from itsexistingproductionsystem.An IS auditor’sprimary concern is that the data should be: a. Sanitised b. Completed c. Representative d. Current Ex: Sanctityof productiondatausedfor testingisthe primary concernfor an auditor.Data shouldbe properlymaskedorsanitisedbeforeit’suse.Allotheroptionisrequiredforcorrectanalysisandresult. 12. An IS Auditor is performing a project review to identify whether a new application has met businessobjectives.Whichofthe followingtestreportsoffersthe mostassurance that business objectives are met? a. User acceptance b. Performance c. Sociability d. Penetration Ex:Useracceptance isthe bestindicationthatbusinessobjectivesare made.Performance isafinancial indicator, sociability is acceptance indicator and penetration is control weakness measurement. 13. When conducting a review of business process re-engineering, an IS auditor found that a key preventive control had been removed. In this case the IS auditor should: a. Inform management of the finding and determine whether management is willing to accept the potential material risk of not having that preventive control. b. Determine if a detective control has replacedthe preventive control during the process and, if it has not, report the removal of the preventive control. c. Recommend that this and all control procedures that existed before the process was reengineered be included in the new process. d. Develop a continuous audit approach to monitor the effects of the removal of the preventive control. Ex: BPR is a process of un-learning and re-learning where there could be a complete change of controls.Ratherthancompleteremoval of apreventivecontrol,acompensatorycontrollike detective control is acceptable compare to only reporting or continuing the earlier process. 14. A hash total of employee numbersis part of the input to a payroll master file update program. The program comparesthe hash total withthe correspondingcontrol total. Whatis the purpose of this procedure? a. Verify that employee numbers are valid b. Verify that only authorised employees are paid c. Detect errors in payroll calculation d. Detect the erroneous update of records. Ex: Hash total compare withthe control total isa batch control processwhichis a file levelcontrol.It can confirmthe filelevelauthoritycompare toindividual validityof record.Itcannotdetectanyerror. 15. When auditing the requirements phase of a software acquisition, the IS auditor should: a. Assess the feasibility of the project timetable b. Assess the vendor’s proposed quality processes c. Ensure that the best software package is acquired
  • 4. d. Review the completeness of the specifications. Ex: Requirement phase in SDLC verify the completeness. Option A done in feasibilitystudy phase, option b is in analysis phase, option c is not the purpose of requirement analysis phase. 16. An organisationdecidestopurchase a software package insteadofdevelopingit.Insucha case, the design and development phases of a traditional software development life cycle (SDLC) would be replaced with: a. Selection and configuration phases b. Feasibility and requirements phases c. Implementation and testing phases d. Nothing: replacement is not required. Ex: Activitiesindesignanddevelopmentphase forsoftware developmentshouldbe replacedwith selectionandrightconfigurationforthirdpartysoftware acquisition.Optionb& c is commonfor acquiredsoftware aswell. 17. When introducing thin client architecture, which of the following risks regarding servers is significantly increased? a. Integrity b. Concurrency c. Confidentiality d. Availability Ex: In the thin client major processing is taking place at the server level. There is no end-point processing because the devices having less or no memory. Hence risk of concurrency control (processing many input at the same time) is the major concerns. CIA has no relevance in this case. 18. Which of the following is an example of addressing social feasibility issue in SDLC project? a. Organisation decides to use existing infrastructure b. Beta version of application is made available to users c. Configuration of purchased software requires more cost d. Allowing employees to access social media sites. Ex: Beta version is distributed to all types of intended user. Using beta version free will provide adequate indication of it’s acceptability socially. Hence option b is the right answer. 19. Whichof the followingisnot an indicator to assessbenefitrealisationfrominternal application software developed in-house? a. Increase in number of customers because of new application b. Decrease in audit findings related to regulatory non-compliance c. Reduced number of virus attacks after implementing new software. d. Increase inproductivityof employeesafterimplementation Ex: Auditfindingsthattoorelatedtoregulatorynon-compliance isnotanindicatortoassessbenefit realisationof securedin-house software.Otheroptionsare the benefitof in-house developed software applications. 20. In a webserver,a common gateway interface (CGI) isMOST often usedas a(n): A. consistent way for data transfer to the application program and back to the user. B. computer graphics imaging method for movie and TV.
