31-60 CISA Domain IV Questions Answer and Explanation

Free Exam Simulator

Question 1 - ID: 3012163
An IS auditor needs to review the procedures used to restore a software application to its state prior to an upgrade. Therefore, the auditor needs to assess:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Backout procedures are used to restore a system to a previous state and are an important element of the change control process. The other choices are not related to the change control process-a process which specifies what procedures should be followed when software is being upgraded but the upgrade does not work and requires a fallback to its former state.
B
Incident management procedures are used to manage errors or problems with system operation. They are usually used by a help desk. One of the incident management procedures may be how to follow a fallback plan.
C
Software development procedures such as the software development life cycle (SDLC) are used to manage the creation or acquisition of new or modified software.:
D
Problem management procedures are used to track user feedback and issues related to the operation of an application for trend analysis and problem resolution.
Question 2 - ID: 8012183
When an organization's disaster recovery plan has a reciprocal agreement, which of the following risk treatment approaches is being applied?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
A reciprocal agreement in which two organizations agree to provide computing resources to each other in the event of a disaster is a form of risk mitigation. This usually works well if both organizations have similar information "processing facilities. Because the intended effect of reciprocal agreements is to have a functional disaster recovery plan, it is a risk mitigation strategy.
B
Risk transfer is the transference of risk to a third party (e.g., buying insurance for activities that pose a risk).
C
Risk acceptance occurs when an organization decides to accept the risk as it is and to do nothing to mitigate or transfer it.
D
Risk avoidance is the decision to cease operations or activities that give rise to a risk. For example, a company may stop accepting credit card payments to avoid the risk of credit card information disclosure.
Question 3 - ID: 4312175
Which of the following is MOST directly affected by network performance monitoring tools?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Network monitoring tools can be used to detect errors that are propagating through a network, but their primary focus is on network reliability so that the network is available when required.
B
A network monitoring tool can violate confidentiality by allowing a network administrator to observe non-encrypted traffic. This requires careful protection and policies regarding the use of network monitoring tools.
C
Network monitoring tools allow observation of network performance and problems. This allows the administrator to take corrective action when network problems are observed. Therefore, the characteristic that is most directly affected by network monitoring is availability.
D
Network monitoring tools will not measure completeness of the communication. This is measured by the end points in the communication.
Question 4 - ID: 4012190
An IS auditor is performing an audit in the data center when the fire alarm begins sounding. The audit scope includes disaster recovery, so the auditor observes the data center staff respond to the alarm. Which of the following is the MOST important action for the data center staff to complete in this scenario?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Removal of backups from the data center is not an appropriate action because it could delay the evacuation of personnel. Most companies would have copies of backups in offsite storage to mitigate the risk of data loss for this type of disaster.
B
Fire suppression systems are designed to operate automatically, and activating the system when staff are not yet evacuated could create confusion and panic, leading to injuries or even fatalities. Manual triggering of the system could be necessary under certain conditions, but only after all other data center personnel are safely evacuated.
C
In an emergency, safety of life is always the first priority; therefore, the complete and orderly evacuation of the facility staff would be the most important activity.
D
Life safety is always the first priority, and notifying the fire department of the alarm is not typically necessary because most data center alarms are configured to automatically report to the local authorities.
Question 5 - ID: 7612180
During an assessment of software development practices, an IS auditor finds that open source software components were used in an application designed for a client. What is the GREATEST concern the auditor would have about the use of open source software?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
A major benefit of using open source software is that it is free. The client is not required to pay for the open source software components; however,both the developing organization and the client should be concerned about the licensing terms and conditions of the open source software components that are being used.
B
Open source software,just like any software code, should be tested for security flaws and should be part of the normal system development life cycle (SDLC) process. This is not more of a concern than licensing compliance.
C
Open source software does not inherently lack quality. Like any software code, it should be tested for reliability and should be part of the normal SDLC process. This is not more of a concern than licensing compliance.
D
There are many types of open source software licenses and each has different terms and conditions. Some open source software licensing allows use of the open source software component freely but requires that the completed software product must also allow the same rights. This is known as viral licensing, and if the development organization is not careful, its products could violate licensing terms by selling the product for profit. The IS auditor should be most concerned with open source software licensing compliance to avoid unintended intellectual property risk or legal consequences.
