SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
Testpassport real exam questions can make sure you pass any IT exam.
Exam Code: CISA
Exam Name: Isaca CISA
Full version: 2290 Q&As
Visit more information about CISA exam:
CISA Real Questions
Share some CISA questions and answers below.
1. Which of the following audit mainly focuses on discovering and disclosing on frauds and
crimes?
A. Compliance Audit
B. Financial Audit
C. Integrated Audit
D. Forensic audit
Answer: D
Forensic audit is the activity that consists of gathering, verifying, processing, analyzing of and
reporting on data in order to obtain facts and/or evidence - in a predefined context - in the area
of legal/financial disputes and or irregularities (including fraud) and giving preventative advice
For your exam you should know below information about different types of audit:
What is an audit?
An audit in general terms is a process of evaluating an individual or organization’s accounts.
This is usually done by an independent auditing body. Thus, audit involves a competent and
independent person obtaining evidence and evaluating it objectively with regard to a given
entity, which in this case is the subject of audit, in order to establish conformance to a given set
of standards. Audit can be on a person, organization, system, enterprise, project or product.
Compliance Audit
A compliance audit is a comprehensive review of an organization's adherence to regulatory
Testpassport real exam questions can make sure you pass any IT exam.
guidelines. Independent accounting, security or IT consultants evaluate the strength and
thoroughness of compliance preparations. Auditors review security polices, user access controls
and risk management procedures over the course of a compliance audit. Compliance audit
include specific tests of controls to demonstrate adherence to specific regulatory or industry
standard. These audits often overlap traditional audits, but may focus on particular system or
data.
What, precisely, is examined in a compliance audit will vary depending upon whether an
organization is a public or private company, what kind of data it handles and if it transmits or
stores sensitive financial data. For instance, SOX requirements mean that any electronic
communication must be backed up and secured with reasonable disaster recovery
infrastructure. Health care providers that store or transmit e-health records, like personal health
information, are subject to HIPAA requirements. Financial services companies that transmit
credit card data are subject to PCI DSS requirements. In each case, the organization must be
able to demonstrate compliance by producing an audit trail, often generated by data from event
log management software.
Financial Audit
A financial audit, or more accurately, an audit of financial statements, is the verification of the
financial statements of a legal entity, with a view to express an audit opinion. The audit opinion
is intended to provide reasonable assurance, but not absolute assurance, that the financial
statements are presented fairly, in all material respects, and/or give a true and fair view in
accordance with the financial reporting framework. The purpose of an audit is to provide an
objective independent examination of the financial statements, which increases the value and
credibility of the financial statements produced by management, thus increase user confidence
in the financial statement, reduce investor risk and consequently reduce the cost of capital of
the preparer of the financial statements.
Operational Audit
Operational Audit is a systematic review of effectiveness, efficiency and economy of operation.
Operational audit is a future-oriented, systematic, and independent evaluation of organizational
activities. In Operational audit financial data may be used, but the primary sources of evidence
are the operational policies and achievements related to organizational objectives. Operational
audit is a more comprehensive form of an Internal audit.
The Institute of Internal Auditor (IIA) defines Operational Audit as a systematic process of
evaluating an organization's effectiveness, efficiency and economy of operations under
management's control and reporting to appropriate persons the results of the evaluation along
with recommendations for improvement.
Objectives
Testpassport real exam questions can make sure you pass any IT exam.
To appraise the effectiveness and efficiency of a division, activity, or operation of the entity in
meeting organizational goals.
To understand the responsibilities and risks faced by an organization.
To identify, with management participation, opportunities for improving control.
To provide senior management of the organization with a detailed understanding of the
Operations.
Integrated Audits
An integrated audit combines financial and operational audit steps. An integrated audit is also
performed to assess overall objectives within an organization, related to financial information
and asset, safeguarding, efficiency and or internal auditors and would include compliance test
of internal controls and substantive audit step.
IS Audit
An information technology audit, or information systems audit, is an examination of the
management controls within an Information technology (IT) infrastructure. The evaluation of
obtained evidence determines if the information systems are safeguarding assets, maintaining
data integrity, and operating effectively to achieve the organization's goals or objectives. These
reviews may be performed in conjunction with a financial statement audit, internal audit, or other
form of attestation engagement.
The primary functions of an IT audit are to evaluate the systems that are in place to guard an
organization's information. Specifically, information technology audits are used to evaluate the
organization's ability to protect its information assets and to properly dispense information to
authorized parties. The IT audit aims to evaluate the following:
Will the organization's computer systems be available for the business at all times when
required? (known as availability) Will the information in the systems be disclosed only to
authorized users? (known as security and confidentiality) Will the information provided by the
system always be accurate, reliable, and timely? (measures the integrity) In this way, the audit
hopes to assess the risk to the company's valuable asset (its information) and establish
methods of minimizing those risks.
Forensic Audit
Forensic audit is the activity that consists of gathering, verifying, processing, analyzing of and
reporting on data in order to obtain facts and/or evidence - in a predefined context - in the area
of legal/financial disputes and or irregularities (including fraud) and giving preventative advice.
The purpose of a forensic audit is to use accounting procedures to collect evidence for the
prosecution or investigation of financial crimes such as theft or fraud. Forensic audits may be
conducted to determine if wrongdoing occurred, or to gather materials for the case against an
alleged criminal.
Testpassport real exam questions can make sure you pass any IT exam.
The following answers are incorrect:
Compliance Audit - A compliance audit is a comprehensive review of an organization's
adherence to regulatory guidelines. Independent accounting, security or IT consultants evaluate
the strength and thoroughness of compliance preparations. Auditors review security polices,
user access controls and risk management procedures over the course of a compliance audit.
Compliance audit include specific tests of controls to demonstrate adherence to specific
regulatory or industry standard. These audits often overlap traditional audits, but may focus on
particular system or data.
Financial Audit- A financial audit, or more accurately, an audit of financial statements, is the
verification of the financial statements of a legal entity, with a view to express an audit opinion.
The audit opinion is intended to provide reasonable assurance, but not absolute assurance, that
the financial statements are presented fairly, in all material respects, and/or give a true and fair
view in accordance with the financial reporting framework. The purpose of an audit is to provide
an objective independent examination of the financial statements, which increases the value
and credibility of the financial statements produced by management, thus increase user
confidence in the financial statement, reduce investor risk and consequently reduce the cost of
capital of the preparer of the financial statements.
Integrated Audits - An integrated audit combines financial and operational audit steps. An
integrated audit is also performed to assess overall objectives within an organization, related to
financial information and asset, safeguarding, efficiency and or internal auditors and would
include compliance test of internal controls and substantive audit step.
The following reference(s) were/was used to create this question:
CISA Review Manual 2014 Page number 44
http://searchcompliance.techtarget.com/definition/compliance-audit
http://en.wikipedia.org/wiki/Financial_audit
http://en.wikipedia.org/wiki/Operational_auditing
http://en.wikipedia.org/wiki/Information_technology_audit
http://www.investorwords.com/16445/forensic_audit.html
2. What is the MOST effective way to ensure security policies and procedures are up-to-date?
A. Verify security requirements are being identified and consistently applied.
B. Align the organization’s security practices with industry standards and best practice.
C. Define and document senior management’s vision for the direction of the security
D. Prevent security documentation audit issues from being raised
Answer: B
Testpassport real exam questions can make sure you pass any IT exam.
3. Which of the following step of PDCA establishes the objectives and processes necessary to
deliver results in accordance with the expected output?
A. Plan
B. Do
C. Check
D. Act
Answer: A
Explanation:
Plan - Establish the objectives and processes necessary to deliver results in accordance with
the expected output (the target or goals). By establishing output expectations, the completeness
and accuracy of the spec is also a part of the targeted improvement. When possible start on a
small scale to test possible effects.
For your exam you should know the information below:
PDCA (planCdoCcheckCact or planCdoCcheckCadjust) is an iterative four-step management
method used in business for the control and continuous improvement of processes and
products. It is also known as the Deming circle/cycle/wheel, Stewart cycle, control circle/cycle,
or planCdoCstudyCact (PDSA). Another version of this PDCA cycle is OPDCA. The added "O"
stands for observation or as some versions say "Grasp the current condition."
The steps in each successive PDCA cycle are:
PLAN
Establish the objectives and processes necessary to deliver results in accordance with the
expected output (the target or goals). By establishing output expectations, the completeness
Testpassport real exam questions can make sure you pass any IT exam.
and accuracy of the spec is also a part of the targeted improvement. When possible start on a
small scale to test possible effects.
DO
Implement the plan, execute the process, make the product. Collect data for charting and
analysis in the following "CHECK" and "ACT" steps.
CHECK
Study the actual results (measured and collected in "DO" above) and compare against the
expected results (targets or goals from the "PLAN") to ascertain any differences. Look for
deviation in implementation from the plan and also look for the appropriateness and
completeness of the plan to enable the execution, i.e., "Do". Charting data can make this much
easier to see trends over several PDCA cycles and in order to convert the collected data into
information. Information is what you need for the next step "ACT".
ACT
Request corrective actions on significant differences between actual and planned results.
