Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
91 views680 pages

CISA - Practice Questions and Answers v1.0

The document is a practice test for the Certified Information Systems Auditor (CISA) exam, containing 25 questions with correct answers and explanations. It covers various topics related to information systems auditing, including business continuity plans, data integrity, incident management, and project evaluations. Each question assesses the auditor's knowledge and understanding of critical concepts in information systems and governance.

Uploaded by

boho naibaho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views680 pages

CISA - Practice Questions and Answers v1.0

The document is a practice test for the Certified Information Systems Auditor (CISA) exam, containing 25 questions with correct answers and explanations. It covers various topics related to information systems auditing, including business continuity plans, data integrity, incident management, and project evaluations. Each question assesses the auditor's knowledge and understanding of critical concepts in information systems and governance.

Uploaded by

boho naibaho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 680

CERTIFIED INFORMATION SYSTEMS AUDIT

(CISA)
Practice Test 2025

Compiled by Storm Chaser


Certified Information Systems Audit (CISA)
Practice Test

Question 1
Which of the following should be of GREATEST concern to an IS auditor reviewing
an organization's business continuity plan (BCP)?
A. The BCP has not been tested since it was first issued.
B. The BCP is not version-controlled.
C. The BCP's contact information needs to be updated.
D. The BCP has not been approved by senior management.
Correct Answer: A – The BCP has not been tested since it was first
issued
Explanation: Regular testing of the BCP is critical to ensure that the plan is
practical, effective, and executable in a real emergency. An untested plan may fail
when it's needed most.
Incorrect Answers:
B. Lack of version control is an issue, but not as critical as not testing the plan.
C. Contact information is important, but outdated contacts can be updated quickly.
D. While approval is necessary, an untested plan poses a greater operational risk.

Question 2
Which of the following would be MOST useful when analyzing computer
performance?
A. Tuning of system software to optimize resource usage
B. Operations report of user dissatisfaction with response time
C. Statistical metrics measuring capacity utilization
D. Report of off-peak utilization and response time
Correct Answer: C – Statistical metrics measuring capacity utilization
Explanation: Statistical metrics provide objective and quantifiable data to analyze
system performance, making them the most reliable for performance assessments.
Incorrect Answers:
A. Tuning is a solution, not an analytical method.
B. User reports are subjective and less precise.
D. Off-peak reports might not reflect typical system loads.

Question 3
Which of the following is the GREATEST risk if two users have concurrent access to
the same database record?
A. Entity integrity
B. Availability integrity
C. Referential integrity
D. Data integrity
Correct Answer: D – Data integrity
Explanation: Concurrent access to the same record can cause inconsistent updates,
leading to corrupted or lost data—violating data integrity.
Incorrect Answers:
A. Entity integrity ensures primary keys are unique, not related to concurrency.
B. Availability isn't directly impacted.
C. Referential integrity relates to relationships between tables.

Question 4
Which of the following is the MOST effective way for an organization to help ensure
agreed-upon action plans from an IS audit will be implemented?
A. Ensure ownership is assigned.
B. Test corrective actions upon completion.
C. Ensure sufficient audit resources are allocated.
D. Communicate audit results organization-wide.
Correct Answer: A – Ensure ownership is assigned
Explanation: Assigning clear ownership ensures accountability for implementing
audit recommendations.
Incorrect Answers:
B. Testing is important after implementation, not for ensuring implementation.
C. Audit resources don’t enforce implementation.
D. Communication is useful, but lacks enforcement.

Question 5
Which of the following issues associated with a data center's closed circuit television
(CCTV) surveillance cameras should be of MOST concern to an IS auditor?
A. CCTV recordings are not regularly reviewed.
B. CCTV records are deleted after one year.
C. CCTV footage is not recorded 24 x 7.
D. CCTV cameras are not installed in break rooms.
Correct Answer: A – CCTV recordings are not regularly reviewed
Explanation: Without regular reviews, suspicious activities could go unnoticed,
defeating the purpose of surveillance.
Incorrect Answers:
B. A year-long retention is often acceptable.
C. 24x7 recording is ideal, but less critical than review.
D. Monitoring break rooms may raise privacy concerns.

Question 6
An IS auditor has been asked to audit the proposed acquisition of new computer
hardware. The auditor's PRIMARY concern is that:
A. a clear business case has been established.
B. the new hardware meets established security standards.
C. a full, visible audit trail will be included.
D. the implementation plan meets user requirements.
Correct Answer: A – A clear business case has been established
Explanation: The most fundamental requirement is that the acquisition is justified
by a solid business need.
Incorrect Answers:
B. Security standards are secondary to the justification of purchase.
C. Audit trails relate to usage, not acquisition.
D. User requirements are addressed later in the process.

Question 7
To confirm integrity for a hashed message, the receiver should use:
A. the same hashing algorithm as the sender's to create a binary image of the file.
B. a different hashing algorithm from the sender's to create a numerical
representation of the file.
C. a different hashing algorithm from the sender's to create a binary image of the
file.
D. the same hashing algorithm as the sender's to create a numerical representation of
the file.
Correct Answer: D – the same hashing algorithm as the sender's to
create a numerical representation of the file
Explanation: Integrity is verified by comparing the sender's and receiver's hash
values, which requires using the same algorithm.
Incorrect Answers:
A/C. Binary image creation is not part of hash verification.
B. A different algorithm would produce a different hash value.

Question 8
An organization is implementing a new system that supports a month-end business
process. Which of the following implementation strategies would be MOST efficient
to decrease business downtime?
A. Cutover
B. Phased
C. Pilot
D. Parallel
Correct Answer: D – Parallel
Explanation: Running old and new systems in parallel ensures continuity and
minimizes downtime during the transition.
Incorrect Answers:
A. Cutover is faster but riskier.
B. Phased takes more time.
C. Pilot affects only a small user group initially.

Question 9
Which of the following should be the FIRST step in managing the impact of a
recently discovered zero-day attack?
A. Estimating potential damage
B. Identifying vulnerable assets
C. Evaluating the likelihood of attack
D. Assessing the impact of vulnerabilities
Correct Answer: B – Identifying vulnerable assets
Explanation: You must first determine what is at risk before taking protective or
corrective measures.
Incorrect Answers:
A. Damage estimation comes after identifying scope.
C. Zero-day implies unknown threat—likelihood is moot.
D. Impact assessment follows asset identification.

Question 10
Which of the following is the BEST way to ensure that an application is performing
according to its specifications?
A. Pilot testing
B. System testing
C. Integration testing
D. Unit testing
Correct Answer: B – System testing
Explanation: System testing verifies that the complete and integrated application
meets the defined requirements.
Incorrect Answers:
A. Pilot testing assesses usability, not performance specs.
C. Integration testing checks inter-module interaction.
D. Unit testing focuses on individual components.

Question 11
Which of the following would be MOST effective to protect information assets in a
data center from theft by a vendor?
A. Conceal data devices and information labels.
B. Issue an access card to the vendor.
C. Monitor and restrict vendor activities.
D. Restrict use of portable and wireless devices.
Correct Answer: C – Monitor and restrict vendor activities
Explanation: Active monitoring and access restrictions directly reduce the risk of
unauthorized actions and data theft.
Incorrect Answers:
A. Concealment is insufficient without monitoring.
B. Issuing access cards without monitoring increases risk.
D. Device restrictions help, but aren’t as effective alone.

Question 12
An employee loses a mobile device resulting in loss of sensitive corporate data. Which
of the following would have BEST prevented data leakage?
A. Data encryption on the mobile device
B. The triggering of remote data wipe capabilities
C. Awareness training for mobile device users
D. Complex password policy for mobile devices
Correct Answer: A – Data encryption on the mobile device
Explanation: Encryption ensures that data remains unreadable even if the device is
lost or stolen.
Incorrect Answers:
B. Remote wipe is reactive and may not occur before access.
C. Training doesn’t prevent actual data access.
D. Strong passwords help, but can be bypassed.

Question 13
During the evaluation of controls over a major application development project, the
MOST effective use of an IS auditor's time would be to review and evaluate:
A. cost-benefit analysis.
B. acceptance testing.
C. application test cases.
D. project plans.
Correct Answer: B – Acceptance testing
Explanation: Acceptance testing confirms that the application meets business and
functional requirements before implementation.
Incorrect Answers:
A. Cost-benefit is useful early in the project, not for control review.
C. Test cases are technical and may not reflect final functionality.
D. Plans alone don’t show whether requirements are met.

Question 14
Upon completion of audit work, an IS auditor should:
A. provide a report to the auditee stating the initial findings.
B. provide a report to senior management prior to discussion with the auditee.
C. distribute a summary of general findings to the members of the auditing team.
D. review the working papers with the auditee.
Correct Answer: A – provide a report to the auditee stating the initial
findings
Explanation: Auditors should present findings to the auditee first to ensure
accuracy and allow for clarification or response.
Incorrect Answers:
B. Reporting to senior management should follow auditee review.
C. Team summaries are internal steps, not a primary requirement.
D. Working papers are not typically reviewed by the auditee.

Question 15
During an IT general controls audit of a high-risk area where both internal and
external audit teams are reviewing the same areas simultaneously, which of the
following is the BEST approach to optimize resources?
A. Leverage the work performed by external audit for the internal audit testing.
B. Ensure both the internal and external auditors perform the work simultaneously.
C. Roll forward the general controls audit to the subsequent audit year.
D. Request that the external audit team leverage the internal audit work.
Correct Answer: A – Leverage the work performed by external audit
for the internal audit testing
Explanation: This avoids duplication of effort and improves audit efficiency through
collaboration.
Incorrect Answers:
B. Simultaneous work may waste resources.
C. Postponing audits in high-risk areas is not recommended.
D. Internal teams should validate external work, not rely solely on it.

Question 16
The GREATEST benefit of using a prototyping approach in software development is
that it helps to:
A. improve efficiency of quality assurance (QA) testing.
B. conceptualize and clarify requirements.
C. decrease the time allocated for user testing and review.
D. minimize scope changes to the system.
Correct Answer: B – conceptualize and clarify requirements
Explanation: Prototypes help users visualize the system early, allowing better
feedback and clearer requirements.
Incorrect Answers:
A. QA efficiency is not the primary benefit.
C. Prototyping may increase time for user involvement.
D. Scope changes are still likely with evolving requirements.

Question 17
After an employee termination, a network account was removed, but the application
account remained active. To keep this issue from recurring, which of the following is
the BEST recommendation?
A. Integrate application accounts with network single sign-on.
B. Perform periodic access reviews.
C. Retrain system administration staff.
D. Leverage shared accounts for the application.
Correct Answer: A – Integrate application accounts with network
single sign-on
Explanation: Centralized account management ensures that all associated access is
removed simultaneously.
Incorrect Answers:
B. Reviews are periodic and may not prevent immediate issues.
C. Training is helpful but not a technical control.
D. Shared accounts reduce accountability and increase risk.

Question 18
During an IT governance audit, an IS auditor notes that IT policies and procedures
are not regularly reviewed and updated. The GREATEST concern to the IS auditor
is that policies and procedures might not:
A. reflect current practices.
B. be subject to adequate quality assurance (QA).
C. include new systems and corresponding process changes.
D. incorporate changes to relevant laws.
Correct Answer: A – reflect current practices
Explanation: Outdated policies can result in misalignment with actual operational
practices, increasing risk.
Incorrect Answers:
B. QA is important but not the primary concern.
C. This is a subset of reflecting current practices.
D. Legal compliance is important but less broad in scope.

Question 19
Management receives information indicating a high level of risk associated with
potential flooding near the organization's data center within the next few years. As a
result, a decision has been made to move data center operations to another facility
on higher ground. Which approach has been adopted?
A. Risk reduction
B. Risk acceptance
C. Risk transfer
D. Risk avoidance
Correct Answer: D – Risk avoidance
Explanation: Moving the facility eliminates the threat exposure entirely, which is a
form of risk avoidance.
Incorrect Answers:
A. Risk reduction would involve mitigation, not elimination.
B. Risk acceptance involves taking no action.
C. Risk transfer involves shifting risk to another party.

Question 20
An emergency power-off switch should:
A. not be in the computer room.
B. not be identified
C. be protected.
D. be illuminated.
Correct Answer: C – be protected
Explanation: The switch must be protected to prevent accidental activation, which
could cause unintended downtime.
Incorrect Answers:
A. It must be accessible in emergencies, often in the room.
B. It should be clearly marked for emergency use.
D. Illumination is useful but secondary to protection.

Question 21
Which of the following is the PRIMARY role of the IS auditor in an organization's
information classification process?
A. Securing information assets in accordance with the classification assigned
B. Validating that assets are protected according to assigned classification
C. Ensuring classification levels align with regulatory guidelines
D. Defining classification levels for information assets within the organization
Correct Answer: B – Validating that assets are protected according to
assigned classification
Explanation: The IS auditor's primary role is to validate that the organization is
applying controls based on the classification levels, not to define or assign them.
Incorrect Answers:
A. Securing assets is management's responsibility, not the auditor’s.
C. Ensuring alignment is part of management's policy role.
D. Defining classification is not the auditor’s duty.

Question 22
When evaluating whether the expected benefits of a project have been achieved, it is
MOST important for an IS auditor to review:
A. the project schedule.
B. quality assurance (QA) results.
C. post-implementation issues.
D. the business case
Correct Answer: D – the business case
Explanation: The business case outlines expected benefits and serves as the baseline
for evaluating if those benefits were delivered.
Incorrect Answers:
A. Schedule tracks timing, not value delivery.
B. QA focuses on product quality, not benefits.
C. Issues may highlight problems but not measure benefits.

Question 23
Which of the following is the MOST important reason for IS auditors to perform
post-implementation reviews for critical IT projects?
A. To determine whether vendors should be paid for project deliverables
B. To provide the audit committee with an assessment of project team performance
C. To provide guidance on the financial return on investment (ROI) of projects
D. To determine whether the organization's objectives were met as expected
Correct Answer: D – To determine whether the organization's
objectives were met as expected
Explanation: The purpose of post-implementation reviews is to ensure that the
project outcomes align with organizational goals.
Incorrect Answers:
A. Payment decisions are handled by project managers.
B. Performance reviews are HR-related.
C. ROI is part of the business evaluation, not the main audit concern.

Question 24
Which of the following BEST indicates that an incident management process is
effective?
A. Decreased number of calls to the help desk
B. Increased number of incidents reviewed by IT management
C. Decreased time for incident resolution
D. Increased number of reported critical incidents
Correct Answer: C – Decreased time for incident resolution
Explanation: Faster resolution indicates that the incident management process is
effective and well-coordinated.
Incorrect Answers:
A. Fewer help desk calls may mean underreporting.
B. Reviewing more incidents doesn't ensure effectiveness.
D. More critical incidents may indicate problems elsewhere.

