Domain 4: Information Systems Operations and Business Resilience Flashcards

1
Q

Which of the following is MOST important when an operating system (OS) patch is to be applied to a production environment?
A. A.Successful regression testing by the developer
B. B.Approval from the information asset owner
C. C.Approval from the security officer
D. D.Patch installation at alternate sites

A

B. It is most important that information owners approve any changes to production systems to ensure that no serious business disruption takes place as the result of the patch release.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An information systems (IS) auditor examining the security configuration of an operating system (OS) should review the:
A. A.transaction logs.
B. B.authorization tables.
C. C.parameter settings.
D. D.routing tables.

A

C. Configuration parameters allow a standard piece of software to be customized for diverse environments and are important in determining how a system runs. The parameter settings should be appropriate to an organization’s workload and control environment. Improper implementation and/or monitoring of OSs can result in undetected errors and corruption of the data being processed, and lead to unauthorized access and inaccurate logging of system usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When reviewing the implementation of a local area network, an information systems (IS) auditor should FIRST review the:
A. A.node list.
B. B.acceptance test report.
C. C.network diagram.
D. D.users list.

A

C. To properly review a local area network implementation, an information systems (IS) auditor should first verify the network diagram to identify risk or single points of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following BEST ensures the integrity of a server’s operating system?

A.Protecting the server in a secure location
B.Setting a boot password
C.Hardening the server configuration
D.Implementing activity logging

A

C. Hardening a system means to configure it in the most secure manner (i.e., install latest security patches, properly define access authorization for users and administrators, disable insecure options and uninstall unused services) to prevent nonprivileged users from gaining the right to execute privileged instructions and, thus, take control of the entire machine, jeopardizing the integrity of the OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following network components is PRIMARILY set up to serve as a security measure by preventing unauthorized traffic between different segments of the network?

A.Firewalls
B.Routers
C.Layer 2 switches
D.Virtual local area networks (VLANs)

A

A. Firewall systems are the primary tool that enables an enterprise to prevent unauthorized access between networks. An enterprise may choose to deploy one or more systems that function as firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The GREATEST advantage of using web services for the exchange of information between two systems is:

A.secure communication.
B.improved performance.
C.efficient interfacing.
D.enhanced documentation.

A

C. Web services facilitate the interoperable exchange of information between two systems regardless of the operating system or programming language used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When reviewing an enterprise’s preventive maintenance process for systems at a data center, what is the MOST important practice that should be in place for an information systems (IS) auditor to be able to ensure that adequate maintenance is being performed on all critical computing, power and cooling systems?

A.Proper background checks on all service personnel are conducted.
B.Service personnel are escorted at all times when performing their work.
C.Maintenance is scheduled during noncritical processing times.
D.Verification of maintenance being performed is done independently.

A

D. Independent verification confirms documented maintenance activities, ensuring their effectiveness in sustaining critical systems. It provides assurance and detects any maintenance process gaps or deficiencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When reviewing a hardware maintenance program, an information systems (IS) auditor should assess whether:

A.the schedule of all unplanned maintenance is maintained.
B.it is in line with historical trends.
C.it has been approved by the IS steering committee.
D.the program is validated against vendor specifications.

A

D. Although maintenance requirements vary based on complexity and performance workloads, a hardware maintenance schedule should be validated against the vendor-provided specifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An information systems (IS) auditor has been tasked by an automated manufacturing facility for the risk-based audit of its distributed control supervisory control and data acquisition (SCADA) systems. Which of the following should be the PRIMARY task for the auditor?

A.Evaluation of communication architecture and connectivity interfaces
B.Evaluation of functioning of monitoring terminals, sensors and actuators
C.Assessment of total cost of ownership (TCO) for the SCADA systems
D.Evaluation of usability of automated controls for enterprise engineers

A

A. Communication channels over the Internet and even USB interfaces in air-gapped systems increase the risk of malware exposure (e.g., Stuxnet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When reviewing the desktop software compliance of an organization, the information systems (IS) auditor should be MOST concerned if the installed software:

A.is installed, but not documented in the IT department records.
B.is being used by users not properly trained in its use.
C.is not listed in the approved software standards document.
D.has a license that will expire in the next 15 days.

A

C. Installing software not allowed by policy is a serious violation and can put the organization at security, legal and financial risk. Any software that is allowed should be part of a standard software list. This is the first thing to review because this would also indicate compliance with policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An information systems (IS) auditor discovers that some users installed personal software on their PCs. This is not explicitly forbidden by the security policy. The BEST approach for an IS auditor is to recommend that the:

A.IT department implement control mechanisms to prevent unauthorized software installation.
B.security policy be updated to include the specific language regarding unauthorized software.
C.IT department prohibit the download of unauthorized software.
D.users obtain approval from an IS manager before installing nonstandard software.

A

B. Lack of specific language addressing unauthorized software in the acceptable use policy is a weakness in administrative controls. The policy should be reviewed and updated to address the issue—and provide authority for the IT department to implement technical controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An information systems (IS) auditor conducting a review of software usage and licensing discovers that numerous PCs contain unauthorized software. Which of the following actions should the IS auditor take?

A.Delete all copies of the unauthorized software.
B.Recommend an automated process to monitor for compliance with software licensing.
C.Report the use of the unauthorized software and the need to prevent recurrence.
D.Warn the end users about the risk of using illegal software.

A

C. The use of unauthorized or illegal software should be prohibited by an organization. An IS auditor must convince the user and management of the risk and the need to eliminate the risk. For example, software piracy can result in exposure and severe fines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a MAJOR concern during a review of help desk activities?

A.The help desk team could not resolve certain calls.
B.A dedicated line is not assigned to the help desk team.
C.Resolved incidents are closed without reference to end users.
D.The help desk instant messaging has been down for more than six months.

A

C. The help desk function is a service-oriented unit. The end users must be advised before an incident can be regarded as closed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Although management has stated otherwise, an information systems (IS) auditor has reasons to believe that the organization is using software that is not licensed. In this situation, the IS auditor should FIRST:

A.include the statement from management in the audit report.
B.verify that the software is in use through testing.
C.include the item in the audit report.
D.discuss the issue with senior management because it could have a negative impact on the organization.

A

B. When there is an indication that an organization might be using unlicensed software, the information systems (IS) auditor should obtain sufficient evidence before including it in the report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a network diagnostic tool that monitors and records network information?

A.Online monitor
B.Downtime report
C.Help desk report
D.Protocol analyzer

A

D. Protocol analyzers are network diagnostic tools that monitor and record network information from packets traveling in the link to which the analyzer is attached.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

During an assessment of software development practices, an information systems (IS) auditor finds that open-source software components were used in an application designed for a client. What is the GREATEST concern that the auditor has about the use of open-source software?

A.The client did not pay for the open-source software components.
B.The organization and client must comply with open-source software license terms.
C.Open-source software has security vulnerabilities.
D.Open-source software is unreliable for commercial use.

A

B. There are many types of open-source software licenses and each has different terms and conditions. Some open-source software licensing allows use of the open-source software component freely but requires that the completed software product must also allow the same rights. This is known as viral licensing, and if the development organization is not careful, its products can violate licensing terms by selling the product for profit. The information systems (IS) auditor should be most concerned with open-source software licensing compliance to avoid unintended intellectual property risk or legal consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An information systems (IS) auditor has been assigned to conduct a test that compares job run logs to computer job schedules. Which of the following observations would be the GREATEST concern to the IS auditor?

A.There are a growing number of emergency changes.
B.There were instances when some jobs were not completed on time.
C.There were instances when some jobs were overridden by computer operators.
D.Evidence shows that only scheduled jobs were run.

A

C. The overriding of computer processing jobs by computer operators can lead to unauthorized changes to data or programs. This is a control concern; thus, it is always critical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following BEST helps to detect errors in data processing?

A.Programmed edit checks
B.Well-designed data entry screens
C.Separation of duties
D.Hash totals

A

D. The use of hash totals is an effective method to reliably detect errors in data processing. A hash total indicates an error in data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A batch transaction job failed in production; however, the same job returned no issues during user acceptance testing (UAT). Analysis of the production batch job indicates that it was altered after UAT. What control provides a mitigation for this risk?

A.Improve regression test cases.
B.Activate audit trails for a limited period after release.
C.Conduct an application user access review.
D.Implement a segregation/separation of duties (SoD) policy.

A

D. To ensure proper segregation/separation of duties (SoD), developers should be restricted to the development environment only. If code needs to be modified after user acceptance testing, the process must be restarted in development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is the BEST method for an information systems (IS) auditor to verify that critical production servers are running the latest security updates released by the vendor?

A.Ensure that automatic updates are enabled on critical production servers.
B.Verify manually that the patches are applied on a sample of production servers.
C.Review the change management log for critical production servers.
D.Run an automated tool to verify the security patches on production servers.

A

D. An automated tool can immediately provide a report on which patches have been applied and which are missing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following allows software systems or applications to access and interact with a cloud-based infrastructure or service provider?

A.Simple Network Management Protocol (SNMP)
B.Remote procedure call
C.Circuit-level gateway
D.Application programming interface (API)

A

D. An application programming interface (API) allows software systems or applications to access and interact with a cloud-based infrastructure or service provider. APIs provide a set of rules and protocols that enable developers to integrate their applications with cloud services, access resources and perform various operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A consulting firm created a file transfer protocol (FTP) site for the purpose of receiving financial data and communicated the site’s address, user ID and password to the financial services enterprise in separate email messages. The enterprise is to transmit its data to the FTP site after manually encrypting the data. The information systems (IS) auditor’s GREATEST concern with this process is that:

A.The users may not remember to manually encrypt the data before transmission.
B.The site credentials were sent to the financial services enterprise via email.
C.Personnel at the consulting firm may obtain access to sensitive data.
D.The use of a shared user ID to the FTP site does not allow for user accountability.

A

A. If the data is not encrypted, an unauthorized external party may download sensitive enterprise data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In a distributed system, which of the following BEST allows different components or modules to communicate and coordinate their activities?

A.Message queue interface
B.Application programming interface (API)
C.Remote procedure call
D.Communication infrastructure interface

A

B. An application programming interface (API) allows components or modules in a distributed system to communicate and coordinate their activities. An API defines a set of rules and protocols that enable the interaction and exchange of data between software components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following is a prevalent risk in the development of end-user computing applications?

A.Applications may not be subject to testing and IT general controls.
B.Development and maintenance costs may be increased.
C.Application development time may be increased.
D.Decision-making may be impaired due to diminished responsiveness to requests for information.

A

A. End-user computing is defined as the ability of end users to design and implement their own information system using computer software products. End-user developed applications may not be subjected to an independent outside review by systems analysts and frequently are not created in the context of a formal development methodology. These applications may lack appropriate standards, controls, quality assurance procedures and documentation. A risk of end-user applications is that management may rely on them as much as traditional applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An information systems (IS) auditor is evaluating network performance for an organization that is considering increasing its Internet bandwidth due to a performance degradation during business hours. Which of the following is MOST likely the cause of the performance degradation?

A.Malware on servers
B.Firewall misconfiguration
C.Increased spam received by the email server
D.Unauthorized network activities

A

D. Unauthorized network activities—such as employee use of file or music sharing sites, online gambling or personal email containing large files or photos—can contribute to network performance issues. Because the information systems (IS) auditor found the degraded performance during business hours, this is the most likely cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

An employee received a digital photo frame as a gift and connected it to his/her work PC to transfer digital photos. The PRIMARY risk that this scenario introduces is that:

A.the photo frame storage media can be used to steal enterprise data.
B.the drivers for the photo frame may be incompatible and crash the user’s PC.
C.the employee may bring inappropriate photographs into the office.
D.the photo frame can be infected with malware.

A

D. Any storage device can be a vehicle for infecting other computers with malware. Some devices have been found to be infected in the factory during the manufacturing process. Controls should exist to prohibit employees from connecting any storage media devices to their enterprise-issued PCs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Business units are concerned about the performance of a newly implemented system. Which of the following should an information systems (IS) auditor recommend?

A.Develop a baseline and monitor system usage.
B.Define alternate processing procedures.
C.Prepare the maintenance manual.
D.Implement the changes users have suggested.

A

A. An information systems (IS) auditor should recommend the development of a performance baseline and monitor the system’s performance against the baseline to develop empirical data upon which decisions for modifying the system can be made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

While reviewing the process for continuous monitoring of the capacity and performance of IT resources, an information systems (IS) auditor should PRIMARILY ensure that the process is focused on which of the following?

A.Adequately monitoring service levels of IT resources and services
B.Providing data to enable timely planning for capacity and performance requirements
C.Providing accurate feedback on IT resource capacity
D.Properly forecasting performance, capacity and throughput of IT resources

A

C. Accurate capacity monitoring of IT resources is a critical element of a continuous monitoring process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following must exist to ensure the viability of a duplicate information processing facility (IPF)?

A.The site is near the primary site to ensure quick and efficient recovery.
B.The site contains the most advanced hardware available.
C.The workload of the primary site is monitored to ensure adequate backup is available.
D.The hardware is tested when it is installed to ensure it is working properly.

A

C. Resource availability must be assured. The workload of the primary site must be monitored to ensure that availability at the alternate site for emergency backup use is sufficient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Contractual provisions for a hot, warm or cold site should PRIMARILY cover which of the following considerations?

A.Physical security measures
B.Total number of subscribers
C.Number of subscribers permitted to use a site at one time
D.References by other users

A

C. The contract should specify the number of subscribers permitted to use the site at any one time. The contract can be written to give preference to certain subscribers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is MOST directly affected by network performance monitoring tools?

A.Integrity
B.Availability
C.Completeness
D.Confidentiality

A

B. Network monitoring tools allow observation of network performance and problems. This allows the administrator to take corrective action when network problems are observed. Therefore, the characteristic most directly affected by network monitoring is availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

While reviewing the IT infrastructure, an information systems (IS) auditor notices that storage resources are continuously being added. The IS auditor should:

A.recommend the use of disk mirroring.
B.review the adequacy of offsite storage.
C.review the capacity management process.
D.recommend the use of a compression algorithm.

A

C. Capacity management is the planning and monitoring of computer resources to ensure that available IT resources are used efficiently and effectively. This looks at capacity from a strategic viewpoint and allows a plan to forecast and purchase additional equipment in a planned manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

An organization implemented an online customer help desk application using a software as a service (SaaS) operating model. An information systems (IS) auditor is asked to recommend the best control to monitor the service level agreement (SLA) with the SaaS vendor regarding availability. What is the BEST recommendation that the IS auditor can provide?