  • 5. C. graphic user interface for web design. D. interface to access the private gateway domain. Ex: The commongatewayinterface (CGI) isastandard wayfor a webservertopass a webuser's requesttoan applicationprogramandto receive databackand forthto the user. Whenthe user requestsawebpage (forexample,byclickingonahighlightedwordorenteringawebsite address), the serversendsbackthe requestedpage.However,whenauserfillsoutaformon a Web page and sendsitin,it usuallyneedstobe processedbyanapplicationprogram.The webservertypically passesthe forminformationtoa small applicationprogramthatprocessesthe dataandmay send back a confirmationmessage.Thismethod,orconventionforpassingdatabackand forthbetween the serverand the applicationiscalledthe commongatewayinterface (CGI).Itispart of the web's HTTP protocol 21. Which one of the following types of firewalls would BEST protect a network from an Internet attack? A. Screened sub-net firewall B. Application filtering gateway C. Packet filtering router D. Circuit level gateway Ex: A screenedsub-netfirewall wouldprovide the bestprotection.The screeningroutercanbe a commercial routerora node withroutingcapabilitiesthatcanfilterpackages,havingthe abilityto letor avoidtrafficbetweennetsornodesbasedonaddresses,ports,protocols,interfaces,etc. Applicationlevelgatewaysare mediatorsbetweentwoentitiesthatwanttocommunicate,also knownas proxygateways.The applicationlevel (proxy) worksatapplicationlevel,notonlyata package level.The screeningonlycontrolsatpackage level,addresses,ports,etc.butdonotsee the contentsof the package.Packetfilteringrouterexaminesthe headerof everypacketordata travelingbetweenthe Internetandthe corporate network 22. Congestion control is BEST handled by which OSI layer? A. Data link B. Session layer C. Transport layer D. Network layer Ex: The transportlayeris responsible forreliabledatadelivery.Thislayer implementssophisticated flowcontrol mechanismthatcandetectcongestionandreduce datatransmissionratesandalso increase transmissionrateswhenthe networkappearstonolongerbe congested(e.g.,TCPflow controls).The networklayerisnotcorrect because congestioncontrol (flowcontrol) occursbasedon routerimplementationsof flowcontrol atthe sub-netlevel (i.e.,source quenchmessagessentout whenroutermemoryorbuffercapacityreachescapacity;howevernomessage tocancel or discard messages,whichinactuallymayincrease congestionproblems).Sessionlayeranddatalinkdonot have any functionalityfornetworkmanagement. 23. Which of the following can a local area network (LAN) administrator use to
  • 6. protect against exposure to illegal or unlicensed software usage by the network user? A. Software metering B. Virus detection software C. Software encryption D. Software inventory programs Ex: The control that a LAN administratorcanuse to protectagainstthe use of illegal or unlicensed software inventoryprograms.Software inventoryprogramsensure the accurate use of the authorizednumberof licenses.Software meteringwouldonlycountthe numberof licenses, whereasvirusdetectionsoftwarepreventsfromvirusinfection,but doesnotpertaintolicenses. Software encryptionisnotuseful because itsfunctionistociphermessages. 24. Which of the following is most suitable method for ensuring up‐to‐date Business Continuity Plan (BCP)? (a) Regular structured walk through tests (b) Yearly full functional tests (c) Continuous Liaison among BCP team members (d) Keep on changing the team members with the more experienced ones Ex: a) Regular Structured walkthrough teststakesplaceto get idea aboutthe possibleservice disruption by majorparticipantsinvolved in plan execution.Ithelps in keeping the plan up‐to‐date. (b) Yearly fully functionaltestsare quite expensiveaswell as damaging thesystemresourcemany a times asit actually imitates the disaster.Hence, fully functionaltestis notadvisable. (c) ContinuousLiaison among BCPteammembersmay initiatethe changein BCPbut to keep it up‐ todate,regularstructured walkthrough testsaremust. (d) Keep on changing theteammemberswith the more experienced oneswill not makethe BCPup‐ todate. 25. When Recovery Point Objective is zero and Recovery Time Objective is 5 hrs, which of the following recovery strategies is advisable? (a) Hot Site – Shadow File Processing (b) Cold Site – Shadow File Processing (c) Hot Site –Tape Back Up (d) Cold Site – Tape Back Up Ex: (a) Recovery PointObjective(RPO) isfocused on data and organization’slosstolerancein relation to the data.And Recovery Time Objective (RTO) is the targeted duration of time and a service level within which a businessprocessmustbe restored aftera disaster.If RPO is to be Zero then we need a mirror backup continuously being taken ata remote site called Shadow file
  • 7. processing.Moreover,if RTO is to be 5 hoursthen we need Hotsite which gets ready within couple of hoursof disaster. (b) ShadowFileprocessing is desirablefor zero RPO butCold Site will notbe usefulas it takes numbersof daystogetherto makeCold site ready foralternateprocessing and it will go beyond the RTO i.e. 5 hrs. (c) Hot Site is desirableas we need to resumeoperationswithin 5 hrs of disaster butTapeBackup will notbe usefulas it will not beable to maintain continuesreal time backup of data so as to keep RPO as zero. (d) Cold Site will not be usefulasit takesdaystogetherto makeCold site ready foralternate processing and it will go beyond theRTO i.e. 5 hrs.Tape Backup will also notbe usefulas it will not be able to maintain continuesreal time backup of data so asto keep RPO aszero. 26. In Disaster Recovery Planning, who is responsible for determining the requirements of Recovery Time Objective and Recovery Point Objective for the organization? (a) Steering committee (b) Board Of Directors (c) IT management (d) Process owners Ex: (a) Steering Committeeis an administrativebody thatreviews,monitorsand prioritizesmajorIT projectsfroma cross‐functionalperspectiveand isresponsibleforalignmentof IT strategy with strategicgoalsof the organization.Thus,determining therequirementsof RTO and RPOis the responsibilityof steering committeeonly. (b) Board of Directors (BODs) are responsibleforinitiating BCP and approving BCP.However, determining requirementsof RTO and RPOis notthe responsibility of BODs. (c) IT managementisresponsibleforcarrying outthe BCP developmentplan rightfrominitialization stageto the execution stageasper the strategy.However,determining requirementsof RTOand RPOis notthe responsibilityof IT management. (d) Processownersarevery importantstakeholdersof BCP.However,determining requirementsof RTO and RPOis notthe responsibilityof processowners. 27. ABC Private Limited. Head‐quartered in Mumbai, has 8 branches across India and the company has limited recovery budget. Which among the following is the BEST recovery strategy for the company? (a) Internal reciprocal arrangements among the branches (b) Hot site maintained in Mumbai (c) Multiple cold sites at all branches (d) Reciprocal agreement with another company in Mumbai
  • 8. Ex: (a) Internalreciprocal arrangementsamong thebranchesaretheBEST recovery strategy fora limited recovery budgetcompany provided thepairof branchesselected for reciprocity is subjectto differentgeographiclocationsand environments. (b) To maintain a Hot site is a costly affairand notviable forlimited recovery budget. (c) Even though cold site is relatively cheaper option compared to a hotsite, multiple cold sites at all brancheswould entailunnecessary fixed rentaloverheadsultimately shooting up thebudgetof the company. (d) In the given case company has8 branchesacrossIndia.Hence,reciprocalagreementwith another company of Mumbaimay notservethepurposeof overall disasterrecovery strategy of thecompany. 28. An IS auditor conducting a review of software usage and licensing discovers that numerous PCs contain unauthorized software. What action should the IS auditor perform FIRST? A. Personally delete all copies of the unauthorized software. B. Inform auditee of the unauthorized software and follow-up to confirm deletion. C. Report the use of the unauthorized software to auditee management and the need to prevent recurrence. D. Take no action, as it is a commonly accepted practice and operations management is responsible for monitoring such use. Ex: Ans B 29. Which of the following represents the MOST significant exposure for an organization that leases personal computers? A. Accounting for shared peripherals B. Frequent reassignment of hardware C. Obsolescence prior to lease termination D. Software licensing issues on leased machines Ex: AnsC 30. An IS auditor is assigned to perform a post implementation review of an application system. Which of the following situations may have impaired the independence of the IS auditor? A. He implemented a specific control during the development of the application system. B. He designed an embedded audit module exclusively for auditing the application system. C. He participated as a member of the application system project team, but did not have operational responsibilities.