Analyze the differences to determine their root causes. Determine where to apply changes that
will include improvement of the process or product. When a pass through these four steps does
not result in the need to improve, the scope to which PDCA is applied may be refined to plan
and improve with more detail in the next iteration of the cycle, or attention needs to be placed in
a different stage of the process.
The following answers are incorrect:
DO - Implement the plan, execute the process, make the product. Collect data for charting and
analysis in the following "CHECK" and "ACT" steps.
CHECK - Study the actual results (measured and collected in "DO" above) and compare against
the expected results (targets or goals from the "PLAN") to ascertain any differences
ACT -Request corrective actions on significant differences between actual and planned results.
Analyze the differences to determine their root causes. Determine where to apply changes that
will include improvement of the process or product
The following reference(s) were/was used to create this question:
CISA review manual 2014 page number 107
4. An IS auditor is reviewing an organization’s network vulnerability scan results.
Which of the following processes would the scan results MOST likely feed into?
A. Firewall maintenance
B. Patch management
C. Incident response
D. Traffic management
Testpassport real exam questions can make sure you pass any IT exam.
Answer: A
5. Assessments of critical information systems are based on a cyclical audit plan that has not
been updated for several years.
Which of the following should the IS auditor recommend to BEST address this situation?
A. Use a revolving set of audit plans to cover all systems
B. Update the audit plan quarterly to account for delays and deferrals of periodic reviews
C. Regularly validate the audit plan against business risks
D. Do not include periodic reviews in detail as part of the audit plan
Answer: C
6. Which of the following cloud deployment model is provisioned for open use by the general
public?
A. Private Cloud
B. Community Cloud
C. Public Cloud
D. Hybrid Cloud
Answer: C
Explanation:
In Public cloud, the cloud infrastructure is provisioned for open use by the general public. It may
be owned, managed, and operated by a business, academic, or government organization, or
some combination of them. It exists on the premises of the cloud provider.
For your exam you should know below information about Cloud Computing deployment models:
Private cloud
The cloud infrastructure is provisioned for exclusive use by a single organization comprising
multiple consumers (e.g., business units). It may be owned, managed, and operated by the
organization, a third party, or some combination of them, and it may exist on or off premises.
Private Cloud
Testpassport real exam questions can make sure you pass any IT exam.
Community Cloud
The cloud infrastructure is provisioned for exclusive use by a specific community of consumers
from organizations that have shared concerns (e.g., mission, security requirements, policy, and
compliance considerations). It may be owned, managed, and operated by one or more of the
organizations in the community, a third party, or some combination of them, and it may exist on
or off premises.
Community Cloud
Public Cloud
The cloud infrastructure is provisioned for open use by the general public. It may be owned,
managed, and operated by a business, academic, or government organization, or some
combination of them. It exists on the premises of the cloud provider.
Public Cloud
Testpassport real exam questions can make sure you pass any IT exam.
Hybrid cloud
The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private,
community, or public) that remain unique entities, but are bound together by standardized or
proprietary technology that enables data and application portability (e.g., cloud bursting for load
balancing between clouds)
hybrid cloud
The following answers are incorrect:
Private cloud - The cloud infrastructure is provisioned for exclusive use by a single organization
comprising multiple consumers (e.g., business units). It may be owned, managed, and operated
by the organization, a third party, or some combination of them, and it may exist on or off
premises.
Community cloud - The cloud infrastructure is provisioned for exclusive use by a specific
community of consumers from organizations that have shared concerns (e.g., mission, security
Testpassport real exam questions can make sure you pass any IT exam.
requirements, policy, and compliance considerations). It may be owned, managed, and
operated by one or more of the organizations in the community, a third party, or some
combination of them, and it may exist on or off premises.
Hybrid cloud - The cloud infrastructure is a composition of two or more distinct cloud
infrastructures (private, community, or public) that remain unique entities, but are bound
together by standardized or proprietary technology that enables data and application portability
(e.g., cloud bursting for load balancing between clouds)
The following reference(s) were/was used to create this question:
CISA review manual 2014 page number 102
Official ISC2 guide to CISSP 3rd edition Page number 689 and 690
7. Which of the following should be reviewed FIRST when planning an IS audit?
A. Recent financial information
B. Annual business unit budget
C. IS audit standards
D. The business environment
Answer: D
8. An IS auditor is reviewing an organization’s incident management processes and procedures.
which of the following observations should be the auditor’s GREATEST concern?
A. Ineffective incident classification
B. Ineffective incident prioritization
C. Ineffective incident detection
D. Ineffective post-incident review
Answer: C
9. An IS auditor reviewing an organization’s data privacy controls observes that privacy notices
do not clearly state how the organization uses customer data for its processing operations.
Which of the following data protection principles MUST be implemented to address this gap?
A. Maintenance of data integrity
B. Access to collected data
C. Retention of consent documentation
D. Purpose for data collection
Answer: B
10. An internal audit department recently established a quality assurance (QA) program.
Testpassport real exam questions can make sure you pass any IT exam.
Which of the following activities is MOST important to include as part of the QA program
requirements?
A. Ongoing monitoring of the audit activities
B. Analysis of user satisfaction reports from business lines.
C. Feedback from internal audit staff
D. Long-term internal audit resource planning
Answer: A
11. Which of the following is NOT an example of corrective control?
A. OS Upgrade
B. Backup and restore
C. Contingency planning
D. System Monitoring
Answer: D
Explanation:
The word NOT is used as a keyword in the question. You need to find out a security control
from given options which in not corrective control. System Monitoring is a detective control and
not a corrective control.
For your exam you should know below information about different security controls
Deterrent Controls
Deterrent Controls are intended to discourage a potential attacker. Access controls act as a
deterrent to threats and attacks by the simple fact that the existence of the control is enough to
keep some potential attackers from attempting to circumvent the control. This is often because
the effort required to circumvent the control is far greater than the potential reward if the
attacker is successful, or, conversely, the negative implications of a failed attack (or getting
caught) outweigh the benefits of success. For example, by forcing the identification and
authentication of a user, service, or application, and all that it implies, the potential for incidents
associated with the system is significantly reduced because an attacker will fear association
with the incident. If there are no controls for a given access path, the number of incidents and
the potential impact become infinite. Controls inherently reduce exposure to risk by applying
oversight for a process. This oversight acts as a deterrent, curbing an attacker’s appetite in the
face of probable repercussions.
The best example of a deterrent control is demonstrated by employees and their propensity to
intentionally perform unauthorized functions, leading to unwanted events. When users begin to
understand that by authenticating into a system to perform a function, their activities are logged
and monitored, and it reduces the likelihood they will attempt such an action. Many threats are
Testpassport real exam questions can make sure you pass any IT exam.
based on the anonymity of the threat agent, and any potential for identification and association
with their actions is avoided at all costs. It is this fundamental reason why access controls are
the key target of circumvention by attackers. Deterrents also take the form of potential
punishment if users do something unauthorized. For example, if the organization policy
specifies that an employee installing an unauthorized wireless access point will be fired, that will
determine most employees from installing wireless access points.
Preventative Controls
Preventive controls are intended to avoid an incident from occurring. Preventative access
controls keep a user from performing some activity or function. Preventative controls differ from
deterrent controls in that the control is not optional and cannot (easily) be bypassed. Deterrent
controls work on the theory that it is easier to obey the control
rather than to risk the consequences of bypassing the control. In other words, the power for
action resides with the user (or the attacker). Preventative controls place the power of action
with the system, obeying the control is not optional. The only way to bypass the control is to
find a flaw in the control’s implementation.
Compensating Controls
Compensating controls are introduced when the existing capabilities of a system do not support
the requirement of a policy. Compensating controls can be technical, procedural, or managerial.
Although an existing system may not support the required controls, there may exist other
technology or processes that can supplement the existing environment, closing the gap in
controls, meeting policy requirements, and reducing overall risk. For example, the access
control policy may state that the authentication process must be encrypted when performed
over the Internet. Adjusting an application to natively support encryption for authentication
purposes may be too costly. Secure Socket Layer (SSL), an encryption protocol, can be
employed and layered on top of the authentication process to support the policy statement.
Other examples include a separation of duties environment, which offers the capability to isolate
certain tasks to compensate for technical limitations in the system and ensure the security of
transactions. In addition, management processes, such as authorization, supervision, and
administration, can be used to compensate for gaps in the access control environment.
Detective Controls
Detective controls warn when something has happened, and are the earliest point in the post-
incident timeline. Access controls are a deterrent to threats and can be aggressively utilized to
prevent harmful incidents through the application of least privilege.
However, the detective
nature of access controls can provide significant visibility into the access environment and help
organizations manage their access strategy and related security risk. As mentioned previously,
Testpassport real exam questions can make sure you pass any IT exam.
strongly managed access privileges provided to an authenticated user offer the ability to reduce
the risk exposure of the enterprise’s assets by limiting the capabilities that authenticated user
has.
However, there are few options to control what a user can perform once privileges are provided.
For example, if a user is provided write access to a file and that file is damaged, altered, or