A.Ask the SaaS vendor to provide a weekly report on application uptime.
B.Implement an online polling tool to monitor the application and record outages.
C.Log all application outages reported by users and aggregate the outage time weekly.
D.Contract an independent third party to provide weekly reports on application uptime.

A

B. Implementing an online polling tool to monitor and record application outages is the best option for an organization to monitor the software as a service application availability. Comparing internal reports with the vendor’s service level agreement (SLA) reports ensures that the vendor’s monitoring of the SLA is accurate and that all conflicts are appropriately resolved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

When reviewing system parameters, an information systems (IS) auditor’s PRIMARY concern should be that:

A.they are set to meet both security and performance requirements.
B.changes are recorded in an audit trail and periodically reviewed.
C.changes are authorized and supported by appropriate documents.
D.access to parameters in the system is restricted.

A

A. The primary concern is to find the balance between security and performance. Recording changes in an audit trail and periodically reviewing them is a detective control; however, if parameters are not set according to business rules, monitoring of changes may not be an effective control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Doing which of the following during peak production hours can result in unexpected downtime?

A.Performing data migration
B.Performing preventive maintenance on electrical systems
C.Promoting applications from development to the staging environment
D.Reconfiguring a standby router in the data center

A

B. Preventive maintenance activities should be scheduled for nonpeak times of the day, and preferably during a maintenance window time period. A mishap or incident caused by a maintenance worker can result in unplanned downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A lower recovery time objective (RTO) results in:

A.higher disaster tolerance.
B.higher cost.
C.reduced system interruptions.
D.more permissive data loss.

A

B. recovery time objective (RTO) is based on the acceptable down time in case of a disruption of operations. The lower the RTO, the higher the cost of recovery strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

An information systems (IS) auditor needs to review the procedures used to restore a software application to its state prior to an upgrade. Therefore, the auditor needs to assess the following:

A.Problem management procedures
B.Software development procedures
C.Back-out procedures
D.Incident management procedures

A

C. Back-out procedures are used to restore a system to a previous state and are an important element of the change control process. The other choices are not related to the change control process, which specifies what procedures should be followed when software is being upgraded but does not work and requires a fallback to its former state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following is widely accepted as one of the critical components in networking management?

A.Configuration and change management
B.Topological mappings
C.Application of monitoring tools
D.Proxy server troubleshooting

A

A. Configuration management is widely accepted as one of the key components of any network because it establishes how the network will function internally and externally. It also deals with the management of configuration and monitoring performance. Change management ensures that the setup and management of the network are done properly, including managing changes to the configuration, removing default passwords and possibly hardening the network by disabling unneeded services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following BEST limits the impact of server failures in a distributed environment?

A.Redundant pathways
B.Clustering
C.Dial backup lines
D.Standby power

A

B. Clustering allows two or more servers to work as a unit so that when one of them fails, the other takes over.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

While conducting an audit on the customer relationship management application, the information systems (IS) auditor observes that it takes a significantly long time for users to log on to the system during peak business hours as compared with other times of the day. After a user is logged on, the average response time for the system is within acceptable limits. Which of the following choices should the IS auditor recommend?

A.No action should be taken because the system meets current business requirements.
B.IT should increase the network bandwidth to improve performance.
C.Users should be provided with detailed manuals to use the system properly.
D.Establish performance measurement criteria for the authentication servers.

A

D. Performance criteria for the authentication servers would help to quantify acceptable thresholds for system performance, which can be measured and remediated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following BEST ensures that users have uninterrupted access to a critical, heavily used web-based application?

A.Disk mirroring
B.redundant array of inexpensive disks (RAID)
C.Dynamic domain name system (DNS)
D.Load balancing

A

D. Load balancing distributes traffic across multiple servers, ensuring uninterrupted system availability and consistent response time for web applications. It also redirects traffic to functional servers if a server fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The PRIMARY benefit of an IT manager monitoring technical capacity is to:

A.identify the need for new hardware and storage procurement.
B.determine the future capacity need based on usage.
C.ensure that the service level requirements are met.
D.ensure that systems operate at optimal capacity.

A

C. Capacity monitoring has multiple objectives; however, the primary objective is to ensure compliance with the internal service level agreement between the business and IT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following should the information systems (IS) auditor review to ensure that servers are optimally configured to support processing requirements?

A.Benchmark test results
B.Server logs
C.Downtime reports
D.Server utilization data

A

D. Monitoring server utilization identifies underused servers and monitors overall server utilization. Underused servers do not provide the business with optimal cost-effectiveness. By monitoring server usage, IT management can take appropriate measures to raise the utilization ratio and provide the most effective return on investment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

If the recovery time objective (RTO) increases:

A.the disaster tolerance increases.
B.the cost of recovery increases.
C.a cold site cannot be used.
D.the data backup frequency increases.

A

A. The longer the recovery time objective (RTO), the higher the disaster tolerance. The disaster tolerance is the amount of time the business can afford to be disrupted before resuming critical operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which of the following is the BEST method to ensure that critical IT system failures do not reoccur?

A.Invest in redundant systems.
B.Conduct a follow-up audit.
C.Monitor system performance.
D.Perform root cause analysis.

A

D. Root cause analysis determines the key reason an incident has occurred and allows for appropriate corrections that will help prevent the incident from recurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

An information systems (IS) auditor determined that the IT manager recently changed the vendor that is responsible for performing maintenance on critical computer systems to cut costs. Although the new vendor is less expensive, the new maintenance contract specifies a change in incident resolution time specified by the original vendor. Which of the following should be the GREATEST concern to the IS auditor?

A.Disaster recovery plans (DRPs) may be invalid and need to be revised.
B.Transactional business data may be lost in the event of system failure.
C.The new maintenance vendor is not familiar with the organization’s policies.
D.Application owners were not informed of the change.

A

D. The greatest risk of making a change to the maintenance of critical systems is that the change can have an adverse impact on a critical business process. Although there is a benefit in selecting a less expensive maintenance vendor, the resolution time must be aligned with the needs of the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which of the following is MOST useful for effective security log management?

A.Implementing automated tools to collect, analyze and retain logs
B.Archiving and storing logs indefinitely to ensure historical data availability
C.Collecting all logs from all systems, databases, devices and tools
D.Security manager reviewing logs daily to detect and respond to security incidents

A

A. Effective security log management involves automated tools and processes to collect, analyze and retain logs from various systems and devices within an organization’s IT infrastructure. Automated log management solutions help streamline the log collection process, centralize logs from different sources, apply real-time analysis techniques to identify security incidents and retain logs for an appropriate period based on regulatory and compliance requirements. Automated tools can process large volumes of log data and identify abnormal patterns or suspicious activities that a human analyst might miss. These tools can also generate alerts in real time when they detect potential security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which of the following would be the MOST appropriate recovery strategy for a sensitive system with a high recovery time objective (RTO)?

A.Warm site
B.Hot site
C.Cold site
D.Mobile recovery site

A

C. Sensitive systems having a high RTO can be performed manually at a tolerable cost for an extended period of time. The cold site is the most cost-effective solution for such a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

During an audit of a small organization that provides medical transcription services, an information systems (IS) auditor observes several issues related to the backup and restore process. Which of the following should be the auditor’s GREATEST concern?

A.Restoration testing for backup media is not performed; however, all data restore requests have been successful.
B.The policy for data backup and retention has not been reviewed by the business owner for the past three years.
C.The organization stores transcription backup media offsite using a third-party service provider that inventories backups annually.
D.Failed backup alerts for the marketing department data files are not followed up on or resolved by the IT administrator.

A

C. Losing a backup medium is a major incident for an organization handling confidential patient data. Privacy laws impose severe penalties, and mandated reporting requirements can harm the organization’s reputation. To ensure proper backup handling, the organization should conduct audit tests, including frequent physical inventories and evaluating controls at the third-party provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

The FIRST step in the execution of a problem management mechanism should be:

A.issue analysis.
B.exception ranking.
C.exception reporting.
D.root cause analysis.

A

C. The reporting of operational issues is normally the first step in tracking problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

An information systems (IS) auditor observed that users are occasionally granted the authority to change system data. This elevated system access yet is required for smooth functioning of business operations. Which of the following controls does the IS auditor MOST likely recommend for long-term resolution?

A.Redesign the controls related to data authorization.
B.Implement additional separation of duties controls.
C.Review policy to see if a formal exception process is required.
D.Implement additional logging controls.

A

C. If the users are granted access to change data in support of the business requirements, the policy should be followed. If there is no policy for the granting of extraordinary access, then one should be designed to ensure that no unauthorized changes are made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A clerk changed the interest rate for a loan on a master file. The rate entered is outside the normal range for such a loan. Which of the following controls is MOST effective in providing reasonable assurance that the change was authorized?

A.The system will not process the change until the clerk’s manager confirms the change by entering an approval code.
B.The system generates a weekly report listing all rate exceptions and the report is reviewed by the clerk’s manager.
C.The system requires the clerk to enter an approval code.
D.The system displays a warning message to the clerk.

A

A. Requiring an approval code by a manager prevents or detects the use of an unauthorized interest rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

An information systems (IS) auditor is assisting in the design of the emergency change control procedures for an organization with a limited budget. Which of the following recommendations BEST helps to establish accountability for the system support personnel?

A.Production access is granted to the individual support ID when needed.
B.Developers use a firefighter ID to promote code to production.
C.A dedicated user promotes emergency changes to production.
D.Emergency changes are authorized prior to promotion.

A

A. Production access should be controlled and monitored to ensure separation of duties. During an emergency change, a user who normally does not have access to production may require access. The best process to ensure accountability within the production system is to have the information security team create a production support group and add the user ID to that group to promote the change. When the change is complete the ID can be removed from the group. This process ensures that activity in production is linked to the specific ID that was used to make the change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which of the following processes should an information systems (IS) auditor recommend to assist in the recording of baselines for software releases?

A.user acceptance testing (UAT)
B.Backup and recovery
C.Incident management
D.Configuration management

A

D. The configuration management process may include automated tools that provide an automated recording of software release baselines. If the new release fails, the baseline will provide a point to which to return.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

In a small organization, developers may release emergency changes directly to production. Which of the following will BEST control the risk in this situation?

A.Approve and document the emergency changes promptly after release.
B.Implement a segregated environment for production access and restrict developer access outside of specific time frames.
C.Implement a defined emergency change management process that includes secondary approval.
D.Implement strict access controls and permissions on the production machine to prevent unauthorized changes.

A

A. It may be appropriate to allow programmers to make emergency changes if they are documented and approved after the fact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

An organization recently installed a security patch that crashed the production server. To minimize the probability of this occurring again, an information systems (IS) auditor should:

A.apply the patch according to the patch’s release notes.
B.ensure that a good change management process is in place.
C.thoroughly test the patch before sending it to production.
D.approve the patch after doing a risk assessment.

A

B. An IS auditor must review the change management process, including patch management procedures, and verify that the process has adequate controls and make suggestions accordingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Recovery procedures for an information processing facility (IPF) are BEST based on:

A.recovery time objective (RTO)
B.recovery point objective (RPO)
C.maximum tolerable outage (MTO)
D.information security policy.

A

A. The recovery time objective (RTO) is the amount of time allowed for the recovery of a business function or resource after a disaster occurs; the RTO is the desired recovery time frame based on maximum tolerable outage (MTO) and available recovery alternatives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which of the following is the MOST efficient and sufficiently reliable way to test the design effectiveness of a change control process?

A.Test a sample population of change requests.
B.Test a sample of authorized changes.
C.Interview personnel in charge of the change control process.
D.Perform an end-to-end walk-through of the process.

A

D. Observation is the best and most effective method to test changes to ensure that the process is effectively designed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

The MOST effective audit procedure in determining if unauthorized changes have been made to production code is to:

A.examine the change control system records and trace them forward to object code files.
B.review access control permissions operating within the production program libraries.
C.examine object code to find instances of changes and trace them back to change control records.
D.review change approved designations established within the change control system.

A

C. The procedure of examining object code files to establish instances of code changes and tracing these back to change control system records is a substantive test that directly addresses the risk of unauthorized code changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

An information systems (IS) auditor is carrying out a system configuration review. Which of the following is the BEST evidence in support of the current system configuration settings?

A.System configuration values that are imported to a spreadsheet by the system administrator
B.Standard report with configuration values that are retrieved from the system by the information systems (IS) auditor
C.Dated screenshot of the system configuration settings that are made available by the system administrator
D.Annual review of approved system configuration values by the business owner

A

B. Evidence that is obtained directly from the source by an IS auditor is more reliable than information that is provided by a system administrator or a business owner because the IS auditor does not have a vested interest in the outcome of the audit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Vendors have released patches fixing security flaws in their software. Which of the following should an information systems (IS) auditor recommend in this situation?

A.Assess the impact of patches prior to installation.
B.Ask the vendors for a new software version with all fixes included.
C.Install the security patch immediately.
D.Decline to deal with these vendors in the future.

A

A. The effect of installing the patch should be immediately evaluated, and installation should occur based on the results of the evaluation. There are numerous cases where a patch from one vendor has affected other systems; therefore, testing the patches as much as possible before rolling them out to the entire organization is necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

During fieldwork, an information systems (IS) auditor experienced a system crash caused by a security patch installation. To provide reasonable assurance that this event will not recur, the IS auditor should ensure that:

A.only systems administrators perform the patch process during nonbusiness hours.
B.the client’s change management and patching processes have proper controls.
C.patches are validated using parallel testing in production.
D.an approval process of the patch, including a risk assessment, is developed.

A

B. The change management process, which includes procedures regarding implementing changes during production hours, helps to ensure that this type of event does not recur. An information systems (IS) auditor should review the change management process, including patch management procedures, to verify that the process has adequate controls and to make suggestions accordingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

During an audit of a small enterprise, the information systems (IS) auditor noted that the IS director has superuser-privilege access that allows the director to process requests for changes to the application access roles (access types). Which of the following should the IS auditor recommend?

A.Implement a properly documented process for application role change requests.
B.Hire additional staff to provide a separation of duties for application role changes.
C.Implement an automated process for changing application roles.
D.Document the current procedure in detail and make it available on the enterprise intranet.

A

A. The information systems (IS) auditor should recommend implementation of a process that can prevent or detect improper changes from being made to the major application roles. The application role change request process should start and be approved by the business owner; then, the IS director can make the changes to the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Which of the following is a control that can be implemented to reduce risk of internal fraud if application programmers are allowed to move programs into the production environment in a small enterprise?

