Domain 1 Q&A
Domain 1 Q&A
3. Which of the following would an IS auditor MOST likely focus on when developing a risk-based
audit program?
A. Business processes
B. Administrative controls
C. Environmental controls
D. Business strategies
Answer: A. Business processes
4. Which of the following types of audit risk assumes an absence of compensating controls in the
area being reviewed?
A. Control risk
B. Detection risk
C. Inherent risk
D. Sampling risk
Answer: C. Inherent risk
A. Disregard these control weaknesses because they are not part of the application controls.
B. Review the system software controls as it may be a part of the overall review.
C. Refer the matter to management and include it in the audit report.
D. Request that the auditee investigate the matter.
Answer: B. Review the system software controls as it may be a part of the overall review.
6. An IS auditor is evaluating the control framework in a large organization. Which of the following
is the BEST recommendation?
A. Implement an established framework.
B. Develop an internal framework.
C. Implement an established framework and internal controls.
D. Implement an established framework and customize it as needed.
Answer: D. Implement an established framework and customize it as needed.
8. Which of the following is the BEST way to ensure that audit findings are addressed in a timely
manner?
A. Include audit findings in a formal report.
B. Follow up with the auditee periodically.
C. Require the auditee to submit a corrective action plan.
D. Schedule a follow-up audit.
Answer: C. Require the auditee to submit a corrective action plan.
10. Which of the following should be the PRIMARY basis for planning IS audit activities?
A. The results of risk assessments
B. The availability of audit staff
C. The findings from previous audits
D. The schedule of audits approved by senior management
Answer: A. The results of risk assessments
12. An IS auditor is reviewing the implementation of an enterprise resource planning (ERP) system.
Which of the following is the MOST critical control that should be evaluated?
A. User acceptance testing
B. Data conversion procedures
C. Access controls
D. System documentation
Answer: C. Access controls
13. Which of the following is the BEST indicator of the effectiveness of an information security
policy?
A. The number of security incidents
B. The extent of user compliance
C. The frequency of policy updates
D. The scope of policy coverage
Answer: B. The extent of user compliance
14. When conducting an IS audit, which of the following is the MOST important consideration when
reviewing the adequacy of backup procedures?
15. An IS auditor reviewing the adequacy of controls over internet-based financial transactions
should be MOST concerned if:
A. User access to the internet is unrestricted.
B. Transactions are not encrypted during transmission.
C. User activities are not monitored.
D. Data is not backed up regularly.
Answer: B. Transactions are not encrypted during transmission.
16. Which of the following is the MOST important consideration when planning an IS audit?
A. The scope of the audit
B. The availability of audit tools
C. The auditee’s schedule
D. The audit budget
Answer: A. The scope of the audit
17. An IS auditor is planning an audit of a new application system. Which of the following is the
MOST important consideration?
A. The availability of system documentation
B. The complexity of the system
C. The criticality of the system to the organization
D. The experience of the audit team
Answer: C. The criticality of the system to the organization
18. Which of the following should be the FIRST step in developing an IS audit plan?
A. Assessing the availability of audit resources
B. Identifying the auditable units
C. Performing a risk assessment
D. Reviewing the organization’s objectives
Answer: C. Performing a risk assessment
19. Which of the following is the MOST important factor in ensuring the effectiveness of an IS audit
function?
20. An IS auditor is evaluating the effectiveness of a business continuity plan (BCP). Which of the
following is the MOST important factor to consider?
A. The frequency of BCP testing
B. The involvement of senior management in the BCP process
C. The alignment of the BCP with organizational objectives
D. The comprehensiveness of the BCP documentation
Answer: C. The alignment of the BCP with organizational objectives
21. Which of the following is the MOST important consideration when evaluating the adequacy of an
organization’s information security policy?
A. The policy’s alignment with organizational objectives
B. The frequency of policy updates
C. The policy’s compliance with regulatory requirements
D. The extent of user awareness of the policy
Answer: A. The policy’s alignment with organizational objectives
22. An IS auditor is reviewing the implementation of a new application system. Which of the
following is the MOST important control to review?
A. User access controls
B. Data conversion procedures
C. System documentation
D. User training
Answer: A. User access controls
23. Which of the following is the MOST important consideration when planning an IS audit of a
third-party service provider?