otherwise negatively impacted (either deliberately or unintentionally), the use of applied access
controls will offer visibility into the transaction. The control environment can be established to
log activity regarding the identification, authentication, authorization, and use of privileges on a
system. This can be used to detect the occurrence of errors, the attempts to perform an
unauthorized action, or to validate when provided credentials were exercised. The logging
system as a detective device provides evidence of actions (both successful and unsuccessful)
and tasks that were executed by authorized users.
Corrective Controls
When a security incident occurs, elements within the security infrastructure may require
corrective actions. Corrective controls are actions that seek to alter the security posture of an
environment to correct any deficiencies and return the environment to a secure state. A security
incident signals the failure of one or more directive, deterrent, preventative, or compensating
controls. The detective controls may have triggered an alarm or notification, but now the
corrective controls must work to stop the incident in its tracks. Corrective controls can take
many forms, all depending on the particular situation at hand or the particular security failure
that needs to be dealt with.
Recovery Controls
Any changes to the access control environment, whether in the face of a security incident or to
offer temporary compensating controls, need to be accurately reinstated and returned to normal
operations. There are several situations that may affect access controls, their applicability,
status, or management. Events can include system outages, attacks, project changes, technical
demands, administrative gaps, and full-blown disaster situations. For example, if an application
is not correctly installed or deployed, it may adversely affect controls placed on system files or
even have default administrative accounts unknowingly implemented upon install. Additionally,
an employee may be transferred, quit, or be on temporary leave that may affect policy
requirements regarding separation of duties. An attack on systems may have resulted in the
implantation of a Trojan horse program, potentially exposing private user information, such as
credit card information and financial data. In all of these cases, an undesirable situation must be
rectified as quickly as possible and controls returned to normal operations.
For your exam you should know below information about different security controls
Deterrent Controls
Testpassport real exam questions can make sure you pass any IT exam.
Deterrent Controls are intended to discourage a potential attacker. Access controls act as a
deterrent to threats and attacks by the simple fact that the existence of the control is enough to
keep some potential attackers from attempting to circumvent the control. This is often because
the effort required to circumvent the control is far greater than the potential reward if the
attacker is successful, or, conversely, the negative implications of a failed attack (or getting
caught) outweigh the benefits of success. For example, by forcing the identification and
authentication of a user, service, or application, and all that it implies, the potential for incidents
associated with the system is significantly reduced because an attacker will fear association
with the incident. If there are no controls for a given access path, the number of incidents and
the potential impact become infinite. Controls inherently reduce exposure to risk by applying
oversight for a process. This oversight acts as a deterrent, curbing an attacker’s appetite in the
face of probable repercussions.
The best example of a deterrent control is demonstrated by employees and their propensity to
intentionally perform unauthorized functions, leading to unwanted events.
When users begin to understand that by authenticating into a system to perform a function, their
activities are logged and monitored, and it reduces the likelihood they will attempt such an
action. Many threats are based on the anonymity of the threat agent, and any potential for
identification and association with their actions is avoided at all costs.
It is this fundamental reason why access controls are the key target of circumvention by
attackers. Deterrents also take the form of potential punishment if users do something
unauthorized. For example, if the organization policy specifies that an employee installing an
unauthorized wireless access point will be fired, that will determine most employees from
installing wireless access points.
Preventative Controls
Preventive controls are intended to avoid an incident from occurring. Preventative access
controls keep a user from performing some activity or function. Preventative controls differ from
deterrent controls in that the control is not optional and cannot (easily) be bypassed. Deterrent
controls work on the theory that it is easier to obey the control
rather than to risk the consequences of bypassing the control. In other words, the power for
action resides with the user (or the attacker). Preventative controls place the power of action
with the system, obeying the control is not optional. The only way to bypass the control is to find
a flaw in the control’s implementation.
Compensating Controls
Compensating controls are introduced when the existing capabilities of a system do not support
the requirement of a policy. Compensating controls can be technical, procedural, or managerial.
Although an existing system may not support the required controls, there may exist other
Testpassport real exam questions can make sure you pass any IT exam.
technology or processes that can supplement the existing environment, closing the gap in
controls, meeting policy requirements, and reducing overall risk.
For example, the access control policy may state that the authentication process must be
encrypted when performed over the Internet. Adjusting an application to natively support
encryption for authentication purposes may be too costly. Secure Socket Layer (SSL), an
encryption protocol, can be employed and layered on top of the authentication process to
support the policy statement.
Other examples include a separation of duties environment, which offers the capability to isolate
certain tasks to compensate for technical limitations in the system and ensure the security of
transactions. In addition, management processes, such as authorization, supervision, and
administration, can be used to compensate for gaps in the access control environment.
Detective Controls
Detective controls warn when something has happened, and are the earliest point in the post-
incident timeline. Access controls are a deterrent to threats and can be aggressively utilized to
prevent harmful incidents through the application of least privilege.
However, the detective nature of access controls can provide significant visibility into the access
environment and help organizations manage their access strategy and related security risk.
As mentioned previously, strongly managed access privileges provided to an authenticated user
offer the ability to reduce the risk exposure of the enterprise’s assets by limiting the capabilities
that authenticated user has.
However, there are few options to control what a user can perform once privileges are provided.
For example, if a user is provided write access to a file and that file is damaged, altered, or
otherwise negatively impacted (either deliberately or unintentionally), the use of applied access
controls will offer visibility into the transaction. The control environment can be established to
log activity regarding the identification, authentication, authorization, and use of privileges on a
system.
This can be used to detect the occurrence of errors, the attempts to perform an unauthorized
action, or to validate when provided credentials were exercised. The logging system as a
detective device provides evidence of actions (both successful and unsuccessful) and tasks that
were executed by authorized users.
Corrective Controls
When a security incident occurs, elements within the security infrastructure may require
corrective actions. Corrective controls are actions that seek to alter the security posture of an
environment to correct any deficiencies and return the environment to a secure state. A security
incident signals the failure of one or more directive, deterrent, preventative, or compensating
controls. The detective controls may have triggered an alarm or notification, but now the
Testpassport real exam questions can make sure you pass any IT exam.
corrective controls must work to stop the incident in its tracks. Corrective controls can take
many forms, all depending on the particular situation at hand or the particular security failure
that needs to be dealt with.
Recovery Controls
Any changes to the access control environment, whether in the face of a security incident or to
offer temporary compensating controls, need to be accurately reinstated and returned to normal
operations. There are several situations that may affect access controls, their applicability,
status, or management.
Events can include system outages, attacks, project changes, technical demands,
administrative gaps, and full-blown disaster situations. For example, if an application is not
correctly installed or deployed, it may adversely affect controls placed on system files or even
have default administrative accounts unknowingly implemented upon install.
Additionally, an employee may be transferred, quit, or be on temporary leave that may affect
policy requirements regarding separation of duties. An attack on systems may have resulted in
the implantation of a Trojan horse program, potentially exposing private user information, such
as credit card information and financial data. In all of these cases, an undesirable situation must
be rectified as quickly as possible and controls returned to normal operations.
The following answers are incorrect:
The other examples belong to corrective control.
The following reference(s) were/was used to create this question:
CISA Review Manual 2014 Page number 44
and
Official ISC2 CISSP guide 3rd edition Page number 50 and 51
12. When evaluating the ability of a disaster recovery plan to enable the recovery of IT
processing capabilities, it is MOST important for the IS auditor to verify the plan is:
A. stored at an offsite location
B. communicated to department heads
C. regularly reviewed
D. periodically tested
Answer: C
13. Which of the following should the IS auditor use to BEST determine whether a project has
met its business objectives?
A. Earned-value analysis
B. Completed project plan
Testpassport real exam questions can make sure you pass any IT exam.
C. Issues log with resolutions
D. Benefits realization document
Answer: D
14. Which of the following BEST demonstrates effective information security management within
an organization?
A. Employees support decisions made by information security management.
B. Excessive risk exposure in one department can be absorbed by other departments.
C. Information security governance is incorporated into organizational governance.
D. Control ownership is assigned to parties who can accept losses related to control failure.
Answer: C
15. The objectives of business process improvement should PRIMARILY include:
A. minimal impact on staff
B. incremental changes in productivity
C. changes of organizational boundaries
D. performance optimization
Answer: D
Testpasport provides valid exam questions for many IT certification exams,
such as Oracle, Microsoft, IBM, Huawei, CompTIA, Dell, and others.
Practice FREE Online Questions of Hot Exams below.
NACE-CIP2-001 FREE Online Questions
AZ-203 FREE Online Questions
AZ-103 FREE Online Questions
AZ-300 FREE Online Questions
AZ-301 FREE Online Questions
Testpassport real exam questions can make sure you pass any IT exam.
AZ-900 FREE Online Questions
H13-622 FREE Online Questions

