Mock Exam - Final - WTH Answers
Mock Exam - Final - WTH Answers
2. Which of the following components is responsible for the collection of data in an intrusion
detection system (IDS)?
A. Analyzer
B. Administrative console
C. User interface
D. Sensor
3. During which of the following phases in system development would user acceptance test plans
normally be prepared?
A. Feasibility study
B. Requirements definition
C. Implementation planning
D. Postimplementation review
4. Vendors have released patches fixing security flaws in their software. Which of the following
should an IS auditor recommend in this situation?
A. Gathering information
B. Gaining access
C. Denying services
D. Evading detection
9. Which of the following represents the GREATEST potential risk in an electronic data interchange
(EDI) environment?
10. There are several methods of providing telecommunication continuity. The method of routing
traffic through split-cable or duplicate-cable facilities is called:
A. Alternative routing.
B. Diverse routing
C. Long-haul network diversity
D. Last-mile circuit protection
11. While auditing third-party IT service provider, an IS auditor discovered that across reviews were not
being performed as required by the contract. The IS auditor should:
12. An organization has created a policy that defines the types of websites that users are forbidden to
access. What is the MOST effective technology to enforce this policy?
13. An IS auditor performing an audit has determined that developers have been granted
administrative access to the virtual machine (VM) management console to manage their own
servers used for software development and testing. Which of the following choices would be of
MOST concern for the IS auditor?
14. Which of the following BEST ensures that business requirements are met prior to implementation?
A. Feasibility study
B. User acceptance testing
C. Postimplementation review
D. Implementation plan
15. When reviewing a disaster recovery plan (DRP), an IS auditor should be MOST concerned with the
lack of:
17. A company is planning to install a network-based intrusion detection system (IDS) to protect the
web site that it hosts. Where should the device be installed?
18. Which of the following is the MOST important for an IS auditor to consider when reviewing a service
level agreement (SLA) with an external IT service provider?
A. Payment terms
B. Uptime guarantee
C. Indemnification clause
D. Default resolution
19. When reviewing a project where quality is a major concern, an IS auditor should use the project
management triangle to explain that:
20. The responsibility for authorizing access to application data should be with the:
A. Data Custodian
B. Database Administrator
C. Data Owner
D. Security Administrator
21. In planning an IS audit, the MOST critical step is the identification of the:
22. When reviewing the configuration of network devices, an IS auditor should be FIRST identify:
23. An IS auditor is involved in the reengineering process that aims to optimize IT infrastructure. Which
of the following will BEST identify the issues to be resolved?
A. Self-assessment
B. Reverse engineering
C. Prototyping
D. Gap Analysis
24. What is the BEST approach to mitigate the risk of a phishing attack?
25. Which of the following BEST helps prioritize the recovery of IT assets when planning for a disaster?
26. Which of the following will MOST successfully identify overlapping key controls in business
application systems?
28. Which of the following groups is the BEST source of information for determining the criticality of
application systems as part of a business impact analysis (BIA)?
29. An IS auditor performing a review of a major software development project finds that it is on
schedule and under budget even though the software developers have worked considerable
amount of unplanned overtime. The IS auditor should:
A. Conclude that the project is progressing as planned because dates are being met
B. Question the project manager further to identify whether overtime costs are being tracked
accurately
C. Conclude that the programmers are intentionally working slowly to earn extra overtime pay
D. Investigate further to determine whether the project plan may not be accurate
30. To protect a Voice-over-Internet Protocol (VoIP) Infrastructure against a denial-of service (DoS)
attack, it is MOST important to secure the:
31. In evaluating programmed controls over password management, which of the following is the IS
auditor MOST likely to rely on?
A. A size check
B. A hash total
C. A validity check
D. A field check
32. Which of the following is the MOST reasonable option for recovering a noncritical system?
A. Warm site
B. Mobile Site
C. Hot Site
D. Cold Site
33. In a public key infrastructure (PKI), Which of the following may be relied upon to prove that an
online transaction was authorized by a specific customer?
A. Nonrepudiation
B. Encryption
C. Authentication
D. Integrity
34. Due to a reorganization a business application system will be extended to other departments.
Which of the following should be of the GREATEST concern for an IS auditor?
A. Facilitates interoperability
B. Facilitates the integration of proprietary components
C. Will be a basis for volume discounts from equipment vendors
D. Allows for the achievement of more economies of the scale for equipment
36. Which of the following represents an example of a preventive control with respect to IT personnel?
37. An IS auditor discovers that uniform resource locators (URLs) for online control self-assessment
questionnaires are sent using URL shortening services. The use of URL shortening would MOST likely
increase the risk of which of the following attacks?
