1. Testpassport real exam questions can make sure you pass any IT exam.
Exam Code: CISA
Exam Name: Isaca CISA
Full version: 2290 Q&As
Visit more information about CISA exam:
CISA Real Questions
Share some CISA questions and answers below.
1. Which of the following audit mainly focuses on discovering and disclosing on frauds and
crimes?
A. Compliance Audit
B. Financial Audit
C. Integrated Audit
D. Forensic audit
Answer: D
Forensic audit is the activity that consists of gathering, verifying, processing, analyzing of and
reporting on data in order to obtain facts and/or evidence - in a predefined context - in the area
of legal/financial disputes and or irregularities (including fraud) and giving preventative advice
For your exam you should know below information about different types of audit:
What is an audit?
An audit in general terms is a process of evaluating an individual or organization’s accounts.
This is usually done by an independent auditing body. Thus, audit involves a competent and
independent person obtaining evidence and evaluating it objectively with regard to a given
entity, which in this case is the subject of audit, in order to establish conformance to a given set
of standards. Audit can be on a person, organization, system, enterprise, project or product.
Compliance Audit
A compliance audit is a comprehensive review of an organization's adherence to regulatory
2. Testpassport real exam questions can make sure you pass any IT exam.
guidelines. Independent accounting, security or IT consultants evaluate the strength and
thoroughness of compliance preparations. Auditors review security polices, user access controls
and risk management procedures over the course of a compliance audit. Compliance audit
include specific tests of controls to demonstrate adherence to specific regulatory or industry
standard. These audits often overlap traditional audits, but may focus on particular system or
data.
What, precisely, is examined in a compliance audit will vary depending upon whether an
organization is a public or private company, what kind of data it handles and if it transmits or
stores sensitive financial data. For instance, SOX requirements mean that any electronic
communication must be backed up and secured with reasonable disaster recovery
infrastructure. Health care providers that store or transmit e-health records, like personal health
information, are subject to HIPAA requirements. Financial services companies that transmit
credit card data are subject to PCI DSS requirements. In each case, the organization must be
able to demonstrate compliance by producing an audit trail, often generated by data from event
log management software.
Financial Audit
A financial audit, or more accurately, an audit of financial statements, is the verification of the
financial statements of a legal entity, with a view to express an audit opinion. The audit opinion
is intended to provide reasonable assurance, but not absolute assurance, that the financial
statements are presented fairly, in all material respects, and/or give a true and fair view in
accordance with the financial reporting framework. The purpose of an audit is to provide an
objective independent examination of the financial statements, which increases the value and
credibility of the financial statements produced by management, thus increase user confidence
in the financial statement, reduce investor risk and consequently reduce the cost of capital of
the preparer of the financial statements.
Operational Audit
Operational Audit is a systematic review of effectiveness, efficiency and economy of operation.
Operational audit is a future-oriented, systematic, and independent evaluation of organizational
activities. In Operational audit financial data may be used, but the primary sources of evidence
are the operational policies and achievements related to organizational objectives. Operational
audit is a more comprehensive form of an Internal audit.
The Institute of Internal Auditor (IIA) defines Operational Audit as a systematic process of
evaluating an organization's effectiveness, efficiency and economy of operations under
management's control and reporting to appropriate persons the results of the evaluation along
with recommendations for improvement.
Objectives
3. Testpassport real exam questions can make sure you pass any IT exam.
To appraise the effectiveness and efficiency of a division, activity, or operation of the entity in
meeting organizational goals.
To understand the responsibilities and risks faced by an organization.
To identify, with management participation, opportunities for improving control.
To provide senior management of the organization with a detailed understanding of the
Operations.
Integrated Audits
An integrated audit combines financial and operational audit steps. An integrated audit is also
performed to assess overall objectives within an organization, related to financial information
and asset, safeguarding, efficiency and or internal auditors and would include compliance test
of internal controls and substantive audit step.