Mais conteúdo relacionado

Mais procurados

IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsEd Tobias
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseDesmond Devendran
 
CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)Cyril Soeri
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit ProcessRam Srivastava
 
Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-PracticesMarco Raposo
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-softwarekzoe1996
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrainInfosecTrain
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment PresentationEMAC Consulting Group
 
03.2 application control
03.2 application control03.2 application control
03.2 application controlMulyadi Yusuf
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Sharah Ayumi
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSShivamSharma909
 
Chap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseChap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseDesmond Devendran
 
Test Data Approach
Test Data ApproachTest Data Approach
Test Data Approachkzoe1996
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1Cheng Olayvar
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseDesmond Devendran
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information Systemarif prasetyo
 

Mais procurados (19)

IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
 
Steps in it audit
Steps in it auditSteps in it audit
Steps in it audit
 
CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit Process
 
Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-Practices
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-software
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
des
desdes
des
 
5.4 it security audit (mauritius)
5.4  it security audit (mauritius)5.4  it security audit (mauritius)
5.4 it security audit (mauritius)
 
03.2 application control
03.2 application control03.2 application control
03.2 application control
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
 
Chap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseChap6 2007 Cisa Review Course
Chap6 2007 Cisa Review Course
 
Test Data Approach
Test Data ApproachTest Data Approach
Test Data Approach
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information System
 

Semelhante a 2020 Updated Cisa Real Exam Questions

auditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfauditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfowaissayyed0041
 
Assessing risks and internal controls training
Assessing  risks and internal controls   trainingAssessing  risks and internal controls   training
Assessing risks and internal controls trainingshifataraislam
 
types of audit hjbkjjgkjgjgkjgkjhkl.pptx
types of audit hjbkjjgkjgjgkjgkjhkl.pptxtypes of audit hjbkjjgkjgjgkjgkjhkl.pptx
types of audit hjbkjjgkjgjgkjgkjhkl.pptxYogaPriya61
 
AUDIT.pptx
AUDIT.pptxAUDIT.pptx
AUDIT.pptxbeminaja
 
Tugas mandiri audit novita dewi 11353202277
Tugas mandiri audit  novita dewi 11353202277Tugas mandiri audit  novita dewi 11353202277
Tugas mandiri audit novita dewi 11353202277novita dewi
 
Internal control.. control env
Internal control.. control envInternal control.. control env
Internal control.. control envPhillys Sebastiane
 
Sarbanes oxley internal controls
Sarbanes oxley internal controlsSarbanes oxley internal controls
Sarbanes oxley internal controlsIllumeo
 
Internal Audit Of The California Department Of Public...
Internal Audit Of The California Department Of Public...Internal Audit Of The California Department Of Public...
Internal Audit Of The California Department Of Public...Tina Jordan
 
BCom Auditing and Corporate Governance Notes-1.pdf
BCom Auditing and Corporate Governance Notes-1.pdfBCom Auditing and Corporate Governance Notes-1.pdf
BCom Auditing and Corporate Governance Notes-1.pdfMystatus4
 
What are the major steps in a financial statement audit.pdf
What are the major steps in a financial statement audit.pdfWhat are the major steps in a financial statement audit.pdf
What are the major steps in a financial statement audit.pdfsarikabangimatam
 
Audits and Regulatory Compliance
Audits and Regulatory ComplianceAudits and Regulatory Compliance
Audits and Regulatory Compliancesomeshwar mankar
 
7 Steps to Conducting a Financial Audit | The Enterprise World
7 Steps to Conducting a Financial Audit | The Enterprise World7 Steps to Conducting a Financial Audit | The Enterprise World
7 Steps to Conducting a Financial Audit | The Enterprise WorldTEWMAGAZINE
 
Internal Financial Control Over Financial Reporting.pdf
Internal Financial Control Over Financial Reporting.pdfInternal Financial Control Over Financial Reporting.pdf
Internal Financial Control Over Financial Reporting.pdfSBSGLOBAL1
 
24201843 studdy-note-8
24201843 studdy-note-824201843 studdy-note-8
24201843 studdy-note-8Akash Saxena
 
Audit Report And Internal Control Evaluation
Audit Report And Internal Control EvaluationAudit Report And Internal Control Evaluation
Audit Report And Internal Control EvaluationRochelle Schear
 

Semelhante a 2020 Updated Cisa Real Exam Questions (20)

Audit presentation
Audit presentationAudit presentation
Audit presentation
 
auditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfauditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdf
 
Assessing risks and internal controls training
Assessing  risks and internal controls   trainingAssessing  risks and internal controls   training
Assessing risks and internal controls training
 
types of audit hjbkjjgkjgjgkjgkjhkl.pptx
types of audit hjbkjjgkjgjgkjgkjhkl.pptxtypes of audit hjbkjjgkjgjgkjgkjhkl.pptx
types of audit hjbkjjgkjgjgkjgkjhkl.pptx
 
Internal control
Internal controlInternal control
Internal control
 
AUDIT.pptx
AUDIT.pptxAUDIT.pptx
AUDIT.pptx
 
Tugas mandiri audit novita dewi 11353202277
Tugas mandiri audit  novita dewi 11353202277Tugas mandiri audit  novita dewi 11353202277
Tugas mandiri audit novita dewi 11353202277
 
Audit PPT.pdf
Audit PPT.pdfAudit PPT.pdf
Audit PPT.pdf
 
Internal control.. control env
Internal control.. control envInternal control.. control env
Internal control.. control env
 
Sarbanes oxley internal controls
Sarbanes oxley internal controlsSarbanes oxley internal controls
Sarbanes oxley internal controls
 
Internal Audit Of The California Department Of Public...
Internal Audit Of The California Department Of Public...Internal Audit Of The California Department Of Public...
Internal Audit Of The California Department Of Public...
 