  • 9. D. He provided consulting advice concerning application system best practices. Ex: AnsA 31. In a risk-based audit approach, an IS auditor is not only influenced by risk but also by: A. the availability of CAATs. B. management's representations. C. organizational structure and job responsibilities. D. the existence of internal and operational controls. Ex: AnsD 32. While conducting a control self-assessment (CSA) program, an IS auditor facilitated workshops involving management and staff in judging and monitoring the effectiveness of existing controls. Which of the following is an objective of a CSA program? A. to enhance audit responsibilities. B. to identify problems. C. to brainstorm solutions. D. to complete the entire audit. Ex: Ans A 33. The IS auditor should be able to identify and evaluate various types of risks and their potential effects. Accordingly, which of the following risks is associated with trap doors? A. Inherent risk. B. Detection risk. C. Audit risk. D. Error risk. Ex: AnsB 34. When performing a procedure to identify the value of inventory that has been kept for more than eight weeks, an IS auditor would MOST likely use: A. test data. B. statistical sampling. C. an integrated test facility. D. generalized audit software.
  • 10. Ex: Ans D 35. When reviewing a system development project at the project initiation stage, an IS auditor finds that the project team is not proposing to strictly follow the organization's quality manual. To meet critical deadlines the project team proposes to fast track the validation and verification processes, commencing some elements before the previous deliverable is signed-off. Under these circumstances the IS auditor would MOST likely: A. report this as a critical finding to senior management. B. accept that different quality processes can be adopted for each project C. report to IS management the team's failure to follow appropriate procedures. D. report the risks associated with fast tracking to the project steering committee Ex: AnsD 36. When there is Audit participation in the systems development process, the IS Auditor should be aware of : A. An Auditor’s ability to perform an independent evaluation of the application after implementation will be impaired. B. An attitude and appearance of independence should be reflected in the Auditor’s conduct when conducting development reviews. C. As a control specialist, the Auditor can provide significant value to the project team by making the final decision on specific controls D. For ongoing evaluation capability, the Auditor should ensure the computer Audit Software be implemented in all applications Ex: Ans A 37. An IS Auditor’s primary objective in testing the integrity of information is to ensure that A. sensitive information is protected B. data are accurate, complete and valid C. information is critical for making decisions D. data are relevant to achieving business objectives Ex: AnsB 38. An IS Audit Report would normally include all of the following EXCEPT : A. scope, objective and period of coverage B. nature and extent of audit work performed
  • 11. C. findings, conclusions and recommendations D. details of programs, procedures and software used Ex: Ans D 39. Which of the following is a substantive audit test ? A. verifying that a management check has been regularly performed B. observing that user Ids and passwords are required to sign on to the computer C. Reviewing reports listing short shipments of goods received D. Reviewing an aged trial balance of accounts receivable Ex: Ans D 40. An IS Auditor, performing a review of an application’s controls, discovers a weakness in system software which could materially impact the application. The IS Auditor should : A. Ignore these control weaknesses as a system software review is beyond the scope of this review. B. Conduct a detailed system software review and report the control weaknesses. C. Include in the report a statement that the Audit was limited to a review of the application’s controls. D. Review the system software controls as relevant and recommend a detailed system software review. Ex: Ans D 41. Which of the following choices best helps information owners to properly classify data? A. Understanding of technical controls that protect data B. Training on organisational policies and standards C. Use of an automated data leak prevention tool D. Understanding which people need to access the data. Ex: While implementing data classification, it is most essential that organization policies and standards, including the data classification schema, are understood by the owner or custodian of the data so they can be properly classified. Automated DLP may not help in understanding classification schema. It is more important that owner understand the requirement compare to end-user. Ex: Ans B
  • 12. 42. Which of the following would be of concern for an information system auditor auditing BPO (Business Process Outsourcing) Service provider? A. BPO has identified all External Compliance requirements. B. BPO exceeds Turn Around Time defined in SLA C. BPO has a documented security policy D. BPO has a proper Background checks for staff Ex: Ans B 43. Whichof the followingchoicesis the most effective control that shouldbe implementedto ensure accountabilityfor applicationusersaccessing sensitive datain the human resource managementsystem and among interfacingapplicationsto the HRMS. a. Two-factorauthentication b. A digital certificate c. Audittrails d. Single sign-onauthentication. Ex: Audittrailscapture whichuser,atwhat time anddate along withotherdetails,hasperformed the transactionand thishelpsinestablishingaccountabilityamongapplicationusers.Otherthree optionsare authenticationmechanism,nottouse for establishingaccountability. 