Question 6 - ID: 9112176
When auditing the onsite archiving process of emails, the IS auditor should pay the MOST attention to:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The storage capacity of the archiving solution would be irrelevant if the proper email messages have not been properly preserved and others have been deleted.
B
The level of user awareness concerning email use would not directly affect the completeness and accuracy of the archived email.
C
Without a data retention policy that is aligned to the company's business and compliance requirements, the email archive may not preserve and reproduce the correct information when required.
D
The support and stability of the archiving solution manufacturer is secondary to the need to ensure a retention policy. Vendor support would not directly affect the completeness and accuracy of the archived email.
Question 7 - ID: 5812165
The MAIN purpose for periodically testing offsite disaster recovery facilities is to:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Testing an offsite location validates the value of the contingency plans and is not used to eliminate detailed plans.
B
Program and system documentation should be reviewed continuously for currency. A test of an offsite facility may ensure that the documentation for that site is current, but this is not the purpose of testing an offsite facility.
C
The main purpose of offsite hardware testing is to ensure the continued compatibility of the contingency facilities so that assurance can be gained that the contingency plans would work in an actual disaster.
D
The testing of an offsite facility does nothing to protect the integrity of the database. It may test the validity of backups but does not protect their integrity.
Question 8 - ID: 6812181
An IS auditor reviewing database controls discovered that changes to the database during normal working hours were handled through a standard set of procedures. However, changes made after normal hours required only an abbreviated number of steps. In this situation, which of the following would be considered an adequate set of compensating controls?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The use of a DBA user account is normally set up to log all changes made and is most appropriate for changes made outside of normal hours. The use of a log, which records the changes, allows changes to be reviewed. Because an abbreviated number of steps are used, this represents an adequate set of compensating controls.
B
A normal user account should not have access to a database. This would permit uncontrolled changes to any of the databases.
C
Users should not be able to make changes. Logging would only provide information changes made but would not limit changes to only those who were authorized
D
The use of the database administrator (DBA) user account without logging would permit uncontrolled changes to be made to databases after access to the account was obtained.
Question 9 - ID: 1112185
An IS auditor is reviewing an organization's recovery from a disaster in which not all the critical data needed to resume business operations were retained. Which of the following was incorrectly defined?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The recovery point objective (RPO) is determined based on the acceptable data loss in the case of a disruption of operations. RPO defines the point in time from which it is necessary to recover the data and quantifies, in terms of time, the permissible amount of data loss in the case of interruption.
B
The service delivery objective (SDO) is directly related to the business needs. SDO is the level of services to be reached during the alternate process mode until the normal situation is restored.
C
The recovery time objective is determined based on the acceptable downtime in the case of a disruption of operations.
D
The interruption window is defined as the amount of time during which the organization is unable to maintain operations from the point of failure to the time that the critical services/applications are restored.
Question 10 - ID: 3912184
A programmer maliciously modified a production program to change data and then restored it back to the original code. Which of the following would MOST effectively detect the malicious activity?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Reviewing executable and source code integrity is an ineffective control, because the source code was changed back to the original and will agree with the current executable.
B
Object code comparisons are ineffective because the original programs were restored, and the changed program does not exist.
C
Source code comparisons are ineffective because the original programs were restored, and the changed program does not exist.
D
Reviewing system log files is the only trail that may provide information about the unauthorized activities in the production library.
Question 11 - ID: 8912189
Recovery procedures for an information processing facility are BEST based on:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The recovery time objective (RTO). is the amount of time allowed for the recovery of a business function or resource after a disaster occurs; the RTO is the desired recovery time frame based on maximum tolerable outage (MTO) and available recovery alternatives.
B
An information security policy does not address recovery procedures.
C
MTO is the amount of time allowed for the recovery of a business function or resource after a disaster occurs; it represents the time by which the service must be restored before the organization is faced with the threat of collapse.
D
The recovery point objective (RPO) has the greatest influence on the recovery strategies for given data. It is determined based on the acceptable data loss in case of a disruption of operations. The RPO effectively quantifies the permissible amount of data loss in case of interruption.