IS Audit
An information technology audit, or information systems audit, is an examination of the
management controls within an Information technology (IT) infrastructure. The evaluation of
obtained evidence determines if the information systems are safeguarding assets, maintaining
data integrity, and operating effectively to achieve the organization's goals or objectives. These
reviews may be performed in conjunction with a financial statement audit, internal audit, or other
form of attestation engagement.
The primary functions of an IT audit are to evaluate the systems that are in place to guard an
organization's information. Specifically, information technology audits are used to evaluate the
organization's ability to protect its information assets and to properly dispense information to
authorized parties. The IT audit aims to evaluate the following:
Will the organization's computer systems be available for the business at all times when
required? (known as availability) Will the information in the systems be disclosed only to
authorized users? (known as security and confidentiality) Will the information provided by the
system always be accurate, reliable, and timely? (measures the integrity) In this way, the audit
hopes to assess the risk to the company's valuable asset (its information) and establish
methods of minimizing those risks.
Forensic Audit
Forensic audit is the activity that consists of gathering, verifying, processing, analyzing of and
reporting on data in order to obtain facts and/or evidence - in a predefined context - in the area
of legal/financial disputes and or irregularities (including fraud) and giving preventative advice.
The purpose of a forensic audit is to use accounting procedures to collect evidence for the
prosecution or investigation of financial crimes such as theft or fraud. Forensic audits may be
conducted to determine if wrongdoing occurred, or to gather materials for the case against an
alleged criminal.
4. Testpassport real exam questions can make sure you pass any IT exam.
The following answers are incorrect:
Compliance Audit - A compliance audit is a comprehensive review of an organization's
adherence to regulatory guidelines. Independent accounting, security or IT consultants evaluate
the strength and thoroughness of compliance preparations. Auditors review security polices,
user access controls and risk management procedures over the course of a compliance audit.
Compliance audit include specific tests of controls to demonstrate adherence to specific
regulatory or industry standard. These audits often overlap traditional audits, but may focus on
particular system or data.
Financial Audit- A financial audit, or more accurately, an audit of financial statements, is the
verification of the financial statements of a legal entity, with a view to express an audit opinion.
The audit opinion is intended to provide reasonable assurance, but not absolute assurance, that
the financial statements are presented fairly, in all material respects, and/or give a true and fair
view in accordance with the financial reporting framework. The purpose of an audit is to provide
an objective independent examination of the financial statements, which increases the value
and credibility of the financial statements produced by management, thus increase user
confidence in the financial statement, reduce investor risk and consequently reduce the cost of
capital of the preparer of the financial statements.
Integrated Audits - An integrated audit combines financial and operational audit steps. An
integrated audit is also performed to assess overall objectives within an organization, related to
financial information and asset, safeguarding, efficiency and or internal auditors and would
include compliance test of internal controls and substantive audit step.
The following reference(s) were/was used to create this question:
CISA Review Manual 2014 Page number 44
http://searchcompliance.techtarget.com/definition/compliance-audit
http://en.wikipedia.org/wiki/Financial_audit
http://en.wikipedia.org/wiki/Operational_auditing
http://en.wikipedia.org/wiki/Information_technology_audit
http://www.investorwords.com/16445/forensic_audit.html
2. What is the MOST effective way to ensure security policies and procedures are up-to-date?
A. Verify security requirements are being identified and consistently applied.
B. Align the organization’s security practices with industry standards and best practice.
C. Define and document senior management’s vision for the direction of the security
D. Prevent security documentation audit issues from being raised
Answer: B
5. Testpassport real exam questions can make sure you pass any IT exam.
3. Which of the following step of PDCA establishes the objectives and processes necessary to
deliver results in accordance with the expected output?
A. Plan
B. Do
C. Check
D. Act
Answer: A
Explanation:
Plan - Establish the objectives and processes necessary to deliver results in accordance with
the expected output (the target or goals). By establishing output expectations, the completeness
and accuracy of the spec is also a part of the targeted improvement. When possible start on a
small scale to test possible effects.