Question 25
Which of the following MOST effectively minimizes downtime during system
conversions?
A. Phased approach
B. Parallel run
C. Direct cutover
D. Pilot study
Correct Answer: B – Parallel run
Explanation: A parallel run allows the old and new systems to operate
simultaneously, reducing risk and minimizing downtime.
Incorrect Answers:
A. Phased can be slow and complex.
C. Cutover is quicker but riskier.
D. A pilot affects only a small group, not the entire system.

Question 26
Which of the following would MOST effectively ensure the integrity of data
transmitted over a network?
A. Message encryption
B. Steganography
C. Certificate authority (CA)
D. Message digest
Correct Answer: D – Message digest
Explanation: Message digests (hash functions) help detect any changes to data
during transmission, ensuring integrity.
Incorrect Answers:
A. Encryption protects confidentiality, not integrity.
B. Steganography hides data, not verify it.
C. CAs verify identities, not message integrity directly.

Question 27
Which of the following would be MOST useful to an IS auditor assessing the
effectiveness of IT resource planning?
A. Budget execution status
B. A capacity analysis of IT operations
C. A succession plan for key IT personnel
D. A list of new applications to be implemented
Correct Answer: B – A capacity analysis of IT operations
Explanation: Capacity analysis shows if IT resources are aligned with demand,
which is crucial for effective planning.
Incorrect Answers:
A. Budget execution shows spending, not planning effectiveness.
C. Succession plans are more relevant to HR audits.
D. Application lists show goals, not capacity.

Question 28
An IS auditor is evaluating controls for monitoring the regulatory compliance of a
third party that provides IT services to the organization. Which of the following
should be the auditor's GREATEST concern?
A. A gap analysis against regulatory requirements has not been conducted.
B. The third-party disclosed a policy-related issue of noncompliance.
C. The organization has not reviewed the third party's policies and procedures.
D. The organization has not communicated regulatory requirements to the third
party.
Correct Answer: D – The organization has not communicated
regulatory requirements to the third party
Explanation: Without communication, the third party cannot ensure compliance,
making it the most critical risk.
Incorrect Answers:
A. Gap analysis is useful but comes after requirements are known.
B. Disclosures can be addressed if requirements were communicated.
C. Review is important but ineffective without initial communication.

Question 29
Which of the following is an audit reviewer's PRIMARY role with regard to
evidence?
A. Ensuring appropriate statistical sampling methods were used
B. Ensuring evidence is labeled to show it was obtained from an approved source
C. Ensuring unauthorized individuals do not tamper with evidence after it has been
captured
D. Ensuring evidence is sufficient to support audit conclusions
Correct Answer: D – Ensuring evidence is sufficient to support audit
conclusions
Explanation: The core responsibility of the auditor is to ensure conclusions are
backed by adequate and relevant evidence.
Incorrect Answers:
A. Sampling is part of audit design, not evidence evaluation.
B. Labeling supports chain of custody but is not the main role.
C. Tamper prevention is more a security function.

Question 30
When an intrusion into an organization's network is detected, which of the following
should be done FIRST?
A. Contact law enforcement.
B. Identify nodes that have been compromised.
C. Block all compromised network nodes.
D. Notify senior management
Correct Answer: B – Identify nodes that have been compromised
Explanation: Identifying affected systems is crucial before taking further action,
such as containment or escalation.
Incorrect Answers:
A. Law enforcement is contacted after internal assessment.
C. Blocking may disrupt operations and should be informed by analysis.
D. Management is notified after initial triage and assessment.

Question 31
An IS auditor is reviewing processes for importing market price data from external
data providers. Which of the following findings should the auditor consider MOST
critical?
A. The quality of the data is not monitored.
B. The transfer protocol does not require authentication.
C. Imported data is not disposed frequently.
D. The transfer protocol is not encrypted.
Correct Answer: A – The quality of the data is not monitored
Explanation: Poor or unmonitored data quality can result in incorrect pricing,
financial errors, and major business impact—making it the most critical concern.
Incorrect Answers:
B. Lack of authentication is a security concern but secondary to data accuracy.
C. Infrequent disposal may be a compliance or storage concern, not critical.
D. Encryption protects confidentiality, not accuracy.

Question 32
In a controlled application development environment, the MOST important
segregation of duties should be between the person who implements changes into the
production environment and the:
A. application programmer.
B. quality assurance (QA) personnel.
C. computer operator.
D. systems programmer.
Correct Answer: A – application programmer
Explanation: To prevent unauthorized or untested changes, programmers should
not have direct access to production deployment.
Incorrect Answers:
B. QA doesn’t make code changes.
C. Operators follow instructions and don’t alter code.
D. Systems programmers deal with infrastructure, not applications.

Question 33
A small startup organization does not have the resources to implement segregation of
duties. Which of the following is the MOST effective compensating control?
A. Rotation of log monitoring and analysis responsibilities
B. Additional management reviews and reconciliations
C. Mandatory vacations
D. Third-party assessments
Correct Answer: B – Additional management reviews and
reconciliations
Explanation: Management oversight is the most direct and continuous
compensating control for segregation of duties.
Incorrect Answers:
A. Rotation helps but lacks formal review.
C. Mandatory vacations are periodic and may not detect issues immediately.
D. Third-party reviews are infrequent.

Question 34
When planning an audit to assess application controls of a cloud-based system, it is
MOST important for the IS auditor to understand the:
A. availability reports associated with the cloud-based system.
B. architecture and cloud environment of the system.
C. policies and procedures of the business area being audited.
D. business process supported by the system.
Correct Answer: D – business process supported by the system
Explanation: Understanding the business process ensures the auditor evaluates the
controls in the context of risk and impact.
Incorrect Answers:
A. Availability is a component, not the whole picture.
B. Architecture is technical and secondary to process understanding.
C. Policies are relevant but less important during planning.

Question 35
Which of the following data would be used when performing a business impact
analysis (BIA)?
A. Projected impact of current business on future business
B. Expected costs for recovering the business
C. Cost of regulatory compliance
D. Cost-benefit analysis of running the current business
Correct Answer: B – Expected costs for recovering the business
Explanation: BIA involves estimating downtime impact and recovery costs to
prioritize critical processes.
Incorrect Answers:
A. Forward-looking projections don’t support BIA.
C. Regulatory compliance is important but indirect.
D. Cost-benefit analysis is used in investment decisions.

Question 36
Which of the following is the BEST indicator of the effectiveness of an organization's
incident response program?
A. Number of successful penetration tests
B. Percentage of protected business applications
C. Number of security vulnerability patches
D. Financial impact per security event
Correct Answer: D – Financial impact per security event
Explanation: Lower financial impact suggests the response program effectively
contains and mitigates incidents.
Incorrect Answers:
A. Pen tests test prevention, not response.
B. Protection does not measure response effectiveness.
C. Patching is a preventive activity.

Question 37
An organization recently implemented a cloud document storage solution and
removed the ability for end users to save data to their local workstation hard drives.
Which of the following findings should be the IS auditor's GREATEST concern?
A. Mobile devices are not encrypted.
B. Users are not required to sign updated acceptable use agreements.
C. The business continuity plan (BCP) was not updated.
D. Users have not been trained on the new system.
Correct Answer: A – Mobile devices are not encrypted
Explanation: Without encryption, sensitive documents accessed via cloud could be
exposed if the mobile device is lost or compromised.
Incorrect Answers:
B. Acceptable use agreements are important but less urgent.
C. BCP updates are strategic but less immediate.
D. Training is important but doesn’t mitigate data exposure.

Question 38
Which of the following security measures will reduce the risk of propagation when a
cyberattack occurs?
A. Data loss prevention (DLP) system
B. Perimeter firewall
C. Network segmentation
D. Web application firewall
Correct Answer: C – Network segmentation
Explanation: Segmentation limits movement within the network, reducing the
spread of an attack.
Incorrect Answers:
A. DLP prevents data exfiltration, not lateral movement.
B. Firewalls protect perimeter, not internal spread.
D. WAFs protect web apps, not internal network layers.

Question 39
An IS auditor notes that the previous year's disaster recovery test was not completed
within the scheduled time frame due to insufficient hardware allocated by a third-
party vendor. Which of the following provides the BEST evidence that adequate
resources are now allocated to successfully recover the systems?
A. Hardware change management policy
B. An up-to-date RACI chart
C. Vendor memo indicating problem correction
D. Service level agreement (SLA)
Correct Answer: D – Service level agreement (SLA)
Explanation: A formal SLA outlines the vendor's commitment and responsibilities,
providing enforceable assurance of resource availability.
Incorrect Answers:
A. Policy does not confirm availability.
B. RACI defines roles but not capabilities.
C. Memos are informal and lack enforcement.

Question 40
When implementing Internet Protocol security (IPsec) architecture, the servers
involved in application delivery:
A. channel access only through the public-facing firewall.
B. channel access through authentication.
C. communicate via Transport Layer Security (TLS).
D. block authorized users from unauthorized activities.
Correct Answer: B – channel access through authentication
Explanation: IPsec ensures data is transmitted securely through mutual
authentication and encryption.
Incorrect Answers:
A. Firewalls control perimeter traffic, not IPsec channels.
C. TLS is different from IPsec (used for application-level encryption).
D. Blocking users is part of access control, not IPsec’s main function.

Question 41
During audit fieldwork, an IS auditor learns that employees are allowed to connect
their personal devices to company-owned computers. How can the auditor BEST
validate that appropriate security controls are in place to prevent data loss?
A. Verify the data loss prevention (DLP) tool is properly configured by the
organization.
B. Review compliance with data loss and applicable mobile device user acceptance
policies.
C. Verify employees have received appropriate mobile device security awareness
training.
D. Conduct a walk-through to view results of an employee plugging in a device to
transfer confidential data.
Correct Answer: A – Verify the data loss prevention (DLP) tool is
properly configured by the organization
Explanation: DLP tools actively prevent unauthorized data transfers, making
configuration validation the best technical control for preventing data loss.
Incorrect Answers:
B. Policy compliance reviews are helpful but indirect.
C. Awareness helps, but doesn’t ensure enforcement.
D. Walk-throughs are reactive and limited in scope.

Question 42
Management has requested a post-implementation review of a newly implemented
purchasing package to determine to what extent business requirements are being met.
Which of the following is MOST likely to be assessed?
A. Implementation methodology
B. Test results
C. Purchasing guidelines and policies
D. Results of live processing
Correct Answer: D – Results of live processing
Explanation: Live processing results directly show how well the system performs in
the real environment, revealing whether business needs are met.
Incorrect Answers:
A. Methodology concerns the development phase.
B. Test results are pre-production indicators.
C. Policies don’t assess actual system performance.

Question 43
Which of the following is an advantage of using agile software development
methodology over the waterfall methodology?
A. Quicker end user acceptance
B. Clearly defined business expectations
C. Quicker deliverables
D. Less funding required overall
Correct Answer: C – Quicker deliverables
Explanation: Agile enables iterative and incremental delivery, allowing faster
deployment of functional software.
Incorrect Answers:
A. End user acceptance depends on usability, not methodology.
B. Waterfall often has clearer expectations from the start.
D. Agile doesn't inherently reduce funding requirements.

Question 44
In an online application, which of the following would provide the MOST information
about the transaction audit trail?
A. File layouts
B. Data architecture
C. System/process flowchart
D. Source code documentation
Correct Answer: C – System/process flowchart
Explanation: Flowcharts help auditors understand the movement and
transformation of data, critical for assessing audit trail completeness.
Incorrect Answers:
A. File layouts show structure, not flow.
B. Data architecture defines relationships, not transaction paths.
D. Source code is too granular and lacks visual clarity.

Question 45
On a public-key cryptosystem when there is no previous knowledge between parties,
which of the following will BEST help to prevent one person from using a fictitious
key to impersonate someone else?
A. Send a certificate that can be verified by a certification authority with the public
key.
B. Encrypt the message containing the sender's public key, using the recipient's
public key.
C. Send the public key to the recipient prior to establishing the connection.
D. Encrypt the message containing the sender's public key, using a private-key
cryptosystem.
Correct Answer: A – Send a certificate that can be verified by a
certification authority with the public key
Explanation: Certificates from trusted authorities verify identity, preventing
impersonation through key spoofing.
Incorrect Answers:
B/C/D. These do not ensure the legitimacy of the sender’s identity without a trusted
third party.

Question 46
The IS quality assurance (QA) group is responsible for:
A. monitoring the execution of computer processing tasks.
B. designing procedures to protect data against accidental disclosure.
C. ensuring that program changes adhere to established standards.
D. ensuring that the output received from system processing is complete.
Correct Answer: C – ensuring that program changes adhere to
established standards
Explanation: QA’s role includes verifying adherence to quality and development
standards throughout the lifecycle.
Incorrect Answers:
A. Monitoring is typically operations’ responsibility.
B. Procedure design is a security or control function.
D. Output validation is more related to operational control.

Question 47
Which of the following approaches will ensure recovery time objectives (RTOs) are
met for an organization's disaster recovery plan (DRP)?
A. Performing a full interruption test
B. Performing a parallel test
C. Performing a tabletop test
D. Performing a cyber-resilience test
Correct Answer: A – Performing a full interruption test
Explanation: A full interruption test simulates a real disaster, providing the most
accurate validation of RTO achievement.
Incorrect Answers:
B. Parallel testing is safer but doesn’t simulate full outage.
C. Tabletop tests are hypothetical.
D. Cyber-resilience tests focus more on security impact than full recovery.

Question 48
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
A. Agile auditing
B. Continuous auditing
C. Risk-based auditing
D. Outsourced auditing
Correct Answer: C – Risk-based auditing
Explanation: Risk-based auditing focuses efforts on high-risk areas, ensuring
optimal use of time and resources.
Incorrect Answers:
A. Agile improves responsiveness, but not necessarily resource use.
B. Continuous auditing increases frequency but may require more resources.
D. Outsourcing is about staffing, not audit scope efficiency.

Question 49
Which of the following would provide the MOST important input during the
planning phase for an audit on the implementation of a bring your own device
(BYOD) program?
A. Results of a risk assessment
B. Policies including BYOD acceptable use statements
C. Findings from prior audits
D. An inventory of personal devices to be connected to the corporate network
Correct Answer: A – Results of a risk assessment
Explanation: A risk assessment identifies threats and vulnerabilities, guiding audit
objectives and scope.
Incorrect Answers:
B. Policies are reviewed later during control evaluation.
C. Prior findings are useful but not the primary input.
D. Inventory supports evidence but not planning.