Question 12 - ID: 5612186
The PRIMARY benefit of an IT manager monitoring technical capacity is to:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
IT management is interested in ensuring that systems are operating at optimal capacity, but their primary obligation is to ensure that IT is meeting the service level requirements of the business.
B
Capacity monitoring has multiple objectives; however, the primary objective is to ensure compliance with the internal service level agreement between the business and IT.
C
Determining future capacity is one definite benefit of technical capability monitoring.
D
This is one benefit of monitoring technical capacity because it can help forecast future demands, not just react to system failures. However,the primary responsibility of the IT manager is to meet the overall requirement to ensure that IT is meeting the service level expectations of the business.
Question 13 - ID: 4512178
Which of the following controls would be MOST effective in ensuring that production source code and object code are synchronized?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
It is a good practice to protect all source and object code-even in development. However, this will not ensure the synchronization of source and object code.
B
All production libraries should be protected with access controls, and this may protect source code from tampering. However, this will not ensure that source and object codes are based on the same version.
C
Using version control software and comparing source and object code is a good practice but may not detect a problem where the source code is a different version than the object code.
D
Date and time-stamp reviews of source and object code would ensure that source code, which has been compiled, matches the production object code. This is the most effective way to ensure that the approved production source code is compiled and is the one being used.
Question 14 - ID: 5212173
In evaluating programmed controls over password management, which of the following is the IS auditor MOST likely to rely on?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The implementation of a field check would not be as effective as a validity check that verifies that all password criteria have been met.
B
A size check is useful because passwords should have a minimum length, but it is not as strong of a control as validity.
C
Passwords are not typically entered in a batch mode, so a hash total would not be effective. More important, a system should not accept incorrect values of a password, so a hash total as a control will not indicate any weak passwords, errors or omissions.
D
A validity check would be the most useful for the verification of passwords because it would verify that the required format has been used-for example, not using a dictionary word, including non-alphabetical characters, etc. An effective password must have several different types of characters: alphabetical, numeric and special.
Question 15 - ID: 6312167
The database administrator suggests that database efficiency can be improved by denormalizing some tables. This would result in:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Denormalization should not cause loss of confidentiality even though confidential data may be involved. The database administrator should ensure that access controls to the databases remain effective.
B
Denormalization may require some changes to the calls between databases and applications but should not cause application malfunctions.
C
Normalization is a design or optimization process for a relational database that increases redundancy. Redundancy, which is usually considered positive when it is a question of resource availability, is negative in a database environment because it demands additional and otherwise unnecessary data handling efforts. Denormalization is sometimes advisable for functional reasons.
D
Denormalization pertains to the structure of the database, not the access controls. It should not result in unauthorized access.
Question 16 - ID: 4712177
Vendors have released patches fixing security flaws in their software. Which of the following should an IS auditor recommend in this situation?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Declining to deal with vendors does not take care of the flaw and may severely limit service options.
B
New software versions with all fixes included are not always available and a full installation could be time consuming.
C
To install the patch without knowing what it might affect could easily cause problems. The installation of a patch may also affect system availability; therefore, the patch should be rolled out at a time that is acceptable to the business.
D
The effect of installing the patch should be immediately evaluated and installation should occur based on the results of the evaluation. There are numerous cases where a patch from one vendor has affected other systems; therefore, it is necessary to test the patches as much as possible before rolling them out to the entire organization.
Question 17 - ID: 2612164
Which of the following is a MAJOR concern during a review of help desk activities?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Ideally, a help desk team should have dedicated lines, but this exception is not as serious as the technical team unilaterally closing an incident.
B
Instant messaging is an add-on to improve the effectiveness of the help desk team. Its absence cannot be seen as a major concern as long as calls can still be made.
C
The help desk function is a service-oriented unit. The end users must be advised before an incident can be regarded as closed.
D
Although this is of concern, it should be expected. A problem escalation procedure should be developed to handle such scenarios.
Question 18 - ID: 5912162
Which of the following is a network diagnostic tool that monitors and records network information?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Help desk reports are prepared by the help desk, which is staffed or supported by IS technical support personnel trained to handle problems occurring during the course of IS operations.
B
Protocol analyzers are network diagnostic tools that monitor and record network information from packets traveling in the link to which the analyzer is attached.