For your exam you should know the information below:
PDCA (planCdoCcheckCact or planCdoCcheckCadjust) is an iterative four-step management
method used in business for the control and continuous improvement of processes and
products. It is also known as the Deming circle/cycle/wheel, Stewart cycle, control circle/cycle,
or planCdoCstudyCact (PDSA). Another version of this PDCA cycle is OPDCA. The added "O"
stands for observation or as some versions say "Grasp the current condition."
The steps in each successive PDCA cycle are:
PLAN
Establish the objectives and processes necessary to deliver results in accordance with the
expected output (the target or goals). By establishing output expectations, the completeness
6. Testpassport real exam questions can make sure you pass any IT exam.
and accuracy of the spec is also a part of the targeted improvement. When possible start on a
small scale to test possible effects.
DO
Implement the plan, execute the process, make the product. Collect data for charting and
analysis in the following "CHECK" and "ACT" steps.
CHECK
Study the actual results (measured and collected in "DO" above) and compare against the
expected results (targets or goals from the "PLAN") to ascertain any differences. Look for
deviation in implementation from the plan and also look for the appropriateness and
completeness of the plan to enable the execution, i.e., "Do". Charting data can make this much
easier to see trends over several PDCA cycles and in order to convert the collected data into
information. Information is what you need for the next step "ACT".
ACT
Request corrective actions on significant differences between actual and planned results.
Analyze the differences to determine their root causes. Determine where to apply changes that
will include improvement of the process or product. When a pass through these four steps does
not result in the need to improve, the scope to which PDCA is applied may be refined to plan
and improve with more detail in the next iteration of the cycle, or attention needs to be placed in
a different stage of the process.
The following answers are incorrect:
DO - Implement the plan, execute the process, make the product. Collect data for charting and
analysis in the following "CHECK" and "ACT" steps.
CHECK - Study the actual results (measured and collected in "DO" above) and compare against
the expected results (targets or goals from the "PLAN") to ascertain any differences
ACT -Request corrective actions on significant differences between actual and planned results.
Analyze the differences to determine their root causes. Determine where to apply changes that
will include improvement of the process or product
The following reference(s) were/was used to create this question:
CISA review manual 2014 page number 107
4. An IS auditor is reviewing an organization’s network vulnerability scan results.
Which of the following processes would the scan results MOST likely feed into?
A. Firewall maintenance
B. Patch management
C. Incident response
D. Traffic management
7. Testpassport real exam questions can make sure you pass any IT exam.
Answer: A
5. Assessments of critical information systems are based on a cyclical audit plan that has not
been updated for several years.
Which of the following should the IS auditor recommend to BEST address this situation?
A. Use a revolving set of audit plans to cover all systems
B. Update the audit plan quarterly to account for delays and deferrals of periodic reviews
C. Regularly validate the audit plan against business risks
D. Do not include periodic reviews in detail as part of the audit plan
Answer: C
6. Which of the following cloud deployment model is provisioned for open use by the general
public?
A. Private Cloud
B. Community Cloud
C. Public Cloud
D. Hybrid Cloud
Answer: C
Explanation:
In Public cloud, the cloud infrastructure is provisioned for open use by the general public. It may
be owned, managed, and operated by a business, academic, or government organization, or
some combination of them. It exists on the premises of the cloud provider.
For your exam you should know below information about Cloud Computing deployment models:
Private cloud
The cloud infrastructure is provisioned for exclusive use by a single organization comprising
multiple consumers (e.g., business units). It may be owned, managed, and operated by the
organization, a third party, or some combination of them, and it may exist on or off premises.
Private Cloud
8. Testpassport real exam questions can make sure you pass any IT exam.
Community Cloud
The cloud infrastructure is provisioned for exclusive use by a specific community of consumers
from organizations that have shared concerns (e.g., mission, security requirements, policy, and
compliance considerations). It may be owned, managed, and operated by one or more of the
organizations in the community, a third party, or some combination of them, and it may exist on
or off premises.