A.Post-implementation functional testing
B.Registration and review of changes
C.Validation of user requirements
D.User acceptance testing (UAT)

A

B. An independent review of the changes to the program in production can identify potential unauthorized changes, versions or functionality that the programmer put into production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

When auditing a database environment, an information systems (IS) auditor will be MOST concerned if the database administrator (DBA) is performing which of the following functions?

A.Performing database changes according to change management procedures
B.Installing patches or upgrades to the operating system
C.Sizing table space and consulting on table join limitations
D.Performing backup and recovery procedures

A

B. Installing patches or upgrades to the operating system is a function that should be performed by a systems administrator, not by a DBA. If a DBA is performing this function, there is risk based on inappropriate separation of duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A vendor released several critical security patches over the past few months, which put a strain on the ability of the administrators to keep the patches tested and deployed in a timely manner. The administrators asked if they could reduce the testing of the patches. What approach should the organization take?

A.Continue the current process of testing and applying patches.
B.Reduce testing and ensure that an adequate back-out plan is in place.
C.Delay patching until resources for testing are available.
D.Rely on the vendor’s testing of the patches.

A

A. Applying security software patches promptly is critical to maintaining the security of the servers; further, testing the patches is important because the patches may affect other systems and business operations. Because the vendor recently released several critical patches in a short time, the organization may choose to wait to see if this is a temporary problem before making a revision to policy or procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

An information systems (IS) auditor has discovered that a new patch is available for an application, but the IT department has decided that the patch is not needed because other security controls are in place. What should the IS auditor recommend?

A.Apply the patch only after it has been thoroughly tested.
B.Implement a host-based intrusion detection system (IDS).
C.Modify the firewall rules to further protect the application server.
D.Assess the overall risk, then recommend whether to deploy the patch.

A

D. Although it is important to ensure that systems are properly patched, a risk assessment needs to be performed to determine the likelihood and probability of the vulnerability being exploited. Therefore, the patch is applied only if the risk of circumventing the existing security controls is great enough to warrant it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

An information systems (IS) auditor discovers that developers have operator access to the command line of a production environment operating system. Which of the following controls would BEST mitigate the risk of undetected and unauthorized program changes to the production environment?

A.Commands typed on the command line are logged.
B.Hash keys are calculated periodically for programs and matched against hash keys calculated for the most recent authorized versions of the programs.
C.Access to the operating system command line is granted through an access restriction tool with preapproved rights.
D.Software development tools and compilers have been removed from the production environment.

A

B. Periodically matching hash keys enables the detection of changes to files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

An information systems (IS) auditor is asked to audit the change management process for all IT operational systems. Which of the following documents will BEST aid the auditor in defining the scope for the audit project?

A.Enterprise architecture (EA)
B.Control catalog
C.Risk register
D.IT organizational chart

A

A. The enterprise architecture (EA) document provides the IT-environment information that the information systems (IS) auditor needs to be able to define the scope of the audit on the change management process for all IT systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

The purpose of code signing is to provide assurance that:

A.the software has not been subsequently modified.
B.the application can safely interface with another signed application.
C.the signer of the application is trusted.
D.the private key of the signer has not been compromised.

A

A. Code signing ensures that the executable code came from a reputable source and has not been modified after being signed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Emergency changes that bypass the normal change control process are MOST acceptable if:

A.management reviews and approves the changes after they have occurred.
B.the changes are reviewed by a peer at the time of the change.
C.the changes are documented in the change control system by the operations department.
D.management has preapproved all emergency changes.

A

A. Because management cannot always be available when a system failure occurs, it is acceptable for changes to be reviewed and approved within a reasonable time period after they occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

An auditor conducting an audit of controls in an IT environment will perform substantive tests for the controls implemented after:

A.the control is automated using technical tools.
B.the original control design has been changed during implementation.
C.confirming the control is designed to mitigate risk.
D.confirming the control is implemented as designed.

A

D. Substantive testing is performed after compliance testing that verifies that the control is implemented as designed. If the compliance test fails, the auditor may not perform substantive testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Which of the following tests performed by an information systems (IS) auditor is the MOST effective in determining compliance with organizational change control procedures?

A.Review software migration records and verify approvals.
B.Identify changes that have occurred and verify approvals.
C.Review change control documentation and verify approvals.
D.Ensure that only appropriate staff can migrate changes into production.

A

B. The most effective method is to determine what changes have been made (check logs and modified dates) and then verify that they have been approved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

During the review of data file change management controls, which of the following BEST helps to decrease the research time needed to investigate exceptions?

A.One-for-one checking
B.Data file security
C.Transaction logs
D.File updating and maintenance authorization

A

C. Transaction logs generate an audit trail by providing a detailed list of date of input, time of input, user ID, terminal location, etc. Research time can be reduced in investigating exceptions because the review can be performed on the logs rather than on the entire transaction file. Transaction logs also help to determine which transactions have been posted to an account—by a particular individual during a particular period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

An information systems (IS) auditor evaluates the effectiveness of the change management process in an organization. What is the MOST important control that the IS auditor should look for to ensure system availability?

A.Changes are authorized by IT managers at all times.
B.User acceptance testing (UAT) is performed and properly documented.
C.Test plans and procedures exist and are closely followed.
D.Capacity planning is performed as part of each development project.

A

C. The most important control for ensuring system availability is to implement a sound test plan and procedures that are followed consistently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

An enterprise uses privileged accounts to process configuration changes for mission-critical applications. Which of the following is the BEST and appropriate control to limit the risk in such a situation?

A.Ensure that audit trails are accurate and specific.
B.Ensure that personnel have adequate training.
C.Ensure that personnel background checks are performed for critical personnel.
D.Ensure that supervisory approval and review are performed for critical changes.

A

D. Supervisory approval and review of critical changes by accountable managers are necessary to prevent and detect unauthorized changes. They ensure separation of duties and safeguard against unauthorized attempts by employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Which of the following is a KEY benefit of using version control systems in configuration and release management?

A.Manages complexity in code management
B.Eases collaboration with multiple developers
C.Limits accessibility for developers
D.Provides ability to track and revert changes

A

D. Using version control systems enables the tracking of code changes, including who made the changes, when they were made and what modifications were implemented. This functionality allows for easy identification of issues, collaboration among developers and the ability to revert to previous versions if needed, promoting better configuration and release management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

The application systems of an organization using open-source software have no single recognized developer producing patches. Which of the following is the MOST secure way of updating open-source software?

A.Rewrite the patches and apply them.
B.Review the code and application of available patches.
C.Develop in-house patches.
D.Identify and test suitable patches before applying them.

A

D. Suitable patches from the existing developers should be selected and tested before applying them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

During the review of an in-house developed application, the GREATEST concern to an information systems (IS) auditor is if a:

A.user raises a change request and tests it in the test environment.
B.programmer codes a change in the development environment and tests it in the test environment.
C.manager approves a change request and then reviews it in production.
D.manager initiates a change request and subsequently approves it.

A

D. Initiating and approving a change request by the same person violates the principle of separation of duties, because one should not approve their own requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

The information systems (IS) auditor observes that the latest security-related software patches for a mission-critical system were released two months ago, but IT personnel have not yet installed the patches. The IS auditor should:

A.review the patch management policy and determine the risk associated with this condition.
B.recommend that IT systems personnel test and then install the patches immediately.
C.recommend that patches be applied every month or immediately upon release.
D.take no action, because the IT processes related to patch management appear to be adequate.

A

A. Reviewing the patch management policy and determining whether the IT department is compliant with the policies will detect whether the policies are appropriate and what risk is associated with current practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

An information systems (IS) auditor is reviewing the change management process for an enterprise resource planning application. Which of the following is the BEST method for testing program changes?

A.Select a sample of change tickets and review them for authorization.
B.Perform a walk-through by tracing a program change from start to finish.
C.Trace a sample of modified programs to support change tickets.
D.Use query software to analyze all change tickets for missing fields.

A

C. Tracing modified programs to change tickets is the best way to test change management controls and detect undocumented changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which of the following is the MOST likely reason an organization implements an emergency change to an application using the emergency change control process?

A.The application owner requested new functionality.
B.Changes are developed using an agile methodology.
C.There is a high probability of a significant impact on operations.
D.The operating system vendor has released a security patch

A

C. Emergency releases are urgent fixes that are implemented to prevent significant user downtime, following specific procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

An information systems (IS) auditor reviewing the application change management process for a large multinational organization should be MOST concerned when:

A.test systems run different configurations than production systems.
B.change management records are paper based.
C.the configuration management database is not maintained.
D.the test environment is installed on the production server

A

C. The configuration management database (CMDB) is used to track configuration item (CI) and the dependencies between them. An out-of-date CMDB in a large multinational organization can result in incorrect approvals being obtained or leave out critical dependencies during the test phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Which of the following BEST helps an information systems (IS) auditor in ensuring that automated data conversion from an old system to a new system has been completed successfully?

A.Operator reports
B.Exception reports
C.Control totals
D.Application logs

A

B. Exception reports are automated reports that identify errors encountered during processing, including transactions that are not converted automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

The reliability of an application system’s audit trail may be questionable if:

A.user IDs are recorded in the audit trail.
B.the security administrator has read-only rights to the audit file.
C.date and time stamps are recorded when an action occurs.
D.users can amend audit trail records when correcting system errors.

A

D. An audit trail is not effective if the details in it can be amended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Which of the following should the information systems (IS) auditor review to ensure the correct version of a data file is used for a production run?

A.Incident or error reports related to the production run
B.Schedules detailing the tasks performed by operators
C.Logs containing relevant system activity and events
D.Reports documenting the distribution of the produced output

A

C. System logs and analysis programs can be used by an information systems (IS) auditor to ensure that the correct file version was used for a production run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Which of the following is a MAJOR challenge in implementing a log management system?

A.Complexity of the IT infrastructure
B.Multiple formats of logs collected
C.Cost of storage due to the volume of logs
D.Addressing false-positive alerts

A

A. Addressing the complexity of the IT resources that generate logs is a major challenge because the performance of many resources deteriorates when logging is enabled. Therefore, it is necessary to determine the type of logs to be captured from each resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Which of the following activities performed by a database administrator (DBA) should be performed by a different person?

A.Deleting database activity logs
B.Implementing database optimization tools
C.Monitoring database usage
D.Defining backup and recovery procedures

A

A. Because database activity logs record activities performed by the database administrator (DBA), deleting them should be performed by an individual other than the DBA. This is a compensating control to aid in ensuring an appropriate separation of duties and is associated with the DBA’s role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Which of the following would an information systems (IS) auditor use to determine if unauthorized modifications were made to production programs?

A.System log analysis
B.Compliance testing
C.Forensic analysis
D.Analytical review

A

B. To determine that only authorized modifications are made to production programs requires the change management process to be reviewed to evaluate the existence of a trail of documentary evidence. Compliance testing helps to verify that the change management process has been applied consistently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Which of the following BEST helps an information systems (IS) auditor to detect the problems encountered by application executions during IT operations?

A.Operating system logs
B.Incident reports
C.Exception reports
D.Computer operator logs

A

C. Exception reports are automated reports that list the problems encountered by the application during execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Which of the following is a MAIN benefit of monitoring operational logs?

A.It provides early warnings of possible risk materialization.
B.It helps information systems (IS) auditors in detecting problems encountered during operations.
C.It gives insight into the health and performance of the IT infrastructure.
D.It provides audit trails for transactions processed during operations.

A

C. Operational log monitoring primarily helps in providing insight about the IT infrastructure and provides data to build performance metrics for various IT resources (e.g., central processing unit (CPU) performance, storage capacity usage, network bandwidth usage and maximum number of transactions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

An information systems (IS) auditor performing an application maintenance audit would review the log of program changes for the:

A.authorization of program changes.
B.creation date of a current object module.
C.number of program changes actually made.
D.creation date of a current source program.

A

A. The auditor wants to ensure that only authorized changes have been made to the application. The auditor would therefore review the log of program changes to verify that all changes have been approved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

During an implementation review of a recent application deployment, it was determined that several incidents were assigned incorrect priorities and, because of this, failed to meet the business service level agreement (SLA). What is the GREATEST concern?

A.The support model was not approved by senior management.
B.The incident resolution of time specified in the SLA is not realistic.
C.There are inadequate resources to support the applications.
D.The support model was poorly developed and implemented contributing to inaccurate prioritization and SLA failures.

A

D. The greatest concern for the information systems (IS) auditor is that the support model was not developed and implemented correctly to prevent or react to potential outages. Incidents can cost the business a significant amount of money and a support model should be implemented with the project. This should be a step within the system development life cycle (SDLC) and procedures and, if it is missed on one project, it may be a symptom of an overall breakdown in process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

When determining the acceptable time period for the resumption of critical business processes:

A.only downtime costs need to be considered.
B.recovery operations should be analyzed.
C.both downtime costs and recovery costs need to be evaluated.
D.indirect downtime costs should be ignored.

A

C. Downtime costs and recovery costs need to be evaluated in determining the acceptable time period before the resumption of critical business processes. The outcome of the business impact analysis should be a recovery strategy that represents the optimal balance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

An organization completed a business impact analysis (BIA) as part of business continuity planning. The NEXT step in the process is to develop:

A.a business continuity strategy.
B.a test and exercise plan.
C.a user training program.
D.the business continuity plan (BCP).

A

A. A business continuity strategy is the next phase because it identifies the best way to recover. The criticality of the business process, the cost, the time required to recover, and security must be considered during this phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Which of the following reports is the MOST appropriate source of information for an information systems (IS) auditor to validate that an (internet service provider (ISP)) has been complying with an enterprise service level agreement for the availability of outsourced telecommunication services?

A.Downtime reports on the telecommunication services generated by the ISP
B.A utilization report of automatic failover services generated by the enterprise
C.A bandwidth utilization report provided by the ISP
D.Downtime reports on the telecommunication services generated by the enterprise

A

D. The enterprise should use internally generated downtime reports to monitor the service provided by the ISP and, as available, to compare with the reports provided by the ISP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

The MAIN purpose of service level management (SLM) is to:

A.set expectations between users and providers.
B.ensure that services are managed to deliver the highest achievable level of availability.
C.keep the costs associated with any service at a minimum.
D.monitor and report any legal noncompliance to business management.

A

A. The objective of service level management (SLM) is to negotiate, document and manage (i.e., provide and monitor) the services in the manner in which the customer requires those services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Which of the following BEST mitigates the risk arising from using reciprocal agreements as a recovery alternative?

A.Perform disaster recovery exercises annually.
B.Ensure that partnering organizations are separated geographically.
C.Regularly perform a business impact analysis (BIA).
D.Select a partnering organization with similar systems.

