Which of the following is MOST important for an IS auditor to determine when reviewing how the organization’s incident response team handles devices that may be involved in criminal activity?

Which of the following is MOST important for an IS auditor to determine when reviewing how the organization’s incident response team handles devices that may be involved in criminal activity?A . Whether devices are checked for malicious applicationsB . Whether the access logs are checked before seizing the devicesC ....

June 27, 2020 No Comments READ MORE +

Which of the following is an analytical review procedure for a payroll system?

Which of the following is an analytical review procedure for a payroll system?A . Performing penetration attempts on the payroll systemB . Evaluating the performance of the payroll system, using benchmarking softwareC . Performing reasonableness tests by multiplying the number of employees by the average wage rateD . Testing hours...

June 27, 2020 No Comments READ MORE +

Implementing which of the following would have prevented this situation?

During a privileged access review, an IS auditor observes many help desk employees have privileges within systems not required for their job functions. Implementing which of the following would have prevented this situation?A . Separation of dutiesB . Multi-factor authenticationC . Least privilege accessD . Privileged access reviewsView AnswerAnswer: C

June 26, 2020 No Comments READ MORE +

You are part of a security staff at a highly profitable bank and each day, all traffic on the network is logged for later review. Every Friday when major deposits are made you're seeing a series of bits placed in the "Urgent Pointer" field of a TCP packet.

You are part of a security staff at a highly profitable bank and each day, all traffic on the network is logged for later review. Every Friday when major deposits are made you're seeing a series of bits placed in the "Urgent Pointer" field of a TCP packet. This is...

June 26, 2020 No Comments READ MORE +

During a follow-up audit, an IS auditor learns the organization implemented an automated process instead of the originally agreed upon enhancement of the manual process. The auditor should:

During a follow-up audit, an IS auditor learns the organization implemented an automated process instead of the originally agreed upon enhancement of the manual process. The auditor should:A . report the finding that recommendations were not acted uponB . perform a cost-benefit analysis on the new processC . verify that...

June 26, 2020 No Comments READ MORE +

Which of the following statement INCORRECTLY describes the traditional audit approach in comparison to the Control self-assessment approach?

Which of the following statement INCORRECTLY describes the traditional audit approach in comparison to the Control self-assessment approach?A . In traditional approach, Staffs at all level, in all functions, are the primary control analyst.B . Traditional approach assigns duties/supervises staffC . Traditional approach is a policy driven approachD . Traditional...

June 26, 2020 No Comments READ MORE +

An IS auditor observes a system performance monitoring tool which states that a server critical to the organization averages high CPU utilization across a cluster of four virtual servers throughout the audit period.

An IS auditor observes a system performance monitoring tool which states that a server critical to the organization averages high CPU utilization across a cluster of four virtual servers throughout the audit period. To determine if further investigation is required, an IS auditor should review:A . the system process activity...

June 26, 2020 No Comments READ MORE +

A shared resource matrix is a technique commonly used to locate:

A shared resource matrix is a technique commonly used to locate:A . Malicious codeB . Security flawsC . Trap doorsD . Covert channelsView AnswerAnswer: D Explanation: Analyzing resources of a system is one standard for locating covert channels because the basis of a covert channel is a shared resource. The...

June 25, 2020 No Comments READ MORE +

Which of the following statement INCORRECTLY describes the Control self-assessment (CSA) approach?

Which of the following statement INCORRECTLY describes the Control self-assessment (CSA) approach? A. CSA is policy or rule driven B. CSA Empowered/accountable employees C. CSA focuses on continuous improvement/learning curve D. In CSA, Staffs at all level, in all functions, are the primary control analyst.View AnswerAnswer: A Explanation: The word...

June 25, 2020 No Comments READ MORE +

You are part of a security staff at a highly profitable bank and each day, all traffic on the network is logged for later review. Every Friday when major deposits are made you're seeing a series of bits placed in the "Urgent Pointer" field of a TCP packet.

You are part of a security staff at a highly profitable bank and each day, all traffic on the network is logged for later review. Every Friday when major deposits are made you're seeing a series of bits placed in the "Urgent Pointer" field of a TCP packet. This is...

June 25, 2020 No Comments READ MORE +