Community Cloud
Public Cloud
The cloud infrastructure is provisioned for open use by the general public. It may be owned,
managed, and operated by a business, academic, or government organization, or some
combination of them. It exists on the premises of the cloud provider.
Public Cloud
9. Testpassport real exam questions can make sure you pass any IT exam.
Hybrid cloud
The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private,
community, or public) that remain unique entities, but are bound together by standardized or
proprietary technology that enables data and application portability (e.g., cloud bursting for load
balancing between clouds)
hybrid cloud
The following answers are incorrect:
Private cloud - The cloud infrastructure is provisioned for exclusive use by a single organization
comprising multiple consumers (e.g., business units). It may be owned, managed, and operated
by the organization, a third party, or some combination of them, and it may exist on or off
premises.
Community cloud - The cloud infrastructure is provisioned for exclusive use by a specific
community of consumers from organizations that have shared concerns (e.g., mission, security
10. Testpassport real exam questions can make sure you pass any IT exam.
requirements, policy, and compliance considerations). It may be owned, managed, and
operated by one or more of the organizations in the community, a third party, or some
combination of them, and it may exist on or off premises.
Hybrid cloud - The cloud infrastructure is a composition of two or more distinct cloud
infrastructures (private, community, or public) that remain unique entities, but are bound
together by standardized or proprietary technology that enables data and application portability
(e.g., cloud bursting for load balancing between clouds)
The following reference(s) were/was used to create this question:
CISA review manual 2014 page number 102
Official ISC2 guide to CISSP 3rd edition Page number 689 and 690
7. Which of the following should be reviewed FIRST when planning an IS audit?
A. Recent financial information
B. Annual business unit budget
C. IS audit standards
D. The business environment
Answer: D
8. An IS auditor is reviewing an organization’s incident management processes and procedures.
which of the following observations should be the auditor’s GREATEST concern?
A. Ineffective incident classification
B. Ineffective incident prioritization
C. Ineffective incident detection
D. Ineffective post-incident review
Answer: C
9. An IS auditor reviewing an organization’s data privacy controls observes that privacy notices
do not clearly state how the organization uses customer data for its processing operations.
Which of the following data protection principles MUST be implemented to address this gap?
A. Maintenance of data integrity
B. Access to collected data
C. Retention of consent documentation
D. Purpose for data collection
Answer: B
10. An internal audit department recently established a quality assurance (QA) program.
11. Testpassport real exam questions can make sure you pass any IT exam.
Which of the following activities is MOST important to include as part of the QA program
requirements?
A. Ongoing monitoring of the audit activities
B. Analysis of user satisfaction reports from business lines.
C. Feedback from internal audit staff
D. Long-term internal audit resource planning
Answer: A
11. Which of the following is NOT an example of corrective control?
A. OS Upgrade
B. Backup and restore
C. Contingency planning
D. System Monitoring
Answer: D
Explanation:
The word NOT is used as a keyword in the question. You need to find out a security control
from given options which in not corrective control. System Monitoring is a detective control and
not a corrective control.
For your exam you should know below information about different security controls
Deterrent Controls
Deterrent Controls are intended to discourage a potential attacker. Access controls act as a
deterrent to threats and attacks by the simple fact that the existence of the control is enough to
keep some potential attackers from attempting to circumvent the control. This is often because
the effort required to circumvent the control is far greater than the potential reward if the
attacker is successful, or, conversely, the negative implications of a failed attack (or getting
caught) outweigh the benefits of success. For example, by forcing the identification and
authentication of a user, service, or application, and all that it implies, the potential for incidents
associated with the system is significantly reduced because an attacker will fear association
with the incident. If there are no controls for a given access path, the number of incidents and
the potential impact become infinite. Controls inherently reduce exposure to risk by applying
oversight for a process. This oversight acts as a deterrent, curbing an attacker’s appetite in the
face of probable repercussions.