Question 50
An IS auditor concludes that logging and monitoring mechanisms within an
organization are ineffective because central servers are not included within the central
log repository. Which of the following audit procedures would have MOST likely
identified this exception?
A. Comparing all servers included in the current central log repository with the
listing used for the prior-year audit
B. Inspecting a sample of alerts generated from the central log repository
C. Comparing a list of all servers from the directory server against a list of all servers
present in the central log repository
D. Inspecting a sample of alert settings configured in the central log repository
Correct Answer: C – Comparing a list of all servers from the directory
server against a list of all servers present in the central log repository
Explanation: This comparison reveals gaps in coverage and ensures all servers are
monitored, highlighting missing logs.
Incorrect Answers:
A. Prior-year comparisons might not reflect new servers.
B. Reviewing alerts doesn’t detect unlogged systems.
D. Alert settings don’t show unmonitored infrastructure.

Question 51
An IS auditor learns the organization has experienced several server failures in its
distributed environment. Which of the following is the BEST recommendation to
limit the potential impact of server failures in the future?
A. Failover power
B. Clustering
C. Parallel testing
D. Redundant pathways
Correct Answer: B – Clustering
Explanation: Clustering allows multiple servers to work together so that if one fails,
another can take over seamlessly—minimizing downtime.
Incorrect Answers:
A. Failover power addresses power failure, not server failure.
C. Parallel testing is for implementation testing, not failover.
D. Redundant pathways relate to networking, not server uptime.

Question 52
During an ongoing audit, management requests a briefing on the findings to date.
Which of the following is the IS auditor's BEST course of action?
A. Request management wait until a final report is ready for discussion.
B. Request the auditee provide management responses.
C. Review working papers with the auditee.
D. Present observations for discussion only.
Correct Answer: D – Present observations for discussion only
Explanation: Sharing preliminary observations without conclusions helps
management understand issues without bypassing the formal audit process.
Incorrect Answers:
A. Delaying may reduce responsiveness.
B. Auditee responses come after findings are finalized.
C. Working papers are internal documents, not for general discussion.

Question 53
Which of the following BEST demonstrates that IT strategy is aligned with
organizational goals and objectives?
A. IT strategies are communicated to all business stakeholders.
B. Organizational strategies are communicated to the chief information officer (CIO).
C. The chief information officer (CIO) is involved in approving the organizational
strategies.
D. Business stakeholders are involved in approving the IT strategy.
Correct Answer: D – Business stakeholders are involved in approving
the IT strategy
Explanation: Involvement of business stakeholders ensures IT strategy supports
business goals and reflects organizational priorities.
Incorrect Answers:
A/B/C. Communication and involvement are important, but approval ensures
alignment.

Question 54
An accounting department uses a spreadsheet to calculate sensitive financial
transactions. Which of the following is the MOST important control for maintaining
the security of data in the spreadsheet?
A. A separate copy of the spreadsheet is routinely backed up.
B. Access to the spreadsheet is given only to those who require access.
C. There is a reconciliation process between the spreadsheet and the finance system.
D. The spreadsheet is locked down to avoid inadvertent changes.
Correct Answer: B – Access to the spreadsheet is given only to those
who require access
Explanation: Limiting access is the most effective control to protect sensitive data
from unauthorized exposure.
Incorrect Answers:
A. Backups protect availability, not confidentiality.
C. Reconciliation ensures accuracy, not security.
D. Lockdown prevents changes, not access.
Question 55
Which of the following is the MOST important responsibility of user departments
associated with program changes?
A. Analyzing change requests
B. Providing unit test data
C. Updating documentation to reflect latest changes
D. Approving changes before implementation
Correct Answer: D – Approving changes before implementation
Explanation: User departments must ensure that changes meet business needs and
are acceptable before being deployed.
Incorrect Answers:
A. Analysis may be shared with developers.
B. Testing is typically supported by IT.
C. Documentation is important but not the key responsibility.

Question 56
Which of the following would be of GREATEST concern when reviewing an
organization's security information and event management (SIEM) solution?
A. SIEM reporting is ad hoc.
B. SIEM reporting is customized.
C. SIEM configuration is reviewed annually.
D. The SIEM is decentralized.
Correct Answer: D – The SIEM is decentralized
Explanation: Decentralized SIEMs can lead to data silos and gaps in security
visibility, which is a major concern for effective incident detection.
Incorrect Answers:
A. Ad hoc reporting may reduce insight but isn't as critical.
B. Customized reports may be beneficial if aligned with objectives.
C. Annual review is acceptable if risk is low.

Question 57
A manager identifies active privileged accounts belonging to staff who have left the
organization. Which of the following is the threat actor in this scenario?
A. Hacktivists
B. Deleted log data
C. Terminated staff
D. Unauthorized access
Correct Answer: C – Terminated staff
Explanation: The terminated staff represent a direct insider threat if their accounts
remain active.
Incorrect Answers:
A. Hacktivists are external actors.
B. Deleted logs are evidence, not actors.
D. Unauthorized access is a result, not an actor.

Question 58
An IS auditor is evaluating the access controls for a shared customer relationship
management (CRM) system. Which of the following would be the GREATEST
concern?
A. Audit logging is not enabled.
B. Single sign-on is not enabled.
C. Complex passwords are not required.
D. Security baseline is not consistently applied.
Correct Answer: A – Audit logging is not enabled
Explanation: Without audit logs, accountability and tracking of system misuse is
impossible.
Incorrect Answers:
B. SSO improves convenience but is not critical.
C. Weak passwords are a concern, but lack of logging prevents detection.
D. Security baselines are important but less urgent than monitoring.

Question 59
Which of the following findings from an IT governance review should be of
GREATEST concern?
A. IT value analysis has not been completed.
B. All IT services are provided by third parties.
C. IT supports two different operating systems.
D. The IT budget is not monitored.
Correct Answer: D – The IT budget is not monitored
Explanation: Lack of budget monitoring may lead to misallocation of resources and
lack of accountability.
Incorrect Answers:
A. Value analysis can be scheduled.
B. Outsourcing is not inherently risky.
C. Multiple OSes may increase complexity, but not risk directly.

Question 60
What would be an IS auditor's BEST course of action when an auditee is unable to
close all audit recommendations by the time of the follow-up audit?
A. Ensure the open issues are retained in the audit results.
B. Recommend compensating controls for open issues.
C. Evaluate the residual risk due to open issues.
D. Terminate the follow-up because open issues are not resolved.
Correct Answer: C – Evaluate the residual risk due to open issues
Explanation: The auditor should assess whether the unremediated issues present an
acceptable or critical level of residual risk.
Incorrect Answers:
A. Documentation is necessary but not the best course of action.
B. Recommending compensating controls is secondary to risk evaluation.
D. Termination is not appropriate without evaluation.

Question 61
Which of the following is the BEST performance indicator for the effectiveness of an
incident management program?
A. Incident alert meantime
B. Number of incidents reported
C. Average time between incidents
D. Incident resolution meantime
Correct Answer: D – Incident resolution meantime
Explanation: The mean time to resolve incidents is a direct measure of how quickly
the organization can handle and close incidents, indicating process effectiveness.
Incorrect Answers:
A. Alert timing measures detection, not resolution.
B. Incident count doesn't reflect resolution capability.
C. Time between incidents reflects frequency, not effectiveness.

Question 62
Backups will MOST effectively minimize a disruptive incident's impact on a business
if they are:
A. taken according to recovery point objectives (RPOs).
B. scheduled according to the service delivery objectives.
C. performed by automated backup software on a fixed schedule.
D. stored on write-once read-many media.
Correct Answer: A – taken according to recovery point objectives
(RPOs)
Explanation: RPO defines the maximum tolerable period in which data might be
lost; aligning backups to RPO minimizes data loss impact.
Incorrect Answers:
B. Scheduling to service delivery is less relevant than to recovery goals.
C. Automation helps but doesn't guarantee alignment with RPOs.
D. Media type matters less than backup timing.
Question 63
An IS audit reveals that an organization is not proactively addressing known
vulnerabilities. Which of the following should the IS auditor recommend the
organization do FIRST?
A. Ensure the intrusion prevention system (IPS) is effective.
B. Verify the disaster recovery plan (DRP) has been tested.
C. Assess the security risks to the business.
D. Confirm the incident response team understands the issue.
Correct Answer: C – Assess the security risks to the business
Explanation: Understanding the actual risk is the first step toward prioritizing and
addressing vulnerabilities appropriately.
Incorrect Answers:
A. IPS effectiveness is secondary to risk assessment.
B. DRP testing doesn’t address current vulnerabilities.
D. Awareness without risk analysis won’t drive action.

Question 64
An IS auditor has completed the fieldwork phase of a network security review and is
preparing the initial draft of the audit report. Which of the following findings should
be ranked as the HIGHEST risk?
A. Network penetration tests are not performed.
B. The network firewall policy has not been approved by the information security
officer.
C. Network firewall rules have not been documented.
D. The network device inventory is incomplete.
Correct Answer: A – Network penetration tests are not performed
Explanation: Without penetration testing, critical vulnerabilities may go
undetected, exposing the organization to severe threats.
Incorrect Answers:
B/C. Policies and documentation are important but less critical than testing.
D. Incomplete inventory is risky but not as urgent as missing testing.

Question 65
Which of the following is the PRIMARY advantage of parallel processing for a new
system implementation?
A. Assurance that the new system meets functional requirements
B. Significant cost savings over other system implementation approaches
C. More time for users to complete training for the new system
D. Assurance that the new system meets performance requirements
Correct Answer: A – Assurance that the new system meets functional
requirements
Explanation: Running both systems in parallel allows comparison and verification
of the new system’s functionality before full cutover.
Incorrect Answers:
B. Parallel is typically more costly.
C. Training time isn't guaranteed by implementation method.
D. Performance validation is possible, but functional testing is the core benefit.

Question 66
During an internal audit of automated controls, an IS auditor identifies that the
integrity of data transfer between systems has not been tested since successful
implementation two years ago. Which of the following should the auditor do NEXT?
A. Review previous system interface testing records.
B. Document the finding in the audit report.
C. Review relevant system changes.
D. Review IT testing policies and procedures.
Correct Answer: C – Review relevant system changes
Explanation: If systems have changed since the last test, it increases the risk of
integration failure—making this review critical before concluding.
Incorrect Answers:
A. Historical testing doesn’t address current risk.
B. Documentation comes after analysis.
D. Reviewing policies is procedural, not evidence-based.

Question 67
The MAIN benefit of using an integrated test facility (ITF) as an online auditing
technique is that it enables:
A. the integration of financial and audit tests.
B. auditors to test without impacting production data.
C. a cost-effective approach to application controls audit.
D. auditors to investigate fraudulent transactions.
Correct Answer: B – auditors to test without impacting production
data
Explanation: ITFs simulate transactions in live systems without affecting actual
data, providing safe and effective testing.
Incorrect Answers:
A. Integration isn’t a unique ITF benefit.
C. ITFs may increase cost depending on setup.
D. Fraud detection is not ITF’s main purpose.

Question 68
Which of the following should be the MOST important consideration when
conducting a review of IT portfolio management?
A. Adherence to best practice and industry approved methodologies
B. Frequency of meetings where the business discusses the IT portfolio
C. Assignment of responsibility for each project to an IT team member
D. Controls to minimize risk and maximize value for the IT portfolio
Correct Answer: D – Controls to minimize risk and maximize value for
the IT portfolio
Explanation: The main purpose of IT portfolio management is to align IT
investments with risk and value, ensuring optimal use of resources.
Incorrect Answers:
A/B/C. These are supporting factors, not primary objectives.

Question 69
Which of the following would BEST facilitate the successful implementation of an IT-
related framework?
A. Establishing committees to support and oversee framework activities
B. Documenting IT-related policies and procedures
C. Aligning the framework to industry best practices
D. Involving appropriate business representation within the framework
Correct Answer: D – Involving appropriate business representation
within the framework
Explanation: Business buy-in ensures the framework is relevant, practical, and
effectively adopted.
Incorrect Answers:
A. Oversight helps but isn’t enough without engagement.
B. Documentation supports implementation but doesn’t drive it.
C. Best practices are helpful but not tailored without input.

Question 70
What is the MAIN reason to use incremental backups?
A. To increase backup resiliency and redundancy
B. To reduce costs associated with backups
C. To improve key availability metrics
D. To minimize the backup time and resources
Correct Answer: D – To minimize the backup time and resources
Explanation: Incremental backups only store changes since the last backup,
reducing the time and space required.
Incorrect Answers:
A. Resiliency depends on backup strategy, not type.
B. Cost is affected, but time/resource savings is the main benefit.
C. Availability metrics relate to system uptime, not backup type.
Question 71
When auditing the security architecture of an online application, an IS auditor
should FIRST review the:
A. location of the firewall within the network.
B. firewall standards.
C. firmware version of the firewall.
D. configuration of the firewall.
Correct Answer: D – configuration of the firewall
Explanation: The configuration directly affects how the firewall controls access.
Reviewing this first ensures security controls are properly implemented.
Incorrect Answers:
A. Firewall location is important, but configuration impacts effectiveness more.
B. Standards provide guidance, but don't show current status.
C. Firmware version is a maintenance issue, not a first audit priority.

Question 72
An organization is planning an acquisition and has engaged an IS auditor to evaluate
the IT governance framework of the target company. Which of the following would be
MOST helpful in determining the effectiveness of the framework?
A. Recent third-party IS audit reports
B. Current and previous internal IS audit reports
C. IT performance benchmarking reports with competitors
D. Self-assessment reports of IT capability and maturity
Correct Answer: B – Current and previous internal IS audit reports
Explanation: These reports provide insights into internal control effectiveness and
recurring governance issues over time.
Incorrect Answers:
A. Third-party audits are useful but may not cover full scope.
C. Benchmarking provides external comparison, not effectiveness.
D. Self-assessments may lack objectivity.

Question 73
Due to limited storage capacity, an organization has decided to reduce the actual
retention period for media containing completed low-value transactions. Which of the
following is MOST important for the organization to ensure?
A. The policy includes a strong risk-based approach.
B. The retention period complies with data owner responsibilities.
C. The retention period allows for review during the year-end audit.
D. The total transaction amount has no impact on financial reporting.
Correct Answer: A – The policy includes a strong risk-based approach
Explanation: A risk-based approach ensures that data retention decisions account
for compliance, legal, and operational risks.
Incorrect Answers:
B. Data owner responsibilities matter but are secondary to overall risk.
C. Year-end audit is a point in time, not the full concern.
D. Financial reporting may be affected by low-value volume data.

Question 74
Which of the following should an IS auditor be MOST concerned with during a post-
implementation review?
A. The system does not have a maintenance plan.
B. The system contains several minor defects.
C. The system deployment was delayed by three weeks.
D. The system was over budget by 15%.
Correct Answer: A – The system does not have a maintenance plan
Explanation: Without a maintenance plan, the system may become unreliable or
insecure, affecting long-term operations.
Incorrect Answers:
B. Minor defects are normal and usually not critical.
C. Deployment delays are scheduling concerns.
D. Budget overages affect cost but not ongoing functionality.