44. During a review of a large data center an IS auditor observed computer operator acting as backup tape librarians and security administrators. Which of the these situations would be MOST critical to report to senior management? a. Computer operation acting as tape librarians b. Computer operators acting as security administrator c. Computer operators acting as tape librarian and security administrator d. It is not necessary to report any of these situations to senior management Ex: Ans C 45. An IS Auditor has found that employees are emailing sensitive company information to public web-based email domains. Which of the following is the best remediation option for the IS Auditor to recommend? a. Encrypted mail accounts b. Training and awareness c. Activity monitoring d. Data Loss prevention (DLP) Ex: data loss prevention is an automated preventive tool that can block sensitive information from leaving the network, while at the same time logging the offenders. Encryption will not prevent sending information to unauthorized person. Activity monitoring is a detective control. Training and awareness is not a strong control compare to DLP. 46. The primary objective ofvalue optimisationprocess is to ensure: a. IT-enabledinvestmentsare made atthe lowestcost b. Appropriate IT-enabledinitiativesare selected c. Cost-efficientdeliveryof solutionsandservices d. Qualificationof ITcosts and likelybenefits
  • 13. Ex: The primaryobjective of value optimisationprocessistoensure cost-efficientdeliveryof solutionsandservices.The focusof value optimisationprocessisnotensuringlowestcostbut optimal costof all IT-enabledinvestments.Selectionof appropriate ITenabledinitiative isone of the operational activitiesof value optimisation.Althoughitiscritical butitisnot the primaryobjective. All IT investmentsbenefitscannotbe quantified.Hence,the optionof quantificationof ITcostsand likelybenefitsisnotcorrect.Further,thisisnotthe objective butamechanismof performance monitoring. 47. Whichof the followingisthe key benefitofcapacity management a. Meetlongterm businessgoalsinacost effectiveandtimelymanner b. Meetscurrent andfuture requirementsinacost-effectivemanner c. Define andmaintainrelationshipsbetweenkeyresourcesandcapabilities d. Assessthe impactof changesand deal withservice incidents Ex: The keybenefitof capacitymanagementistoensure thatnotjustthe current but the future businessrequirementsare metinacost effective manner.Capacitymanagementlooksatbothlong- termas well asshort termbusinessgoalsinacost effective andtimelymanner.Defining,describing and maintainingrelationshipsbetweenkeyresourcesandcapabilitiesisaprimaryrequirementof capacitymanagementandnot a benefit.Assessingthe impactof changesanddeal withservice incidentsisone of the benefitsof capacitymanagementbutcomparedtooptionA,thisisnot a ket benefit. 48. Whichof the followingismost critical for ensuringsustainedalignmentofIT strategic plans? The IT strategic plans provide: a. DirectiontoIT departmentondeployment of informationsystems b. Keyfunctionariesare involvedindevelopmentandimplementation c. IT longand short range plansare communicatedtostake holders d. Feedbackiscaptured,reportedandevaluatedforinclusioninfuture ITplanning. Ex: Capturing,reportingandevaluatingfeedbackforinclusioninfuture ITplanningismostcritical for ensuringsustainedalignmentof ITstrategicplansasthisprovidesmetricsformonitoringandalso ensuringthatperformance ismaintainednotonlyforthe currentbutalso forthe future.Top managementsharesthe enterprise strategybasedonwhichITstrategyispreparedbythe IT department.There isnodirectiontoITdepartmentondeploymentof informationsystemsprovided as part of IT strategicplanning.The involvementof keyfunctionariesindevelopmentand implementationiscritical toensure successbutitisrequiredinthe initial stages.However,thisdoes not guarantee the sustainabilityof the initiative.The communicationof ITlongandshort range plans isimportantto getbuy-inandto keepall stakeholdersinformedbutthisisonlyareportingprocess. 49. From an IT governance perspective,whatis the primary responsibilityofthe board of directors to ensure that the IT strategy: a. Is cost effective b. Is future thinkingandinnovative c. Is alignedwiththe businessstrategy d. Has the appropriate prioritylevel assigned. Ex: AnsC
  • 14. 50. An IS Auditor has beenasked to reviewa contract for a vendor beingconsideredtoprovide data centre services.Whichis the best way to determine whetherthe termsof the contract are adheredto after the contract is signed? a. Require the vendortoprovide monthlystatusreports b. Have periodicmeetingswiththe clientITmanager c. Conductperiodicauditreviewsof the vendor d. Require the performance parametersbe statedwithinthe contract Ex: AnsC 51. Whichof the followingchoicesisthe primary benefitofrequiringa steeringcommittee to oversee IT investment? a. To conduct a feasibilitystudytodemonstrateITvalue b. To ensure thatinvestmentsare made accordingtobusinessrequirements c. To ensure thatpropersecuritycontrolsare enforced d. To ensure thata standarddevelopmentmethodologyisimplemented. Ex: AnsB 52. An IS Auditor is evaluatinga newly developedITpolicyfor an organisation. Whichof the followingfacilitywouldthe IS auditor considermost important to facilitate compliance with the policy upon its implementation. a. ExistingITmechanismsthatenable compliance b. Alignmentof the policytothe businessstrategy c. Currentand future technologyinitiatives d. Regulatorycompliance objectivesthatare definedinthe policy. Ex: AnsA 53. An IS Auditor isreviewinga DRP and discoversthat a critical applicationis missingfrom the plan. Whichof the followingrecommendationswouldbe the best option for the IS auditor working with an organisation with limited IT resources. a. Active-active clusters b. A reciprocal agreement c. A warm site d. Active-passive cluster. Ex: Inactive-passivecluster,the applicationisrunningonlyone (active) node while othernodesare usedonlyif the applicationfailsonthe active node.Active-activeclusterandwarmsite will require more resources.Reciprocal arrangementmaynotbe a goodoptionforcritical application.Anactive- passive clusterwouldbe the bestoptioninthiscase because the passiveclusterwouldrestore the application. 54. An IS Auditor is reviewing the backup strategy and the backup technology in use by an organisation. The IS Auditor would be most concerned if: a. Data restoration tests are not being regularly performed. b. Disk subsystem are being backed up to other disks, and not to tape.