The best example of a deterrent control is demonstrated by employees and their propensity to
intentionally perform unauthorized functions, leading to unwanted events. When users begin to
understand that by authenticating into a system to perform a function, their activities are logged
and monitored, and it reduces the likelihood they will attempt such an action. Many threats are
12. Testpassport real exam questions can make sure you pass any IT exam.
based on the anonymity of the threat agent, and any potential for identification and association
with their actions is avoided at all costs. It is this fundamental reason why access controls are
the key target of circumvention by attackers. Deterrents also take the form of potential
punishment if users do something unauthorized. For example, if the organization policy
specifies that an employee installing an unauthorized wireless access point will be fired, that will
determine most employees from installing wireless access points.
Preventative Controls
Preventive controls are intended to avoid an incident from occurring. Preventative access
controls keep a user from performing some activity or function. Preventative controls differ from
deterrent controls in that the control is not optional and cannot (easily) be bypassed. Deterrent
controls work on the theory that it is easier to obey the control
rather than to risk the consequences of bypassing the control. In other words, the power for
action resides with the user (or the attacker). Preventative controls place the power of action
with the system, obeying the control is not optional. The only way to bypass the control is to
find a flaw in the control’s implementation.
Compensating Controls
Compensating controls are introduced when the existing capabilities of a system do not support
the requirement of a policy. Compensating controls can be technical, procedural, or managerial.
Although an existing system may not support the required controls, there may exist other
technology or processes that can supplement the existing environment, closing the gap in
controls, meeting policy requirements, and reducing overall risk. For example, the access
control policy may state that the authentication process must be encrypted when performed
over the Internet. Adjusting an application to natively support encryption for authentication
purposes may be too costly. Secure Socket Layer (SSL), an encryption protocol, can be
employed and layered on top of the authentication process to support the policy statement.
Other examples include a separation of duties environment, which offers the capability to isolate
certain tasks to compensate for technical limitations in the system and ensure the security of
transactions. In addition, management processes, such as authorization, supervision, and
administration, can be used to compensate for gaps in the access control environment.
Detective Controls
Detective controls warn when something has happened, and are the earliest point in the post-
incident timeline. Access controls are a deterrent to threats and can be aggressively utilized to
prevent harmful incidents through the application of least privilege.
However, the detective
nature of access controls can provide significant visibility into the access environment and help
organizations manage their access strategy and related security risk. As mentioned previously,
13. Testpassport real exam questions can make sure you pass any IT exam.
strongly managed access privileges provided to an authenticated user offer the ability to reduce
the risk exposure of the enterprise’s assets by limiting the capabilities that authenticated user
has.
However, there are few options to control what a user can perform once privileges are provided.
For example, if a user is provided write access to a file and that file is damaged, altered, or
otherwise negatively impacted (either deliberately or unintentionally), the use of applied access
controls will offer visibility into the transaction. The control environment can be established to
log activity regarding the identification, authentication, authorization, and use of privileges on a
system. This can be used to detect the occurrence of errors, the attempts to perform an
unauthorized action, or to validate when provided credentials were exercised. The logging
system as a detective device provides evidence of actions (both successful and unsuccessful)
and tasks that were executed by authorized users.
Corrective Controls
When a security incident occurs, elements within the security infrastructure may require
corrective actions. Corrective controls are actions that seek to alter the security posture of an
environment to correct any deficiencies and return the environment to a secure state. A security
incident signals the failure of one or more directive, deterrent, preventative, or compensating
controls. The detective controls may have triggered an alarm or notification, but now the
corrective controls must work to stop the incident in its tracks. Corrective controls can take
many forms, all depending on the particular situation at hand or the particular security failure
that needs to be dealt with.