Question 75
Which of the following is the PRIMARY basis on which audit objectives are
established?
A. Audit risk
B. Consideration of risks
C. Assessment of prior audits
D. Business strategy
Correct Answer: B – Consideration of risks
Explanation: Risk assessment determines what areas are most critical to examine
and forms the basis for audit objectives.
Incorrect Answers:
A. Audit risk is a consequence, not the starting point.
C. Prior audits support planning, not define objectives.
D. Business strategy is relevant but indirect.

Question 76
An IS auditor is following up on prior period items and finds management did not
address an audit finding. Which of the following should be the IS auditor's NEXT
course of action?
A. Note the exception in a new report as the item was not addressed by
management.
B. Interview management to determine why the finding was not addressed.
C. Recommend alternative solutions to address the repeat finding.
D. Conduct a risk assessment of the repeat finding.
Correct Answer: D – Conduct a risk assessment of the repeat finding
Explanation: Before taking further action, it's essential to assess whether the
unresolved finding presents a current or heightened risk.
Incorrect Answers:
A. Reporting is important but premature without re-evaluation.
B. Interviews support understanding but not risk validation.
C. Recommending solutions comes after assessment.

Question 77
The PRIMARY focus of a post-implementation review is to verify that:
A. enterprise architecture (EA) has been complied with.
B. user requirements have been met.
C. acceptance testing has been properly executed.
D. user access controls have been adequately designed.
Correct Answer: B – user requirements have been met
Explanation: Post-implementation reviews determine whether the system fulfills
intended business needs.
Incorrect Answers:
A. EA compliance is a design concern.
C. Testing ensures function, but review confirms outcome.
D. Access controls are part of the review, not the main focus.

Question 78
Which of the following BEST protects an organization's proprietary code during a
joint-development activity involving a third party?
A. Privacy agreement
B. Statement of work (SOW)
C. Nondisclosure agreement (NDA)
D. Service level agreement (SLA)
Correct Answer: C – Nondisclosure agreement (NDA)
Explanation: An NDA legally binds the third party to protect proprietary
information, including code.
Incorrect Answers:
A. Privacy agreements relate to personal data.
B. SOW outlines tasks but not confidentiality.
D. SLAs focus on service levels, not protection.

Question 79
During which process is regression testing MOST commonly used?
A. Unit testing
B. System modification
C. Stress testing
D. Program development
Correct Answer: B – System modification
Explanation: Regression testing ensures that new changes haven’t negatively
impacted existing functionality.
Incorrect Answers:
A. Unit testing validates small code blocks.
C. Stress testing evaluates system limits.
D. Program development includes testing but not focused on regression.

Question 80
Which of the following should be of GREATEST concern to an IS auditor reviewing
a network printer disposal process?
A. Business units are allowed to dispose printers directly to authorized vendors.
B. Inoperable printers are stored in an unsecured area.
C. Disposal policies and procedures are not consistently implemented.
D. Evidence is not available to verify printer hard drives have been sanitized prior to
disposal.
Correct Answer: D – Evidence is not available to verify printer hard
drives have been sanitized prior to disposal
Explanation: Printers may store sensitive data. Lack of evidence of proper
sanitization is a serious data leakage risk.
Incorrect Answers:
A. Vendor use is acceptable with controls.
B. Unsecured storage is risky but less critical.
C. Inconsistent policies matter but do not directly imply data exposure.

Question 81
Which of the following activities provides an IS auditor with the MOST insight
regarding potential single person dependencies that might exist within the
organization?
A. Reviewing vacation patterns
B. Interviewing senior IT management
C. Mapping IT processes to roles
D. Reviewing user activity logs
Correct Answer: C – Mapping IT processes to roles
Explanation: Process-to-role mapping directly shows which processes depend on
individual employees, helping identify single points of failure.
Incorrect Answers:
A. Vacation patterns may suggest dependency but lack completeness.
B. Interviews may not provide objective insights.
D. Activity logs reflect behavior, not structure.

Question 82
Which of the following metrics is the BEST indicator of the performance of a web
application?
A. Server thread count
B. Server uptime
C. HTTP server error rate
D. Average response time
Correct Answer: D – Average response time
Explanation: Response time is a direct measure of user experience and performance
of a web application.
Incorrect Answers:
A. Thread count indicates load, not performance.
B. Uptime reflects availability, not responsiveness.
C. Error rates reflect issues but not speed or usability.

Question 83
An IS auditor suspects an organization's computer may have been used to commit a
crime. Which of the following is the auditor's BEST course of action?
A. Contact the incident response team to conduct an investigation.
B. Advise management of the crime after the investigation.
C. Examine the computer to search for evidence supporting the suspicions.
D. Notify local law enforcement of the potential crime before further investigation.
Correct Answer: A – Contact the incident response team to conduct
an investigation
Explanation: The incident response team is trained to handle such events properly,
ensuring evidence is preserved and the investigation follows protocol.
Incorrect Answers:
B. Waiting delays appropriate response.
C. Auditors must not investigate independently due to evidence contamination risk.
D. Law enforcement should only be involved through proper channels.

Question 84
An IS auditor follows up on a recent security incident and finds the incident response
was not adequate. Which of the following findings should be considered MOST
critical?
A. The attack could not be traced back to the originating person.
B. The attack was not automatically blocked by the intrusion detection system
(IDS).
C. Appropriate response documentation was not maintained.
D. The security weakness facilitating the attack was not identified.
Correct Answer: D – The security weakness facilitating the attack was
not identified
Explanation: Without identifying the root cause, the same vulnerability remains
unaddressed, increasing risk of recurrence.
Incorrect Answers:
A. Traceability is helpful but not always feasible.
B. IDS response is automated and may not stop novel attacks.
C. Documentation is important but not as critical as fixing the issue.

Question 85
Which of the following is the MOST important prerequisite for the protection of
physical information assets in a data center?
A. Knowledge of the IT staff regarding data protection requirements
B. Complete and accurate list of information assets that have been deployed
C. Segregation of duties between staff ordering and staff receiving information assets
D. Availability and testing of onsite backup generators
Correct Answer: B – Complete and accurate list of information assets
that have been deployed
Explanation: Without knowing what assets exist, it is impossible to protect them
effectively.
Incorrect Answers:
A. Knowledge is important but secondary.
C. Segregation aids process integrity, not asset protection.
D. Backup power ensures continuity, not asset inventory.

Question 86
During an audit of a reciprocal disaster recovery agreement between two companies,
the IS auditor would be MOST concerned with the:
A. allocation of resources during an emergency.
B. maintenance of hardware and software compatibility.
C. differences in IS policies and procedures.
D. frequency of system testing.
Correct Answer: B – Maintenance of hardware and software
compatibility
Explanation: If systems aren’t compatible, recovery efforts will fail despite the
agreement.
Incorrect Answers:
A. Allocation is important but depends on compatibility.
C. Policy differences can be addressed post-compatibility.
D. Testing frequency matters, but incompatibility undermines all tests.

Question 87
Which of the following BEST indicates the effectiveness of an organization's risk
management program?
A. Residual risk is minimized.
B. Inherent risk is eliminated.
C. Control risk is minimized.
D. Overall risk is quantified.
Correct Answer: A – Residual risk is minimized
Explanation: Effective risk management means that, after controls are applied, the
remaining risk (residual) is within acceptable levels.
Incorrect Answers:
B. Inherent risk cannot be eliminated.
C. Control risk focuses on failure of controls but not overall risk.
D. Quantification is helpful but not an indicator of effectiveness.

Question 88
Providing security certification for a new system should include which of the
following prior to the system's implementation?
A. End-user authorization to use the system in production
B. Testing of the system within the production environment
C. An evaluation of the configuration management practices
D. External audit sign-off on financial controls
Correct Answer: C – An evaluation of the configuration management
practices
Explanation: Configuration management ensures system settings and changes are
controlled, which is vital for security certification.
Incorrect Answers:
A. Authorization is part of go-live, not certification.
B. Testing in production introduces risks.
D. Audit sign-off isn’t part of system security certification.

Question 89
Which of the following should be the FIRST step when developing a data loss
prevention (DLP) solution for a large organization?
A. Create the DLP policies and templates.
B. Conduct a threat analysis against sensitive data usage.
C. Conduct a data inventory and classification exercise.
D. Identify approved data workflows across the enterprise.
Correct Answer: C – Conduct a data inventory and classification
exercise
Explanation: Before protecting data, the organization must understand what data
exists and how sensitive it is.
Incorrect Answers:
A. Policies should follow classification.
B. Threat analysis requires understanding data first.
D. Workflow review comes after data identification.

Question 90
Which of the following activities would allow an IS auditor to maintain independence
while facilitating a control self-assessment (CSA)?
A. Implementing the remediation plan
B. Developing the remediation plan
C. Developing the CSA questionnaire
D. Partially completing the CSA
Correct Answer: C – Developing the CSA questionnaire
Explanation: Creating tools for the assessment maintains independence, as long as
the auditor doesn’t participate in executing controls.
Incorrect Answers:
A/B/D. These involve implementation or execution, compromising independence.

Question 91
Which of the following is MOST important for an IS auditor to confirm when
reviewing an organization's plans to implement robotic process automation (RPA) to
automate routine business tasks?
A. A benchmarking exercise of industry peers who use RPA has been completed.
B. The end-to-end process is understood and documented.
C. A request for proposal (RFP) has been issued to qualified vendors.
D. Roles and responsibilities are defined for the business processes in scope.
Correct Answer: B – The end-to-end process is understood and
documented
Explanation: Before implementing automation, it is critical to understand the full
process to avoid automating flawed procedures.
Incorrect Answers:
A. Benchmarking is useful, but not foundational.
C. Issuing an RFP is a procurement step, not an audit priority.
D. Defining roles is important but comes after understanding the process.

Question 92
Which of the following BEST facilitates the legal process in the event of an incident?
A. Right to perform e-discovery
B. Preserving the chain of custody
C. Results of a root cause analysis
D. Advice from legal counsel
Correct Answer: B – Preserving the chain of custody
Explanation: A documented chain of custody ensures evidence is admissible in legal
proceedings by proving it hasn't been tampered with.
Incorrect Answers:
A. E-discovery rights are important but depend on evidence integrity.
C. Root cause analysis is for remediation, not legal action.
D. Legal advice is helpful but cannot substitute proper procedures.

Question 93
Cross-site scripting (XSS) attacks are BEST prevented through:
A. secure coding practices.
B. use of common industry frameworks.
C. a three-tier web architecture.
D. application firewall policy settings.
Correct Answer: A – secure coding practices
Explanation: XSS exploits vulnerabilities in input handling; proper input validation
and encoding through secure coding prevent it.
Incorrect Answers:
B. Frameworks help but must be configured properly.
C. Architecture can’t prevent XSS alone.
D. Firewalls can detect but not fully prevent XSS.

Question 94
Prior to a follow-up engagement, an IS auditor learns that management has decided
to accept a level of residual risk related to an audit finding without remediation. The
IS auditor is concerned about management's decision. Which of the following should
be the IS auditor's NEXT course of action?
A. Present the issue to executive management.
B. Report the disagreement to the board.
C. Accept management's decision and continue the follow-up.
D. Report the issue to IS audit management.
Correct Answer: D – Report the issue to IS audit management
Explanation: The auditor should escalate the issue internally before external
reporting, allowing the audit function to assess the situation.
Incorrect Answers:
A/B. Involve executive stakeholders only if internal escalation fails.
C. Concerns must be addressed before accepting management’s decision.
Question 95
An IS auditor observes that a bank's web page address is prefixed "https://". The
auditor would be correct to conclude that:
A. the bank has established a virtual private network (VPN).
B. transactions are encrypted.
C. the bank has a restricted Internet protocol (IP) address.
D. the customer is connected to the bank's intranet.
Correct Answer: B – transactions are encrypted
Explanation: HTTPS indicates that communications between the browser and the
web server are encrypted using SSL/TLS.
Incorrect Answers:
A. VPNs are separate from HTTPS.
C. IP addresses are unrelated to HTTPS.
D. HTTPS is used on the internet, not intranets specifically.

Question 96
Which of the following is the BEST control to mitigate attacks that redirect Internet
traffic to an unauthorized website?
A. Utilize a network-based firewall.
B. Conduct regular user security awareness training.
C. Enforce a strong password policy meeting complexity requirements.
D. Perform domain name system (DNS) server security hardening.
Correct Answer: D – Perform domain name system (DNS) server
security hardening
Explanation: DNS spoofing or poisoning is a common method to redirect traffic;
hardening DNS prevents such attacks.
Incorrect Answers:
A. Firewalls do not filter DNS queries.
B. Awareness helps but doesn’t prevent redirection.
C. Passwords don’t protect DNS infrastructure.

Question 97
During a follow-up audit, an IS auditor learns that some key management personnel
have been replaced since the original audit, and current management has decided not
to implement some previously accepted recommendations. What is the auditor's
BEST course of action?
A. Retest the control.
B. Notify the audit manager.
C. Close the audit finding.
D. Notify the chair of the audit committee
Correct Answer: B – Notify the audit manager
Explanation: The audit manager should be informed to assess appropriate next
steps, especially when recommendations are being overridden.
Incorrect Answers:
A. Retesting is secondary to addressing decision changes.
C. Closing the finding prematurely may hide unresolved risk.
D. Escalating to the audit committee is not the first step.

Question 98
An organization wants to classify database tables according to its data classification
scheme. From an IS auditor's perspective, the tables should be classified based on
the:
A. specific functional contents of each single table.
B. frequency of updates to the table.
C. number of end users with access to the table.
D. descriptions of column names in the table.
Correct Answer: A – specific functional contents of each single table
Explanation: Classification is based on the sensitivity and criticality of the data
content, not technical or usage aspects.
Incorrect Answers:
B. Update frequency is irrelevant to classification.
C. Access levels follow classification, not define it.
D. Column names are metadata, not classification criteria.

Question 99
Management is concerned about sensitive information being intentionally or
unintentionally emailed as attachments outside the organization by employees. What
is the MOST important task before implementing any associated email controls?
A. Provide notification to employees about possible email monitoring.
B. Develop an information classification scheme.
C. Develop an acceptable use policy for end-user computing (EUC).
D. Require all employees to sign nondisclosure agreements (NDAs).
Correct Answer: B – Develop an information classification scheme
Explanation: Without classification, the organization cannot identify which data is
sensitive and requires protection.
Incorrect Answers:
A. Notification is required later for compliance.
C. Acceptable use defines behavior but not protection.
D. NDAs don’t control data flows or enforce technical controls.