A. The service provider’s reputation
B. The terms of the service level agreement (SLA)
C. The availability of audit evidence
D. The service provider’s compliance with regulations
Answer: C. The availability of audit evidence
24. An IS auditor is reviewing the controls over an organization’s data center. Which of the
following is the MOST important control to review?
A. Physical access controls
B. Environmental controls
C. Fire suppression systems
D. Data backup procedures
Answer: A. Physical access controls
25. Which of the following is the MOST important consideration when evaluating the effectiveness
of an organization’s incident response plan?
A. The frequency of incident response training
B. The involvement of senior management in the incident response process
C. The alignment of the incident response plan with organizational objectives
D. The comprehensiveness of the incident response documentation
Answer: C. The alignment of the incident response plan with organizational objectives
26. An IS auditor is reviewing the controls over an organization’s network infrastructure. Which of
the following is the MOST important control to review?
A. Network access controls
B. Network monitoring procedures
C. Network documentation
D. Network configuration management
Answer: A. Network access controls
27. Which of the following is the MOST important consideration when planning an IS audit of an
organization’s information security program?
A. The scope of the information security program
B. The availability of information security resources
C. The alignment of the information security program with organizational objectives
D. The experience of the information security staff
Answer: C. The alignment of the information security program with organizational objectives
28. An IS auditor is evaluating the controls over an organization’s change management process.
Which of the following is the MOST important control to review?
A. Change authorization procedures
B. Change testing procedures
C. Change documentation
D. Change implementation procedures
Answer: A. Change authorization procedures
29. Which of the following is the MOST important consideration when evaluating the effectiveness
of an organization’s data backup procedures?
A. The frequency of data backups
B. The type of backup media used
C. The location of backup storage
D. The ability to restore data
Answer: D. The ability to restore data
30. An IS auditor is reviewing the controls over an organization’s disaster recovery plan (DRP).
Which of the following is the MOST important control to review?
A. The comprehensiveness of the DRP documentation
B. The frequency of DRP testing
C. The alignment of the DRP with organizational objectives
D. The involvement of senior management in the DRP process
Answer: C. The alignment of the DRP with organizational objectives
31. Which of the following is the MOST important consideration when evaluating the effectiveness
of an organization’s information security policy?
A. The frequency of policy updates
B. The policy’s compliance with regulatory requirements
C. The extent of user awareness of the policy
D. The policy’s alignment with organizational objectives
Answer: D. The policy’s alignment with organizational objectives
32. An IS auditor is reviewing the controls over an organization’s IT asset management process.
Which of the following is the MOST important control to review?
A. Asset inventory procedures
B. Asset disposal procedures
C. Asset acquisition procedures
D. Asset tracking procedures
Answer: A. Asset inventory procedures
5. What is considered the MOST critical element for the successful implementation of an
information security program?
A. An effective enterprise risk management framework
B. Senior management commitment
C. An adequate budgeting process
D. Meticulous program planning
Answer: B. Senior management commitment
7. Which of the following tasks may be performed by the same person in a well-controlled
information processing computer center?
A. Security administration and change management
B. Computer operations and system development
C. System development and change management
D. System development and system maintenance
Answer: D. System development and system maintenance
8. Which of the following is the MOST critical control over database administration (DBA)?
A. Ensuring database modifications are reviewed
B. Segregating DBA functions from application programming
C. Implementing change management procedures
D. Logging changes to the database
Answer: B. Segregating DBA functions from application programming
9. An IS auditor should review the procedures for the backup and storage of the database logs to
ensure that the logs are:
A. Archived to a secure location.
B. Manually maintained.
C. Stored on tapes.
D. Tested periodically.
Answer: A. Archived to a secure location.
10. The IS audit process must be performed in accordance with the IS audit standards established by:
A. The organization being audited.
B. The IS auditor’s organization.
C. International auditing standards.
D. ISACA.
Answer: D. ISACA.
11. Which of the following is the MOST important objective of the exit conference with
management?
A. To explain the audit findings
B. To gain agreement on the audit findings
C. To review recommendations
D. To discuss the audit report
Answer: B. To gain agreement on the audit findings
13. Which of the following should an IS auditor use to detect duplicate invoice records within an
invoice master file?
14. Which of the following is the MOST important consideration when planning an IS audit?
A. The scope of the audit
B. The availability of audit tools
C. The auditee’s schedule
D. The audit budget
Answer: A. The scope of the audit
15. An IS auditor is reviewing the implementation of an enterprise resource planning (ERP) system.
Which of the following is the MOST critical control that should be evaluated?