BCom Auditing and Corporate Governance Notes-1.pdf
BCom Auditing and Corporate Governance Notes-1.pdfBCom Auditing and Corporate Governance Notes-1.pdf
BCom Auditing and Corporate Governance Notes-1.pdf
 
What are the major steps in a financial statement audit.pdf
What are the major steps in a financial statement audit.pdfWhat are the major steps in a financial statement audit.pdf
What are the major steps in a financial statement audit.pdf
 
Audits and Regulatory Compliance
Audits and Regulatory ComplianceAudits and Regulatory Compliance
Audits and Regulatory Compliance
 
7 Steps to Conducting a Financial Audit | The Enterprise World
7 Steps to Conducting a Financial Audit | The Enterprise World7 Steps to Conducting a Financial Audit | The Enterprise World
7 Steps to Conducting a Financial Audit | The Enterprise World
 
Internal Financial Control Over Financial Reporting.pdf
Internal Financial Control Over Financial Reporting.pdfInternal Financial Control Over Financial Reporting.pdf
Internal Financial Control Over Financial Reporting.pdf
 
Auditing
AuditingAuditing
Auditing
 
A guide to different type of audit services
A guide to different type of audit servicesA guide to different type of audit services
A guide to different type of audit services
 
24201843 studdy-note-8
24201843 studdy-note-824201843 studdy-note-8
24201843 studdy-note-8
 
Audit Report And Internal Control Evaluation
Audit Report And Internal Control EvaluationAudit Report And Internal Control Evaluation
Audit Report And Internal Control Evaluation
 

Mais de douglascarnicelli

Oracle Certification 1Z0-1041 Questions and Answers
Oracle Certification 1Z0-1041 Questions and AnswersOracle Certification 1Z0-1041 Questions and Answers
Oracle Certification 1Z0-1041 Questions and Answersdouglascarnicelli
 
2020 Updated Microsoft MB-200 Questions and Answers
2020 Updated Microsoft MB-200 Questions and Answers2020 Updated Microsoft MB-200 Questions and Answers
2020 Updated Microsoft MB-200 Questions and Answersdouglascarnicelli
 
Introduction to Cisco Sales 700-150 Real Exam Questions
Introduction to Cisco Sales 700-150 Real Exam QuestionsIntroduction to Cisco Sales 700-150 Real Exam Questions
Introduction to Cisco Sales 700-150 Real Exam Questionsdouglascarnicelli
 
Cisco Certification 500-240 Questions and Answers
Cisco Certification 500-240 Questions and AnswersCisco Certification 500-240 Questions and Answers
Cisco Certification 500-240 Questions and Answersdouglascarnicelli
 
CCNP Enterprise 300-425 ENWLSD Questions and Answers
CCNP Enterprise 300-425 ENWLSD Questions and AnswersCCNP Enterprise 300-425 ENWLSD Questions and Answers
CCNP Enterprise 300-425 ENWLSD Questions and Answersdouglascarnicelli
 
MuleSoft certified platform architect-level 1 Real Exam Questions
MuleSoft certified platform architect-level 1 Real Exam QuestionsMuleSoft certified platform architect-level 1 Real Exam Questions
MuleSoft certified platform architect-level 1 Real Exam Questionsdouglascarnicelli
 
DELL EMC Implementation Engineer (EMCIE) E20-393 Questions and answers
DELL EMC Implementation Engineer (EMCIE) E20-393 Questions and answersDELL EMC Implementation Engineer (EMCIE) E20-393 Questions and answers
DELL EMC Implementation Engineer (EMCIE) E20-393 Questions and answersdouglascarnicelli
 
2020 New Updated 1Z0-060 Questions and Answers
2020 New Updated 1Z0-060 Questions and Answers2020 New Updated 1Z0-060 Questions and Answers
2020 New Updated 1Z0-060 Questions and Answersdouglascarnicelli
 
HCDA-OWS Developer H35-920 Questions and Answers
HCDA-OWS Developer H35-920 Questions and AnswersHCDA-OWS Developer H35-920 Questions and Answers
HCDA-OWS Developer H35-920 Questions and Answersdouglascarnicelli
 
CompTIA A+ 220-1001 Questions and Answers
CompTIA A+ 220-1001 Questions and AnswersCompTIA A+ 220-1001 Questions and Answers
CompTIA A+ 220-1001 Questions and Answersdouglascarnicelli
 
Latest Microsoft Az-400 Questions and answers
Latest Microsoft Az-400 Questions and answersLatest Microsoft Az-400 Questions and answers
Latest Microsoft Az-400 Questions and answersdouglascarnicelli
 

Mais de douglascarnicelli (11)

Oracle Certification 1Z0-1041 Questions and Answers
Oracle Certification 1Z0-1041 Questions and AnswersOracle Certification 1Z0-1041 Questions and Answers
Oracle Certification 1Z0-1041 Questions and Answers
 
2020 Updated Microsoft MB-200 Questions and Answers
2020 Updated Microsoft MB-200 Questions and Answers2020 Updated Microsoft MB-200 Questions and Answers
2020 Updated Microsoft MB-200 Questions and Answers
 
Introduction to Cisco Sales 700-150 Real Exam Questions
Introduction to Cisco Sales 700-150 Real Exam QuestionsIntroduction to Cisco Sales 700-150 Real Exam Questions
Introduction to Cisco Sales 700-150 Real Exam Questions
 
Cisco Certification 500-240 Questions and Answers
Cisco Certification 500-240 Questions and AnswersCisco Certification 500-240 Questions and Answers
Cisco Certification 500-240 Questions and Answers
 
CCNP Enterprise 300-425 ENWLSD Questions and Answers
CCNP Enterprise 300-425 ENWLSD Questions and AnswersCCNP Enterprise 300-425 ENWLSD Questions and Answers
CCNP Enterprise 300-425 ENWLSD Questions and Answers
 
MuleSoft certified platform architect-level 1 Real Exam Questions
MuleSoft certified platform architect-level 1 Real Exam QuestionsMuleSoft certified platform architect-level 1 Real Exam Questions
MuleSoft certified platform architect-level 1 Real Exam Questions
 
DELL EMC Implementation Engineer (EMCIE) E20-393 Questions and answers
DELL EMC Implementation Engineer (EMCIE) E20-393 Questions and answersDELL EMC Implementation Engineer (EMCIE) E20-393 Questions and answers
DELL EMC Implementation Engineer (EMCIE) E20-393 Questions and answers
 
2020 New Updated 1Z0-060 Questions and Answers
2020 New Updated 1Z0-060 Questions and Answers2020 New Updated 1Z0-060 Questions and Answers
2020 New Updated 1Z0-060 Questions and Answers
 
HCDA-OWS Developer H35-920 Questions and Answers
HCDA-OWS Developer H35-920 Questions and AnswersHCDA-OWS Developer H35-920 Questions and Answers
HCDA-OWS Developer H35-920 Questions and Answers
 
CompTIA A+ 220-1001 Questions and Answers
CompTIA A+ 220-1001 Questions and AnswersCompTIA A+ 220-1001 Questions and Answers
CompTIA A+ 220-1001 Questions and Answers
 
Latest Microsoft Az-400 Questions and answers
Latest Microsoft Az-400 Questions and answersLatest Microsoft Az-400 Questions and answers
Latest Microsoft Az-400 Questions and answers
 

Último

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Último (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