Question 100
While auditing a small organization's data classification processes and procedures, an
IS auditor noticed that data is often classified at the incorrect level. What is the
MOST effective way for the organization to improve this situation?
A. Conduct awareness presentations and seminars for information classification
policies.
B. Use automatic document classification based on content.
C. Have IT security staff conduct targeted training for data owners.
D. Publish the data classification policy on the corporate web portal.
Correct Answer: B – Use automatic document classification based on
content
Explanation: Automation reduces human error and ensures consistency in
classification based on content patterns and rules.
Incorrect Answers:
A. Presentations raise awareness but may not change behavior.
C. Targeted training helps, but automation is more scalable.
D. Publishing policies helps access, not performance.

Question 101
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that
patches are not available. What should the auditor recommend be done FIRST?
A. Implement additional firewalls to protect the system.
B. Decommission the server.
C. Implement a new system that can be patched.
D. Evaluate the associated risk.
Correct Answer: D – Evaluate the associated risk
Explanation: Risk evaluation is the first step to understand the severity and impact
before deciding the most appropriate mitigation.
Incorrect Answers:
A. Firewalls might reduce risk but should follow proper assessment.
B. Decommissioning may be excessive without understanding the full context.
C. System replacement is costly and premature without evaluating alternatives.

Question 102
During a review of an organization's network threat response process, the IS auditor
noticed that the majority of alerts were closed without resolution. Management
responded that those alerts were unworkable due to lack of actionable intelligence,
and therefore the support team is allowed to close them. What is the BEST way for
the auditor to address this situation?
A. Further review closed unactioned alerts to identify mishandling of threats.
B. Reopen unactioned alerts and report to the audit committee.
C. Recommend that management enhance the policy and improve threat awareness
training.
D. Omit the finding from the report as this practice is in compliance with the current
policy.
Correct Answer: A – Further review closed unactioned alerts to
identify mishandling of threats
Explanation: Reviewing these alerts helps assess whether real threats are being
overlooked, which could expose the organization.
Incorrect Answers:
B. Reopening alerts and reporting without evidence may be premature.
C. Training may be useful later, but investigation comes first.
D. Ignoring the issue due to policy compliance risks missing critical failures.

Question 103
Which of the following BEST helps to ensure data integrity across system interfaces?
A. Reconciliations
B. Environment segregation
C. Access controls
D. System backups
Correct Answer: A – Reconciliations
Explanation: Reconciliation processes compare data between systems to detect and
correct errors during transfer.
Incorrect Answers:
B. Segregation prevents conflict of interest but not interface integrity.
C. Access controls protect data from unauthorized access, not transfer errors.
D. Backups restore data but don’t ensure integrity across systems.

Question 104
Due to system limitations, segregation of duties (SoD) cannot be enforced in an
accounts payable system. Which of the following is the IS auditor's BEST
recommendation for a compensating control?
A. Require written authorization for all payment transactions.
B. Review payment transaction history.
C. Reconcile payment transactions with invoices.
D. Restrict payment authorization to senior staff members.
Correct Answer: A – Require written authorization for all payment
transactions
Explanation: Written approvals provide accountability and oversight, compensating
for lack of SoD.
Incorrect Answers:
B. Reviewing after the fact doesn’t prevent unauthorized payments.
C. Reconciliation checks accuracy but not authorization.
D. Restricting to senior staff limits risk but doesn’t provide control.
Question 105
Spreadsheets are used to calculate project cost estimates. Totals for each cost
category are then keyed into the job-costing system. What is the BEST control to
ensure that data is accurately entered into the system?
A. Display back of project detail after entry
B. Reconciliation of total amounts by project
C. Reasonableness checks for each cost type
D. Validity checks, preventing entry of character data
Correct Answer: B – Reconciliation of total amounts by project
Explanation: Reconciliation validates data between the spreadsheet and the job-
costing system, ensuring accuracy.
Incorrect Answers:
A. Displaying entry data helps users, but doesn’t confirm correctness.
C. Reasonableness checks detect anomalies but may miss input errors.
D. Validity checks ensure format but not correct values.

Question 106
An organization plans to receive an automated data feed into its enterprise data
warehouse from a third-party service provider. Which of the following would be the
BEST way to prevent accepting bad data?
A. Purchase data cleansing tools from a reputable vendor.
B. Appoint data quality champions across the organization.
C. Obtain error codes indicating failed data feeds.
D. Implement business rules to reject invalid data.
Correct Answer: D – Implement business rules to reject invalid data
Explanation: Business rules prevent bad data from being accepted into the system,
reducing downstream errors.
Incorrect Answers:
A. Cleansing fixes data post-import, not prevention.
B. Champions raise awareness but don’t enforce rules.
C. Error codes signal issues but don’t block bad data.

Question 107
Which task should an IS auditor complete FIRST during the preliminary planning
phase of a database security review?
A. Determine which databases will be in scope.
B. Identify the most critical database controls.
C. Evaluate the types of databases being used.
D. Perform a business impact analysis (BIA).
Correct Answer: A – Determine which databases will be in scope
Explanation: Scoping defines the boundaries of the review and ensures focused,
efficient auditing.
Incorrect Answers:
B. Identifying controls comes after defining scope.
C. Evaluating database types supports review but isn’t first.
D. BIA is helpful but not the initial task in this context.

Question 108
Which of the following is an IS auditor's GREATEST concern when an organization
does not regularly update software on individual workstations in the internal
environment?
A. The organization may not be in compliance with licensing agreements.
B. System functionality may not meet business requirements.
C. The system may have version control issues.
D. The organization may be more susceptible to cyber-attacks.
Correct Answer: D – The organization may be more susceptible to
cyber-attacks
Explanation: Outdated software often contains known vulnerabilities that hackers
can exploit.
Incorrect Answers:
A. Licensing issues are legal, but not as severe as security risk.
B. Functionality may be affected, but that’s not the biggest threat.
C. Version control is a maintenance issue, not a primary security concern.

Question 109
An organization has assigned two new IS auditors to audit a new system
implementation. One of the auditors has an IT-related degree, and one has a business
degree. Which of the following is MOST important to meet the IS audit standard for
proficiency?
A. The standard is met as long as a supervisor reviews the new auditors' work.
B. The standard is met as long as one member has a globally recognized audit
certification.
C. Team member assignments must be based on individual competencies.
D. Technical co-sourcing must be used to help the new staff.
Correct Answer: C – Team member assignments must be based on
individual competencies
Explanation: IS audit standards require auditors to be assigned based on their
ability to carry out the work competently.
Incorrect Answers:
A. Supervision doesn’t replace competency.
B. Certification helps but doesn’t replace experience.
D. Co-sourcing is an option but not required if competencies exist.
Question 110
Which of the following is a social engineering attack method?
A. A hacker walks around an office building using scanning tools to search for a
wireless network to gain access.
B. An employee is induced to reveal confidential IP addresses and passwords by
answering questions over the phone.
C. An unauthorized person attempts to gain access to secure premises by following
an authorized person through a secure door.
D. An intruder eavesdrops and collects sensitive information flowing through the
network and sells it to third parties.
Correct Answer: B – An employee is induced to reveal confidential IP
addresses and passwords by answering questions over the phone
Explanation: Social engineering manipulates people into revealing confidential
information.
Incorrect Answers:
A. Wireless scanning is a technical attack.
C. Physical tailgating is a physical security breach, not social manipulation.
D. Eavesdropping is a passive technical attack.

Question 111
Which of the following will BEST ensure that a proper cutoff has been established to
reinstate transactions and records to their condition just prior to a computer system
failure?
A. Rotating backup copies of transaction files offsite
B. Ensuring bisynchronous capabilities on all transmission lines
C. Maintaining system console logs in electronic format
D. Using a database management system (DBMS) to dynamically back-out partially
processed transactions
Correct Answer: D – Using a database management system (DBMS)
to dynamically back-out partially processed transactions
Explanation: A DBMS with rollback capabilities allows the system to return to a
consistent state before failure.
Incorrect Answers:
A. Offsite backups are useful but don’t guarantee proper cutoff.
B. Bisynchronous lines improve transmission reliability but not data recovery.
C. Logs aid investigations but don’t restore transactional state.

Question 112
Which of the following fire suppression systems needs to be combined with an
automatic switch to shut down the electricity supply in the event of activation?
A. FM-200
B. Dry pipe
C. Carbon dioxide
D. Halon
Correct Answer: C – Carbon dioxide
Explanation: CO₂ displaces oxygen, posing a risk to people and electronics if the
power isn’t shut off.
Incorrect Answers:
A. FM-200 is safe for people and doesn't require immediate power cut.
B. Dry pipe systems are water-based and used in specific areas.
D. Halon is effective but has been phased out due to environmental concerns.

Question 113
Which of the following is the PRIMARY purpose of a post-implementation review?
A. To ensure project resources were optimized
B. To ensure project deliverables were provided on time
C. To determine whether expected benefits were realized from a project
D. To calculate a project's actual cost against the projected cost
Correct Answer: C – To determine whether expected benefits were
realized from a project
Explanation: The review assesses if the project met its business goals and delivered
value.
Incorrect Answers:
A. Resource usage is a secondary consideration.
B. Timeliness is important but not the core purpose.
D. Cost comparison is part of evaluation, but not the main goal.

Question 114
An organization's security policy mandates that all new employees must receive
appropriate security awareness training. Which of the following metrics would BEST
assure compliance with this policy?
A. Number of new hires who have violated enterprise security policies
B. Percentage of new hires that have completed the training
C. Number of reported incidents by new hires
D. Percentage of new hires who report incidents
Correct Answer: B – Percentage of new hires that have completed the
training
Explanation: Completion rate directly measures compliance with the training
requirement.
Incorrect Answers:
A. Violations indicate issues but don’t measure policy compliance.
C. Incident reports may reflect awareness but not training completion.
D. Reporting indicates participation, not formal completion.
Question 115
Which of the following business continuity activities prioritizes the recovery of critical
functions?
A. Business impact analysis (BIA)
B. Risk assessment
C. Business continuity plan (BCP) testing
D. Disaster recovery plan (DRP) testing
Correct Answer: A – Business impact analysis (BIA)
Explanation: BIA identifies critical processes and the impact of their disruption,
enabling prioritization.
Incorrect Answers:
B. Risk assessment identifies threats, not priorities.
C. BCP testing validates recovery strategies.
D. DRP testing is more technical and specific to systems.

Question 116
An IS auditor found that a company executive is encouraging employee use of social
networking sites for business purposes. Which of the following recommendations
would BEST help to reduce the risk of data leakage?
A. Requiring policy acknowledgment and nondisclosure agreements (NDAs) signed by
employees
B. Monitoring employees' social networking usage
C. Establishing strong access controls on confidential data
D. Providing education and guidelines to employees on use of social networking sites
Correct Answer: D – Providing education and guidelines to employees
on use of social networking sites
Explanation: Training helps employees understand how to avoid disclosing sensitive
information online.
Incorrect Answers:
A. NDAs are helpful but don’t change behavior.
B. Monitoring detects issues after they occur.
C. Access control protects data, not how it’s discussed externally.

Question 117
Which of the following is the MOST efficient way to assess the controls in a service
provider's environment?
A. Review testing performed by the service provider's internal audit department
B. Require the service provider to conduct control self-assessments (CSAs)
C. Review the service provider's master service agreement (MSA)
D. Obtain an independent auditor's report from the service provider
Correct Answer: D – Obtain an independent auditor's report from the
service provider
Explanation: Reports like SOC 1/2 provide objective, efficient assessments of
internal controls.
Incorrect Answers:
A. Internal audits lack independence.
B. CSAs are subjective.
C. MSAs state expectations but don’t confirm implementation.

Question 118
The PRIMARY focus of audit follow-up reports should be to:
A. Assess if new risks have developed
B. Determine if audit recommendations have been implemented
C. Determine if past findings are still relevant
D. Verify the completion date of the implementation
Correct Answer: B – Determine if audit recommendations have been
implemented
Explanation: Follow-ups ensure that findings are addressed and that risks are
mitigated as planned.
Incorrect Answers:
A. New risks are reviewed in separate assessments.
C. Relevance supports reporting but isn’t the primary goal.
D. Dates are useful, but implementation is the priority.

Question 119
Which of the following is the BEST way to mitigate the risk associated with
technology obsolescence?
A. Create tactical and strategic IS plans
B. Make provisions in the budgets for potential upgrades
C. Invest in current technology
D. Create a technology watch team that evaluates emerging trends
Correct Answer: A – Create tactical and strategic IS plans
Explanation: Strategic planning anticipates obsolescence and guides proactive
upgrades.
Incorrect Answers:
B. Budgeting is important but must align with planning.
C. Investing without planning may not address risk.
D. Watching trends helps, but planning ensures action.

Question 120
Which of the following is MOST important to ensure when reviewing a global
organization's controls to protect data held on its IT infrastructure across all of its
locations?
A. The capacity of underlying communications infrastructure in the host locations is
sufficient
B. The threat of natural disasters in each location hosting infrastructure has been
accounted for
C. Relevant data protection legislation and regulations for each location are adhered
to
D. Technical capabilities exist in each location to manage the data and recovery
operations
Correct Answer: C – Relevant data protection legislation and
regulations for each location are adhered to
Explanation: Compliance with local laws is critical for avoiding legal penalties and
ensuring lawful data handling.
Incorrect Answers:
A. Communication capacity is a performance concern, not compliance.
B. Natural disasters impact BCP but not data protection compliance.
D. Technical capabilities support operations but don’t ensure legality.

Question 121
An organization is planning to re-purpose workstations that were used to handle
confidential information. Which of the following would be the IS auditor's BEST
recommendation to dispose of this information?
A. Overwrite the disks with random data.
B. Reformat the disks.
C. Erase the disks by degaussing.
D. Delete the disk partitions.
Correct Answer: C – Erase the disks by degaussing
Explanation: Degaussing eliminates magnetic fields and completely removes all data
from storage media, ensuring confidentiality.
Incorrect Answers:
A. Overwriting helps, but degaussing is more thorough.
B. Reformatting does not securely erase data.
D. Deleting partitions leaves data recoverable.

Question 122
External experts were used on a recent IT audit engagement. While assessing the
external experts' work, the internal audit team found some gaps in the evidence that
may have impacted their conclusions. What is the internal audit team's BEST course
of action?
A. Engage another expert to conduct the same testing.
B. Report a scope limitation in their conclusions.
C. Recommend the external experts conduct additional testing.
D. Escalate to senior management.
Correct Answer: B – Report a scope limitation in their conclusions
Explanation: If the evidence is incomplete, the most appropriate course of action is
to report a scope limitation to maintain audit integrity.
Incorrect Answers:
A. Engaging another expert adds cost and delay.
C. Recommending more testing doesn’t resolve the original evidence gap.
D. Escalation may be premature without documenting the limitation.