A. User acceptance testing
B. Data conversion procedures
C. Access controls
D. System documentation
Answer: C. Access controls
16. Which of the following BEST indicates the success of a security awareness training program?
A. Reduced number of security incidents
B. Increased number of reported incidents
C. Higher compliance rates
D. Positive feedback from participants
Answer: A. Reduced number of security incidents
17. Which of the following should be the FIRST step in developing an IS audit plan?
A. Assessing the availability of audit resources
B. Identifying the auditable units
C. Performing a risk assessment
D. Reviewing the organization’s objectives
Answer: C. Performing a risk assessment
18. Which of the following should be the PRIMARY basis for planning IS audit activities?
A. The results of risk assessments
B. The availability of audit staff
C. The findings from previous audits
D. The schedule of audits approved by senior management
Answer: A. The results of risk assessments
19. Which of the following BEST describes an IS auditor’s primary responsibility when performing
an audit?
A. Detecting fraud
B. Examining transactions
C. Reporting findings
D. Evaluating controls
Answer: D. Evaluating controls
20. An IS auditor is reviewing the controls over an organization’s data center. Which of the
following is the MOST important control to review?
A. Physical access controls
B. Environmental controls
C. Fire suppression systems
D. Data backup procedures
Answer: A. Physical access controls
22. Which of the following is the MOST important factor in ensuring the effectiveness of an IS audit
function?
A. The independence of the audit team
B. The experience of the audit staff
C. The comprehensiveness of the audit plan
D. The support of senior management
Answer: D. The support of senior management
23. Which of the following is the MOST important consideration when evaluating the adequacy of an
organization’s information security policy?
A. The policy’s alignment with organizational objectives
B. The frequency of policy updates
C. The policy’s compliance with regulatory requirements
D. The extent of user awareness of the policy
Answer: A. The policy’s alignment with organizational objectives
24. An IS auditor is reviewing the implementation of a new application system. Which of the
following is the MOST important control to review?
A. User access controls
B. Data conversion procedures
C. System documentation
D. User training
Answer: A. User access controls
25. Which of the following is the MOST important consideration when planning an IS audit of a
third-party service provider?
A. The service provider’s reputation
B. The terms of the service level agreement (SLA)
C. The availability of audit evidence
D. The service provider’s compliance with regulations
Answer: C. The availability of audit evidence
26. Which of the following is the MOST important consideration when evaluating the effectiveness
of an organization’s information security program?
A. The extent of user awareness
B. The alignment with organizational objectives
C. The frequency of security incidents
D. The comprehensiveness of the security policy
Answer: B. The alignment with organizational objectives
Domain 3: Information Systems Acquisition, Development and
Implementation - Self-assessment Questions and Answers
1. To assist in testing an essential banking system being acquired, an organization has provided
the vendor with sensitive data from its existing production system. An IS auditor’s PRIMARY
concern is that the data should be:
A. sanitized.
B. complete.
C. representative.
D. current.
Answer: A. sanitized.
2. Which of the following is the PRIMARY purpose for conducting parallel testing?
A. To determine if the system operates in the production environment.
B. To determine if the new system performs adequately before replacing the old system.
C. To test the old and new systems simultaneously.
D. To ensure the new system meets user requirements.
Answer: B. To determine if the new system performs adequately before replacing the old
system.
3. The BEST method to ensure that the new system is compatible with the existing system is:
A. Data mapping.
B. Integration testing.
C. Pilot testing.
D. Parallel testing.
Answer: B. Integration testing.
A. Adequate funding.
B. User involvement.
C. Executive support.
D. Skilled team members.
Answer: C. Executive support.
6. During the implementation phase of an IS project, which of the following activities should be
the PRIMARY responsibility of the user department?
A. Developing test data.
B. Developing detailed system specifications.
C. Coding and documentation.
D. Approving user acceptance testing.
Answer: D. approving user acceptance testing.
7. Which of the following represents the GREATEST risk when assessing the impact of
changes to the scope of an IT project?
A. Increased project costs.
B. Implementation delays.
C. Inadequate testing.
D. Reduced quality of deliverables.
Answer: D. Reduced quality of deliverables.
8. Which of the following tasks should an IS auditor perform FIRST when developing an audit
program for reviewing an application system?