2020 Updated Cisa Real Exam Questions

  • 1. Testpassport real exam questions can make sure you pass any IT exam. Exam Code: CISA Exam Name: Isaca CISA Full version: 2290 Q&As Visit more information about CISA exam: CISA Real Questions Share some CISA questions and answers below. 1. Which of the following audit mainly focuses on discovering and disclosing on frauds and crimes? A. Compliance Audit B. Financial Audit C. Integrated Audit D. Forensic audit Answer: D Forensic audit is the activity that consists of gathering, verifying, processing, analyzing of and reporting on data in order to obtain facts and/or evidence - in a predefined context - in the area of legal/financial disputes and or irregularities (including fraud) and giving preventative advice For your exam you should know below information about different types of audit: What is an audit? An audit in general terms is a process of evaluating an individual or organization’s accounts. This is usually done by an independent auditing body. Thus, audit involves a competent and independent person obtaining evidence and evaluating it objectively with regard to a given entity, which in this case is the subject of audit, in order to establish conformance to a given set of standards. Audit can be on a person, organization, system, enterprise, project or product. Compliance Audit A compliance audit is a comprehensive review of an organization's adherence to regulatory
  • 2. Testpassport real exam questions can make sure you pass any IT exam. guidelines. Independent accounting, security or IT consultants evaluate the strength and thoroughness of compliance preparations. Auditors review security polices, user access controls and risk management procedures over the course of a compliance audit. Compliance audit include specific tests of controls to demonstrate adherence to specific regulatory or industry standard. These audits often overlap traditional audits, but may focus on particular system or data. What, precisely, is examined in a compliance audit will vary depending upon whether an organization is a public or private company, what kind of data it handles and if it transmits or stores sensitive financial data. For instance, SOX requirements mean that any electronic communication must be backed up and secured with reasonable disaster recovery infrastructure. Health care providers that store or transmit e-health records, like personal health information, are subject to HIPAA requirements. Financial services companies that transmit credit card data are subject to PCI DSS requirements. In each case, the organization must be able to demonstrate compliance by producing an audit trail, often generated by data from event log management software. Financial Audit A financial audit, or more accurately, an audit of financial statements, is the verification of the financial statements of a legal entity, with a view to express an audit opinion. The audit opinion is intended to provide reasonable assurance, but not absolute assurance, that the financial statements are presented fairly, in all material respects, and/or give a true and fair view in accordance with the financial reporting framework. The purpose of an audit is to provide an objective independent examination of the financial statements, which increases the value and credibility of the financial statements produced by management, thus increase user confidence in the financial statement, reduce investor risk and consequently reduce the cost of capital of the preparer of the financial statements. Operational Audit Operational Audit is a systematic review of effectiveness, efficiency and economy of operation. Operational audit is a future-oriented, systematic, and independent evaluation of organizational activities. In Operational audit financial data may be used, but the primary sources of evidence are the operational policies and achievements related to organizational objectives. Operational audit is a more comprehensive form of an Internal audit. The Institute of Internal Auditor (IIA) defines Operational Audit as a systematic process of evaluating an organization's effectiveness, efficiency and economy of operations under management's control and reporting to appropriate persons the results of the evaluation along with recommendations for improvement. Objectives
  • 3. Testpassport real exam questions can make sure you pass any IT exam. To appraise the effectiveness and efficiency of a division, activity, or operation of the entity in meeting organizational goals. To understand the responsibilities and risks faced by an organization. To identify, with management participation, opportunities for improving control. To provide senior management of the organization with a detailed understanding of the Operations. Integrated Audits An integrated audit combines financial and operational audit steps. An integrated audit is also performed to assess overall objectives within an organization, related to financial information and asset, safeguarding, efficiency and or internal auditors and would include compliance test of internal controls and substantive audit step. IS Audit An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement. The primary functions of an IT audit are to evaluate the systems that are in place to guard an organization's information. Specifically, information technology audits are used to evaluate the organization's ability to protect its information assets and to properly dispense information to authorized parties. The IT audit aims to evaluate the following: Will the organization's computer systems be available for the business at all times when required? (known as availability) Will the information in the systems be disclosed only to authorized users? (known as security and confidentiality) Will the information provided by the system always be accurate, reliable, and timely? (measures the integrity) In this way, the audit hopes to assess the risk to the company's valuable asset (its information) and establish methods of minimizing those risks. Forensic Audit Forensic audit is the activity that consists of gathering, verifying, processing, analyzing of and reporting on data in order to obtain facts and/or evidence - in a predefined context - in the area of legal/financial disputes and or irregularities (including fraud) and giving preventative advice. The purpose of a forensic audit is to use accounting procedures to collect evidence for the prosecution or investigation of financial crimes such as theft or fraud. Forensic audits may be conducted to determine if wrongdoing occurred, or to gather materials for the case against an alleged criminal.
  • 4. Testpassport real exam questions can make sure you pass any IT exam. The following answers are incorrect: Compliance Audit - A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines. Independent accounting, security or IT consultants evaluate the strength and thoroughness of compliance preparations. Auditors review security polices, user access controls and risk management procedures over the course of a compliance audit. Compliance audit include specific tests of controls to demonstrate adherence to specific regulatory or industry standard. These audits often overlap traditional audits, but may focus on particular system or data. Financial Audit- A financial audit, or more accurately, an audit of financial statements, is the verification of the financial statements of a legal entity, with a view to express an audit opinion. The audit opinion is intended to provide reasonable assurance, but not absolute assurance, that the financial statements are presented fairly, in all material respects, and/or give a true and fair view in accordance with the financial reporting framework. The purpose of an audit is to provide an objective independent examination of the financial statements, which increases the value and credibility of the financial statements produced by management, thus increase user confidence in the financial statement, reduce investor risk and consequently reduce the cost of capital of the preparer of the financial statements. Integrated Audits - An integrated audit combines financial and operational audit steps. An integrated audit is also performed to assess overall objectives within an organization, related to financial information and asset, safeguarding, efficiency and or internal auditors and would include compliance test of internal controls and substantive audit step. The following reference(s) were/was used to create this question: CISA Review Manual 2014 Page number 44 http://searchcompliance.techtarget.com/definition/compliance-audit http://en.wikipedia.org/wiki/Financial_audit http://en.wikipedia.org/wiki/Operational_auditing http://en.wikipedia.org/wiki/Information_technology_audit http://www.investorwords.com/16445/forensic_audit.html 2. What is the MOST effective way to ensure security policies and procedures are up-to-date? A. Verify security requirements are being identified and consistently applied. B. Align the organization’s security practices with industry standards and best practice. C. Define and document senior management’s vision for the direction of the security D. Prevent security documentation audit issues from being raised Answer: B
  • 5. Testpassport real exam questions can make sure you pass any IT exam. 3. Which of the following step of PDCA establishes the objectives and processes necessary to deliver results in accordance with the expected output? A. Plan B. Do C. Check D. Act Answer: A Explanation: Plan - Establish the objectives and processes necessary to deliver results in accordance with the expected output (the target or goals). By establishing output expectations, the completeness and accuracy of the spec is also a part of the targeted improvement. When possible start on a small scale to test possible effects. For your exam you should know the information below: PDCA (planCdoCcheckCact or planCdoCcheckCadjust) is an iterative four-step management method used in business for the control and continuous improvement of processes and products. It is also known as the Deming circle/cycle/wheel, Stewart cycle, control circle/cycle, or planCdoCstudyCact (PDSA). Another version of this PDCA cycle is OPDCA. The added "O" stands for observation or as some versions say "Grasp the current condition." The steps in each successive PDCA cycle are: PLAN Establish the objectives and processes necessary to deliver results in accordance with the expected output (the target or goals). By establishing output expectations, the completeness