  • 15. c. Daily backup logs purged quarterly. d. Backups of critical company data are not encrypted. Ex:The onlywaytoensure withcertaintythatabackupisworkingistoperformadatarestoration test.If thiswere notbeingdoneregularly,itwouldbe aconcern.Otheroptions are concernedbut option a is the most concerned. 55. An organisation is reviewing its contract with cloud computing provider. For which of the followingreasonswouldthe organisationwanttoremove alock-inclause fromthe contract. a. Availability b. Portability c. Agility d. Scalability Ex: When drawing up a contract with a cloud service provider, the ideal practice is to remove the customerlock-inclause.Itmaybe importantforthe clienttosecure portabilityof theirsystemassets, i.e., the right to transfer from one vendor to another. Removing lock-in period will not improve availability.Agilityreferstoefficiencyof solutionenablingorganisationtorespondtobusinessneeds further.Scalabilityisthe abilitytoadjustservice levelsaccordingtochangingbusinesscircumstances. 56. Which of the following ways is the best for an IS Auditor to verify that critical production servers are running the latest security updates released by the vendor? a. Ensure that automatic updates are enabled on critical production servers. b. Verify manually that the patches are applied on a sample of production servers. c. Review the change management log for critical production servers. d. Run an automated tool to verify the security patches on production servers. Ex: An automated tool can immediately provide a report on which patches have been applied and which are missing. Ensuring automatic update will not provide assurance that all servers are being patchedappropriately.Manual testingisdifficultandtime consuming.Change management logmay not accurately reflect the patch update status. 57. Whichofthe followingchoicesbestensuresaccountabilitywhenupdatingdata directlyin a production database? a. Before and after screen images b. Approved implementation plan c. Approved validation plan. d. Data File security. Ex:Creatingbeforeandafterimageisthebestwaytoensure thatappropriatedatahave beenupdated in a direct data change. The screen shots would include the data prior to and after the change. Approved plans may not ensure that appropriate changes were made. Approved validation plan will also not ensuring that data changes were appropriate and correct. Data file security will also not ensuring that data changes were correct. 58. A financial institutionhas decidedto outsource its customer service divisionto an offshore vendor. The most important consideration would be to ensure that the contract contains: a. A limited liability clause b. A right-to-audit clause c. A data ownership clause d. An early termination clause. Ex: Data ownership is the most important aspect of outsourced operations. An ownership clause establishesthatoutsourcingcompanymaintainscomplete ownershipof the informationprovidedto the vendor and the vendor must maintain confidentiality over the information with which it comes
  • 16. intocontact. The ownershipclause alsoprohibitsthe vendorfromusinganyof the customerdata for its internal purpose. 59. An IS Auditor of a healthcare organisationis reviewingcontractual termsand conditionsof a third party cloud provider beingconsideredto host patient health information.Whichof the following contractual terms would be the greatest risk to the customer organisation. a. Data ownership is retained by the customer organisation. b. The third partyproviderreservesthe righttoaccess data to perform certain operations. c. Bulk data withdrawal mechanisms are identified. d. The customer organisation is responsible for backup, archive and restore. Ex: Some service providersreservethe righttoaccesscustomerinformation(thirdpartyaccess) to performcertaintransactionsandprovide certainservices.Inthe case of protectedhealth information(PHI),regulationsmayrestrictcertainaccess.Organisationmustreview the regulatory environmentinwhichthe cloudprovideroperatesbecauseitmayhave requirementsorrestrictions of itsown.Organisationsmustthendeterminewhetherthe cloudproviderprovidesappropriate controlsto ensure thatdata are appropriatelysecure. 60. A vendor has released several critical security patches over the past few months and this has puta strain on the abilityofthe administratorsto keepthe patchestestedanddeployed in a timely manner. The administrators have asked if they could reduce the testing of the patches. What approach should the organisation take? a. Continue the current process of testing and applying patches. b. Reduce testing and ensure that an adequate backout plan is in place. c. Delay patching until resources for testing are available. d. Rely on the vendor’s testing of the patches. Ex: Applying security software patches promptly is critical to maintain the security of the servers; further,testingthe patchesisimportantbecause the patchesmay affectother systemsandbusiness operations.Because the vendorhasrecentlyreleasedseveral criticalpatchesinashorttime,itcanbe hoped that this is a temporary problem and does not need a revision to policy or procedures. 61. A new business requirement required changing database vendors. Which of the following areas should the IS Auditor primarily examine in relation to this implementation? a. Integrity of the data b. Timing of the cutover c. Authorisation level of users d. Normalisation of data. Ex: A critical issue whenmigratingdatafromone database to anotheristhe integrityof the data and ensuringthatthe data are migratedcompletelyandcorrectly. 62. Due to resource constraints, a developerrequiresfull access to production data to support certain problemsreported by productionusers. Which of the followingchoiceswould be a good compensating control for controlling unauthorised changes in production? a. Provide andmonitorseparate loginIds that the developerwill use forprogrammingand production support. b. Capture activitiesof the developerinthe productionenvironmentbyenablingaudittrails. c. Back up all effectedrecordsbefore allowingthe developertomake production changes. d. Ensure that all changes are approved by the change manager.