A. Gain an understanding of the business process.
B. Identify relevant IT risks.
C. Evaluate existing controls.
D. Review previous audit reports.
Answer: A. Gain an understanding of the business process.
10. Which of the following BEST describes the role of an IS auditor during the implementation of a
new system?
A. To design and test application controls.
B. To act as a consultant to project management.
C. To develop and execute test plans.
D. To ensure that data conversion is accurate.
Answer: B. To act as a consultant to project management.
12. Which of the following is the MOST critical factor to the success of a project?
A. Clearly defined objectives.
B. A large budget.
C. A detailed project plan.
D. Experienced project team members.
Answer: A. Clearly defined objectives.
13. Which of the following is the BEST method for managing scope changes in a project?
A. Using a formal change control process.
B. Conducting regular project status meetings.
C. Performing risk assessments.
D. Documenting all project changes.
Answer: A. Using a formal change control process.
14. Which of the following BEST ensures that a new application meets the requirements of the
business?
A. Conducting a user acceptance test.
B. Performing a system integration test.
C. Developing detailed functional specifications.
D. Using a prototyping approach.
Answer: A. Conducting a user acceptance test.
15. Which of the following BEST describes the role of an IS auditor during the feasibility study phase
of an application development project?
A. To review the feasibility study report.
B. To assist in the development of functional specifications.
C. To design test cases for the new system.
D. To participate in the selection of the project team.
Answer: A. To review the feasibility study report.
16. Which of the following is the BEST way to ensure that the implementation of a new system does
not disrupt the operations of other systems?
A. Conducting system integration testing.
B. Implementing the new system during off-peak hours.
C. Using a phased implementation approach.
D. Performing a post-implementation review.
Answer: A. Conducting system integration testing.
17. Which of the following is the PRIMARY purpose of conducting a post-implementation review?
A. To ensure that project objectives were achieved.
B. To identify lessons learned for future projects.
C. To evaluate the effectiveness of the project management process.
D. To ensure that system requirements were met.
Answer: A. To ensure that project objectives were achieved.
18. Which of the following is the MOST important reason for conducting a post-implementation
review?
A. To ensure that project objectives were achieved.
B. To evaluate the effectiveness of the project management process.
C. To ensure that system requirements were met.
D. To identify lessons learned for future projects.
Answer: A. to ensure that project objectives were achieved.
2. For mission-critical systems with a low tolerance to interruption and a high cost of recovery,
the IS auditor, in principle, recommends the use of which of the following recovery options?
A. Mobile site
B. Warm site
C. Cold site
D. Hot site
Answer: D. Hot site
3. Which of the following is the MOST effective method for an IS auditor to use in testing the
program change management process?
A. Trace from system-generated information to the change management documentation
B. Examine change management documentation for evidence of accuracy
C. Trace from the change management documentation to a system-generated audit trail
D. Examine change management documentation for evidence of completeness
Answer: A. Trace from system-generated information to the change management
documentation
4. Which of the following would allow an enterprise to extend its intranet across the Internet to
its business partners?
A. Virtual private network
B. Client-server
C. Dial-up access
D. Network service provider
Answer: A. Virtual private network
6. When conducting an audit of client-server database security, the IS auditor should be MOST
concerned about the availability of:
A. System utilities
B. Application program generators
C. Systems security documentation
D. Access to stored procedures
Answer: D. Access to stored procedures
7. When reviewing a network used for Internet communications, an IS auditor will FIRST
examine the:
A. Validity of password change occurrences
B. Architecture of the client-server application
C. Network architecture and design
D. Firewall protection and proxy servers
Answer: C. Network architecture and design
10. Which of the following components of a business continuity plan is PRIMARILY the
responsibility of an organization’s IS department?
A. Developing the business continuity plan
B. Selecting and approving the recovery strategies used in the business continuity plan
C. Declaring a disaster
D. Restoring the IT systems and data after a disaster
Answer: D. Restoring the IT systems and data after a disaster
11. Which of the following is the BEST method to ensure that the new system is compatible with
the existing system?
A. Data mapping
B. Integration testing
C. Pilot testing
D. Parallel testing
Answer: B. Integration testing
12. Which of the following would be of GREATEST concern to an IS auditor reviewing the
implementation of a new system?