39. An IS auditor is performing a review of the disaster recovery hot site used by a financial institution.
Which of the following would be the GREATEST concern?
A. System administrators used shared accounts which never expire at the hot site.
B. Disk space utilization data are not kept current
C. Physical security controls at the hot site are less robust than at the main site
D. Servers at the hot site do not have the same specifications as at the main site.
40. Inadequate programming and coding practices introduce the risk of:
A. Phishing
B. Buffer overflow exploitation
C. Synchronized (SYN) flood
D. Brute force attacks
A. An impact
B. A vulnerability
C. An asset
D. A threat
42. Recovery procedures for an information processing facility are BEST based on:
43. Change control for business application systems being developed using prototyping could be
complicated by the:
45. An IS auditor reviewing access controls for a client-server environment should FIRST:
47. The MAIN reason for requiring that all computer clocks across an organization by synchronized is
to:
48. The knowledge base of an expert system that uses questionnaires to lead the user through a series
of choices before a conclusion is reached is known as:
A. Rules.
B. Decision trees.
C. Semantic nets.
D. Dataflow diagram.
49. In a contract with a hot, warm or cold site, contractual provision should PRIMARILY cover which of
the following considerations?
50. Which of the following public key infrastructure (PKI) elements provides detailed descriptions for
dealing with a compromised private key?
51. What is the MAJOR benefit of conducting a control self-assessment (CSA) over a traditional audit?
52. If a database is restored using before-image dumps, where should the process begin following an
interruption?
53. Which of the following is the PRIMARY purpose for conducting parallel testing?
A. To provide assurance to stakeholders that the business operations will continue in the
event of disaster
B. To establish an alternate site for IT services to meet predefined recovery time objectives
(RTOs)
C. To manage risk while recovering from an event that adversely affected operations.
D. To meet the regulatory compliance requirements in the event of natural disaster
56. An IS auditor who was involved in designing an organization’s business continuity plan (BCP) has
been assigned to audit the plan. The IS auditor should:
A. Daily backup
B. Offsite storage
C. Mirroring
D. Periodic testing
58. Which of the following is the BEST enabler for strategic alignment between business and IT?
A. A maturity model
B. Goals and metrics
C. Control objectives
D. A responsible, accountable, consulted and informed (RACI) chart
59. During a postimplementation review, which of the following activities should be performed?
A. Port scanning
B. Back door
C. Man-in-the-middle
D. War driving
61. Which of the following should an IS auditor use to detect duplicate invoice records within an invoice
master life?
A. Attribute sampling
B. Computer-assisted audit and techniques (CAATs)
C. Compliance testing
D. Integrated test facility (ITF)
62. The BEST overall quantitative measure of the performance of biometric control devices is:
63. When two or more systems are integrated, the IS auditor must review input/output controls in the:
64. Which of the following is MOST important to determine the recovery point objective (RPO) for a
critical process in an enterprise?
66. The decisions and actions of an IS auditor are MOST likely to affect which of the following types of
risk?
A. Inherent
B. Detection
C. Control
D. Business
68. An organization is considering using a new IT service provider. From an audit perspective, which of
the following would be the MOST important item to review?
69. Which of the following does a lack of adequate security controls represent?
A. Threat
B. Asset
C. Impact
D. Vulnerability
70. When planning an audit of a network setup, an IS Auditor should give highest priority to obtaining
which of the following network documentation?
73. An IS auditor reviewing an organization’s disaster recovery plan should PRIMARILY verify that it is:
74. An IS auditor discovers that the disaster recovery plan (DRP) for a company does not include a
critical application that is hosted in the cloud. Management response states that the cloud vendor
is responsible for DR and DR-related testing. What is the NEXT course of action for the IS auditor to
pursue?
75. A company is implementing a Dynamic Host Configuration Protocol (DHCP). Given that the following
conditions exist, which represents the GREATEST concern?
A. Contingency planning
B. IS management resource allocation
C. Project management
D. Knowledge of internal controls
77. When developing a business continuity plan (BCP), which of the following tools should be used to
gain an understanding of the organization’s business processes?
78. A financial institution that process millions of transactions each day has a central communications
processor (switch) for connecting teller machines (ATMs). Which of the following would be the BEST
contingency plan for the communications processor?
79. An IS auditor reviewing a series of completed projects finds that the implemented functionality
often exceeded requirements and most of the projects ran significantly over budget. Which of these
area of the organization’s project management process is the MOST likely cause of the issue?
82. What is the BEST method to facilitate successful user testing and acceptance of a new enterprise
resource planning (ERP) payroll system that is replacing an existing legacy system?
A. Multiple testing
B. Parallel testing
C. Integration testing
D. Prototype testing
83. Which of the following manages the digital certificate life cycle to ensure adequate security and
controls exist in digital signature applications related to e-commerce?