  • 17. Ex: Providingseparate loginIDsthatwouldonlyallow adeveloperprivilegedaccesswhenrequiredis a good compensatingcontrol,butitmustalsobe backedup withmonitoringandsupervisionof the activityof the developer. 63. While conducting an audit on the CRM application, the IS Auditor observes that it takes a significantly long time for users to log on to the system during peak business hours as compared with other times of the day. Once loggedon, the average response time for the system is within acceptable limits. Which of the following choices should the IS Auditor recommend? a. The IS Auditorshouldrecommendnothingbecause the systemiscompliantwithcurrent business requirements. b. IT should increase the network bandwidth to improve performance. c. Users should be provided with detailed manuals to use the system properly. d. The ISAuditorshouldrecommendestablishingperformancemeasurementcriteriaforthe authentication servers. Ex: Performance criteriaforthe authenticationserverswouldhelptoquantifyacceptable thresholds for system performance, which can be measured and remediated. 64. Which of the following controls would be most effective to reduce the risk of loss due to fraudulent online payment request? a. Transaction monitoring b. Protecting web sessions using secured socket layer (SSL) c. Enforcing password complexity for authentication d. Inputting validation checks on web forms. Ex: An electronic payment system could be the target of fraudulent activities. An unauthorised user could potentially enter false transactions. By monitoring transactions, the payment processor could identifypotentiallyfraudulent transactions based on the typical usage patterns, monetary amounts, physical location of purchases, and other data that are part of the transaction process. 65. Whichofthe followingcriteriaare most neededtoensure thatloginformationisadmissible in court? Ensure that dat have been: a. Independently time stamped b. Recorded by multiple logging systems. c. Encrypted by the most secure algorithm d. Verified to ensure log integrity. Ex: It isimportantto assure thatlog informationexistedatacertainpoint of time andit hasnot been alerted. Therefore, evidential credibility of log informationis enhanced when there is proof that no one has tampered with this information. 66. The greatest benefit of having well-defined data classification policies and procedures is: a. A more accurate inventory of information assets b. A decreased cost of controls. c. A reduced risk of inappropriate system access. d. An improved regulatory compliance. Ex: An important benefit of a well-defined data classificationprocess wouldbe to lower the cost of protectingdatabyensuringthatthe appropriate controlsare appliedwithrespecttothe sensitivityof the data. Without proper classification framework, some security controls may be greater and therefore, more costly than is required based on the data classification.
  • 18. 67. An IS Auditor who is auditing an application determines that, due to resource constraints, one user holdsrolesas both a developeranda release co-ordinator.Whichofthe following options would the IS Auditor most likely recommend? a. Revoke the user’s developer access b. Revoke the user’s release coordinator access c. Management review of user activities d. Periodic audit of user activities. Ex: If an individual requires role with conflicting segregation of duties, the best control given the circumstances is to monitor that individual’s access in the productionenvironment.Although this is notpreferredmethodof resolvingsegregationof dutiesconflicts,itisthe bestcompensationgcontrol given the current business circumstances. 68. A companyisplanningtoinstall a network-basedintrusiondetectionsystem(IDS) toprotect the web site that it hosts. Where should the device be installed? a. On the local network b. Outside the firewall c. In the de-militarised zone d. On the server that hosts the website. Ex: NetworkbasedIDSsdetectattackattemptsbymonitoringnetworktraffick.A publicwebserveris typically placed on the protected network segment known as the demilitarised zone( DMZ). An IDS installedinthe DMZ detectsandreportson maliciousactivityoriginatingfromthe internetaswell as the internal network, thus allowing the administrator to take action. 69. An ISAuditoris workingwiththe DBA group to mitigate riskassociatedwithindividual users who have direct access to SQL databases. The IS Auditor recommends using lightweight directory access protocol (LDAP) groups. What approval should be requiredto ensure least privilege? a. Manager approval b. Database ownerapproval c. Systemadministratorapproval d. DBA approval Ex: Requiringdatabase ownerapproval willensurethatafterthe groupis createdonlyuserswho require accesswill be added.The groupownerwouldbe the dataownerandwouldbe the best personto understandaccessneeds. 70. An IS Auditor isreviewinganorganisation’s networkoperationscentre (NOC).Whichof the following choices is of the greatest concern? The use of a. A wetpipe-basedfire suppressionsystem b. A rentedrack space inthe NOC. c. A CO2-basedfire suppressionsystem. d. An uninterruptedpowersupplywith10minsof backup power. Ex: CO2 systemsare a dangerto the people andshouldnotbe usedbecause theycause suffocation inthe eventof a fire.Controlsshouldconsiderpersonal safetyfirst. 71. An IS Auditor is reviewing access for an accounting system and notices a segregation of dutiesissue;however,the businessissmall and additional workers are not available.What is the best recommended compensating control in this situation? a. Implementingrole-basedaccess. b. Reviewingaudittrails c. Performingperiodicaccessreviews d. Reviewingthe errorlog. Ex: Reviewingaudittrailswouldbe the bestcompensatingcontrol forasegregationof dutiesissue that cannot be eliminatedbyaddingemployees.