A. Lack of user training
B. Lack of management support
C. Lack of system documentation
D. Lack of a project management plan
Answer: D. Lack of a project management plan
13. Which of the following is MOST important to ensure the success of a project?
A. Adequate funding
B. User involvement
C. Executive support
D. Skilled team members
Answer: C. Executive support
14. During the implementation phase of an IS project, which of the following activities should be
the PRIMARY responsibility of the user department?
A. Developing test data
B. Developing detailed system specifications
C. Coding and documentation
D. Approving user acceptance testing
Answer: D. approving user acceptance testing
15. Which of the following represents the GREATEST risk when assessing the impact of
changes to the scope of an IT project?
A. Increased project costs
B. Implementation delays
C. Inadequate testing
D. Reduced quality of deliverables
Answer: D. Reduced quality of deliverables
16. Which of the following tasks should an IS auditor perform FIRST when developing an audit
program for reviewing an application system?
A. Gain an understanding of the business process
B. Identify relevant IT risks
C. Evaluate existing controls
D. Review previous audit reports
Answer: A. Gain an understanding of the business process
18. Which of the following BEST describes the role of an IS auditor during the implementation
of a new system?
A. To design and test application controls
B. To act as a consultant to project management
C. To develop and execute test plans
D. To ensure that data conversion is accurate
Answer: B. to act as a consultant to project management
20. Which of the following is the MOST critical factor to the success of a project?
A. Clearly defined objectives
B. A large budget
C. A detailed project plan
D. Experienced project team members
Answer: A. clearly defined objectives
21. Which of the following is the BEST method for managing scope changes in a project?
A. Using a formal change control process
B. Conducting regular project status meetings
C. Performing risk assessments
D. Documenting all project changes
Answer: A. Using a formal change control process
22. Which of the following BEST ensures that a new application meets the requirements of the
business?
A. Conducting a user acceptance test
B. Performing a system integration test
C. Developing detailed functional specifications
D. Using a prototyping approach
Answer: A. Conducting a user acceptance test
23. Which of the following BEST describes the role of an IS auditor during the feasibility study
phase of an application development project?
A. To review the feasibility study report
B. To assist in the development of functional specifications
C. To design test cases for the new system
D. To participate in the selection of the project team
Answer: A. To review the feasibility study report
24. Which of the following is the BEST way to ensure that the implementation of a new system
does not disrupt the operations of other systems?
A. Conducting system integration testing
B. Implementing the new system during off-peak hours
C. Using a phased implementation approach
D. Performing a post-implementation review
Answer: A. Conducting system integration testing
26. Which of the following is the MOST important reason for conducting a post-implementation
review?
A. To ensure that project objectives were achieved
B. To evaluate the effectiveness of the project management process
C. To ensure that system requirements were met
D. To identify lessons learned for future projects
Answer: A. To ensure that project objectives were achieved
27. Which of the following is the MOST critical factor to the success of an IT project?
A. Clearly defined objectives
B. A detailed project plan
C. A large budget
D. Experienced project team members
Answer: A. Clearly defined objectives
28. Which of the following is the BEST way to ensure that changes to an application do not
introduce new risks?
A. Conducting a risk assessment
B. Performing a system integration test
C. Conducting a user acceptance test
D. Using a phased implementation approach
Answer: B. Performing a system integration test
30. Which of the following is the MOST critical factor to the success of an IT project?
A. Clearly defined objectives
B. A detailed project plan
C. A large budget
D. Experienced project team members
Answer: A. Clearly defined objectives
31. Which of the following is the BEST way to ensure that changes to an application do not
introduce new risks?
A. Conducting a risk assessment
B. Performing a system integration test
C. Conducting a user acceptance test
D. Using a phased implementation approach
Answer: B. Performing a system integration test
33. Which of the following is the MOST critical factor to the success of an IT project?
A. Clearly defined objectives
B. A detailed project plan
C. A large budget
D. Experienced project team members
Answer: A. Clearly defined objectives
34. Which of the following is the BEST way to ensure that changes to an application do not
introduce new risks?
A. Conducting a risk assessment
B. Performing a system integration test
C. Conducting a user acceptance test
D. Using a phased implementation approach
Answer: B. Performing a system integration test
2. Which of the following BEST provides access control to payroll data being processed on a local
server?
A. Logging access to personal information
B. Using separate passwords for sensitive transactions
C. Using software that restricts access rules to authorized staff
D. Restricting system access to business hours
Answer: C. Using software that restricts access rules to authorized staff.