A

B. If the two partnering organizations are in close geographic proximity, this can lead to both organizations being subjected to the same environmental disaster, such as an earthquake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Determining the service delivery objective (SDO) should be based PRIMARILY on:

A.the minimum acceptable operational capability.
B.the cost-effectiveness of the restoration process.
C.meeting the recovery time objectives (RTOs).
D.the allowable interruption window.

A

A. The service delivery objective (SDO) is the level of service to be reached during the alternate process mode until the normal situation is restored. This is directly related to the business needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

An information systems (IS) auditor reviewing a new outsourcing contract with a service provider would be MOST concerned if which of the following was missing?

A.A clause providing a right to audit the service provider
B.A clause defining penalty payments for poor performance
C.Predefined service level report templates
D.A clause regarding supplier limitation of liability

A

A. The absence of a right to audit clause or other forms of attestation that the supplier is compliant with a certain standard would potentially prevent the information systems (IS) auditor from investigating any aspect of supplier performance moving forward, including control deficiencies, poor performance, and adherence to legal requirements. The absence of this clause would be a major concern for the IS auditor because it would be difficult for the organization to assess whether the appropriate controls were implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

During an HR audit, an information systems (IS) auditor is informed that there is a verbal agreement between the IT and HR departments about the level of IT services expected. In this situation, what should the IS auditor do FIRST?

A.Postpone the audit until the agreement is documented.
B.Report the existence of the undocumented agreement to senior management.
C.Confirm the content of the agreement with both departments.
D.Draft a service level agreement for the two departments.

A

C. An information systems (IS) auditor should first confirm and understand the current practice before making any recommendations. Part of this is to ensure that both parties agree with the terms of the agreement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

An information systems (IS) auditor of a health care organization is reviewing contractual terms and conditions of a third-party cloud provider being considered to host patient health information. Which of the following contractual terms is the GREATEST risk to the customer organization?

A.Data ownership is retained by the customer organization.
B.The third-party provider reserves the right to access data to perform certain operations.
C.Bulk data withdrawal mechanisms are undefined.
D.The customer organization is responsible for backup, archiving and restoration.

A

B. Organizations must review the regulatory environment in which the cloud provider operates because it may have requirements or restrictions of its own. Some service providers reserve the right to access customer information (third-party access) to perform certain transactions and provide certain services. In the case of protected health information, regulations may restrict certain access. Organizations must then determine whether the cloud provider provides appropriate controls to ensure data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

An organization is considering using a new IT service provider. From an audit perspective, which of the following is the MOST important item to review?

A.References from other clients for the service provider
B.The physical security of the service provider site
C.The proposed service level agreement (SLA) with the service provider
D.Background checks of the service provider’s employees

A

C. An SLA is a guarantee that the provider will deliver the services according to the contract. When contracting with a service provider, it is a good practice to enter into an SLA with the provider. The information systems (IS) auditor will want to ensure that performance and security requirements are clearly stated in the SLA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Which of the following issues should be a MAJOR concern to an information systems (IS) auditor who is reviewing a service level agreement (SLA)?

A.A service adjustment resulting from an exception report took a day to implement.
B.The complexity of application logs used for service monitoring made the review difficult.
C.Key performance indicators (KPIs) were not included in the SLA.
D.The document is updated on an annual basis.

A

C. Lack of service measures, such as key performance indicators (KPIs), makes it difficult to gauge the efficiency and effectiveness of the IT services being provided. Although KPIs can vary based on the nature of the service and the agreement between parties, commonly included KPIs in SLAs include response time, uptime, service reliability, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

A laptop computer belonging to an enterprise database administrator (DBA) and containing a file of production database passwords has been stolen. What should the organization do FIRST?

A.Send a report to the information systems (IS) audit department.
B.Change the name of the database administrator (DBA) account.
C.Suspend the DBA account.
D.Change the database password.

A

D. The password should be changed immediately because there is no way to know whether it has been compromised.

103
Q

Which of the following is the MOST effective when determining the correctness of individual account balances migrated from one database to another?

A.Compare the hash total before and after the migration.
B.Verify that the number of records is the same for both databases.
C.Perform sample testing of the migrated account balances.
D.Compare the control totals of all of the transactions.

A

C. Performing sample testing of the migrated account balances involves the comparison of a selection of individual transactions from the database before and after the migration.

104
Q

A database administrator (DBA) has identified a performance problem with some tables, which can be solved through denormalization. This situation will increase the risk of:

A.concurrent access.
B.deadlocks.
C.unauthorized access to data.
D.a loss of data integrity.

A

D. Denormalization compromises the structure that ensures data integrity, leading to an increased risk of data inconsistency and loss of data integrity.

105
Q

During an application audit, an information systems (IS) auditor is asked to provide assurance of the database’s referential integrity. Which of the following should be reviewed?

A.Field definition
B.Master table definition
C.Composite keys
D.Foreign key structure

A

D. Referential integrity in a relational database refers to consistency between coupled (linked) tables. Referential integrity is usually enforced by the combination of a primary key or candidate key (alternate key) and a foreign key. For referential integrity to hold, any field in a table that is declared a foreign key should contain only values from a parent table’s primary key or a candidate key.

106
Q

A new database is being set up in an overseas location to provide information to the general public and to increase the speed at which the information is made available. The overseas database is to be housed at a data center and will be updated in real time to mirror the information stored locally. Which of the following areas of operations should be considered as having the HIGHEST risk?

A.Confidentiality of the information stored in the database
B.The hardware being used to run the database application
C.Backups of the information in the overseas database
D.Remote access to the backup database

A

B. The business objective is to make the information available to the public in a timely manner. Because the database is physically located overseas, hardware failures that are left unfixed can reduce the availability of the system to users.

107
Q

An information systems (IS) auditor finds that a database administrator (DBA) has read-and-write access to production data. The IS auditor should:

A.accept the DBA access as a common practice.
B.assess the controls relevant to the DBA function.
C.recommend the immediate revocation of the DBA access to production data.
D.review user access authorizations approved by the DBA.

A

B. When reviewing privileged accounts, the auditor should look for compensating controls that may address a potential exposure.

108
Q

Which of the following controls provides the GREATEST assurance of database integrity?

A.Audit log procedures
B.Table link/reference checks
C.Query/table access time checks
D.Rollback and rollforward database features

A

B. Performing table link/reference checks serves to detect table linking errors (such as completeness and accuracy of the contents of the database) and, thus, provides the greatest assurance of database integrity.

109
Q

An information systems (IS) auditor analyzing the audit log of a database management system (DBMS) finds that some transactions were partially executed as a result of an error and have not been rolled back. Which of the following transaction processing features has been violated?

A.Consistency
B.Isolation
C.Durability
D.Atomicity

A

D. Atomicity guarantees that either the entire transaction is processed or none of it is.

110
Q

Segmenting a highly sensitive database results in:

A.reduced exposure.
B.reduced threat.
C.less criticality.
D.less sensitivity.

A

A. Segmenting data reduces the quantity of data exposed to a particular vulnerability.

111
Q

If a database is restored using before-image dumps, where should the process begin following an interruption?

A.Before the last transaction
B.After the last transaction
C.At the first transaction after the latest checkpoint
D.At the last transaction before the latest checkpoint

A

A. When using before images, it is important to note that the last transaction in the dump may not have updated the database before the dump was taken.

112
Q

An information systems (IS) auditor finds that database administrators (DBAs) have access to the log location on the database server and the ability to purge logs from the system. What is the BEST audit recommendation to ensure that DBA activity is effectively monitored?

A.Change permissions to prevent DBAs from purging logs.
B.Forward database logs to a centralized log server to which the DBAs do not have access.
C.Require that critical changes to the database are formally approved.
D.Back up database logs to magnetic media.

A

B. To protect the availability and integrity of the database logs, it is most feasible to forward the database logs to a centralized log server to which the DBAs do not have access.

113
Q

Which of the following security measures BEST ensures the integrity of information stored in a data warehouse?

A.Validated daily backups
B.Change management procedures
C.Data dictionary maintenance
D.A read-only restriction

A

D. Applying read-only restriction to a data warehouse prevents data manipulation, because most of the data stored there are historical and do not require changes.

114
Q

During an application audit, the information systems (IS) auditor finds several problems related to corrupt data in the database. Which of the following is a corrective control that the IS auditor should recommend?

A.Define the standards, and closely monitor them for compliance.
B.Ensure that only authorized personnel can update the database.
C.Establish controls to handle concurrent access problems.
D.Proceed with restore procedures.

A

D. Proceeding with restore procedures is a corrective control. Restore procedures can be used to recover databases to their last-known archived version.

115
Q

A database administrator (DBA) who needs to make emergency changes to a database after normal working hours should log in:

A.with their named account to make the changes.
B.with the shared DBA account to make the changes.
C.to the server administrative account to make the changes.
D.to the user’s account to make the changes.

A

A. Logging in using the named user account before using the database administrator (DBA) account provides accountability by noting the person making the changes.

116
Q

During a database review, an information systems (IS) auditor notices that some tables in the database are not normalized. The IS auditor should next:

A.recommend that the database be normalized.
B.review the conceptual data model.
C.review the stored procedures.
D.review the justification.

A

D. If the database is not normalized, the IS auditor should review the justification because, in some situations, denormalization is recommended for performance reasons.

117
Q

Which interface allows different software applications to access and manipulate a relational database management system (RDBMS)?

A.Application programming interface (API)
B.Structured query language (SQL)
C.Object-relational mapping
D.Java database connectivity

A

A. An application programming interface (API) allows different software applications to access and manipulate a relational database management system (RDBMS). The API provides a set of functions, methods or protocols that enable developers to interact with the database, perform queries and manage data.

118
Q

In a relational database with referential integrity, the use of which of the following keys would prevent deletion of a row from a customer table if the customer number of that row is stored with live orders on the orders table?

A.Foreign key
B.Primary key
C.Secondary key
D.Public key

A

A. In a relational database with referential integrity, the use of foreign keys would prevent events such as primary key changes and record deletions, resulting in orphaned relations within the database.

119
Q

Which of the following choices BEST ensures accountability when updating data directly in a production database?

A.Review of audit logs
B.Principle of least privilege
C.Approved validation plan
D.Separation of duties

A

A. Detailed audit logs that contain the user ID of the individual who performed the change and the data before and after the change are the best evidence of database changes. A review of these logs identifies the individual who changed the data (ensuring accountability) and the correctness of the change.

120
Q

What is the BEST backup strategy for a large database with data supporting online sales?

A.Weekly full backup with daily incremental backup
B.Daily full backup
C.Clustered servers
D.Mirrored hard disks

A

D. Mirrored hard disks ensure that all data are backed up to more than one disk so that a failure of one disk will not result in loss of data.

121
Q

Online banking transactions are being posted to the database when processing suddenly comes to a halt. The integrity of the transaction processing is BEST ensured by:

A.database integrity checks.
B.validation checks.
C.input controls.
D.database commits and rollbacks.

A

D. Database commits save completed transaction processing, while rollback reverses partially completed transaction processing if the transaction fails.

121
Q

A new business requirement required changing database vendors. Which of the following areas should the information systems (IS) auditor PRIMARILY examine concerning this implementation?

A.Integrity of the data
B.Timing of the cutover
C.Authorization level of users
D.Normalization of the data

A

A. Critical issues when migrating data from one database to another is the integrity of the data and ensuring that the data are migrated completely and correctly.

122
Q

The objective of concurrency control in a database system is to:

A.restrict updating of the database to authorized users.
B.ensure integrity when two processes attempt to update the same data simultaneously.
C.prevent inadvertent or unauthorized disclosure of data in the database.
D.ensure the accuracy, completeness, and consistency of data.

A

B. Concurrency controls prevent data integrity problems, which can arise when two update processes access the same data item simultaneously.

123
Q

An information systems (IS) auditor is reviewing database security for an organization. Which of the following is the MOST important consideration for database hardening?

A.The default configurations are changed.
B.All tables in the database are denormalized.
C.Stored procedures and triggers are encrypted.
D.The service port used by the database server is changed.

A

A. Default database configurations, such as default passwords and services, need to be changed; otherwise, the database can be easily compromised by malicious code and by intruders.

124
Q

Which of the following should an information systems (IS) auditor recommend for the protection of specific sensitive information stored in a data warehouse?

A.Implement column- and row-level permissions.
B.Enhance user authentication via strong passwords.
C.Organize the data warehouse into subject matter-specific databases.
D.Log user access to the data warehouse.

A

A. Column- and row-level permissions control what information users can access. Column-level security prevents users from seeing one or more attributes on a table. With row-level security, a certain grouping of information on a table is restricted (e.g., if a table held details of employee salaries, then a restriction can be put in place to ensure that, unless specifically authorized, users cannot view the salaries of executive staff). Column- and row-level security can be achieved in a relational database by allowing users to access logical representations of data (views) rather than physical tables. This fine-grained security model is likely to offer the best balance between information protection while still supporting a wide range of analytical and reporting uses.

125
Q

Which of the following situations would increase the likelihood of fraud?

A.Application programmers are implementing changes to data in the production database.
B.Administrators are implementing vendor patches to vendor-supplied software without following change control procedures.
C.Operations support staff members are implementing changes to batch schedules.
D.Database administrators (DBA) are implementing changes to data structures.

A

A. Production programs are used for processing enterprise data. It is imperative that controls on changes to production programs are stringent. Lack of control in this area can result in application programs being modified to manipulate the data.

126
Q

What is the MOST effective control for enforcing accountability among database users who are accessing sensitive information?

A.Implement a log management process.
B.Implement a two-factor authentication.
C.Use table views to access sensitive data.
D.Separate database and application servers.

A

A. Accountability means knowing what is being done by whom. The best way to enforce the principle is to implement a log management process that creates and stores logs with pertinent information, such as username, type of transaction and hour.

127
Q

An information systems (IS) auditor reviewing database controls discovered that changes to the database during normal working hours were handled through a standard set of procedures. However, changes made after normal hours required only an abbreviated number of steps. In this situation, which of the following is considered an adequate set of compensating controls?

A.Allow changes to be made only with the database administrator (DBA) user account.
B.Make changes to the database after granting access to a normal user account.
C.Use the DBA user account to make changes, log the changes and review the change log the following day.
D.Use the normal user account to make changes, log the changes and review the change log the following day.

A

C. The use of a DBA user account is normally set up to log all changes made and is most appropriate for changes made outside of normal hours. The use of a log, which records the changes, allows changes to be reviewed. Because an abbreviated number of steps are used, this represents an adequate set of compensating controls.