  • 6. Testpassport real exam questions can make sure you pass any IT exam. and accuracy of the spec is also a part of the targeted improvement. When possible start on a small scale to test possible effects. DO Implement the plan, execute the process, make the product. Collect data for charting and analysis in the following "CHECK" and "ACT" steps. CHECK Study the actual results (measured and collected in "DO" above) and compare against the expected results (targets or goals from the "PLAN") to ascertain any differences. Look for deviation in implementation from the plan and also look for the appropriateness and completeness of the plan to enable the execution, i.e., "Do". Charting data can make this much easier to see trends over several PDCA cycles and in order to convert the collected data into information. Information is what you need for the next step "ACT". ACT Request corrective actions on significant differences between actual and planned results. Analyze the differences to determine their root causes. Determine where to apply changes that will include improvement of the process or product. When a pass through these four steps does not result in the need to improve, the scope to which PDCA is applied may be refined to plan and improve with more detail in the next iteration of the cycle, or attention needs to be placed in a different stage of the process. The following answers are incorrect: DO - Implement the plan, execute the process, make the product. Collect data for charting and analysis in the following "CHECK" and "ACT" steps. CHECK - Study the actual results (measured and collected in "DO" above) and compare against the expected results (targets or goals from the "PLAN") to ascertain any differences ACT -Request corrective actions on significant differences between actual and planned results. Analyze the differences to determine their root causes. Determine where to apply changes that will include improvement of the process or product The following reference(s) were/was used to create this question: CISA review manual 2014 page number 107 4. An IS auditor is reviewing an organization’s network vulnerability scan results. Which of the following processes would the scan results MOST likely feed into? A. Firewall maintenance B. Patch management C. Incident response D. Traffic management
  • 7. Testpassport real exam questions can make sure you pass any IT exam. Answer: A 5. Assessments of critical information systems are based on a cyclical audit plan that has not been updated for several years. Which of the following should the IS auditor recommend to BEST address this situation? A. Use a revolving set of audit plans to cover all systems B. Update the audit plan quarterly to account for delays and deferrals of periodic reviews C. Regularly validate the audit plan against business risks D. Do not include periodic reviews in detail as part of the audit plan Answer: C 6. Which of the following cloud deployment model is provisioned for open use by the general public? A. Private Cloud B. Community Cloud C. Public Cloud D. Hybrid Cloud Answer: C Explanation: In Public cloud, the cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. For your exam you should know below information about Cloud Computing deployment models: Private cloud The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. Private Cloud
  • 8. Testpassport real exam questions can make sure you pass any IT exam. Community Cloud The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. Community Cloud Public Cloud The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. Public Cloud
  • 9. Testpassport real exam questions can make sure you pass any IT exam. Hybrid cloud The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds) hybrid cloud The following answers are incorrect: Private cloud - The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. Community cloud - The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security
  • 10. Testpassport real exam questions can make sure you pass any IT exam. requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. Hybrid cloud - The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds) The following reference(s) were/was used to create this question: CISA review manual 2014 page number 102 Official ISC2 guide to CISSP 3rd edition Page number 689 and 690 7. Which of the following should be reviewed FIRST when planning an IS audit? A. Recent financial information B. Annual business unit budget C. IS audit standards D. The business environment Answer: D 8. An IS auditor is reviewing an organization’s incident management processes and procedures. which of the following observations should be the auditor’s GREATEST concern? A. Ineffective incident classification B. Ineffective incident prioritization C. Ineffective incident detection D. Ineffective post-incident review Answer: C 9. An IS auditor reviewing an organization’s data privacy controls observes that privacy notices do not clearly state how the organization uses customer data for its processing operations. Which of the following data protection principles MUST be implemented to address this gap? A. Maintenance of data integrity B. Access to collected data C. Retention of consent documentation D. Purpose for data collection Answer: B 10. An internal audit department recently established a quality assurance (QA) program.
  • 11. Testpassport real exam questions can make sure you pass any IT exam. Which of the following activities is MOST important to include as part of the QA program requirements? A. Ongoing monitoring of the audit activities B. Analysis of user satisfaction reports from business lines. C. Feedback from internal audit staff D. Long-term internal audit resource planning Answer: A 11. Which of the following is NOT an example of corrective control? A. OS Upgrade B. Backup and restore C. Contingency planning D. System Monitoring Answer: D Explanation: The word NOT is used as a keyword in the question. You need to find out a security control from given options which in not corrective control. System Monitoring is a detective control and not a corrective control. For your exam you should know below information about different security controls Deterrent Controls Deterrent Controls are intended to discourage a potential attacker. Access controls act as a deterrent to threats and attacks by the simple fact that the existence of the control is enough to keep some potential attackers from attempting to circumvent the control. This is often because the effort required to circumvent the control is far greater than the potential reward if the attacker is successful, or, conversely, the negative implications of a failed attack (or getting caught) outweigh the benefits of success. For example, by forcing the identification and authentication of a user, service, or application, and all that it implies, the potential for incidents associated with the system is significantly reduced because an attacker will fear association with the incident. If there are no controls for a given access path, the number of incidents and the potential impact become infinite. Controls inherently reduce exposure to risk by applying oversight for a process. This oversight acts as a deterrent, curbing an attacker’s appetite in the face of probable repercussions. The best example of a deterrent control is demonstrated by employees and their propensity to intentionally perform unauthorized functions, leading to unwanted events. When users begin to understand that by authenticating into a system to perform a function, their activities are logged and monitored, and it reduces the likelihood they will attempt such an action. Many threats are
  • 12. Testpassport real exam questions can make sure you pass any IT exam. based on the anonymity of the threat agent, and any potential for identification and association with their actions is avoided at all costs. It is this fundamental reason why access controls are the key target of circumvention by attackers. Deterrents also take the form of potential punishment if users do something unauthorized. For example, if the organization policy specifies that an employee installing an unauthorized wireless access point will be fired, that will determine most employees from installing wireless access points. Preventative Controls Preventive controls are intended to avoid an incident from occurring. Preventative access controls keep a user from performing some activity or function. Preventative controls differ from deterrent controls in that the control is not optional and cannot (easily) be bypassed. Deterrent controls work on the theory that it is easier to obey the control rather than to risk the consequences of bypassing the control. In other words, the power for action resides with the user (or the attacker). Preventative controls place the power of action with the system, obeying the control is not optional. The only way to bypass the control is to find a flaw in the control’s implementation. Compensating Controls Compensating controls are introduced when the existing capabilities of a system do not support the requirement of a policy. Compensating controls can be technical, procedural, or managerial. Although an existing system may not support the required controls, there may exist other technology or processes that can supplement the existing environment, closing the gap in controls, meeting policy requirements, and reducing overall risk. For example, the access control policy may state that the authentication process must be encrypted when performed over the Internet. Adjusting an application to natively support encryption for authentication purposes may be too costly. Secure Socket Layer (SSL), an encryption protocol, can be employed and layered on top of the authentication process to support the policy statement. Other examples include a separation of duties environment, which offers the capability to isolate certain tasks to compensate for technical limitations in the system and ensure the security of transactions. In addition, management processes, such as authorization, supervision, and administration, can be used to compensate for gaps in the access control environment. Detective Controls Detective controls warn when something has happened, and are the earliest point in the post- incident timeline. Access controls are a deterrent to threats and can be aggressively utilized to prevent harmful incidents through the application of least privilege. However, the detective nature of access controls can provide significant visibility into the access environment and help organizations manage their access strategy and related security risk. As mentioned previously,