3. An IS auditor has just completed a review of an organization that has a mainframe computer and
two database servers where all production data reside. Which of the following weaknesses would
be considered the MOST serious?
A. The security officer also serves as the database administrator.
B. Password controls are not administered over the two database servers.
C. There is no business continuity plan for the mainframe system’s noncritical applications.
D. Most local area networks do not back up file-server-fixed disks regularly.
Answer: B. Password controls are not administered over the two database servers.
4. An organization is proposing to install a single sign-on facility giving access to all systems. The
organization should be aware that:
A. Maximum unauthorized access would be possible if a password is disclosed.
B. User access rights would be restricted by the additional security parameters.
C. The security administrator’s workload would increase.
D. User access rights would be increased.
Answer: A. Maximum unauthorized access would be possible if a password is disclosed.
6. An insurance company is using public cloud computing for one of its critical applications to
reduce costs. Which of the following would be of MOST concern to the IS auditor?
A. The inability to recover the service in a major technical failure scenario.
B. The data in the shared environment being accessed by other companies.
C. The service provider not including investigative support for incidents.
D. The long-term viability of the service if the provider goes out of business.
Answer: B. The data in the shared environment being accessed by other companies.
7. Which of the following BEST determines whether complete encryption and authentication
protocols for protecting information while being transmitted exist?
A. A digital signature with RSA has been implemented.
B. Work is being done in tunnel mode with the nested services of AH and ESP.
Answer: B. Work is being done in tunnel mode with the nested services of AH and ESP.
8. Which of the following concerns about the security of an electronic message would be addressed
by digital signatures?
A. Unauthorized reading
B. Theft
C. Unauthorized copying
D. Alteration
Answer: D. Alteration
10. Which of the following is the MOST effective preventive antivirus control?
A. Scanning email attachments on the mail server
B. Restoring systems from clean copies
C. Disabling universal serial bus ports
D. An online antivirus scan with up-to-date virus definitions
Answer: A. Scanning email attachments on the mail server
12. Which of the following is the BEST method to prevent a successful attack against a system with
known vulnerabilities?
A. Installing an intrusion detection system.
B. Applying the latest security patches.
C. Implementing proper firewall rules.
D. Using network segmentation.
Answer: B. Applying the latest security patches.
13. Which of the following techniques is the MOST effective for detecting vulnerabilities in a
network?
A. Penetration testing
B. Intrusion detection
C. Vulnerability scanning
D. Network traffic analysis
Answer: A. Penetration testing
14. Which of the following BEST describes the primary objective of implementing corporate
governance of IT?
A. Alignment of IT with business objectives
B. Compliance with regulatory requirements
C. Assurance of effective IT risk management
D. Achievement of cost efficiency in IT operations
Answer: A. Alignment of IT with business objectives
15. Which of the following would BEST help an IS auditor understand an organization's information
security program?
A. Reviewing the information security policy
B. Interviewing key information security personnel
C. Evaluating the results of a security risk assessment
D. Reviewing information security incident reports
Answer: A. Reviewing the information security policy
17. Which of the following is MOST effective in preventing brute force attacks on network devices?
A. Limiting login attempts
B. Using complex passwords
C. Encrypting network traffic
D. Implementing a strong firewall
Answer: A. Limiting login attempts
18. Which of the following is the BEST method for controlling access to systems containing
sensitive information?
A. Implementing role-based access controls
B. Using biometric authentication
C. Requiring two-factor authentication
D. Encrypting sensitive information
Answer: A. Implementing role-based access controls
19. Which of the following is MOST important when considering the security of an outsourced IT
function?
A. Reviewing the vendor's security policies and procedures
B. Ensuring the vendor has insurance coverage
C. Conducting regular security audits of the vendor
D. Including security requirements in the contract
Answer: D. including security requirements in the contract
20. Which of the following would BEST ensure the confidentiality of data stored in the cloud?
21. Which of the following is the PRIMARY purpose of an incident response plan?
A. To ensure business continuity during an incident
B. To minimize the impact of security incidents
C. To document security incidents and responses
D. To comply with regulatory requirements
Answer: B. To minimize the impact of security incidents
22. Which of the following is the MOST effective way to prevent unauthorized access to data on
mobile devices?