A. Registration authority
B. Certificate authority (CA)
C. Certification revocation list (CRL)
D. Certification practice statement
A. Signer to have a public key and the receiver to have a private key.
B. Signer to have a private key and the receiver to have a public key.
C. Signer and receiver to have a public key.
D. Signer and receiver to have a private key.
86. An IS auditor is evaluating management’s risk assessment of information systems. The IS auditor
should FIRST review:
87. A local area network (LAN) administrator normally would be restricted from:
88. An organization is reviewing its contract with a cloud computing provider. For which of the following
reasons would be the organization want to remove a lock-in clause from the contract?
A. Availability
B. Portability
C. Agility
D. Scalability
89. Which control is the BEST way to ensure that the data in a file have not been changed during
transmission?
A. Reasonableness check
B. Parity bits
C. Hash values
D. Check digits
90. Which of the following would be the MOST cost-effective recommendation for reducing the
number of defects encountered during software development projects?
92. An IS auditor finds out-of-range data in some tables of a database. Which of the following controls
should the IS auditor recommend to avoid this situation?
93. Which of the following BEST ensure the integrity of a server’s operating system (OS)?
94. A small organization has only one database administrator (DBA) and one system administrator. The
DBA has root access to the UNIX server, which hosts the database application. How should
segregation of duties be enforced in this scenario.
A. Hire a second DBA a split the duties between the two individuals.
B. Remove the DBA’s root access on all UNIX servers.
C. Ensure that all actions of the DBA are logged and that all logs are backed up to tape.
D. Ensure that database logs are forwarded to a UNIX server where the DBA does not have
root access.
A. Evaluating threats and vulnerabilities associated with existing IT assets and IT projects.
B. Using the firm’s past actual loss experience to determine current exposures.
C. Reviewing published loss statistics from comparable organizations.
D. Reviewing IT control weaknesses identified in audit reports.
96. A financial institution with multiple branch offices has an automated control that requires the
branch manager to approve transactions more than a certain amount. What type of audit control
is this?
A. Detective
B. Preventive
C. Corrective
D. Directive
97. In the event of a data center disaster, which of the following would be the MOST appropriate
strategy to enable a complete recovery of a critical database?
98. Which of the following insurance types provide for a loss arising from fraudulent acts by
employees?
A. Business interruption
B. Fidelity coverage
C. Errors and omissions
D. Extra expense
99. An organization sells books and music online at its secure web site. Transactions are transferred to
the accounting and delivery systems every hour to be processed. Which of the following controls
BEST ensures that sales processed in the secure web site are transferred to both the delivery and
accounting systems?
A. Transaction tools are recorded on a daily bases in the sales systems. Daily sales system totals
are aggregated and totaled.
B. Transactions are automatically numerically sequenced. Sequences are checked and gaps in
continuity are accounted for.
C. Processing systems check for duplicated transaction numbers. If a transaction number is
duplicated (already present), it is rejected.
D. System time is synchronized hourly using a centralized time server. All transactions have a
date/time stamp.
100. When reviewing an organization’s logical access security to its remote systems, which of the
following would be GREATEST concern to an IS auditor?
A. An impact
B. A vulnerability
C. An asset
D. A threat
102. Which of the following is an advantage of elliptic curve encryption (ECC) over RSA encryption?
A. Computation speed
B. Ability to support digital signatures
C. Simpler key distribution
D. Message integrity controls
103. Of the following alternatives, the FIRST approach to developing a disaster recovery strategy would
be to assess whether:
104. An IS auditor is reviewing an IT security risk management program. Measures of security risk should:
105. The reason a certification and accreditation (C&A) process is performed on critical systems is to
ensure that:
A. Substantive testing
B. Compliance testing
C. Analytical Testing
D. Control Testing
108. Which of the following is the BEST indicator of the effectiveness of backup and restore procedures
while restoring data after a disaster?
110. Which of the following controls would be the MOST comprehensive in a remote access network
with multiple and diverse subsystems?
A. Proxy server
B. Firewall installation
C. Demilitarized zone (DMZ)
D. Virtual private network (VPN)
111. During an audit, the IS auditor notes that the application developer also performs quality assurance
testing on a particular application. Which of the following should the IS auditor do?
112. The review of router access control lists should be conducted during:
A. An environmental review.
B. A network security review.
C. A business continuity review.
D. A data integrity review.
113. Which of the following is MOST important when an operating system (OS) patch is to be applied to
a production environment?
114. Which of the following should impair the independence of a quality assurance team?
115. Which of the following types of risk could result from inadequate software project baselining?
A. Sign-off delays
B. Software integrity violations
C. Scope creep
D. Inadequate controls
116. During the collection of forensic evidence, which of the following actions would MOST likely result
in the destruction or corruption of evidence in a compromised system?