128
Q

An information systems (IS) auditor finds out-of-range data in some tables of a database. Which of the following controls should the IS auditor recommend to avoid this situation?

A.Log all table update transactions
B.Implement integrity constraints in the database
C.Implement before and after image reporting
D.Use tracing and tagging

A

B. Implementing integrity constraints in the database is a preventive control because data are checked against predefined tables or rules, which prevents any undefined data from being entered.

129
Q

The information systems (IS) auditor is reviewing an enterprise’s HR database implementation. The IS auditor discovers that the database servers are clustered for high availability, all default database accounts have been removed and database audit logs are kept and reviewed on a weekly basis. What other area should the IS auditor check to ensure that the databases are appropriately secured?

A.Database administrators are restricted from access to HR data.
B.Database logs are encrypted.
C.Database stored procedures are encrypted.
D.Database initialization parameters are appropriate.

A

D. When a database is opened, many of its configuration options are governed by initialization parameters. These parameters are usually governed by a file that contains many settings. The system initialization parameters address many global database settings, including authentication, remote access and other critical security areas. To effectively audit a database implementation, the information systems (IS) auditor must examine the database initialization parameters.

130
Q

An information systems (IS) auditor finds out-of-range data in some tables of a database. Which of the following controls would BEST avoid this situation?

A.Log all table update transactions.
B.Implement before-and-after image reporting.
C.Use tracing and tagging.
D.Implement integrity constraints in the database.

A

D. Implementing integrity constraints in the database is a preventive control because data are checked against predefined tables or rules, preventing any undefined data from being entered.

131
Q

During the audit of a database server, which of the following poses the GREATEST security risk?

A.The password on the administrator account does not expire.
B.Default global security settings for the database remain unchanged.
C.Old data have not been purged.
D.Database activity is not fully logged.

A

B. Default security settings for the database can allow issues such as blank user passwords or passwords that are the same as the username. This poses the greatest security risk.

132
Q

The database administrator (DBA) suggests that database efficiency can be improved by denormalizing some tables. This will result in:

A.loss of confidentiality.
B.increased redundancy.
C.unauthorized accesses.
D.application malfunctions.

A

B. Normalization is a design or optimization process for a relational database that increases redundancy. Redundancy, which is usually considered positive for resource availability, is negative in a database environment because it demands additional and otherwise unnecessary data handling efforts. Denormalization is sometimes advisable for functional reasons.

133
Q

To optimize an organization’s business continuity plan, an information systems (IS) auditor should recommend a business impact analysis to determine:

A.the business processes that generate the most financial value for the organization and, therefore, must be recovered first.
B.the priorities and order for recovery to ensure alignment with the organization’s business strategy.
C.the business processes that must be recovered following a disaster to ensure the organization’s survival.
D.the priorities and order of recovery, which will recover the greatest number of systems in the shortest time frame.

A

C. To ensure the organization’s survival following a disaster, it is important to recover the most critical business processes first.

134
Q

An information systems (IS) auditor is reviewing an organization’s disaster recovery plan (DRP) implementation. The project was completed on time and on budget. During the review, the auditor uncovers several areas of concern. Which of the following presents the GREATEST risk?

A.Testing of the DRP has not been performed.
B.The disaster recovery strategy does not specify the use of a hot site.
C.The business impact analysis (BIA) was conducted, but the results were not used.
D.The disaster recovery project manager for the implementation has recently left the organization.

A

C. The risk of not using the business impact analysis (BIA) results for disaster recovery planning means that the DRP may not be designed to recover the most critical assets in the correct order. As a result, the plan may not be adequate to allow the organization to recover from a disaster.

135
Q

Which of the following groups is the BEST source of information for determining the criticality of application systems as part of a business impact analysis (BIA)?

A.Business processes owners
B.IT management
C.Senior business management
D.Industry experts

A

A. Business process owners have the most relevant information to contribute because the business impact analysis (BIA) is designed to evaluate criticality and recovery timelines, based on business needs.

136
Q

Which of the following distinguishes a business impact analysis (BIA) from a risk assessment?

A.Inventory of critical assets
B.Identification of vulnerabilities
C.Listing of threats
D.Determination of acceptable downtime

A

D. A determination of acceptable downtime is made only in a BIA.

137
Q

As part of the business continuity planning process, which of the following should be identified FIRST in the business impact analysis (BIA)?

A.Risk, such as single point-of-failure and infrastructure risk
B.Threats to critical business processes
C.Critical business processes for ascertaining the priority for recovery
D.Resources required for resumption of business

A

C. The identification of critical business processes should be addressed first so that the priorities and timelines for recovery can be documented.

138
Q

Which of the following is the BEST method for determining the criticality of each application system in the production environment?

A.Interview the application programmers.
B.Perform a gap analysis.
C.Review the most recent application audits.
D.Perform a business impact analysis (BIA).

A

D. A business impact analysis (BIA) gives the impact of the loss of each application. A BIA is conducted with representatives of the business that can accurately describe the criticality of a system and its importance to the business.

139
Q

Which of the following tasks should be performed FIRST when preparing a disaster recovery plan (DRP)?

A.Develop a recovery strategy.
B.Perform a business impact analysis (BIA).
C.Map software systems, hardware and network components.
D.Appoint recovery teams with defined personnel, roles and hierarchy.

A

B. The first step in any disaster recovery plan (DRP) is to perform a BIA.

140
Q

The PRIMARY purpose of a business impact analysis (BIA) is to:

A.define recovery strategies.
B.identify the alternate site.
C.improve recovery testing.
D.calculate the annual loss expectancy.

A

A. One of the primary outcomes of a business impact analysis (BIA) is the recovery time objective (RTO)e and the recovery point objective (RPO), which help in defining the recovery strategies.

141
Q

After completing the business impact analysis (BIA), what is the NEXT step in the business continuity planning process?

A.Test and maintain the plan.
B.Develop a specific plan.
C.Develop recovery strategies.
D.Implement the plan.

A

C. After the business impact analysis (BIA) is completed, the next phase in the BCP development is to identify the various recovery strategies and select the most appropriate strategy for recovering from a disaster that will meet the timelines and priorities defined through the BIA.

142
Q

Which of the following BEST helps prioritize the recovery of IT assets when planning for a disaster?

A.Incident response plan
B.Business impact analysis (BIA)
C.Threat and risk analysis
D.Recovery time objective (RTO)

A

B. Incorporating the business impact analysis (BIA) into the IT disaster recovery planning process is critical to ensure that IT assets are prioritized to align with the business.

143
Q

Which recovery strategy is MOST appropriate for a business with multiple offices within a region and a limited recovery budget?

A.Hot site maintained by the business
B.Commercial cold site
C.Reciprocal arrangement between its offices
D.Third-party hot site

A

C. A reciprocal arrangement among its offices would be most appropriate for a business with many offices within a region. Each office can be designated as a recovery site for some other office. This would be the least expensive approach and would provide an acceptable level of confidence.

144
Q

The MAIN reason for requiring that all computer clocks across an enterprise are synchronized is to:

A.prevent omission or duplication of transactions.
B.ensure smooth data transition from client machines to servers.
C.ensure that email messages have accurate time stamps.
D.support the incident investigation process.

A

D. During an investigation of incidents, audit logs are used as evidence, and the time stamp information in them is useful. If the clocks are not synchronized, investigations will be more difficult, because a timeline of events occurring on different systems might not be easily established.

145
Q

The MAIN criterion for determining the severity level of a service disruption incident is:

A.cost of recovery.
B.negative public opinion.
C.geographic location.
D.downtime.

A

D. The longer the period of time a client cannot be serviced, the greater the severity (impact) of the incident.

146
Q

Which of the following controls is MOST effective in ensuring that production source code and object code are synchronized?

A.Release-to-release source and object comparison reports
B.Library control software restricting changes to source code
C.Restricted access to source code and object code
D.Date and time-stamp reviews of source and object code

A

D. Date and time-stamp reviews of source and object code ensures that the source code, which has been compiled, matches the production object code. This is the most effective way to ensure that the approved production source code is compiled and is the one being used.

147
Q

In evaluating programmed controls over password management, which of the following is the information systems (IS) auditor MOST likely to rely on?

A.Size check
B.Hash total
C.Validity check
D.Field check

A

C. A validity check is the most useful check for the verification of passwords because it verifies that the required format has been used—for example, not using a dictionary word and including nonalphabetical characters. An effective password must have several different types of characters: alphabetical, numeric and special.

148
Q

What is the PRIMARY role of the information systems (IS) auditor in controlling self-assessment programs?

A.Assessor
B.Participant
C.Facilitator
D.Manager

A

C. When CSA programs are established, auditors become internal control professionals and assessment facilitators.

149
Q
A
150
Q

Which of the following reports should an information systems (IS) auditor use to check compliance with a service level agreement’s requirement for uptime?

A.Utilization reports
B.Hardware error reports
C.System logs
D.Availability reports

A

D. information systems (IS) inactivity, such as downtime, is addressed by availability reports. These reports provide the time periods during which the computer was available for utilization by users or other processes.

151
Q

Which of the following would an information systems (IS) auditor consider to be MOST helpful when evaluating the effectiveness and adequacy of a preventive computer maintenance program?

A.System downtime log
B.Vendor reliability figures
C.Regularly scheduled maintenance log
D.Written preventive maintenance schedule

A

A. A system downtime log provides evidence regarding the effectiveness and adequacy of computer preventive maintenance programs. The log is a detective control, but because it is validating the effectiveness of the maintenance program, it is validating a preventive control.

152
Q

An information systems (IS) auditor observed that multiple applications are hosted on the same server. The recovery time objective (RTO) for the server is:

A.based on the application with the longest RTO.
B.based on the application with the shortest RTO.
C.based on the mean of each application’s RTO.
D.independent of the RTO and based on the criticality of the application.

A

B. When several applications are hosted on a server, the server’s RTO must be determined by taking the RTO of the most critical application, which is the shortest RTO.

153
Q

An information systems (IS) auditor is reviewing an organization’s recovery from a disaster in which not all the critical data needed to resume business operations were retained. Which of the following was incorrectly defined?

A.Interruption window
B.Recovery time objective
C.Service delivery objective
D.Recovery point objective

A

D. The recovery point objective (RPO) is determined based on the acceptable data loss in the case of a disruption of operations. RPO defines the point in time from which it is necessary to recover the data and quantifies, in terms of time, the permissible amount of data loss in the case of interruption.

154
Q

During a production system change control audit, an information systems (IS) auditor finds that the change management process is not formally documented and that some migration procedures failed. What should the IS auditor do next?

A.Recommend redesigning the change management process.
B.Gain more assurance on the findings through root cause analysis.
C.Recommend that program migration be stopped until the change process is documented.
D.Document the finding and present it to management.

A

B. A change management process is critical to IT production systems. Before recommending that the organization take any other action (e.g., stopping migrations or redesigning the change management process), the information systems (IS) auditor should gain assurance that the incidents reported are related to deficiencies in the change management process and not caused by some process other than change management.

155
Q

An organization has a business process with a recovery time objective (RTO) equal to zero and a recovery point objective (RPO) close to one minute. This implies that the process can tolerate:

A.a data loss of up to one minute, but the processing must be continuous.
B.a one-minute processing interruption but cannot tolerate any data loss.
C.a processing interruption of one minute or more.
D.both a data loss and processing interruption longer than one minute.

A

A. The recovery time objective (RTO) measures organization tolerance for downtime, and the recovery point objective (RPO) measures how much data loss can be accepted.

156
Q

Which of the following BEST mitigates the risk of backup media containing irreplaceable information being lost or stolen while in transit?

A.Ensure that media are encrypted.
B.Maintain a duplicate copy.
C.Maintain chain of custody.
D.Ensure that personnel are bonded.

A

B. Sensitive data should always be fully backed up before being transmitted or moved. Backups of sensitive information should be treated with the same control considerations as the actual data.

157
Q

An organization with a limited budget has a recovery time objective (RTO) of 72 hours and a recovery point objective (RPO) of 24 hours. Which of the following would BEST meet the requirements of the business?

A.Hot site
B.Cold site
C.Mirrored site
D.Warm site

A

D. A warm site is a suitable solution because it provides essential infrastructure and most of the required IT equipment at a reasonable cost. Additional equipment can be obtained through vendor agreements within days.

158
Q

Which of the following database controls ensure that the integrity of transactions is maintained in an online transaction processing system’s database?

A.Authentication controls
B.Data normalization controls
C.Read/write access log controls
D.Commitment and rollback controls

A

D. Commitment and rollback controls are directly relevant to integrity. These controls ensure that database operations that form a logical transaction unit will be completed entirely or not at all (i.e., if, for some reason, a transaction cannot be fully completed, then incomplete inserts/updates/deletes are rolled back so that the database returns to its pretransition state).

159
Q

It is MOST appropriate to implement an incremental backup scheme when:

A.there is limited recovery time for critical data.
B.online disk-based media are preferred.
C.there is limited media capacity.
D.a random selection of backup sets is required.

A

C. In an incremental backup, after the full backup, only the files that have changed are backed up, thus minimizing media storage.

160
Q

IT management has decided to install a level 1 redundant array of inexpensive disks (RAID) system in all servers to compensate for the elimination of offsite backups. The information systems (IS) auditor should recommend:

A.upgrading to a level 5 redundant array of inexpensive disks (RAID).
B.increasing the frequency of onsite backups.
C.reinstating the offsite backups.
D.establishing a cold site in a secure location.

A

C. A RAID system, at any level, does not protect against a natural disaster. The problem will not be alleviated without offsite backups.

161
Q

In addition to the backup considerations for all systems, which of the following is an important consideration in providing backup for online systems?

A.Maintaining system software parameters
B.Ensuring periodic dumps of transaction logs
C.Ensuring grandfather-father-son file backups
D.Maintaining important data at an offsite location

A

B. Regular transaction log dumps are vital to preserving timely data in online systems, acting as a crucial backup to prevent data loss. Given the high activity volume in online systems, the traditional backup method may not be feasible.

162
Q

Data flow diagrams are used by information systems (IS) auditors to:

A.identify key controls.
B.highlight high-level data definitions.
C.graphically summarize data paths and storage.
D.portray step-by-step details of data generation.

A

C. Data flow diagrams are used as aids to graph or chart data flow and storage. They trace data from their origination to their destination, highlighting the paths and storage of data.

163
Q

Which of the following is the MOST important consideration when defining recovery point objectives (RPOs)?