  • 19. 72. An IS Auditor is reviewing a manufacturing company and finds that mainframe users at a remote site connect to the mainframe at headquarters over the internet via telnet. Which of the following is the best recommendation to ensure proper security controls. a. Use of a point-to-pointleasedline b. Use of a firewallrule toallow onlythe IPaddressof the remote site c. Use of two-factorauthentication d. Use of a non-standardportfortelnet Ex: A leasedlinewilleffectivelyextendthe LAN of the headquarters tothe remote site,adthe mainframe Telnetconnectionwouldtravel overthe private line,whichwouldbe lessof asecurity riskwhenusingan insecure protocol suchastelnet. 73. The primary purpose of installingdata leakpreventionsoftware is to control which of the followingchoices? a. Accessprivilegestoconfidentialfilesstoredonservers b. Attemptstodestroycritical dataon the internetnetwork c. Whichexternal systemscanaccessinternal resources d. Confidential documentsleavingthe internal network. Ex: A serverrunningaDLP software applicationusespredefinedcriteriatocheckwhetherany confidentialdocumentsordataare leavingthe internal network. 74. Whichof the followinggroupswouldcreate most concern to an IS Auditor ifthey have direct full access to the productiondatabase? a. Applicationtesters b. Systemadministrators c. The database owner d. The data recoveryteam. Ex: Applicationtestersshouldbe restrictedtothe nonproductionenvironmentand,if theyhave full access to the productiondatabase, the confidentialityandintegrityof databecome questionable. 75. Which of the following tests should be prohibited during peak hours as part of a network security assessment of a bank’s production environment? a. Port scanningforopenfirewall ports b. Testingdatabase serversforweakorblankpasswords c. Port scanningforopenportsin database server d. Networkpacketsniffing. Ex: Testingfordatabase blankor weakpasswordscouldleadtoproductionaccountsbeinglocked out frommultiple failedlogins,whichcould affectproductionsystems. 76. Whichof the followingchoiceswouldbe consideredan attack vector for social engineering? a. A fake email message designedtosteal banklogingcredential. b. Malware installedonawebsite thatinfectsvisitorstothe site. c. An attackerstealingthe laptopof a systemadministratortotry to gainaccess. d. An attackersearchingthroughthe trash dumpsterforconfidential data. Ex: Social engineering,inthe contextof informationsecurity,referstopsychological manipulationof people intoperformingactionsordivulgingconfidentialinformation.A fake email message designed to steal banklogincredentialsisanexampleof one type of social engineeringattackcommonly calledphishing. 77. A warning message from a public web application system displays specific database error messages to the user. Which of the following choices would be the major concern? a. The abilitytopost false transactionstothe database. b. Unauthorisedaccesstothe database byhijackingthe administratorssession c. SusceptibilitytoDOSattacks d. Susceptibilitytohackingattemptstodatabase.
  • 20. Ex: If database error messagesare disclosed,perpetratorscouldknow the database type (vendor, versionetc.).Thiswouldincreasethe riskof applicationlayerattackssuchas SQL injection. 78. A company determinedthatitswebsite wascompromisedandarootkit was installedonthe server hosting the application. Which of the following choices would be most likely prevented the incident. a. HIPS b. NIDS c. A Firewall d. OS patching. Ex: A host-basedintrusionpreventionsystempreventsunauthorisedchangestothe host.If a malware attackattemptedtoinstall arootkit,the IPSwouldrefuse topermitthe installationwithout the consentof an administrator. 79. An IS Auditor performing an audit has determined that developers have been granted administrative access to the virtual machine management console to manage their own servers used for software development and testing. Which of the following choices would be most concern for the IS Auditor? a. Developershave the abilitytocreate or de-provisionservers. b. Developerscouldgainelevatedaccesstoproductionservers. c. Developerscanaffectthe performance of productionserverswiththeirapplications d. Developerscouldinstallunapprovedapplicationsto anyservers. Ex: Virtualisationoffersthe abilitytocreate ordestroyvirtual machines(VMs) throughthe administrativeinterface withadministrative access.Whileadeveloperwouldbe unlikelytode- provisionaproductionserver,the administrative console wouldgranthim/herthe abilitytodothis, whichwouldbe a significantrisk. 80. An IS Auditor performingan audit has discussedserver virtualisationimplementationwith the system administrators who indicate that the ability to quickly replicate a production server and create an identical host has saved considerable time and effort.What would be the greatest risk that the ISAuditor shouldlook for whenauditingthe virtual environment? a. Making copies of servers will violate the terms of the software licenses for the OS. b. The copied servers have identical host names and IP addresses c. Virtual server mis-configurations will be propagated across all servers. d. The administratormaycreate performance issuesbycreatingtoomany virtual machines (VMs). Ex: Like any other technology, the VMs must be configured correctly to provide the security and performance necessary to support business requirements. If a VMis configured incorrectly, it could lead to compromise of the physical device and unauthorised activity. The VM configuration that is used as a template should be reviewed carefully to ensure that it is correctly defined. 81. An IS Auditor is reviewing security incident management procedures for the company. Which of the following choices is the most important consideration? a. Chain of custody of electronic evidence b. System breach notification procedures c. Escalation procedures to external agencies d. Procedures to recover lost data. Ex: The preservationof evidence isthe mostimportantconsiderationinregardtosecurityincident management.If dataand evidenceare notcollectedproperly,valuableinformationcouldbe lostand wouldnotbe admissible inthe courtof law shouldthe companydecide topursue litigation. 82. AnIS Auditorisreviewinganetworklogdiscoversthatanemployee ranelevatedcommands on his/her PC by invoking the task scheduler to launch restricted applications. This is an example of what type of attack? a. A race condition