C
Online monitors measure telecommunication transmissions and determine whether transmissions were accurate and complete.
D
Downtime reports track the availability of telecommunication lines and circuits.
Question 19 - ID: 7312187
An IS auditor reviewing an organization's disaster recovery plan should PRIMARILY verify that it is:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The plan must be subjected to regular testing, but the period between tests will depend on the nature of the organization, the amount of change in the organization and the relative importance of IS. Three months, or even annually, may be appropriate in different circumstances.
B
Although the disaster recovery plan should receive the approval of senior management, it need not be the chief executive officer if another executive officer is equally or more appropriate. For a purely IS-related plan, the executive responsible for technology may have approved the plan.
C
The plan should be reviewed at appropriate intervals, depending on the nature of the business and the rate of change of systems and personnel. Otherwise, it may become out of date and may no longer be effective.
D
Although a business continuity plan is likely to be circulated throughout an organization, the IS disaster recovery plan will usually be a technical document and only relevant to IS and communication staff.
Question 20 - ID: 4912168
An IS auditor has been assigned to conduct a test that compares job run logs to computer job schedules. Which of the following observations would be of the GREATEST concern to the IS auditor?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Instances of jobs not being completed on time is a potential issue and should be investigated, but it is not the greatest concern.
B
Emergency changes are acceptable as long as they are properly documented as part of the process.
C
The audit should find that all scheduled jobs were run and that any exceptions were documented. This would not be a violation.
D
The overriding of computer processing jobs by computer operators could lead to unauthorized changes to data or programs. This is a control concern; thus, it is always critical.
Question 21 - ID: 3312170
The objective of concurrency control in a database system is to:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Access controls restrict updating of the database to authorized users.
B
Quality controls such as edits ensure the accuracy, completeness and consistency of data maintained in the database.
C
Controls such as passwords prevent the inadvertent or unauthorized disclosure of data from the database.
D
Concurrency controls prevent data integrity problems, which can arise when two update processes access the same data item at the same time.
Question 22 - ID: 1612188
There are several methods of providing telecommunication continuity. The method of routing traffic through split-cable or duplicate-cable facilities is called:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Diverse routing routes traffic through split-cable facilities or duplicate-cable facilities. This can be accomplished with different and/or duplicate cable sheaths. If different cable sheaths are used, the cable may be in the same conduit and, therefore, subject to the same interruptions as the cable it is backing up. The communication service subscriber can duplicate the facilities by having alternate routes, although the entrance to and from the customer premises may be in the same conduit. The subscriber can obtain diverse routing and alternate routing from the local carrier, including dual-entrance facilities. This type of access is time consuming and costly.
B
Alternative routing is a method of routing information via an alternate medium such as copper cable or fiber optics. This involves the use of different networks, circuits or end points should the normal network be unavailable.
C
Long-haul network diversity is a diverse, long-distance network using different packet switching circuits among the major long-distance carriers. It ensures long-distance access should any carrier experience a network failure.
D
Last-mile circuit protection is a redundant combination of local carrier T-ls (E-ls in Europe), microwave and/or coaxial cable access to the local communications loop. This enables the facility to have access during a local carrier communication disaster. Alternate local-carrier routing is also used.
Question 23 - ID: 8312179
A database administrator (DBA) who needs to make emergency changes to a database after normal working hours should log in:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The use of a normal user account would not have sufficient privileges to make changes on the database.
B
The server administrative accounts are shared and may be used by multiple support users. In addition, the server privilege accounts may not have the ability to perform database changes.
C
Logging in using the named user account before using the database administrator (DBA) account provides accountability by noting the person making the changes.
D
The DBA account is typically a shared user account. The shared account makes it difficult to establish the identity of the support user who is performing the database update.
Question 24 - ID: 8112166
A large chain of shops with electronic funds transfer at point-of-sale devices has a central communications processor for connecting to the banking network. Which of the following is the BEST disaster recovery plan for the communications processor?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The provision of an alternate processor onsite would be fine if it were an equipment problem but would not help in the case of a power outage and may require technical expertise to cutover to the alternate equipment.
B
Offsite storage of backups would not help, because electronic funds transfer tends to be an online process and offsite storage will not replace the dysfunctional processor.