A.Minimum operating requirements
B.Acceptable data loss
C.Mean time between failures
D.Acceptable time for recovery

A

B. Recovery point objectives (RPOs) are the level of data loss/reworking an organization is willing to accept.

164
Q

Which of the following inputs would PRIMARILY help in designing the data backup strategy in case of potential natural disasters?

A.Recovery point objective (RPO)
B.Volume of data to be backed up
C.Available data backup technologies
D.Recovery time objective (RTO)

A

A. The recovery point objective (RPO) determines acceptable data loss and the earliest recovery point in time, quantifying the acceptable data loss in case of interruption for designing backup strategies.

165
Q

The PRIMARY purpose of implementing redundant array of inexpensive disks (RAID) level 1 in a file server is to:

A.achieve performance improvement.
B.provide user authentication.
C.ensure availability of data.
D.ensure the confidentiality of data.

A

C. RAID level 1 provides disk mirroring. Data written to one disk are also written to another disk. Users in the network access data on the first disk; if disk one fails, the second disk takes over. This redundancy ensures the availability of data.

166
Q

Which of the following processes will be MOST effective in reducing the risk that unauthorized software on a backup server is distributed to the production server?

A.Manually copy files to accomplish replication.
B.Review changes in the software version control system.
C.Ensure that developers do not have access to the backup server.
D.Review the access control log of the backup server.

A

B. It is common practice for software changes to be tracked and controlled using version control software. An information systems (IS) auditor should review reports or logs from this system to identify the software that is promoted to production. Only moving the versions on the version control system program will prevent the transfer of development or earlier versions.

167
Q

Which of the following is the MOST efficient strategy for the backup of large quantities of mission-critical data when the systems need to be online to take sales orders 24 hours a day?

A.Implementing a fault-tolerant disk-to-disk backup solution.
B.Making a full backup weekly and an incremental backup nightly.
C.Creating a duplicate storage area network (SAN) and replicating the data to a second SAN.
D.Creating identical server and storage infrastructure at a hot site.

A

A. Disk-to-disk backup involves writing the primary backup to disk instead of tape. This allows for later copying, cloning or migration to tape. It ensures minimal system performance impact, enables fast backups of large data volumes and offers immediate transfer to an alternate disk set in case of failure.

168
Q

An information systems (IS) auditor finds that the data warehouse query performance decreases significantly at certain times of the day. Which of the following controls are MOST relevant for the IS auditor to review?

A.Permanent table-space allocation
B.Commitment and rollback controls
C.User spool and database limit controls
D.Read/write access log controls

A

C. User spool limits restrict the space available for running user queries. This prevents poorly formed queries from consuming excessive system resources and impacting general query performance. Limiting the space available to users in their own databases prevents them from building excessively large tables. This helps to control space utilization, which itself acts to help performance by maintaining a buffer between the actual data volume stored and the physical device capacity. Additionally, it prevents users from consuming excessive resources in ad hoc table builds (as opposed to scheduled production loads that often can run overnight and are optimized for performance purposes). In a data warehouse, because online transactions are not being run, commitment and rollback does not have an impact on performance.

169
Q

What is the GREATEST risk associated with inadequate management of storage growth in a critical file server?

A.Backup time steadily increases.
B.Backup operational costs significantly increase.
C.Storage operational costs significantly increase.
D.Server recovery work may not meet the recovery time objective (RTO).

A

D. In case of a crash, recovering a server with an extensive amount of data can require a significant amount of time. If the recovery cannot meet the RTO, there will be a discrepancy in IT strategies. It is important to ensure that server restoration can meet the RTO.

170
Q

In the event of a data center disaster, which of the following is the MOST appropriate strategy to enable a complete recovery of a critical database?

A.Daily data backup to a remote site
B.Real-time replication to a remote site
C.Hard disk mirroring to a local server
D.Real-time data backup to the local storage area network

A

B. With real-time replication to a remote site, data are updated simultaneously in two separate locations; therefore, a disaster in one site does not damage the information located in the remote site. This assumes that both sites are not affected by the same disaster.

171
Q

A review of wide area network (WAN) usage discovers that traffic on one communication line between sites, synchronously linking the master and standby database, peaks at 96 percent of the line capacity. An information systems (IS) auditor should conclude that:

A.analysis is required to determine if a pattern emerges that results in a service loss for a short period of time.
B.WAN capacity is adequate for the maximum traffic demands because saturation has not been reached.
C.the line should immediately be replaced by one with a larger capacity to provide approximately 85 percent saturation.
D.users should be instructed to reduce their traffic demands or distribute them across all service hours to flatten bandwidth consumption.

A

A. The peak at 96 percent can be the result of a one-off incident (e.g., a user downloading a large amount of data); therefore, analysis to establish whether this is a regular pattern and what causes this behavior should be carried out before expenditure on a larger line capacity is recommended.

172
Q

Which of the following backup techniques is the MOST appropriate when an organization requires extremely granular data restore points, as defined in the recovery point objective (RPO)?

A.Virtual tape libraries
B.Disk-based snapshots
C.Continuous data backup
D.Disk-to-tape backup

A

Recovery point objective (RPO) is based on the acceptable data loss in the case of a disruption. In this scenario, the organization needs a short RPO and continuous data backup is the best option.

173
Q

Which of the following BEST supports 24/7 availability?

A.Daily backup
B.Offsite storage
C.Mirroring
D.Periodic testing

A

C. Mirroring of critical elements is a tool that facilitates immediate (failover) recoverability.

174
Q

Which of the following is the BEST indicator of the effectiveness of backup and restore procedures while restoring data after a disaster?

A.Members of the recovery team were available.
B.Recovery time objectives (RTOs) were met.
C.Inventory of backup media was properly maintained.
D.Backup media was completely restored at an alternate site.

A

B. Effective backup and restore procedures are ensured by meeting recovery time objectives (RTOs), which are defined during the business impact analysis (BIA) stage with input from business process owners.

175
Q

An information systems (IS) auditor is reviewing the enterprise’s IT environment and identified that the IT operations team implemented an enhanced level of security over data. Which of the following object-oriented technology characteristic is MOST likely be implemented by the IT operations team?

A.Inheritance
B.Dynamic warehousing
C.Encapsulation
D.Polymorphism

A

C. Encapsulation is a property of objects, and it prevents accessing either properties or methods that have not been previously defined as public. This means that any implementation of the behavior of an object is not accessible. An object defines a communication interface with the exterior and only that which belongs to that interface can be accessed.

176
Q

Applying a retention date on a file will ensure that:

A.data cannot be read until the date is set.
B.data will not be deleted before that date.
C.backup copies are not retained after that date.
D.datasets having the same name are differentiated.

A

B. A retention date ensures that a file cannot be overwritten or deleted before that date has passed.

177
Q

When auditing the onsite archiving process of emails, the information systems (IS) auditor should pay the MOST attention to which of the following?

A.Existence of a data retention policy
B.Storage capacity of the archiving solution
C.Level of user awareness concerning email use
D.Support and stability of the archiving solution manufacturer

A

A. Without a data retention policy that is aligned with the organization’s business and compliance requirements, the email archive may not preserve and reproduce the correct information when required.

178
Q

Which of the following is the MOST important criterion when selecting a location for an offsite storage facility for information systems (IS) backup files? The offsite facility must be:

A.physically separated from the data center and not subject to the same risk.
B.given the same level of protection as that of the computer data center.
C.outsourced to a reliable third party.
D.equipped with surveillance capabilities.

A

A. It is important that there is an offsite storage location for information systems (IS) files and that it is in a location not subject to the same risk as the primary data center.

179
Q

A medium-sized organization, whose IT disaster recovery measures have been in place and regularly tested for years, has just developed a formal business continuity plan (BCP). A basic BCP tabletop exercise has been performed successfully. Which testing should an information systems (IS) auditor recommend be performed next to verify the adequacy of the new BCP?

A.Full-scale test with relocation of all departments, including IT, to the contingency site.
B.Walk-through test of a series of predefined scenarios with all critical personnel involved.
C.IT disaster recovery test with business departments involved in testing the critical applications.
D.Functional test of a scenario with limited IT involvement.

A

D. After a tabletop exercise has been performed, the next step is a functional test, which includes the mobilization of staff to exercise the administrative and organizational functions of a recovery. Because the IT part of the recovery has been tested for years, it is more efficient to verify and optimize the BCP before actually involving IT in a full-scale test. The full-scale test would be the last step of the verification process before entering into a regular annual testing schedule.

180
Q

Depending on the complexity of an organization’s business continuity plan (BCP), it may be developed as a set of plans to address various aspects of business continuity and disaster recovery. In such an environment, it is essential that:

A.each plan is consistent with one another.
B.all plans are integrated into a single plan.
C.each plan is dependent on one another.
D.the sequence for implementation of all plans is defined.

A

A. Depending on the complexity of an organization, there can be more than one plan to address various aspects of business continuity and disaster recovery, but the plans must be consistent to be effective.

181
Q

A financial institution that processes millions of transactions each day has a central communications processor (switch) for connecting to automated teller machines. Which of the following is the BEST contingency plan for the communications processor?

A.Reciprocal agreement with another organization
B.Alternate processor in the same location
C.Alternate processor at another network node
D.Duplex communication links

A

C. The unavailability of the central communications processor disrupts all access to the banking network. This can be caused by an equipment, power or communications failure. Having a duplicate processor in another location that can be used for alternate processing is the best solution.

182
Q

Which of the following would be a MAJOR concern for an information systems (IS) auditor reviewing a business continuity plan (BCP)?

A.The plan is approved by the chief information officer.
B.The plan contact lists have not been updated.
C.Test results are not adequately documented.
D.The training schedule for recovery personnel is not included.

A

C. The effectiveness of a BCP can best be determined through tests. If results of tests are not documented, then there is no basis for feedback, updates, etc.

183
Q

An information systems (IS) auditor can verify that an organization’s business continuity plan (BCP) is effective by reviewing the:

A.alignment of the BCP with industry good practices.
B.results of business continuity tests performed by information systems (IS) and end-user personnel.
C.offsite facility, its contents, security and environmental controls.
D.annual financial cost of the BCP activities versus the expected benefit of the implementation of the plan.

A

B. The effectiveness of the BCP can best be evaluated by reviewing the results from previous business continuity tests for thoroughness and accuracy in accomplishing their stated objectives.

184
Q

Which of the following is MOST important for an information systems (IS) auditor to verify while conducting a business continuity audit?

A.Data backups are performed on a timely basis.
B.A recovery site is contracted for and available as needed.
C.Human safety procedures are in place.
D.Insurance coverage is adequate and premiums are current.

A

C. The most important element in any business continuity process is the protection of human life. This takes precedence over all other aspects of the plan.

185
Q

An organization has just completed its annual risk assessment. Regarding the business continuity plan (BCP), what should an information systems (IS) auditor recommend as the next step for the organization?

A.Review and evaluate the BCP for adequacy.
B.Perform a full simulation of the BCP.
C.Train and educate employees regarding the BCP.
D.Notify critical contacts in the BCP.

A

A. The business continuity plan (BCP) should be reviewed every time a risk assessment is completed for the organization.

186
Q

For effective implementation after a business continuity plan (BCP) has been developed, it is MOST important that the BCP be:

A.stored in a secure offsite facility.
B.approved by senior management.
C.communicated to appropriate personnel.
D.made available through the enterprise’s intranet.

A

C. The implementation of a BCP will be effective only if appropriate personnel are informed and aware of all the aspects of the BCP.

187
Q

An offsite information processing facility (IPF) with electrical wiring, air conditioning and flooring, but no computer or communications equipment, is a:

A.cold site.
B.warm site.
C.dial-up site.
D.duplicate processing facility.

A

A. A cold site is ready to receive equipment but does not offer any components at the site in advance of the need.

188
Q

Which of the following BEST ensures uninterrupted operations in an organization with IT operation centers in several countries?

A.Distribution of key procedural documentation
B.Reciprocal agreement between business partners
C.Strong senior management leadership
D.Employee training on the BCP

A

D. During a disaster, the chain of command might be interrupted. Therefore, it is important that employees know their roles in the BCP, including where to report and how to perform their job functions. Employee training on the plan is especially important for businesses with offices that are geographically separated because there is a greater chance of communication disruption.

189
Q

Which of the following stakeholders is the MOST important in terms of developing a business continuity plan (BCP)?

A.Process owners
B.Application owners
C.Board of directors
D.IT management

A

A. Process owners are essential in identifying the critical business functions, recovery times and resources needed.

190
Q

The BEST method for assessing the effectiveness of a business continuity plan (BCP) is to review the:

A.plans and compare them to appropriate standards.
B.results from previous tests.
C.emergency procedures and employee training.
D.offsite storage and environmental controls.

A

B. Previous test results provide evidence of the effectiveness of the BCP.

191
Q

While designing the business continuity plan (BCP) for an airline reservation system, the MOST appropriate method of data transfer/backup at an offsite location is:

A.shadow file processing.
B.electronic vaulting.
C.hard-disk mirroring.
D.hot-site provisioning.

A

A. In shadow file processing, exact duplicates of the files are maintained at the same site or at a remote site. The two files are processed concurrently. This is used for critical data files, such as airline booking systems.

192
Q

The activation of an enterprise’s business continuity plan (BCP) should be based on predetermined criteria that address the:

A.duration of the outage.
B.type of outage.
C.probability of the outage.
D.cause of the outage.

A

A. The initiation of a business continuity plan (BCP) (action) should primarily be based on the maximum period for which a business function can be disrupted before the disruption threatens the achievement of organizational objectives.

193
Q

Which of the following is MOST important to determine the recovery point objective (RPO) for a critical process in an enterprise?

A.Number of hours of acceptable downtime
B.Total cost of recovering critical systems
C.Extent of data loss that is acceptable
D.Acceptable reduction in the level of service

A

C. The RPO determines acceptable data loss and the earliest acceptable recovery point in time, quantifying the permissible data loss in case of interruption.

194
Q

Which of the following ensures the availability of transactions in the event of a disaster?

A.Send hourly backups containing transactions offsite.
B.Send daily backups containing transactions offsite.
C.Capture transactions to multiple storage devices.
D.Transmit transactions offsite in real time.

A

D. The only way to ensure the availability of all transactions is to perform a real-time transmission to an offsite facility.

195
Q

Which of the following BEST ensures continuity of a wide area network (WAN) across the enterprise?

A.Built-in alternative routing
B.Complete full system backup daily
C.A repair contract with a service provider
D.A duplicate machine alongside each server

A

A. Alternative routing ensures that the network will continue if a communication device fails or if a link is severed because message rerouting can be automatic.