Question 123
The practice of periodic secure code reviews is which type of control?
A. Compensating
B. Detective
C. Preventive
D. Corrective
Correct Answer: B – Detective
Explanation: Secure code reviews identify vulnerabilities after code is written,
making them detective controls.
Incorrect Answers:
A. Compensating controls are substitutes, not detection mechanisms.
C. Preventive controls avoid issues before they occur.
D. Corrective controls address issues after they’re found.

Question 124
Which of the following is the PRIMARY role of key performance indicators (KPIs) in
supporting business process effectiveness?
A. To analyze workflows in order to optimize business processes and eliminate tasks
that do not provide value
B. To evaluate the cost-benefit of tools implemented to monitor control performance
C. To enable conclusions about the performance of the processes and target variances
for follow-up analysis
D. To assess the functionality of a software deliverable based on business processes
Correct Answer: C – To enable conclusions about the performance of
the processes and target variances for follow-up analysis
Explanation: KPIs help measure and evaluate whether processes meet performance
expectations, supporting decision-making.
Incorrect Answers:
A. Workflow analysis is broader and not the KPI’s primary role.
B. Cost-benefit evaluation is separate from performance tracking.
D. Software functionality assessment is not the core KPI purpose.
Question 125
Which of the following would BEST enable an organization to address the security
risks associated with a recently implemented bring your own device (BYOD)
strategy?
A. Mobile device testing program
B. Mobile device upgrade program
C. Mobile device awareness program
D. Mobile device tracking program
Correct Answer: C – Mobile device awareness program
Explanation: Educating users on secure practices is key in mitigating BYOD risks.
Incorrect Answers:
A. Testing doesn’t address end-user behavior.
B. Upgrades improve performance but not user knowledge.
D. Tracking helps monitor use, but doesn’t prevent risky behavior.

Question 126
An organization has outsourced the development of a core application. However, the
organization plans to bring the support and future maintenance of the application
back in-house. Which of the following findings should be the IS auditor's
GREATEST concern?
A. The data model is not clearly documented.
B. The vendor development team is located overseas.
C. The cost of outsourcing is lower than in-house development.
D. A training plan for business users has not been developed.
Correct Answer: A – The data model is not clearly documented
Explanation: Without proper documentation, it will be difficult to maintain or
modify the application.
Incorrect Answers:
B. Offshore development can be managed with oversight.
C. Cost is a business decision, not an audit risk.
D. Lack of user training is a concern but not the biggest risk.

Question 127
An employee has accidentally posted confidential data to the company's social media
page. Which of the following is the BEST control to prevent this from recurring?
A. Establish two-factor access control for social media accounts.
B. Implement a moderator approval process.
C. Require all updates to be made by the marketing director.
D. Perform periodic audits of social media updates.
Correct Answer: B – Implement a moderator approval process
Explanation: Pre-post review by a moderator can prevent inappropriate or
accidental disclosures.
Incorrect Answers:
A. Two-factor authentication protects account access, not content.
C. Centralizing control limits flexibility and may not prevent errors.
D. Audits are reactive, not preventive.

Question 128
Which of the following is MOST important to include in a contract with a software
development service provider?
A. A list of key performance indicators (KPIs)
B. Service level agreement (SLA)
C. Ownership of intellectual property
D. Explicit contract termination requirements
Correct Answer: C – Ownership of intellectual property
Explanation: IP ownership ensures the client can use and maintain the software
after the contract ends.
Incorrect Answers:
A. KPIs support performance but not rights.
B. SLAs cover service but not legal ownership.
D. Termination clauses are important but secondary to IP rights.

Question 129
An IS auditor is reviewing the perimeter security design of a network. Which of the
following provides the GREATEST assurance that both incoming and outgoing
internet traffic is controlled?
A. Load balancer
B. Security information and event management (SIEM) system
C. Intrusion detection system (IDS)
D. Stateful firewall
Correct Answer: D – Stateful firewall
Explanation: Stateful firewalls track and filter traffic based on session state,
ensuring both directions are monitored and controlled.
Incorrect Answers:
A. Load balancers manage traffic flow, not security.
B. SIEM systems monitor events but don’t enforce controls.
C. IDS detects but doesn’t block traffic.

Question 130
An organization needs to comply with data privacy regulations forbidding the display
of personally identifiable information (PII) on customer bills or receipts. However, it
is a business requirement to display at least one attribute so that customers can
verify the bills or receipts are intended for them. What is the BEST
recommendation?
A. Data sanitization
B. Data masking
C. Data encryption
D. Data tokenization
Correct Answer: B – Data masking
Explanation: Data masking allows partial display (e.g., last 4 digits of a credit
card) to maintain usability while protecting PII.
Incorrect Answers:
A. Sanitization removes data, making it unusable.
C. Encryption protects data at rest or in transit, not on display.
D. Tokenization is useful internally, not for customer-facing verification.

Question 131
Which of the following development practices would BEST mitigate the risk
associated with theft of user credentials transmitted between mobile devices and the
corporate network?
A. Enforce the validation of digital certificates used in the communication sessions.
B. Release mobile applications in debugging mode to allow for easy troubleshooting.
C. Embed cryptographic keys within the mobile application source code.
D. Allow persistent sessions between mobile applications and the corporate network.
Correct Answer: A – Enforce the validation of digital certificates used
in the communication sessions
Explanation: Validating certificates ensures secure, encrypted connections and
prevents man-in-the-middle attacks.
Incorrect Answers:
B. Debug mode exposes sensitive information and should never be used in
production.
C. Embedded keys can be extracted and misused.
D. Persistent sessions increase exposure to credential theft.

Question 132
Which of the following is MOST useful for determining whether the goals of IT are
aligned with the organization's goals?
A. Enterprise architecture (EA)
B. Key performance indicators (KPIs)
C. Balanced scorecard
D. Enterprise dashboard
Correct Answer: C – Balanced scorecard
Explanation: A balanced scorecard links business goals to IT objectives and
measures performance across strategic areas.
Incorrect Answers:
A. EA helps structure systems but doesn’t assess alignment.
B. KPIs measure performance but don’t show alignment.
D. Dashboards present metrics but don’t establish strategic relationships.

Question 133
Which of the following cloud deployment models would BEST meet the needs of a
startup software development organization with limited initial capital?
A. Community
B. Hybrid
C. Private
D. Public
Correct Answer: D – Public
Explanation: Public cloud is cost-effective and scalable, ideal for startups that
require flexible and low-cost infrastructure.
Incorrect Answers:
A. Community cloud is shared but less flexible.
B. Hybrid models require more complex integration and cost.
C. Private cloud is expensive to set up and maintain.

Question 134
Which of the following is MOST effective in detecting an intrusion attempt?
A. Using packet filter software
B. Using smart cards with one-time passwords
C. Installing biometrics-based authentication
D. Analyzing system logs
Correct Answer: D – Analyzing system logs
Explanation: Log analysis helps identify suspicious activities and unauthorized
access attempts.
Incorrect Answers:
A. Packet filters only control basic traffic and are not effective in detection.
B. Smart cards prevent unauthorized access but don’t detect attempts.
C. Biometrics restrict access but do not detect ongoing attacks.

Question 135
The MOST important reason why an IT risk assessment should be updated on a
regular basis is to:
A. Utilize IT resources in a cost-effective manner.
B. React to changes in the IT environment.
C. Comply with data classification changes.
D. Comply with risk management policies.
Correct Answer: B – React to changes in the IT environment
Explanation: New threats, technologies, and processes require reassessment to keep
the risk profile current.
Incorrect Answers:
A. Resource usage is secondary to risk awareness.
C. Data classification changes are part of, not the driver of, risk assessments.
D. Policies should prompt updates, but the reason is environmental change.

Question 136
An organization's strategy to source certain IT functions from a software as a service
(SaaS) provider should be approved by the:
A. IT steering committee.
B. Chief financial officer (CFO).
C. IT operations manager.
D. Chief risk officer (CRO).
Correct Answer: A – IT steering committee
Explanation: The IT steering committee ensures that IT sourcing decisions align
with overall strategy and business goals.
Incorrect Answers:
B. CFO reviews budget but not strategic alignment.
C. IT operations manager executes tasks, not strategic oversight.
D. CRO focuses on risk but doesn’t approve sourcing decisions.

Question 137
An organization experienced a domain name system (DNS) attack caused by default
user accounts not being removed from one of the servers. Which of the following
would have been the BEST way to mitigate the risk of this DNS attack?
A. Require all employees to attend training for secure configuration management.
B. Have a third party configure the virtual servers.
C. Configure the servers from an approved standard configuration.
D. Configure the intrusion prevention system (IPS) to identify DNS attacks.
Correct Answer: C – Configure the servers from an approved standard
configuration
Explanation: Using a hardened, approved configuration reduces the risk of
vulnerabilities like default accounts.
Incorrect Answers:
A. Training is good but doesn’t enforce secure configs.
B. Outsourcing doesn’t guarantee secure configuration.
D. IPS detects attacks but doesn’t prevent weak setups.

Question 138
The BEST indicator of an optimized quality management system (QMS) is that it:
A. Is endorsed by senior management
B. Aligns with an industry recognized framework
C. Is integrated and enforced in all IT activities
D. Defines and monitors all IT QMS activities
Correct Answer: C – Is integrated and enforced in all IT activities
Explanation: Full integration of QMS ensures consistency, control, and optimization
of quality throughout IT.
Incorrect Answers:
A. Endorsement is supportive, not an indicator of effectiveness.
B. Alignment helps but doesn’t ensure implementation.
D. Definition and monitoring are essential but not proof of optimization.

Question 139
When developing customer-facing IT applications, in which stage of the system
development life cycle (SLC) is it MOST beneficial to consider data privacy
principles?
A. User acceptance testing (UAT)
B. Systems design and architecture
C. Requirements definition
D. Software selection and acquisition
Correct Answer: C – Requirements definition
Explanation: Data privacy must be built into system requirements to ensure it is
considered throughout development.
Incorrect Answers:
A. UAT is too late for effective privacy integration.
B. Design implements what’s defined in requirements.
D. Acquisition depends on prior requirement identification.

Question 140
An organization is shifting to a remote workforce. In preparation, the IT department
is performing stress and capacity testing of remote access infrastructure and systems.
What type of control is being implemented?
A. Directive
B. Detective
C. Preventive
D. Compensating
Correct Answer: C – Preventive
Explanation: Stress testing anticipates issues and ensures infrastructure can handle
remote load, preventing service failures.
Incorrect Answers:
A. Directive controls guide behavior, not prevent failure.
B. Detective controls identify problems after they occur.
D. Compensating controls substitute for weaknesses in other areas.
Question 141
What is the BEST method for securing credit card numbers stored temporarily on a
file server prior to transmission to the downstream system for payment processing?
A. Masking the full credit card number
B. Encryption with strong cryptography
C. Truncating the credit card number
D. One-way hash with strong cryptography
Correct Answer: B – Encryption with strong cryptography
Explanation: Encryption protects sensitive data at rest and ensures that even if
unauthorized access occurs, the data remains unreadable.
Incorrect Answers:
A. Masking hides part of the number but doesn’t secure stored data.
C. Truncating reduces exposure but still reveals part of the data.
D. Hashing is irreversible and not appropriate if the data needs to be retrieved.

Question 142
When removing a financial application system from production, which of the
following is MOST important?
A. Media used by the retired system has been sanitized.
B. Software license agreements are retained.
C. End-user requests for changes are recorded and tracked.
D. Data retained for regulatory purposes can be retrieved.
Correct Answer: D – Data retained for regulatory purposes can be
retrieved
Explanation: Regulatory compliance requires that financial records be retained and
accessible even after system decommissioning.
Incorrect Answers:
A. Sanitization is important but secondary to compliance.
B. License records are administrative, not critical.
C. Change requests are irrelevant post-decommission.

Question 143
In a 24/7 processing environment, a database contains several privileged application
accounts with passwords set to "never expire." Which of the following
recommendations would BEST address the risk with minimal disruption to the
business?
A. Schedule downtime to implement password changes.
B. Introduce database access monitoring into the environment.
C. Modify the access management policy to make allowances for application
accounts.
D. Modify applications to no longer require direct access to the database.
Correct Answer: B – Introduce database access monitoring into the
environment
Explanation: Monitoring ensures visibility into privileged account usage and allows
continuous operations without immediate disruption.
Incorrect Answers:
A. Downtime is disruptive.
C. Policy modification addresses policy, not the risk.
D. Rewriting applications is costly and time-consuming.

Question 144
The risk of communication failure in an e-commerce environment is BEST minimized
through the use of:
A. Alternative or diverse routing
B. Compression software to minimize transmission duration
C. Functional or message acknowledgments
D. A packet filtering firewall to reroute messages
Correct Answer: A – Alternative or diverse routing
Explanation: Diverse routing provides redundancy in case of primary path failure,
ensuring continuity of operations.
Incorrect Answers:
B. Compression reduces size, not failure risk.
C. Acknowledgments confirm delivery but don’t prevent outages.
D. Firewalls don’t reroute messages.

Question 145
What is the PRIMARY benefit of an audit approach which requires reported findings
to be issued together with related action plans, owners, and target dates?
A. It establishes accountability for the action plans.
B. It enforces action plan consensus between auditors and auditees.
C. It facilitates easier audit follow-up.
D. It helps to ensure factual accuracy of findings.
Correct Answer: A – It establishes accountability for the action plans
Explanation: Assigning responsibility ensures that someone is accountable for
resolving each issue, improving remediation.
Incorrect Answers:
B. Consensus is helpful, but accountability is key.
C. Follow-up is improved by accountability, not format alone.
D. Accuracy is based on evidence, not format.

Question 146
An organization has made a strategic decision to split into separate operating entities
to improve profitability. However, the IT infrastructure remains shared between the
entities. Which of the following would BEST help to ensure that IS audit still covers
key risk areas within the IT environment as part of its annual plan?
A. Developing a risk-based plan considering each entity's business processes
B. Conducting an audit of newly introduced IT policies and procedures
C. Revising IS audit plans to focus on IT changes introduced after the split
D. Increasing the frequency of risk-based IS audits for each business entity
Correct Answer: A – Developing a risk-based plan considering each
entity's business processes
Explanation: A risk-based audit plan ensures comprehensive coverage tailored to
the specific risks of each new entity.
Incorrect Answers:
B. Policy review is limited in scope.
C. Focusing on changes may miss ongoing risks.
D. Audit frequency alone does not ensure appropriate coverage.

Question 147
The PRIMARY advantage of object-oriented technology is enhanced:
A. Grouping of objects into methods for data access.
B. Management of sequential program execution for data access.
C. Management of a restricted variety of data types for a data object.
D. Efficiency due to the re-use of elements of logic.
Correct Answer: D – Efficiency due to the re-use of elements of logic
Explanation: Object-oriented programming promotes code reuse through
inheritance, reducing development time and improving maintainability.
Incorrect Answers:
A. Grouping helps structure but isn’t the main benefit.
B. Sequential execution is unrelated to object orientation.
C. Object-oriented systems are flexible with data types.