Recovery Controls
Any changes to the access control environment, whether in the face of a security incident or to
offer temporary compensating controls, need to be accurately reinstated and returned to normal
operations. There are several situations that may affect access controls, their applicability,
status, or management. Events can include system outages, attacks, project changes, technical
demands, administrative gaps, and full-blown disaster situations. For example, if an application
is not correctly installed or deployed, it may adversely affect controls placed on system files or
even have default administrative accounts unknowingly implemented upon install. Additionally,
an employee may be transferred, quit, or be on temporary leave that may affect policy
requirements regarding separation of duties. An attack on systems may have resulted in the
implantation of a Trojan horse program, potentially exposing private user information, such as
credit card information and financial data. In all of these cases, an undesirable situation must be
rectified as quickly as possible and controls returned to normal operations.
For your exam you should know below information about different security controls
Deterrent Controls
14. Testpassport real exam questions can make sure you pass any IT exam.
Deterrent Controls are intended to discourage a potential attacker. Access controls act as a
deterrent to threats and attacks by the simple fact that the existence of the control is enough to
keep some potential attackers from attempting to circumvent the control. This is often because
the effort required to circumvent the control is far greater than the potential reward if the
attacker is successful, or, conversely, the negative implications of a failed attack (or getting
caught) outweigh the benefits of success. For example, by forcing the identification and
authentication of a user, service, or application, and all that it implies, the potential for incidents
associated with the system is significantly reduced because an attacker will fear association
with the incident. If there are no controls for a given access path, the number of incidents and
the potential impact become infinite. Controls inherently reduce exposure to risk by applying
oversight for a process. This oversight acts as a deterrent, curbing an attacker’s appetite in the
face of probable repercussions.
The best example of a deterrent control is demonstrated by employees and their propensity to
intentionally perform unauthorized functions, leading to unwanted events.
When users begin to understand that by authenticating into a system to perform a function, their
activities are logged and monitored, and it reduces the likelihood they will attempt such an
action. Many threats are based on the anonymity of the threat agent, and any potential for
identification and association with their actions is avoided at all costs.
It is this fundamental reason why access controls are the key target of circumvention by
attackers. Deterrents also take the form of potential punishment if users do something
unauthorized. For example, if the organization policy specifies that an employee installing an
unauthorized wireless access point will be fired, that will determine most employees from
installing wireless access points.
Preventative Controls
Preventive controls are intended to avoid an incident from occurring. Preventative access
controls keep a user from performing some activity or function. Preventative controls differ from
deterrent controls in that the control is not optional and cannot (easily) be bypassed. Deterrent
controls work on the theory that it is easier to obey the control
rather than to risk the consequences of bypassing the control. In other words, the power for
action resides with the user (or the attacker). Preventative controls place the power of action
with the system, obeying the control is not optional. The only way to bypass the control is to find
a flaw in the control’s implementation.
Compensating Controls
Compensating controls are introduced when the existing capabilities of a system do not support
the requirement of a policy. Compensating controls can be technical, procedural, or managerial.
Although an existing system may not support the required controls, there may exist other
15. Testpassport real exam questions can make sure you pass any IT exam.
technology or processes that can supplement the existing environment, closing the gap in
controls, meeting policy requirements, and reducing overall risk.
For example, the access control policy may state that the authentication process must be
encrypted when performed over the Internet. Adjusting an application to natively support
encryption for authentication purposes may be too costly. Secure Socket Layer (SSL), an
encryption protocol, can be employed and layered on top of the authentication process to
support the policy statement.
Other examples include a separation of duties environment, which offers the capability to isolate
certain tasks to compensate for technical limitations in the system and ensure the security of
transactions. In addition, management processes, such as authorization, supervision, and
administration, can be used to compensate for gaps in the access control environment.
Detective Controls
Detective controls warn when something has happened, and are the earliest point in the post-
incident timeline. Access controls are a deterrent to threats and can be aggressively utilized to
prevent harmful incidents through the application of least privilege.
However, the detective nature of access controls can provide significant visibility into the access
environment and help organizations manage their access strategy and related security risk.