196
Q

During an audit of a business continuity plan (BCP), an information systems (IS) auditor found that, although all departments were housed in the same building, each department had a separate BCP. The IS auditor recommended that the BCPs be reconciled. Which of the following areas should be reconciled FIRST?

A.Evacuation plan
B.Recovery priorities
C.Backup storages
D.Call tree

A

A. Protecting human resources during a disaster-related event should be addressed first. Having separate business continuity plans (BCPs) can result in conflicting evacuation plans, thus jeopardizing the safety of staff and clients.

197
Q

Which of the following business continuity plan (BCP) tests involves participation of relevant members of the crisis management/response team to practice proper coordination?

A.Tabletop
B.Functional
C.Full-scale
D.Desk check

A

A. The primary purpose of tabletop testing is to practice proper coordination because it involves all or some of the crisis team members and is focused more on coordination and communication issues than on technical process details.

198
Q

Which of the following is the BEST method to ensure that the business continuity plan (BCP) remains up to date?

A.The group walks through the different scenarios of the plan from beginning to end.
B.The group ensures that specific systems can actually perform adequately at the alternate offsite facility.
C.The group is aware of full-interruption test procedures.
D.Interdepartmental communication is promoted to better respond in the case of a disaster.

A

A. A structured walk-through test gathers representatives from each department who will review the plan and identify weaknesses.

199
Q

Which of the following is the PRIMARY objective of the business continuity plan (BCP) process?

A.To provide assurance to stakeholders that business operations will continue in the event of disaster.
B.To establish an alternate site for IT services to meet predefined recovery time objectives (RTOs).
C.To manage risk while recovering from an event that adversely affected operations.
D.To meet the regulatory compliance requirements in the event of natural disaster.

A

C. The BCP process primarily focuses on managing and mitigating risk during recovery of operations due to an event that affected operations.

200
Q

An optimized disaster recovery plan (DRP) for an organization should:

A.reduce the length of the recovery time and the cost of recovery.
B.increase the length of the recovery time and the cost of recovery.
C.reduce the duration of the recovery time and increase the cost of recovery.
D.not affect the recovery time or the cost of recovery.

A

A. One of the objectives of a disaster recovery plan (DRP) is to reduce the duration and cost of recovering from a disaster.

201
Q

The PRIMARY objective of business continuity and disaster recovery plans should be to:

A.safeguard critical information systems (IS) assets.
B.provide for continuity of operations.
C.minimize the loss to an organization.
D.protect human life.

A

D. Because human life is invaluable, the main priority of any business continuity and disaster recovery plan should be to protect people.

202
Q

Integrating the business continuity plan (BCP) into IT project management aids in:

A.the testing of the business continuity requirements.
B.the development of a more comprehensive set of requirements.
C.the development of a transaction flowchart.
D.ensuring the application meets the users’ needs.

A

B. Integrating the BCP into the development process ensures complete coverage of the requirements through each phase of the project.

203
Q

Which of the following contributes MOST to an effective business continuity plan (BCP)?

A.The document is circulated to all interested parties.
B.Planning involves all user departments.
C.The plan is approved by senior management.
D.An audit is performed by an external information systems (IS) auditor.

A

B. The involvement of user departments in the BCP is crucial for the identification of the business processing priorities and the development of an effective plan.

204
Q

While observing a full simulation of the business continuity plan (BCP), an information systems (IS) auditor notices that the notification systems within the organizational facilities can be severely impacted by infrastructure damage. The BEST recommendation that the IS auditor can provide to the organization is to ensure that:

A.the salvage team is trained to use the notification system.
B.the notification system provides for the recovery of the backup.
C.redundancies are built into the notification system.
D.the notification systems are stored in a vault.

A

C. If the notification system has been severely impacted by the damage, redundancy is the best control.

205
Q

During a review of a business continuity plan (BCP), an information systems (IS) auditor noticed that the point at which a situation is declared to be a crisis has not been defined. The MAJOR risk associated with this is that:

A.response and recovery actions are initiated too early.
B.activating the appropriate response and recovery actions are delayed during a crisis.
C.crisis situations may be underestimated or overlooked.
D.the BCP may become too rigid.

A

B. The absence of a clear definition for declaring a situation as a crisis creates the risk of delays in activating the appropriate response and recovery actions. Without a predefined threshold or criteria for identifying a crisis, there is uncertainty and potential confusion about when to escalate the response, mobilize resources and implement critical measures. This can lead to valuable time being lost, ineffective decision-making, and delays in mitigating the impacts of the crisis.

206
Q

Which of the following is an appropriate test method to apply to a business continuity plan (BCP)?

A.Pilot
B.Paper
C.Unit
D.System

A

B. A paper test (sometimes called a desk check) is appropriate for testing a BCP. It is a walk-through of the entire BCP, or part of the BCP, involving major players in the BCP’s execution who determine what may happen in a particular disaster.

207
Q

The PRIMARY objective of testing a business continuity plan (BCP) is to:

A.familiarize employees with the business continuity plan (BCP).
B.ensure that all residual risk is addressed.
C.exercise all possible disaster scenarios.
D.identify limitations of the BCP.

A

D. Testing the BCP provides the best evidence of any limitations that may exist.

208
Q

When developing a business continuity plan (BCP), which of the following tools should be used to gain an understanding of the organization’s business processes?

A.Business continuity self-audit
B.Resource recovery analysis
C.Risk assessment
D.Gap analysis

A

C. Risk assessment and business impact assessment are tools for understanding the business as a part of a BCP.

209
Q

An information systems (IS) auditor notes during an audit that an organization’s business continuity plan (BCP) does not adequately address information confidentiality during the recovery process. The IS auditor should recommend that the plan be modified to include:

A.the level of information security required when business recovery procedures are invoked.
B.information security roles and responsibilities in the crisis management structure.
C.information security resource requirements.
D.change management procedures for information security that can affect business continuity arrangements.

A

A. Clearly define the level of information security required when invoking business recovery procedures to ensure confidentiality is maintained.

210
Q

With respect to business continuity strategies, an information systems (IS) auditor interviews key stakeholders in an organization to determine whether they understand their roles and responsibilities. The IS auditor is attempting to evaluate the:

A.clarity and simplicity of the business continuity plans (BCPs).
B.adequacy of the BCPs.
C.effectiveness of the BCPs.
D.ability of IS and end-user personnel to respond effectively in emergencies.

A

A. The information systems (IS) auditor should interview key stakeholders to evaluate how well they understand their roles and responsibilities. When all stakeholders have a detailed understanding of their roles and responsibilities in the event of a disaster, an IS auditor can deem the business continuity plan to be clear and simple.

211
Q

During the design of a business continuity plan (BCP), the business impact analysis (BIA) identifies critical processes and supporting applications. This will PRIMARILY influence the:

A.responsibility for maintaining the BCP.
B.criteria for selecting a recovery site provider.
C.recovery strategy.
D.responsibilities of key personnel.

A

C. The most appropriate strategy is selected based on the relative risk level, timelines and criticality identified in the business impact analysis (BIA).

212
Q

A live test of a mutual agreement for IT system recovery was carried out, including a four-hour test of intensive usage by the business units. The test was successful, but gives only partial assurance that the:

A.system and the IT operations team can sustain operations in the emergency environment.
B.resources and the environment can sustain the transaction load.
C.connectivity to the applications at the remote site meets response time requirements.
D.workflow of actual business operations can use the emergency system in case of a disaster.

A

D. The live test of the mutual agreement for IT system recovery, including the intensive usage by business units, only partially ensures that the workflow of actual business operations can use the emergency system in case of a disaster.

213
Q

Which of the following should be of MOST concern to an information systems (IS) auditor reviewing the business continuity plan (BCP)?

A.The disaster levels are based on scopes of damaged functions but not on duration.
B.The difference between low-level disaster and software incidents is not clear.
C.The overall BCP is documented, but detailed recovery steps are not specified.
D.The responsibility for declaring a disaster is not identified.

A

D. If nobody declares the disaster, the BCP is not invoked, making all other concerns less important.

214
Q

Which of the following activities should the business continuity manager perform FIRST after the replacement of hardware at the primary information processing facility (IPF)?

A.Verify compatibility with the hot site.
B.Review the implementation report .
C.Perform a walk-through of the disaster recovery plan (DRP).
D.Update the IT assets inventory .

A

D. An IT assets inventory is the basic input for the BCP/disaster recovery plan (DRP), and the plan must be updated to reflect changes in the IT infrastructure.

215
Q

While performing a review of a critical third-party application, an information systems (IS) auditor is MOST concerned with discovering:

A.inadequate procedures for ensuring adequate system portability.
B.inadequate operational documentation for the system.
C.an inadequate alternate service provider listing.
D.an inadequate software escrow agreement.

A

D. The inclusion of a clause in the agreement that requires software code to be placed in escrow helps to ensure that the customer can continue to use the software and/or obtain technical support if a vendor goes out of business.

216
Q

Which of the following is the BEST way to ensure that incident response activities are consistent with the requirements of business continuity?

A.Draft and publish a clear practice for enterprise-level incident response.
B.Establish a cross-departmental working group to share perspectives.
C.Develop a scenario and perform a structured walk-through.
D.Develop a project plan for end-to-end testing of disaster recovery.

A

C. A structured walk-through including both incident response and business continuity personnel provides the best opportunity to identify gaps or misalignments between the plans.

217
Q

There are several methods of providing telecommunication continuity. The method of routing traffic through split-cable or duplicate-cable facilities is called:

A.alternative routing.
B.diverse routing.
C.long-haul network diversity.
D.last-mile circuit protection.

A

B. Diverse routing routes traffic through split-cable facilities or duplicate-cable facilities. This can be accomplished with different and/or duplicate cable sheaths. If different cable sheaths are used, the cable may be in the same conduit and, therefore, subject to the same interruptions as the cable it is backing up. The communication service subscriber can duplicate the facilities by having alternate routes, although the entrance to and from the customer premises may be in the same conduit. The subscriber can obtain diverse routing and alternate routing from the local carrier, including dual-entrance facilities. This type of access is time-consuming and costly.

218
Q

Which of the following is the BEST reason for integrating the testing of noncritical systems in the disaster recovery plan (DRP) with the business continuity plan (BCP)?

A.To ensure that the DRPs is aligned to the business impact analysis (BIA).
B.Infrastructure recovery personnel can be assisted by business subject matter experts.
C.The BCPs may assume the existence of capabilities that are not in the DRPs.
D.To provide business executives with knowledge of disaster recovery capabilities.

A

C. The BCPs may assume the existence of capabilities that are not part of the DRPs, such as allowing employees to work from home during the disaster; however, IT may not have made sufficient provisions for these capabilities (e.g., they cannot support a large number of employees working from home). Although the noncritical systems are important, it is possible that they are not part of the DRPs. For example, an organization may use an online system that does not interface with the internal systems. If the business function using the system is a critical process, the system should be tested, and it may not be part of the DRP. Therefore, DRP and BCP testing should be integrated.

219
Q

Which of the following scenarios provides the BEST disaster recovery plan (DRP) to implement for critical applications?

A.Daily data backups that are stored offsite and a hot site located 140 km from the main data center.
B.Daily data backups that are stored onsite in a fireproof safe.
C.Real-time data replication between the main data center and the hot site located 500 m from the main site.
D.Daily data backups that are stored offsite with a warm site located 70 km from the main data center.

A

A. The absence of real-time backups may pose a challenge depending on the recovery point objective (RPO).

220
Q

Which of the following statements is useful while drafting a disaster recovery plan (DRP)?

A.Downtime costs decrease as the recovery point objective (RPO) increases.
B.Downtime costs increase with time.
C.Recovery costs are independent of time.
D.Recovery costs can only be controlled on a short-term basis.

A

B. Downtime costs—such as loss of sales, idle resources and salaries—increase with time. A disaster recovery plan (DRP) should be drawn up to achieve the lowest downtime costs possible.

221
Q

In a disaster recovery situation, which of the following is the MOST important metric to ensure that data are synchronized between critical systems?

A.recovery point objective (RPO)
B.recovery time objective (RTO)
C.recovery service resilience
D.recovery service scalability

A

A. Establishing a common recovery point objective (RPO) is most critical for ensuring that interdependencies between systems are properly synchronized. It ensures that systems do not contain data from different points in time that may result in accounting transactions that cannot be reconciled and a loss of referential integrity.

222
Q

Which of the following represents the GREATEST risk created by a reciprocal agreement for disaster recovery between two organizations?

A.Developments may result in hardware and software incompatibility.
B.Resources may not be available when needed.
C.The recovery plan cannot be live tested.
D.The security infrastructures in each organization may be different.

A

A. If one organization updates its hardware and software configuration, it may mean it is no longer compatible with the other party’s systems in the agreement. This may mean that each organization is unable to use the facilities at the other organization to recover their processing following a disaster.

223
Q

What is the PRIMARY risk of using reciprocal agreements for disaster recovery between two business units in an organization?

A.The documents lack legal sufficiency.
B.Both entities are vulnerable to the same incident.
C.IT systems have non-identical configurations.
D.One party experiences more frequent disruptions than the other.

A

B. The use of reciprocal disaster recovery is based on the probability that both organizations will not suffer a disaster at the same time.

224
Q

Of the following alternatives, the FIRST approach to developing a disaster recovery strategy is to assess whether:

A.all threats can be completely removed.
B.a cost-effective, built-in resilience can be implemented.
C.the recovery time objective (RTO) can be optimized.
D.the cost of recovery can be minimized.

A

B. It is critical to initially identify information assets that can be made more resilient to disasters (e.g., diverse routing, alternate paths or multiple communication carriers). Preventing a problem is always better than planning to address a problem when it happens.

225
Q

During an information systems (IS) audit of the disaster recovery plan of a global enterprise, the auditor observes that some remote offices have very limited local IT resources. Which of the following observations is the MOST critical for the IS auditor?

A.A test has not been made to ensure that local resources can maintain security and service standards when recovering from a disaster or incident.
B.The corporate business continuity plan (BCP) plan does not accurately document the systems that exist at remote offices.
C.Corporate security measures have not been incorporated into the test plan.
D.A test has not been made to ensure that backups from the remote offices are usable.

A

A. Regardless of the capability of local IT resources, the most critical risk is the lack of testing that would identify quality issues in the recovery process.

226
Q

Which of the following would an information systems (IS) auditor consider to be the MOST important to review when conducting a disaster recovery audit?

A.A hot site is contracted for and available as needed.
B.A business continuity manual is available and current.
C.Insurance coverage is adequate and premiums are current.
D.Data backups are performed timely and stored offsite.