Question 148
An IT governance body wants to determine whether IT service delivery is based on
consistently effective processes. Which of the following is the BEST approach?
A. Develop a maturity model
B. Evaluate key performance indicators (KPIs)
C. Conduct a gap analysis
D. Implement a control self-assessment (CSA)
Correct Answer: A – Develop a maturity model
Explanation: A maturity model assesses process standardization and effectiveness
over time, supporting continuous improvement.
Incorrect Answers:
B. KPIs monitor outcomes, not process maturity.
C. Gap analysis identifies issues but not consistency.
D. CSAs are internal and subjective.

Question 149
A warehouse employee of a retail company has been able to conceal the theft of
inventory items by entering adjustments of either damaged or lost stock items to the
inventory system. Which control would have BEST prevented this type of fraud in a
retail environment?
A. Statistical sampling of adjustment transactions
B. Separate authorization for input of transactions
C. An edit check for the validity of the inventory transaction
D. Unscheduled audits of lost stock lines
Correct Answer: B – Separate authorization for input of transactions
Explanation: Requiring a second party to approve transactions prevents employees
from making fraudulent adjustments unilaterally.
Incorrect Answers:
A. Sampling may miss fraudulent entries.
C. Edit checks don’t detect fraudulent intent.
D. Audits detect after the fact, not prevent.

Question 150
Which type of testing is MOST important to perform during a project audit to help
ensure business objectives are met?
A. Regression testing
B. Pilot testing
C. Functional testing
D. System testing
Correct Answer: C – Functional testing
Explanation: Functional testing ensures that the system meets defined business
requirements and delivers expected results.
Incorrect Answers:
A. Regression testing checks for side effects, not business alignment.
B. Pilot testing evaluates usability, not core functionality.
D. System testing is broader but may not cover detailed business functionality.

Question 151
Which of the following is MOST important for an IS auditor to review when
assessing the integrity of encryption controls for data at rest?
A. Protection of encryption keys
B. Encryption of test data
C. Frequency of encryption key changes
D. Length of encryption keys
Correct Answer: A – Protection of encryption keys
Explanation: Protecting encryption keys is essential because compromised keys can
render the encryption useless and expose sensitive data.
Incorrect Answers:
B. Encryption of test data is a good practice but not critical for assessing integrity
controls.
C. Key rotation enhances security but is secondary to protecting the keys themselves.
D. Key length matters, but it cannot compensate for poor key protection.

Question 152
An IS audit manager finds that data manipulation logic developed by the audit
analytics team leads to incorrect conclusions. This inaccurate logic is MOST likely an
indication of which of the following?
A. The team's poor understanding of the business process being analyzed
B. Incompatibility between data volume and analytics processing capacity
C. Poor change controls over data sets collected from the business
D. Poor security controls that grant inappropriate access to analysis produced
Correct Answer: A – The team's poor understanding of the business process
being analyzed
Explanation: Misunderstanding business logic often results in flawed analytics,
leading to incorrect audit conclusions.
Incorrect Answers:
B. Capacity issues typically affect performance, not logic.
C. Poor change control might affect data versioning, not logic creation.
D. Security control issues could expose data but don’t explain flawed logic.

Question 153
Which of the following is the BEST control to mitigate the malware risk associated
with an instant messaging (IM) system?
A. Blocking external IM traffic
B. Blocking attachments in IM
C. Allowing only corporate IM solutions
D. Encrypting IM traffic
Correct Answer: C – Allowing only corporate IM solutions
Explanation: Using approved corporate IM platforms enables organizations to
enforce security policies and monitor communications.
Incorrect Answers:
A. Blocking all external IM may not be feasible and restricts communication.
B. Blocking attachments can help but doesn’t control other risks.
D. Encryption ensures confidentiality but not malware prevention.
Question 154
An IS auditor noted that a change to a critical calculation was placed into the
production environment without being tested. Which of the following is the BEST
way to obtain assurance that the calculation functions correctly?
A. Check regular execution of the calculation batch job.
B. Interview the lead system developer.
C. Obtain post-change approval from management.
D. Perform substantive testing using computer-assisted audit techniques (CAATs).
Correct Answer: D – Perform substantive testing using computer-assisted audit
techniques (CAATs)
Explanation: CAATs allow the auditor to verify calculation logic by testing large
datasets, ensuring the change works as intended.
Incorrect Answers:
A. Regular execution doesn’t confirm accuracy.
B. Interviews may confirm process, not functionality.
C. Management approval is administrative, not technical assurance.

Question 155
The use of cookies constitutes the MOST significant security threat when they are
used for:
A. obtaining a public key from a certification authority (CA).
B. forwarding email and Internet Protocol (IP) addresses.
C. authenticating using username and password.
D. downloading files from the host server.
Correct Answer: C – Authenticating using username and password
Explanation: Cookies used for authentication can be hijacked, enabling
unauthorized access without needing credentials.
Incorrect Answers:
A. Public key retrieval is a one-way secure action.
B. IP address forwarding poses privacy concerns, not critical threats.
D. File downloads are unrelated to cookie-based risks.

Question 156
To address issues related to privileged users identified in an IS audit, management
implemented a security information and event management (SIEM) system. Which
type of control is in place?
A. Directive
B. Detective
C. Preventive
D. Corrective
Correct Answer: B – Detective
Explanation: A SIEM system monitors and alerts on suspicious activity, making it
a detective control by identifying anomalies in privileged user behavior.
Incorrect Answers:
A. Directive controls guide behavior but do not monitor.
C. Preventive controls block actions, which SIEM does not do.
D. Corrective controls respond after an issue, not detect it.

Question 157
A new privacy regulation requires a customer's privacy information to be deleted
within 72 hours, if requested. Which of the following would be an IS auditor's
GREATEST concern regarding compliance to this regulation?
A. Outdated online privacy policies
B. End user access to applications with customer information
C. Incomplete backup and retention policies
D. Lack of knowledge of where customers' information is saved
Correct Answer: D – Lack of knowledge of where customers' information is saved
Explanation: Without knowing where data resides, the organization cannot ensure
complete deletion within the required time frame.
Incorrect Answers:
A. Outdated policies affect communication but not execution.
B. Access issues are important, but not the primary concern for deletion.
C. Backups are relevant, but location awareness comes first.

Question 158
A computer forensic audit is MOST relevant in which of the following situations?
A. Inadequate controls in the IT environment
B. Mismatches in transaction data
C. Data loss due to hacking of servers
D. Missing server patches
Correct Answer: C – Data loss due to hacking of servers
Explanation: Forensic audits are best applied in cybercrime situations, such as
breaches and hacking incidents, to collect and analyze evidence.
Incorrect Answers:
A. Inadequate controls are an audit concern, not a trigger for forensics.
B. Data mismatches indicate a processing issue, not a breach.
D. Missing patches are a vulnerability, not evidence of a crime.

Question 159
A month after a company purchased and implemented system and performance
monitoring software, reports were too large and therefore were not reviewed or acted
upon. The MOST effective plan of action would be to:
A. Evaluate replacement systems and performance monitoring software.
B. Use analytical tools to produce exception reports from the system and
performance monitoring software.
C. Re-install the system and performance monitoring software.
D. Restrict functionality of system monitoring software to security-related events.
Correct Answer: B – Use analytical tools to produce exception reports from the
system and performance monitoring software
Explanation: Exception reporting ensures that critical insights are highlighted for
review, improving usability without discarding the system.
Incorrect Answers:
A. Replacing software is costly and unnecessary.
C. Re-installation doesn’t address the core issue of volume.
D. Limiting to security events ignores performance monitoring needs.

Question 160
An organization seeks to control costs related to storage media throughout the
information life cycle while still meeting business and regulatory requirements. Which
of the following is the BEST way to achieve this objective?
A. Perform periodic tape backups.
B. Utilize solid state memory.
C. Stream backups to the cloud.
D. Implement a data retention policy
Correct Answer: D – Implement a data retention policy
Explanation: A retention policy ensures data is stored only as long as needed,
optimizing storage use and reducing compliance risk.
Incorrect Answers:
A. Tape backups help storage but don’t manage retention.
B. SSDs improve speed, not cost control over time.
C. Cloud streaming solves storage location, not retention duration.

Question 161
An IS auditor is reviewing a recent security incident and is seeking information about
the approval of a recent modification to a database system's security settings. Where
would the auditor MOST likely find this information?
A. Security incident and event management (SIEM) report
B. Change log
C. System event correlation report
D. Database log
Correct Answer: B – Change log
Explanation: A change log records system modifications, including approvals and
timestamps, making it the primary source to trace approved changes.
Incorrect Answers:
A. SIEM reports show events, not change approvals.
C. Correlation reports analyze patterns but not change authorizations.
D. Database logs show activity, not approval tracking.

Question 162
A review of an organization's IT portfolio revealed several applications that are not
in use. The BEST way to prevent this situation from recurring would be to
implement:
A. An information asset acquisition policy
B. Business case development procedures
C. A formal request for proposal (RFP) process
D. Asset life cycle management
Correct Answer: D – Asset life cycle management
Explanation: Asset life cycle management ensures applications are assessed
regularly, updated, or decommissioned to avoid unused assets.
Incorrect Answers:
A. Acquisition policies help selection, not lifecycle oversight.
B. Business cases justify projects but don’t manage long-term use.
C. RFP processes relate to procurement, not usage tracking.

Question 163
In an environment that automatically reports all program changes, which of the
following is the MOST efficient way to detect unauthorized changes to production
programs?
A. Periodically running and reviewing test data against production programs
B. Verifying user management approval of modifications
C. Reviewing the last compile date of production programs
D. Manually comparing code in production programs to controlled copies
Correct Answer: C – Reviewing the last compile date of production programs
Explanation: Reviewing compile dates can quickly flag unauthorized changes by
showing discrepancies from expected modification timelines.
Incorrect Answers:
A. Running tests is slower and may miss subtle changes.
B. Approval checks may not detect unauthorized actions.
D. Manual comparison is accurate but not efficient.

Question 164
An IS auditor is observing transaction processing and notes that a high-priority
update job ran out of sequence. What is the MOST significant risk from this
observation?
A. Daily schedules lack change control
B. Previous jobs may have failed
C. The job may not have run to completion
D. The job completes with invalid data
Correct Answer: D – The job completes with invalid data
Explanation: Out-of-sequence execution can lead to invalid data, corrupting
downstream processes or reports.
Incorrect Answers:
A. Lack of change control is a broader issue, not the direct risk.
B. Failed jobs are a risk but not the primary concern here.
C. Incomplete runs are possible but less critical than invalid outcomes.

Question 165
Which of the following is the BEST source of information for an IS auditor to use
when determining whether an organization's information security policy is adequate?
A. Risk assessment results
B. Penetration test results
C. Industry benchmarks
D. Information security program plans
Correct Answer: A – Risk assessment results
Explanation: Risk assessments identify threats and vulnerabilities, directly
informing whether current policies address real-world risks.
Incorrect Answers:
B. Pen tests show exposure, not policy adequacy.
C. Benchmarks are useful but not organization-specific.
D. Program plans are directional, not evaluative.

Question 166
Which of the following is the MOST significant risk associated with the use of
virtualization?
A. Insufficient network bandwidth
B. Single point of failure
C. Inadequate configuration
D. Performance issues of hosts
Correct Answer: C – Inadequate configuration
Explanation: Misconfigured virtual environments can expose multiple virtual
machines (VMs) to compromise or failure.
Incorrect Answers:
A. Bandwidth limits performance but is not the greatest risk.
B. Failover strategies mitigate single points of failure.
D. Host performance issues are secondary to security risks.

Question 167
Which of the following is MOST important to consider when scheduling follow-up
audits?
A. The impact if corrective actions are not taken
B. The amount of time the auditee has agreed to spend with auditors
C. The efforts required for independent verification with new auditors
D. Controls and detection risks related to the observations
Correct Answer: A – The impact if corrective actions are not taken
Explanation: Risk-based prioritization ensures follow-ups are focused where
unaddressed issues could cause major harm.
Incorrect Answers:
B. Time availability is logistical, not strategic.
C. Verification effort doesn’t determine audit need.
D. Detection risks are relevant but derive from impact.

Question 168
Secure code reviews as part of a continuous deployment program are which type of
control?
A. Detective
B. Corrective
C. Logical
D. Preventive
Correct Answer: D – Preventive
Explanation: Secure code reviews aim to detect vulnerabilities before deployment,
thus preventing security issues.
Incorrect Answers:
A. Detective controls operate post-event.
B. Corrective actions address existing problems.
C. Logical controls refer to system access, not code quality.

Question 169
Which of the following would BEST detect unauthorized modification of data by a
database administrator (DBA)?
A. Audit database change requests
B. Audit database activity logs
C. Review changes to edit checks
D. Compare data to input records
Correct Answer: B – Audit database activity logs
Explanation: Activity logs provide detailed insight into what the DBA has changed,
allowing detection of unauthorized actions.
Incorrect Answers:
A. Change requests show intent but not execution.
C. Edit checks help integrity, not detect admin behavior.
D. Data comparisons do not identify the source of changes.
Question 170
In a typical system development life cycle (SDLC), which group is PRIMARILY
responsible for confirming compliance with requirements?
A. Steering committee
B. Risk management
C. Quality assurance (QA)
D. Internal audit
Correct Answer: C – Quality assurance (QA)
Explanation: QA teams validate that deliverables meet business and technical
requirements throughout the SDLC.
Incorrect Answers:
A. Steering committees guide direction, not validation.
B. Risk management focuses on risk, not compliance.
D. Internal audit assesses controls post-implementation.

Question 171
Which of the following is MOST important when an organization is implementing a
new vendor management policy?
A. Defining escalation procedures for service failures
B. Monitoring vendor performance metrics
C. Establishing risk-based vendor tiers
D. Training staff on vendor selection
Correct Answer: C – Establishing risk-based vendor tiers
Explanation: Categorizing vendors by risk level ensures appropriate oversight and
controls.
Incorrect Answers:
A. Important but reactive.
B. Metrics matter, but depend on correct tiering.
D. Training is supportive, not foundational.

Question 172
An IS auditor is evaluating a new SaaS application used by the finance team. Which
of the following would be the MOST important control?
A. Two-factor authentication
B. Local data backups
C. Business continuity planning
D. Formal approval from finance department
Correct Answer: A – Two-factor authentication
Explanation: Strong authentication helps prevent unauthorized access to sensitive
financial data.
Incorrect Answers:
B. Backups may be managed by the vendor.
C. BCP is broader than access control.
D. Approval is necessary, but not a control.