C
Installation of duplex communication links would be most appropriate if it were only the communication link that failed.
D
Having an alternative standby processor at another network node would be the best solution. The unavailability of the central communications processor would disrupt all access to the banking network, resulting in the disruption of operations for all of the shops. This could be caused by failure of equipment, power or communications.
Question 25 - ID: 9312172
Which of the following is widely accepted as one of the critical components in networking management?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Configuration management is widely accepted as one of the key components of any network because it establishes how the network will function internally and externally. It also deals with the management of configuration and monitoring performance. Change management ensures that the setup and management of the network is done properly, including managing changes to the configuration, removal of default passwords and possibly hardening the network by disabling unneeded services.
B
Application monitoring is not a critical part of network management.
C
Topological mappings provide outlines of the components of the network and its connectivity.This is important to address issues such as single points of failure and proper network isolation but is not the most critical component of network management.
D
Proxy server troubleshooting is used for troubleshooting purposes, and managing a proxy is only a small part of network management.
Question 26 - ID: 2812171
Which of the following controls would provide the GREATEST assurance of database integrity?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Audit log procedures enable recording of all events that have been identified and help in tracing the events. However,they only point to the event and do not ensure completeness or accuracy of the database contents.
B
Rollback and rollforward database features ensure recovery from an abnormal disruption. They assure the integrity of the transaction that was being processed at the time of disruption, but do not provide assurance on the integrity of the contents of the database.
C
Querying/monitoring table access time checks helps designers improve database performance but not integrity.
D
Performing table link/reference checks serves to detect table linking errors (such as completeness and accuracy of the contents of the database), and thus provides the greatest assurance of database integrity.
Question 27 - ID: 7812191
An IS auditor discovers that the disaster recovery plan (DRP)for a company does not include a critical application hosted in the cloud. Management's response states that the cloud vendor is responsible for disaster recovery(DR) and DR-related testing.What is the NEXT course of action for the IS auditor to pursue?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Auditing the cloud vendor would be useful; however,this would only be useful if the vendor is contractually required to provide disaster recovery (DR) services.
B
A copy of DR policies can be requested to review their adequacy; however,this will only be useful if the vendor is contractually required to provide DR services.
C
DR services can only be expected from the vendor when explicitly listed in the contract with well-defined recovery time objectives and recovery point objectives. Without the contractual language, the vendor is not required to provide DR services.
D
An independent auditor's report, such as Statements on Standards for Attestation Engagements 16, on DR capabilities can be reviewed to ascertain the vendor's DR capabilities; however, this will only be fruitful if the vendor is contractually required to provide DR services.
Question 28 - ID: 4412174
Which of the following represents the GREATEST risk created by a reciprocal agreement for disaster recovery made between two companies?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The difference in security infrastructures, while a risk, is not insurmountable.
B
The plan can be tested by paper-based walk-throughs and possibly by agreement between the companies.
C
If one organization updates its hardware and software configuration, it may mean that it is no longer compatible with the systems of the other party in the agreement. This may mean that each company is unable to use the facilities at the other company to recover their processing following a disaster.
D
Resources being unavailable when needed are an intrinsic risk in any reciprocal agreement, but this is a contractual matter and is not the greatest risk.
Question 29 - ID: 1812182
Which of the following tests performed by an IS auditor would be the MOST effective in determining compliance with change control procedures in an organization?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Software migration records may not have all changes listed-changes could have been made that were not included in the migration records.
B
Change control records may not have all changes listed.
C
The most effective method is to determine what changes have been made (check logs and modified dates) and then verify that they have been approved.
D
Ensuring that only appropriate staff can migrate changes into production is a key control process but, in itself, does not verify compliance.
Question 30 - ID: 4012169
A new business requirement required changing database vendors. Which of the following areas should the IS auditor PRIMARILY examine in relation to this implementation?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
A critical issue when migrating data from one database to another is the integrity of the data and ensuring that the data are migrated completely and correctly.
B
The timing of the cutover is important, but because the data are being migrated to a new database, duplication should not be an issue.
C
The authorization of the users is not as relevant as the authorization of the application because the users will interface with the database through an application, and the users will not directly interface with the database.
D
Normalization is used to design the database and is not necessarily related to database migration.

Free Exam Simulator