118. An IS auditor is auditing an IT disaster recovery plan (DRP). The IS auditor should PRIMARILY ensure
that the plan covers:
A. A resilient IT infrastructure
B. Alternate site information
C. Documented disaster recovery (DR) test results
D. Analysis and prioritization of business functions
119. Which of the following system and data conversion strategies provides the GREATEST redundancy?
A. Direct cutover
B. Pilot study
C. Phased approach
D. Parallel run
120. Which of the following is the BEST reference for an IS auditor to determine a vendor’s ability to
meet service level agreement (SLA) requirements for a critical IT security service?
121. While reviewing sensitive electronic work papers, the IS auditor noticed that they were not
encrypted. This could compromise the:
A. Mandatory
B. Role-based
C. Discretionary
D. Single sign-on (SSO)
123. A failure discovered in which of the following testing stages would have the GREATEST impact on
the implementation of new application software?
A. System testing
B. Acceptance testing
C. Integration testing
D. Unit testing
124. An IS auditor is reviewing an organization to ensure that evidence related to a data breach case is
preserved. Which of the following choices would be of MOST concern to the IS auditor?
125. The cost of ongoing operations when a disaster recovery plan (DRP) is in place, compared to not
having a disaster recovery plan, will MOST likely:
A. Increase
B. Decrease
C. Remain the same
D. Be unpredictable
126. The final decision to include a material finding in an audit report should be made by the:
A. Audit committee.
B. Auditee’s manager.
C. IS auditor
D. Chief executive officer (CEO) of the organization.
127. The feature of a digital signature that ensures the sender cannot later deny generating and sending
the message is called:
A. Data integrity.
B. Authentication.
C. Nonrepudiation
D. Replay protection.
128. An IS auditor analyzing the audit log of a database management system (DBMS) finds that some
transactions were partially executed as a result of an error and have not been rolled back. Which
of the following transaction processing features has been violated?
A. Consistency
B. Isolation
C. Durability
D. Atomicity
129. The BEST method for assessing the effectiveness of a business continuity plan is to review the:
130. When conducting a penetration test of an IT system, an organization should not be MOST
concerned with:
131. Which techniques would BEST test for the existence of dual control when auditing the wire transfer
systems of a bank?
134. Which of the following is an implementation risk within the process of decision support systems
(DSSs)?
A. Management control
B. Semi structured dimensions
C. Inability to specify purpose and usage patterns
D. Changes in decision process
135. Which of the following network components is PRIMARILY set up to serve as a security measure by
preventing unauthorized traffic between different segments of the network?
A. Firewall
B. Routers
C. Layer 2 switch
D. Virtual local area networks (VLANs)
136. Which of the following is the primary requirement in reporting results of an IS Audit? The report is:
138. An IS auditor notes that failed login attempts to a core financial system are automatically logged
and the logs are retained for a year by the organization. The IS auditor should conclude that this is:
139. Which of the following BEST ensures that users have uninterrupted access to a critical, heavily
utilized web-based application?
A. Disk mirroring
B. Redundancy array of inexpensive disks (RAID) technology
C. Dynamic domain name system (DNS)
D. Load balancing
140. Which of the following should be of MOST concern to an IS auditor reviewing the business
continuity plan (BCP)?
A. The disaster levels are based on scopes of damaged functions but not on duration.
B. The difference between low-level disaster and software incidents is not clear.
C. The overall BCP is documented, but detailed recovery steps are not specified.
D. The responsibility for declaring a disaster is not identified.
141. Which of the following is the BEST factor for determining the required extent of data collection
during the planning phase of an IS compliance audit?
143. The GREATEST advantage of using web services for the exchange of information between two
systems is:
A. Secure communication
B. Improve performance
C. Efficient interfacing
D. Enhanced documentation
144. Which of the following tasks should be performed FIRST when preparing a disaster recovery plan
(DRP)?
145. There is a concern that the risk of unauthorized access may increase after implementing a single
sign-on (SSO) process. To prevent unauthorized access, the MOST important action is to:
146. The MOST important reason for an IS auditor to obtain sufficient and appropriate audit evidence is
to:
148. Which of the following is the MOST important for an IS auditor to consider when reviewing a service
level agreement (SLA) with an external IT service provider?
A. Payment terms
B. Uptime guarantee
C. Indemnification clause
D. Default resolution
149. When planning to add personnel to tasks imposing time constraints on the duration of a project,
which of the following should be revalidated FIRST?
150. An IS auditor wishes to determine the effectiveness of managing user access to a server room.
Which of the following is the BEST evidence of effectiveness?