  • 21. b. A privilege escalation c. A buffer overflow d. An impersonation Ex:A privilegeescalationisatype of attackwhere higherlevelsystemauthorityisobtainedbyvarious methods. In this example, the task scheduler service runs with administrator permissions, and a security flaw allows programs launched by the scheduler to run at the same permission level. 83. An IS Auditor performing an IS audit of the newly installed voice-over-internet protocol system was inspecting the wiring closets on each floor of the building. What would be the greatest concern? a. LAN switches are not connected to the UPS units b. Network cabling is disorganised and not properly labelled. c. The telephones are using the same cable used for LAN connections. d. The wiring closet also contain power lines and breaker panels. Ex: VOIPtelephone systemsuse standard networkcablingandtypicallyeachtelephonegetspower overthe networkcable fromthe wiringclosetwhere the networkswitchisinstalled.If the LAN switchesdonothave backup power,the phoneswilllose powerif there isautilityinterruptionand potentiallynotbe able tomake emergencycalls. 84. Sign-onproceduresinclude the creationof aunique user-idandpassword.However,anIS auditordiscoversthatinmanycases the username and passwordare the same.The Best control to mitigate thisriskisto: a. Change the company’ssecuritypolicy b. Educate usersabout the riskof weakpasswords c. Buildinvalidationstopreventthisduringusercreationandpasswordchange d. Require aperiodicreviewof matchingof user-IDandpasswordsfordetectionand correction. Ex: Ansb 85. Whichof the followinglogical accessexposuresinvolveschangingdatabefore,orasit is enteredintothe computer? a. Data diddling b. Trojan horse c. Worm d. Salami technique Ex: Ansa 86. All of the followingare commonformsof internetattacksexcept: a. Exploitationof vulnerabilitiesinvendorprograms b. Denial of service attacks c. Sendinghostilecode andattackprograms as mail attachments d. Systematichackerfoot-printingof anorganization. Ex: AnsA 87. The scope of a logical accesscontrolsreview would include the evaluationof: a. Effectivenessandefficiencyof ITsecurityandrelatedcontrols b. Confidentiality,integrityandavailabilityof informationof authorizedusers. c. Accessto systemsoftware andapplicationsoftware toensure compliance withthe access policy.
  • 22. d. Accessto the userauthorizationlevels,parametersandoperational functionsthrough applicationsoftware. Ex: AnsC 88. Whichof the followingconcernsassociatedwiththe worldwide webwouldbe addressedby a firewall? a. Unauthorizedaccessfrom outside the organization b. Unauthorizedaccessfromwithinthe organization c. Delayininternetconnectivity d. Delayindownloadingusingfiletransferprotocol. Ex: AnsA 89. If inadequate,whichof the followingwouldmostlikelycontribute toadenial of service attack? a. Routerconfigurationandrules b. Designof the internal network c. Updatesto the router systemsoftware d. Audittestingandreviewtechniques Ex: AnsC 90. Whichof the followingmethodsof providingtelecommunicationcontinuityinvolvesrouting trafficthroughsplitor duplicate cable facilities? a. Diverse routing b. Alternate routing c. Redundancy d. Long haul networkdiversity Ex: Ans a 91. Passwordshouldbe: a. Assignedbythe securityadministrator b. Changedevery30 daysat the discretionof the user c. Reusedoftentoensure the userdoesnotforgetthe password d. Displayedonthe screensothat the usercan ensure thatit has beenproperlyentered. Ex: Ans B 92. Whichof the followingdatabase administratoractivitiesisunlikelytobe recordedon detective control log a. Deletion of arecord b. Change of a password c. Disclosure of password d. Changesto accessrights. Ex: AnsC 93. Confidential datastoredona laptopisbestprotectedby: a. Storage on optical disk b. Log-onID and password c. Data encryption
  • 23. d. Physical locks Ex: AnsB 94. Whichof the followingisthe mosteffective techniqueforprovidingsecurityduringdata transmission? a. Communicationlog b. Systemssoftware log c. Encryption d. Standardprotocol Ex: AnsC 95. An ISauditorwhointendstouse penetrationtestingduringanauditof internetconnections would: a. Evaluate configuration b. Examine securitysettings c. Ensure virus-scanningsoftware inuse d. Use toolsandtechniquesthatare available toahacker. Ex: Ans D 96. Bestapproach formonitoringthe performance of ITresourcesis? a. Compare lagindicators againstexpectedthresholds b. Monitorleadindicatorswithindustrybestpractices c. Define thresholdsforlagindicatorsbasedonlongtermplan d. Lead indicatorshave correspondinglagindicators. Ex: Ans b 97. An ISAuditordetectedthatseveral PCsconnectedto the internethave alow securitylevel that isallowingforfree recordingof cookies.Thiscreatesariskbecause cookieslocally stores a. Informationaboutthe internetsite b. Informationaboutthe user c. Informationforthe internetconnection d. Internetpages. Ex: AnsB 98. Whichof the followingbestensuresthe integrityof aserver’soperatingsystem? a. Protectingthe serverina secure location b. Settinga bootpassword c. Hardeningthe serverconfiguration d. Implementingactivitylogin Ex: AnsC 99. When an employee notifies the companythat he/she has forgotten his/her password,what should be done FIRST by the security administrator? A. Allowthe system to randomlygenerate a new password
  • 24. B. Verify the user’s identificationthrough a challenge/response system C. Provide the employee with the default password and explain that it should be changed as soon as possible D. Ask the employee to move to the administratorterminal to generate a new password in order to assure confidentiality Ex: Ans B 100. Which of the followingwould be of MOST concern to an IS auditorreviewinga VPN implementation?Computers on the network that are located: A. on the enterprise’s internal network. B. at the backup site. C. in employees’homes. D. at the enterprise’s remote offices. Ex: Ans C