A

D. Without data to process, all other components of the recovery effort are of no value. Even in the absence of a plan, recovery efforts of any type would not be practical without data to process.

227
Q

The MAIN purpose for periodically testing offsite disaster recovery facilities is to:

A.protect the integrity of the data in the database.
B.eliminate the need to develop detailed contingency plans.
C.ensure the continued compatibility of the contingency facilities.
D.ensure that program and system documentation remains current.

A

C. The main purpose of offsite hardware testing is to ensure the continued compatibility of the contingency facilities so that assurance can be gained that the contingency plans will work in an actual disaster.

228
Q

Management considered two projections for its disaster recovery plan (DRP): plan A with two months to fully recover and plan B with eight months to fully recover. The recovery point objectives (RPOs) are the same in both plans. It is reasonable to expect that plan B projected higher:

A.downtime costs.
B.resumption costs.
C.recovery costs.
D.walk-through costs.

A

A. Because management considered a longer time window for recovery in plan B, downtime costs included in the plan are likely to be higher.

229
Q

Which of the following is the MOST critical element to execute a disaster recovery plan (DRP) effectively?

A.Offsite storage of backup data
B.Up-to-date list of key disaster recovery contacts
C.Availability of a replacement data center
D.Clearly defined recovery time objective

A

A. Remote storage of backups is the most critical disaster recovery plan (DRP) element of the items listed because access to backup data is required to restore systems.

230
Q

A large chain of shops with electronic funds transfer at point-of-sale devices has a central communications processor for connecting to the banking network. Which of the following is the BEST disaster recovery plan (DRP) for the communications processor?

A.Offsite storage of daily backups
B.Alternative standby processor onsite
C.Installation of duplex communication links
D.Alternative standby processor at another network node

A

D. Having an alternative standby processor at another network node is the best solution. The unavailability of the central communications processor disrupts all access to the banking network, disrupting operations for all of the shops. This can be caused by failure of equipment, power or communications.

231
Q

When reviewing a disaster recovery plan, an information systems (IS) auditor should be MOST concerned with the lack of:

A.process owner involvement.
B.well-documented testing procedures.
C.an alternate processing facility.
D.a well-documented data classification scheme.

A

A. Process owner involvement is a critical part of the business impact analysis (BIA), which is used to create the disaster recovery plan. If the information systems (IS) auditor determines that process owners were not involved, this is a significant concern.

232
Q

Which of the following provides the BEST evidence of an organization’s disaster recovery capability readiness?

A.Disaster recovery plan (DRP)
B.Customer references for the alternate site provider
C.Processes for maintaining the DRP
D.Results of tests and exercises

A

D. Only tests and exercises demonstrate the adequacy of the plans and provide reasonable assurance of an organization’s disaster recovery capability readiness.

233
Q

An information systems (IS) auditor is performing a review of the disaster recovery hot site used by a financial institution. Which of the following is the GREATEST concern?

A.System administrators use shared accounts which never expire at the hot site.
B.Disk space utilization data are not kept current.
C.Physical security controls at the hot site are less robust than at the main site.
D.Servers at the hot site do not have the same specifications as at the main site.

A

B. Not knowing how much disk space is in use and, therefore, how much is needed at the disaster recovery site can create major issues in the case of a disaster.

234
Q

To ensure structured disaster recovery, it is MOST important that the business continuity plan (BCP) and disaster recovery plan (DRP) are:

A.stored at an alternate location.
B.communicated to all users.
C.tested regularly.
D.updated regularly.

A

C. If the BCP is tested regularly, the BCP and disaster recovery plan (DRP) team are adequately aware of the process and that helps in structured disaster recovery.

235
Q

Which of the following issues should be the GREATEST concern to the information systems (IS) auditor when reviewing an IT disaster recovery test?

A.Due to the limited test time window, only the most essential systems were tested, and other systems were tested separately during the rest of the year.
B.During the test, some of the backup systems were defective or not working, causing the test of these systems to fail.
C.The procedures to shut down and secure the original production site before starting the backup site required far more time than planned.
D.Every year, the same employees perform the test, and the recovery plan documents are not used because every step is well known by all participants.

A

B. The purpose of the test is to test the backup plan. When the backup systems are not working, then the plan cannot be counted on in a real disaster. This is the most serious problem.

236
Q

A disaster recovery plan (DRP) for an organization’s financial system specifies that the recovery point objective (RPO) is zero and the recovery time objective (RTO) is 72 hours. Which of the following is the MOST cost-effective solution?

A.A hot site that can be operational in eight hours with asynchronous backup of the transaction logs
B.Distributed database systems in multiple locations updated asynchronously.
C.Synchronous updates of the data and standby active systems in a hot site
D.Synchronous remote copy of the data in a warm site that can be operational in 48 hours

A

D. The synchronous copy of the data storage achieves the RPO, and a warm site operational in 48 hours meets the required RTO.

237
Q

Which of the following disaster recovery testing techniques is the MOST efficient way to determine the effectiveness of the plan?

A.Preparedness tests
B.Paper tests
C.Full operational tests
D.Actual service disruption

A

A. Preparedness tests involve simulation of the entire environment (in phases) at a relatively low cost and help the team to better understand and prepare for the actual test scenario.

238
Q

An information systems (IS) auditor is auditing an IT disaster recovery plan (DRP). The IS auditor should PRIMARILY ensure that the plan covers:

A.a resilient IT infrastructure.
B.alternate site information.
C.documented disaster recovery test results.
D.analysis and prioritization of business functions.

A

D. The DRP must primarily focus on recovering critical business functions in the event of disaster within predefined RTOs; thus, it is necessary to align the recovery of IT services based on the criticality of business functions.

239
Q

In which of the following situations is it MOST appropriate to implement data mirroring as the recovery strategy?

A.Disaster tolerance is high.
B.The recovery time objective (RTO) is high.
C.The recovery point objective (RPO) is low.
D.The RPO is high.

A

C. The recovery point objective (RPO) indicates the latest point in time at which it is possible to recover the data. This determines how often the data must be backed up to minimize data loss. If the RPO is low, then the organization does not want to lose much data and must use a process such as data mirroring to prevent data loss.

240
Q

After a disaster declaration, the media creation date at a warm recovery site is based on the:

A.recovery point objective (RPO)
B.recovery time objective (RTO)
C.service delivery objective (SDO)
D.maximum tolerable outage (MTO)

A

A. The recovery point objective (RPO) defines the acceptable data loss in a disruption, indicating the earliest acceptable data recovery point. It quantifies the permissible data loss in case of interruption. The media creation date reflects the RPO for data restoration.

241
Q

The organization’s disaster recovery plan (DRP) should address early recovery of:

A.all information systems processes.
B.all financial processing applications.
C.only those applications designated by the information systems (IS) manager.
D.processing in priority order, as defined by business management.

A

D. Business management should know which systems are critical and what they need to process well in advance of a disaster. It is management’s responsibility to develop and maintain the plan. Adequate time will not be available for this determination after the disaster occurs. IS and the information processing facility are service organizations that exist for the purpose of assisting the general user management in successfully performing their jobs.

242
Q

Which of the following choices would MOST likely ensure that a disaster recovery effort is successful?

A.The tabletop test was performed.
B.Data restoration was completed.
C.Recovery procedures are approved.
D.Appropriate staff resources are committed.

A

B. The most reliable method to determine whether a backup is valid is to restore it to a system. A data restore test should be performed at least annually to verify that the process is working properly.

243
Q

During a disaster recovery test, an information systems (IS) auditor observes that the performance of the disaster recovery site’s server is slow. To find the root cause of this, the IS auditor should FIRST review the:

A.event error log generated at the disaster recovery site.
B.disaster recovery test plan.
C.disaster recovery plan (DRP).
D.configurations and alignment of the primary and disaster recovery sites.

A

D. Because the configuration of the system is the most probable cause, the IS auditor should review that first.

244
Q

An information systems (IS) auditor discovers that the disaster recovery plan (DRP) for an organization does not include a critical application hosted in the cloud. Management response states that the cloud vendor is responsible for disaster recovery (DR) and DR-related testing. What is the NEXT course of action for the IS auditor to pursue?

A.Plan an audit of the cloud vendor.
B.Review the vendor contract to determine its DR capabilities.
C.Review an independent auditor’s report of the cloud vendor.
D.Request a copy of the DRP from the cloud vendor.

A

B. DR services can only be expected from the vendor when explicitly listed in the contract with well-defined recovery time objectives and recovery point objectives. Without the contractual language, the vendor is not required to provide DR services.

245
Q

An information systems (IS) auditor reviewing an organization’s disaster recovery plan (DRP) should PRIMARILY verify that it is:

A.tested every six months.
B.regularly reviewed and updated.
C.approved by the chief executive officer.
D.communicated to every department head in the organization.

A

B. The plan should be reviewed at appropriate intervals, depending on the nature of the business and the rate of change of systems and personnel. Otherwise, it may become out-of-date and may no longer be effective.

246
Q

An information systems (IS) auditor evaluating the resilience of a high-availability network should be MOST concerned if:

A.the setup is geographically dispersed.
B.the servers are clustered in one site.
C.a hot site is ready for activation.
D.diverse routing is implemented for the network.

A

B. A clustered setup in one site makes the entire network vulnerable to natural disasters or other disruptive events.

247
Q

An organization with a number of offices across a wide geographical area has developed a disaster recovery plan (DRP). Using actual resources, which of the following is the MOST cost-effective test of the DRP?

A.Full operational test
B.Preparedness test
C.Paper test
D.Regression test

A

B. A preparedness test offers a more practical approach by assessing the readiness of actual resources and systems. It provides a higher level of confidence that the organization’s critical components are prepared for recovery without incurring the potential disruptions and costs associated with a full operational test.

248
Q

When developing a disaster recovery plan (DRP), what criteria should be considered when determining the acceptable downtime?

A.Annual loss expectancy
B.Service delivery objective
C.Quantity of orphan data
D.Maximum tolerable outage (MTO)

A

D. Recovery time objective (RTO) is determined based on the acceptable downtime in the case of a disruption of operations. It indicates the maximum tolerable outage (MTO) that an organization considers to be acceptable before a system or process must resume following a disaster.

249
Q

Which of the following is the MOST reasonable option for recovering a noncritical system?

A.Warm site
B.Mobile site
C.Hot site
D.Cold site

A

D. Generally, a cold site is contracted for a longer period at a lower cost. It is generally used for noncritical applications because it requires more time to make a cold site operational.

250
Q

A hot site should be implemented as a recovery strategy when the:

A.disaster downtime tolerance is low.
B.recovery point objective (RPO) is high.
C.recovery time objective (RTO) is high.
D.maximum tolerable downtime is long.

A

A. Disaster downtime tolerance is the time gap during which the business can accept non-availability of IT facilities. If this time gap is low, recovery strategies that can be implemented within a short period of time, such as a hot site, should be used.

251
Q

To address an organization’s disaster recovery requirements, backup intervals should not exceed the:

A.service level objective.
B.recovery time objective (RTO).
C.recovery point objective (RPO).
D.maximum acceptable outage (MAO).

A

D. The maximum acceptable outage (MAO) is the maximum amount of system downtime that is tolerable. It can be used as a synonym for maximum tolerable period of disruption or maximum allowable downtime. However, the RTO denotes an objective/target, while the MAO constitutes a vital necessity for an organization’s survival.

252
Q

What component requires frequent updating to ensure the continued effectiveness of a disaster recovery plan (DRP)?

A.Contact information of key personnel
B.Server inventory documentation
C.Individual roles and responsibilities
D.Procedures for declaring a disaster

A

A. In the event of a disaster, it is important to have a current updated list of personnel who are key to the operation of the plan.

253
Q

An information systems (IS) auditor is conducting a review of the disaster recovery procedures for a data center. Which of the following indicators BEST shows that the procedures meet the requirements?

A.Documented procedures were approved by management.
B.Procedures were reviewed and compared with industry good practices.
C.A tabletop exercise using the procedures was conducted.
D.Recovery teams and their responsibilities are documented.

A

C. Conducting a tabletop exercise (paper-based test) of the procedures with all responsible members best ensures that the procedures meet the requirements. This type of test can identify missing or incorrect procedures because representatives responsible for performing the tasks are present.

254
Q

Which of the following BEST helps define disaster recovery strategies?

A.Annual loss expectancy and exposure factor
B.Maximum tolerable downtime and data loss
C.Existing server and network redundancies
D.Data backup and offsite storage requirements

A

B. Two of the key outcomes of the business impact analysis are the recovery time objective (RTO) and recovery point objective (RPO)—maximum tolerable downtime and data loss—that further help in identifying the recovery strategies.

255
Q

An information systems (IS) auditor is reviewing the most recent disaster recovery plan of an organization. Which approval is the MOST important when determining the availability of system resources required for the plan?

A.Executive management
B.IT management
C.Board of directors
D.Steering committee

A

B. Because a disaster recovery plan (DRP) is based on the recovery and provisioning of IT services, IT management’s approval is most important to verify that the system resources will be available in the event that a disaster event is triggered.

256
Q

Which of the following is a continuity plan test that simulates a system crash and uses actual resources to cost-effectively obtain evidence about the plan’s effectiveness?

A.Paper test
B.Post-test
C.Preparedness test
D.Walk-through

A

C. A preparedness test is a localized version of a full test, wherein resources are expended in the simulation of a system crash. This test is performed regularly on different aspects of the plan and can be a cost-effective way to gradually obtain evidence about the plan’s effectiveness. It also provides a means to improve the plan in increments.

257
Q

The cost of ongoing operations when a disaster recovery plan (DRP) is in place, compared to not having a DRP, will MOST likely:

A.increase.
B.decrease.
C.remain the same.
D.be unpredictable.

A

A. Due to the additional cost of testing, maintaining and implementing disaster recovery plan (DRP) measures, the cost of normal operations for any organization will always increase after a DRP implementation (i.e., the cost of normal operations during a nondisaster period is more than the cost of operations during a nondisaster period when no DRP was in place).

258
Q

An information systems (IS) auditor is performing an audit in the data center when the fire alarm begins sounding. The audit scope includes disaster recovery, so the auditor observes the data center staff respond to the alarm. Which of the following is the MOST important action for the data center staff to complete in this scenario?

A.Notify the local fire department of the alarm condition.
B.Prepare to activate the fire suppression system.
C.Ensure all persons in the data center are evacuated.
D.Remove all backups from the data center.

A

C. In an emergency, safety of life is always the first priority; therefore, the complete and orderly evacuation of the facility staff is the most important activity.