As mentioned previously, strongly managed access privileges provided to an authenticated user
offer the ability to reduce the risk exposure of the enterprise’s assets by limiting the capabilities
that authenticated user has.
However, there are few options to control what a user can perform once privileges are provided.
For example, if a user is provided write access to a file and that file is damaged, altered, or
otherwise negatively impacted (either deliberately or unintentionally), the use of applied access
controls will offer visibility into the transaction. The control environment can be established to
log activity regarding the identification, authentication, authorization, and use of privileges on a
system.
This can be used to detect the occurrence of errors, the attempts to perform an unauthorized
action, or to validate when provided credentials were exercised. The logging system as a
detective device provides evidence of actions (both successful and unsuccessful) and tasks that
were executed by authorized users.
Corrective Controls
When a security incident occurs, elements within the security infrastructure may require
corrective actions. Corrective controls are actions that seek to alter the security posture of an
environment to correct any deficiencies and return the environment to a secure state. A security
incident signals the failure of one or more directive, deterrent, preventative, or compensating
controls. The detective controls may have triggered an alarm or notification, but now the
16. Testpassport real exam questions can make sure you pass any IT exam.
corrective controls must work to stop the incident in its tracks. Corrective controls can take
many forms, all depending on the particular situation at hand or the particular security failure
that needs to be dealt with.
Recovery Controls
Any changes to the access control environment, whether in the face of a security incident or to
offer temporary compensating controls, need to be accurately reinstated and returned to normal
operations. There are several situations that may affect access controls, their applicability,
status, or management.
Events can include system outages, attacks, project changes, technical demands,
administrative gaps, and full-blown disaster situations. For example, if an application is not
correctly installed or deployed, it may adversely affect controls placed on system files or even
have default administrative accounts unknowingly implemented upon install.
Additionally, an employee may be transferred, quit, or be on temporary leave that may affect
policy requirements regarding separation of duties. An attack on systems may have resulted in
the implantation of a Trojan horse program, potentially exposing private user information, such
as credit card information and financial data. In all of these cases, an undesirable situation must
be rectified as quickly as possible and controls returned to normal operations.
The following answers are incorrect:
The other examples belong to corrective control.
The following reference(s) were/was used to create this question:
CISA Review Manual 2014 Page number 44
and
Official ISC2 CISSP guide 3rd edition Page number 50 and 51
12. When evaluating the ability of a disaster recovery plan to enable the recovery of IT
processing capabilities, it is MOST important for the IS auditor to verify the plan is:
A. stored at an offsite location
B. communicated to department heads
C. regularly reviewed
D. periodically tested
Answer: C
13. Which of the following should the IS auditor use to BEST determine whether a project has
met its business objectives?
A. Earned-value analysis
B. Completed project plan
17. Testpassport real exam questions can make sure you pass any IT exam.
C. Issues log with resolutions
D. Benefits realization document
Answer: D
14. Which of the following BEST demonstrates effective information security management within
an organization?
A. Employees support decisions made by information security management.
B. Excessive risk exposure in one department can be absorbed by other departments.
C. Information security governance is incorporated into organizational governance.
D. Control ownership is assigned to parties who can accept losses related to control failure.
Answer: C
15. The objectives of business process improvement should PRIMARILY include:
A. minimal impact on staff
B. incremental changes in productivity
C. changes of organizational boundaries
D. performance optimization
Answer: D
Testpasport provides valid exam questions for many IT certification exams,
such as Oracle, Microsoft, IBM, Huawei, CompTIA, Dell, and others.
Practice FREE Online Questions of Hot Exams below.
NACE-CIP2-001 FREE Online Questions
AZ-203 FREE Online Questions
AZ-103 FREE Online Questions
AZ-300 FREE Online Questions
AZ-301 FREE Online Questions
18. Testpassport real exam questions can make sure you pass any IT exam.
AZ-900 FREE Online Questions
H13-622 FREE Online Questions