A. Encrypting the data
B. Using strong passwords
C. Implementing remote wipe capabilities
D. Requiring multi-factor authentication
Answer: A. Encrypting the data
23. Which of the following is the MOST effective control to prevent internal fraud?
A. Segregation of duties
B. Implementing an audit trail
C. Conducting background checks
D. Requiring mandatory vacations
Answer: A. Segregation of duties
25. Which of the following is the MOST important consideration when developing an information
security policy?
A. Aligning with business objectives
B. Complying with legal requirements
C. Addressing all identified risks
D. Ensuring user awareness
Answer: A. Aligning with business objectives
26. Which of the following BEST describes the primary objective of an IT risk management
program?
A. To identify and mitigate IT risks
B. To comply with regulatory requirements
C. To improve IT governance
D. To enhance IT service delivery
Answer: A. To identify and mitigate IT risks
27. Which of the following is MOST effective in ensuring that unauthorized changes to production
systems are detected?
A. Implementing change management procedures
B. Conducting regular audits
C. Using a version control system
D. Monitoring system logs
Answer: D. monitoring system logs
28. Which of the following is the BEST method to ensure that security patches are applied in a timely
manner?
A. Implementing an automated patch management system
B. Conducting regular vulnerability assessments
C. Establishing a patch management policy
D. Performing regular system audits
Answer: A. Implementing an automated patch management system
29. Which of the following BEST describes the purpose of a security awareness program?
A. To educate users about security policies and procedures
B. To ensure compliance with security policies
C. To reduce the number of security incidents
D. To improve the organization's security posture
Answer: A. To educate users about security policies and procedures
30. Which of the following is the MOST important factor when selecting a cloud service provider?
A. The provider's security controls
B. The provider's compliance with regulations
C. The provider's reputation
D. The provider's service level agreements
Answer: A. The provider's security controls
31. Which of the following is the PRIMARY purpose of a data classification scheme?
A. To determine the appropriate level of protection for data
B. To comply with legal and regulatory requirements
C. To ensure data integrity
D. To facilitate data recovery
Answer: A. To determine the appropriate level of protection for data
32. Which of the following is the BEST way to ensure that only authorized personnel have access to
sensitive information?
A. Implementing role-based access controls
B. Conducting regular access reviews
C. Using strong passwords
D. Encrypting sensitive information
Answer: A. Implementing role-based access controls
33. Which of the following is the MOST important factor in the success of an information security
program?
A. Management support
B. User awareness
C. Adequate funding
D. Effective policies and procedures
Answer: A. Management support
34. Which of the following is the MOST effective way to manage the risk of data leakage from
mobile devices?
A. Implementing a mobile device management solution
B. Using strong passwords
C. Encrypting the data
D. Conducting regular security awareness training
Answer: A. Implementing a mobile device management solution
35. Which of the following is the PRIMARY purpose of an incident response team?
A. To coordinate the organization's response to security incidents
B. To investigate security incidents
C. To document security incidents and responses
D. To prevent security incidents
Answer: A. To coordinate the organization's response to security incidents
36. Which of the following is the MOST important factor in the effectiveness of a security awareness
program?
A. Management support
B. User participation
C. Regular updates
D. Comprehensive content
Answer: A. Management support
37. Which of the following is the BEST method for ensuring that access to sensitive information is
restricted to authorized users?
A. Implementing role-based access controls
B. Using strong passwords
C. Conducting regular access reviews
D. Encrypting the information
Answer: A. Implementing role-based access controls
38. Which of the following is the PRIMARY objective of a security policy?
A. To define acceptable use of information systems
B. To establish guidelines for protecting information assets
C. To ensure compliance with legal and regulatory requirements
D. To provide a framework for managing security risks
Answer: D. To provide a framework for managing security risks
39. Which of the following is the MOST effective way to protect data at rest?
A. Encrypting the data
B. Implementing access controls
C. Using strong passwords
D. Conducting regular security audits
Answer: A. Encrypting the data
40. Which of the following is the BEST way to ensure that users comply with security policies?
A. Conducting regular security awareness training
B. Implementing technical controls
C. Performing regular audits
D. Enforcing disciplinary measures
Answer: A. Conducting regular security awareness training
41. Which of the following is the MOST important consideration when developing an incident
response plan?
A. Ensuring business continuity
B. Minimizing the impact of incidents
C. Complying with legal requirements
D. Documenting incidents and responses
Answer: B. Minimizing the impact of incidents