  • 13. Testpassport real exam questions can make sure you pass any IT exam. strongly managed access privileges provided to an authenticated user offer the ability to reduce the risk exposure of the enterprise’s assets by limiting the capabilities that authenticated user has. However, there are few options to control what a user can perform once privileges are provided. For example, if a user is provided write access to a file and that file is damaged, altered, or otherwise negatively impacted (either deliberately or unintentionally), the use of applied access controls will offer visibility into the transaction. The control environment can be established to log activity regarding the identification, authentication, authorization, and use of privileges on a system. This can be used to detect the occurrence of errors, the attempts to perform an unauthorized action, or to validate when provided credentials were exercised. The logging system as a detective device provides evidence of actions (both successful and unsuccessful) and tasks that were executed by authorized users. Corrective Controls When a security incident occurs, elements within the security infrastructure may require corrective actions. Corrective controls are actions that seek to alter the security posture of an environment to correct any deficiencies and return the environment to a secure state. A security incident signals the failure of one or more directive, deterrent, preventative, or compensating controls. The detective controls may have triggered an alarm or notification, but now the corrective controls must work to stop the incident in its tracks. Corrective controls can take many forms, all depending on the particular situation at hand or the particular security failure that needs to be dealt with. Recovery Controls Any changes to the access control environment, whether in the face of a security incident or to offer temporary compensating controls, need to be accurately reinstated and returned to normal operations. There are several situations that may affect access controls, their applicability, status, or management. Events can include system outages, attacks, project changes, technical demands, administrative gaps, and full-blown disaster situations. For example, if an application is not correctly installed or deployed, it may adversely affect controls placed on system files or even have default administrative accounts unknowingly implemented upon install. Additionally, an employee may be transferred, quit, or be on temporary leave that may affect policy requirements regarding separation of duties. An attack on systems may have resulted in the implantation of a Trojan horse program, potentially exposing private user information, such as credit card information and financial data. In all of these cases, an undesirable situation must be rectified as quickly as possible and controls returned to normal operations. For your exam you should know below information about different security controls Deterrent Controls
  • 14. Testpassport real exam questions can make sure you pass any IT exam. Deterrent Controls are intended to discourage a potential attacker. Access controls act as a deterrent to threats and attacks by the simple fact that the existence of the control is enough to keep some potential attackers from attempting to circumvent the control. This is often because the effort required to circumvent the control is far greater than the potential reward if the attacker is successful, or, conversely, the negative implications of a failed attack (or getting caught) outweigh the benefits of success. For example, by forcing the identification and authentication of a user, service, or application, and all that it implies, the potential for incidents associated with the system is significantly reduced because an attacker will fear association with the incident. If there are no controls for a given access path, the number of incidents and the potential impact become infinite. Controls inherently reduce exposure to risk by applying oversight for a process. This oversight acts as a deterrent, curbing an attacker’s appetite in the face of probable repercussions. The best example of a deterrent control is demonstrated by employees and their propensity to intentionally perform unauthorized functions, leading to unwanted events. When users begin to understand that by authenticating into a system to perform a function, their activities are logged and monitored, and it reduces the likelihood they will attempt such an action. Many threats are based on the anonymity of the threat agent, and any potential for identification and association with their actions is avoided at all costs. It is this fundamental reason why access controls are the key target of circumvention by attackers. Deterrents also take the form of potential punishment if users do something unauthorized. For example, if the organization policy specifies that an employee installing an unauthorized wireless access point will be fired, that will determine most employees from installing wireless access points. Preventative Controls Preventive controls are intended to avoid an incident from occurring. Preventative access controls keep a user from performing some activity or function. Preventative controls differ from deterrent controls in that the control is not optional and cannot (easily) be bypassed. Deterrent controls work on the theory that it is easier to obey the control rather than to risk the consequences of bypassing the control. In other words, the power for action resides with the user (or the attacker). Preventative controls place the power of action with the system, obeying the control is not optional. The only way to bypass the control is to find a flaw in the control’s implementation. Compensating Controls Compensating controls are introduced when the existing capabilities of a system do not support the requirement of a policy. Compensating controls can be technical, procedural, or managerial. Although an existing system may not support the required controls, there may exist other
  • 15. Testpassport real exam questions can make sure you pass any IT exam. technology or processes that can supplement the existing environment, closing the gap in controls, meeting policy requirements, and reducing overall risk. For example, the access control policy may state that the authentication process must be encrypted when performed over the Internet. Adjusting an application to natively support encryption for authentication purposes may be too costly. Secure Socket Layer (SSL), an encryption protocol, can be employed and layered on top of the authentication process to support the policy statement. Other examples include a separation of duties environment, which offers the capability to isolate certain tasks to compensate for technical limitations in the system and ensure the security of transactions. In addition, management processes, such as authorization, supervision, and administration, can be used to compensate for gaps in the access control environment. Detective Controls Detective controls warn when something has happened, and are the earliest point in the post- incident timeline. Access controls are a deterrent to threats and can be aggressively utilized to prevent harmful incidents through the application of least privilege. However, the detective nature of access controls can provide significant visibility into the access environment and help organizations manage their access strategy and related security risk. As mentioned previously, strongly managed access privileges provided to an authenticated user offer the ability to reduce the risk exposure of the enterprise’s assets by limiting the capabilities that authenticated user has. However, there are few options to control what a user can perform once privileges are provided. For example, if a user is provided write access to a file and that file is damaged, altered, or otherwise negatively impacted (either deliberately or unintentionally), the use of applied access controls will offer visibility into the transaction. The control environment can be established to log activity regarding the identification, authentication, authorization, and use of privileges on a system. This can be used to detect the occurrence of errors, the attempts to perform an unauthorized action, or to validate when provided credentials were exercised. The logging system as a detective device provides evidence of actions (both successful and unsuccessful) and tasks that were executed by authorized users. Corrective Controls When a security incident occurs, elements within the security infrastructure may require corrective actions. Corrective controls are actions that seek to alter the security posture of an environment to correct any deficiencies and return the environment to a secure state. A security incident signals the failure of one or more directive, deterrent, preventative, or compensating controls. The detective controls may have triggered an alarm or notification, but now the
  • 16. Testpassport real exam questions can make sure you pass any IT exam. corrective controls must work to stop the incident in its tracks. Corrective controls can take many forms, all depending on the particular situation at hand or the particular security failure that needs to be dealt with. Recovery Controls Any changes to the access control environment, whether in the face of a security incident or to offer temporary compensating controls, need to be accurately reinstated and returned to normal operations. There are several situations that may affect access controls, their applicability, status, or management. Events can include system outages, attacks, project changes, technical demands, administrative gaps, and full-blown disaster situations. For example, if an application is not correctly installed or deployed, it may adversely affect controls placed on system files or even have default administrative accounts unknowingly implemented upon install. Additionally, an employee may be transferred, quit, or be on temporary leave that may affect policy requirements regarding separation of duties. An attack on systems may have resulted in the implantation of a Trojan horse program, potentially exposing private user information, such as credit card information and financial data. In all of these cases, an undesirable situation must be rectified as quickly as possible and controls returned to normal operations. The following answers are incorrect: The other examples belong to corrective control. The following reference(s) were/was used to create this question: CISA Review Manual 2014 Page number 44 and Official ISC2 CISSP guide 3rd edition Page number 50 and 51 12. When evaluating the ability of a disaster recovery plan to enable the recovery of IT processing capabilities, it is MOST important for the IS auditor to verify the plan is: A. stored at an offsite location B. communicated to department heads C. regularly reviewed D. periodically tested Answer: C 13. Which of the following should the IS auditor use to BEST determine whether a project has met its business objectives? A. Earned-value analysis B. Completed project plan
  • 17. Testpassport real exam questions can make sure you pass any IT exam. C. Issues log with resolutions D. Benefits realization document Answer: D 14. Which of the following BEST demonstrates effective information security management within an organization? A. Employees support decisions made by information security management. B. Excessive risk exposure in one department can be absorbed by other departments. C. Information security governance is incorporated into organizational governance. D. Control ownership is assigned to parties who can accept losses related to control failure. Answer: C 15. The objectives of business process improvement should PRIMARILY include: A. minimal impact on staff B. incremental changes in productivity C. changes of organizational boundaries D. performance optimization Answer: D Testpasport provides valid exam questions for many IT certification exams, such as Oracle, Microsoft, IBM, Huawei, CompTIA, Dell, and others. Practice FREE Online Questions of Hot Exams below. NACE-CIP2-001 FREE Online Questions AZ-203 FREE Online Questions AZ-103 FREE Online Questions AZ-300 FREE Online Questions AZ-301 FREE Online Questions
  • 18. Testpassport real exam questions can make sure you pass any IT exam. AZ-900 FREE Online Questions H13-622 FREE Online Questions