Question 173
Which of the following BEST supports traceability in software development?
A. Use of open-source components
B. Integration with business intelligence tools
C. Requirement-to-test case mapping
D. Continuous integration tools
Correct Answer: C – Requirement-to-test case mapping
Explanation: Mapping ensures every requirement is validated through testing.
Incorrect Answers:
A. Traceability relates to documentation, not licensing.
B. BI tools report, not track development lineage.
D. CI helps automation, not traceability.

Question 174
Which of the following is the PRIMARY concern when staff use unauthorized cloud
services for file sharing?
A. Increased bandwidth consumption
B. Delayed IT service response times
C. Data leakage and regulatory noncompliance
D. Redundancy of IT-managed solutions
Correct Answer: C – Data leakage and regulatory noncompliance
Explanation: Shadow IT use can result in loss of control over sensitive data.
Incorrect Answers:
A. Minor operational impact.
B. Not the primary risk.
D. Redundancy is an inefficiency, not a risk.

Question 175
Which of the following provides the BEST assurance of confidentiality in email
communication?
A. Secure email gateway
B. Digital signatures
C. Email encryption
D. Anti-malware filters
Correct Answer: C – Email encryption
Explanation: Encryption ensures only authorized recipients can read the content.
Incorrect Answers:
A. Gateways help routing, not encryption.
B. Signatures confirm identity, not content privacy.
D. Malware protection is a different function.

Question 176
An IS auditor notices that access logs are reviewed only annually. What is the
GREATEST risk?
A. Overutilization of IT staff
B. Delayed detection of unauthorized access
C. Increased false positive rates
D. Duplicate user accounts
Correct Answer: B – Delayed detection of unauthorized access
Explanation: Infrequent reviews reduce chances of timely response to misuse.
Incorrect Answers:
A. Staff time isn’t the main issue.
C. False positives relate to tool tuning.
D. Duplicates are more about provisioning than reviews.

Question 177
Which of the following BEST ensures that new employees receive access aligned with
their job responsibilities?
A. Periodic review of user access rights
B. Preapproved access templates based on roles
C. Manual approval from department head
D. Delayed provisioning to ensure completeness
Correct Answer: B – Preapproved access templates based on roles
Explanation: Role-based provisioning standardizes access control and reduces
errors.
Incorrect Answers:
A. Periodic reviews are reactive.
C. Manual approvals are subject to inconsistency.
D. Delays hinder productivity.

Question 178
Which of the following should be the FIRST step when designing a security
awareness program?
A. Measure incident trends
B. Define program objectives
C. Assign awareness coordinators
D. Develop training modules
Correct Answer: B – Define program objectives
Explanation: Clear goals guide the structure, content, and evaluation of the
program.
Incorrect Answers:
A, C, D: Important but follow after setting objectives.

Question 179
What is the PRIMARY objective of implementing a centralized identity management
system?
A. Improve audit readiness
B. Simplify user provisioning
C. Ensure consistent access control
D. Enforce password complexity
Correct Answer: C – Ensure consistent access control
Explanation: Centralization standardizes access across systems.
Incorrect Answers:
A. Audit readiness is a benefit, not the main goal.
B. Simplification supports control, not the end itself.
D. Passwords are just one aspect.

Question 180
Which of the following would be MOST helpful to determine whether an organization
is following its patch management policy?
A. Interviewing system administrators
B. Reviewing help desk tickets
C. Comparing patch levels with policy timelines
D. Evaluating server performance reports
Correct Answer: C – Comparing patch levels with policy timelines
Explanation: This directly assesses compliance with patch deployment
requirements.
Incorrect Answers:
A. Interviews are subjective.
B. Help desk logs reflect issues, not compliance.
D. Performance is affected by many factors.

Question 181
When evaluating the management practices at a third-party organization providing
outsourced services, the IS auditor considers relying on an independent auditor's
report. The IS auditor would FIRST:
A. Review the objectives of the audit
B. Examine the independent auditor's workpapers
C. Discuss the report with the independent auditor
D. Determine if recommendations have been implemented
Correct Answer: A – Review the objectives of the audit
Explanation: Understanding the objectives ensures the report’s scope aligns with
the IS auditor’s reliance requirements.
Incorrect Answers:
B. Workpapers are useful but not the first step.
C. Discussions are secondary to reviewing scope.
D. Implementation follows after verifying the audit's relevance.

Question 182
What is the BEST control to address SQL injection vulnerabilities?
A. Digital signatures
B. Input validation
C. Unicode translation
D. Secure Sockets Layer (SSL) encryption
Correct Answer: B – Input validation
Explanation: Input validation prevents malicious SQL code from being processed,
effectively blocking injection attempts.
Incorrect Answers:
A. Digital signatures verify authenticity, not prevent injection.
C. Unicode translation does not sanitize input.
D. SSL protects data in transit, not input fields.

Question 183
In a typical network architecture used for e-commerce, a load balancer is normally
found between the:
A. Routers and the web servers
B. Mail servers and the mail repositories
C. Users and the external gateways
D. Databases and internal firewalls
Correct Answer: A – Routers and the web servers
Explanation: The load balancer distributes incoming traffic from routers to multiple
web servers to optimize performance and availability.
Incorrect Answers:
B. Mail systems don’t use load balancers in this way.
C. Users interact with web services, not directly with load balancers.
D. Load balancing is not typically used between databases and firewalls.

Question 184
During an audit of a financial application, it was determined that many terminated
users' accounts were not disabled. Which of the following should be the IS auditor's
NEXT step?
A. Perform a review of terminated users' account activity
B. Conclude that IT general controls are ineffective
C. Communicate risks to the application owner
D. Perform substantive testing of terminated users' access rights
Correct Answer: A – Perform a review of terminated users' account activity
Explanation: This determines whether any unauthorized access occurred, which is
crucial before making broader conclusions.
Incorrect Answers:
B. It's premature to conclude control failure without evidence.
C. Communicating risks is important but follows analysis.
D. Substantive testing is part of the activity review, not the first step.

Question 185
When developing metrics to measure the contribution of IT to the achievement of
business goals, the MOST important consideration is that the metrics:
A. Measure the effectiveness of IT controls in the achievement of IT strategy
B. Provide quantitative measurement of IT initiatives in relation with business
targets
C. Are expressed in terms of how IT risk impacts the achievement of business goals
D. Are used by similar industries to measure the effect of IT on business strategy
Correct Answer: B – Provide quantitative measurement of IT initiatives in
relation with business targets
Explanation: Metrics must clearly link IT performance to business value and
outcomes.
Incorrect Answers:
A. Control effectiveness supports IT strategy, not business goals.
C. IT risk impact is useful but not primary.
D. Industry benchmarks help comparison but not organizational alignment.

Question 186
The MOST important function of a business continuity plan (BCP) is to:
A. Ensure that the critical business functions can be recovered
B. Provide procedures for evaluating tests of the BCP
C. Provide a schedule of events that has to occur if there is a disaster
D. Ensure that all business functions are restored
Correct Answer: A – Ensure that the critical business functions can be recovered
Explanation: BCP prioritizes continuity of essential services to maintain operations
during disruption.
Incorrect Answers:
B. Evaluation procedures are supportive, not core.
C. Scheduling is part of execution, not the primary purpose.
D. Not all functions are equally critical or included.
Question 187
A small financial institution is preparing to implement a check image processing
system to support planned mobile banking product offerings. Which of the following
is MOST critical to the successful implementation of the system?
A. Feasibility studies
B. Control design
C. Integration testing
D. End user training
Correct Answer: B – Control design
Explanation: Proper controls ensure that the system operates securely and meets
regulatory and operational requirements.
Incorrect Answers:
A. Feasibility is important early but not critical during implementation.
C. Testing is important, but security and compliance depend on controls.
D. Training supports adoption but follows secure design.

Question 188
A characteristic of a digital signature is that it:
A. Is under control of the receiver
B. Is unique to the message
C. Has a reproducible hashing algorithm
D. Is validated when data are changed
Correct Answer: B – Is unique to the message
Explanation: Digital signatures combine hashing and encryption, producing a value
unique to both the sender and the message.
Incorrect Answers:
A. The sender controls the signature.
C. Algorithms are consistent, but not the key trait.
D. Changes invalidate the signature; they don’t validate it.

Question 189
What is the BEST way to control updates to the vendor master file in an accounts
payable system?
A. Using prenumbered and authorized request forms
B. Having only one person updating the master file
C. Periodically reviewing the entire vendor master file
D. Comparing updates against authorization
Correct Answer: D – Comparing updates against authorization
Explanation: This ensures that all changes are verified and approved, reducing the
risk of fraud or error.
Incorrect Answers:
A. Forms aid control but don’t confirm execution.
B. Single-user access increases risk.
C. Periodic review is less timely and may miss issues.

Question 190
A PRIMARY benefit derived by an organization employing control self-assessment
(CSA) techniques is that CSA:
A. Can identify high-risk areas for detailed review
B. Allows IS auditors to independently assess risk
C. Can be used as a replacement for traditional audits
D. Allows management to relinquish responsibility for control
Correct Answer: A – Can identify high-risk areas for detailed review
Explanation: CSA helps management and auditors focus resources by highlighting
weak or high-risk areas proactively.
Incorrect Answers:
B. CSA supports management, not auditor independence.
C. It complements, not replaces, audits.
D. It reinforces, not removes, control responsibility.

Question 191
During an audit of an organization's financial statements, an IS auditor finds that
the IT general controls are deficient. What should the IS auditor recommend?
A. Increase the compliance testing of the application controls
B. Place greater reliance on the application controls
C. Increase the substantive testing of the financial balances
D. Place greater reliance on the framework of control
Correct Answer: C – Increase the substantive testing of the financial balances
Explanation: When general controls are weak, the auditor compensates by
performing more direct tests on financial balances to ensure accuracy.
Incorrect Answers:
A. Compliance testing is ineffective if general controls are already known to be weak.
B. Weak general controls undermine application controls.
D. The framework doesn’t mitigate specific control deficiencies.

Question 192
An organization is considering allowing users to connect personal devices to the
corporate network. Which of the following should be done FIRST?
A. Configure users on the mobile device management (MDM) solution
B. Create inventory records of personal devices
C. Implement an acceptable use policy
D. Conduct security awareness training
Correct Answer: C – Implement an acceptable use policy
Explanation: Establishing acceptable use guidelines is critical before allowing device
access, ensuring users understand responsibilities and limitations.
Incorrect Answers:
A. MDM setup follows policy implementation.
B. Inventory creation is a follow-up control.
D. Training supports policy, not substitutes it.

Question 193
During an incident management audit, an IS auditor finds that several similar
incidents were logged during the audit period. Which of the following is the auditor's
MOST important course of action?
A. Document the finding and present it to management
B. Determine if a root cause analysis was conducted
C. Validate whether all incidents have been actioned
D. Confirm the resolution time of the incidents
Correct Answer: B – Determine if a root cause analysis was conducted
Explanation: Repeated incidents suggest an unresolved issue. The auditor must
confirm whether the underlying cause was identified and addressed.
Incorrect Answers:
A. Documentation follows investigation.
C. Action taken doesn’t ensure problem resolution.
D. Resolution time matters, but without root cause analysis, recurrence remains.

Question 194
Stress testing should ideally be carried out under a:
A. Test environment with test data
B. Production environment with test data
C. Test environment with production workloads
D. Production environment with production workloads
Correct Answer: C – Test environment with production workloads
Explanation: Using real workloads in a controlled (test) environment simulates
actual performance without risking operations.
Incorrect Answers:
A. Test data may not represent real load.
B. Testing in production with test data may be unreliable.
D. Testing in live production is risky and not ideal.

Question 195
An audit of environmental controls at a data center could include a review of the:
A. Local alarms on emergency exits
B. Logs recording visitors to the data center
C. List of employees authorized to enter the data center
D. Ceiling space to ensure that there are no wet pipes
Correct Answer: D – Ceiling space to ensure that there are no wet pipes
Explanation: Wet pipes in ceiling spaces can cause damage to IT infrastructure.
Preventing water hazards is a key environmental control.
Incorrect Answers:
A. Alarms support physical access control, not environmental.
B. Visitor logs are security-related, not environmental.
C. Access lists are physical access controls.

Question 196
A data breach has occurred due to malware. Which of the following should be the
FIRST course of action?
A. Shut down the affected systems
B. Quarantine the impacted systems
C. Notify customers of the breach
D. Notify the cyber insurance company
Correct Answer: B – Quarantine the impacted systems
Explanation: Isolating infected systems prevents further spread and facilitates
investigation while maintaining evidence.
Incorrect Answers:
A. Shutdown may hinder forensics.
C. Notification is a legal step but not immediate.
D. Insurance notification is important but not the first step.

Question 197
An online retailer is receiving customer complaints about receiving different items
from what they ordered on the organization's website. The root cause has been
traced to poor data quality. Despite efforts to clean erroneous data from the system,
multiple data quality issues continue to occur. Which of the following
recommendations would be the BEST way to reduce the likelihood of future
occurrences?
A. Outsource data cleansing activities to reliable third parties
B. Assign responsibility for improving data quality
C. Implement business rules to validate employee data entry
D. Invest in additional employee training for data entry
Correct Answer: B – Assign responsibility for improving data quality
Explanation: Without ownership, data quality cannot be consistently managed or
improved across processes.
Incorrect Answers:
A. Outsourcing doesn't fix systemic issues.
C. Rules are important but require governance.
D. Training helps but is insufficient alone.
Question 198
During an operational audit of a biometric system used to control physical access,
which of the following should be of GREATEST concern to an IS auditor?
A. False positives
B. User acceptance of biometrics
C. False negatives
D. Lack of biometric training
Correct Answer: A – False positives
Explanation: False positives allow unauthorized access, posing a direct security risk.
Incorrect Answers:
B. User acceptance affects adoption, not security.
C. False negatives inconvenience users but don’t threaten security.
D. Training enhances usability, not integrity.

Question 199
During a software acquisition review, an IS auditor should recommend that there be
a software escrow agreement when:
A. The product is new in the market
B. The deliverables do not include the source code
C. There is no service level agreement (SLA)
D. The estimated life for the product is less than 3 years
Correct Answer: B – The deliverables do not include the source code
Explanation: An escrow ensures source code access in case the vendor is unable to
support the software, critical when it's not provided initially.
Incorrect Answers:
A. New products may be stable; escrow depends on code access.
C. SLA addresses service, not code availability.
D. Product lifespan doesn't determine escrow necessity.

Question 200
When reviewing a data classification scheme, it is MOST important for an IS auditor
to determine if:
A. The information owner is required to approve access to the asset
B. Senior IT managers are identified as information owners
C. The security criteria are clearly documented for each classification
D. Each information asset is assigned to a different classification
Correct Answer: C – The security criteria are clearly documented for each
classification
Explanation: Clear criteria ensure consistent classification and application of
security controls.
Incorrect Answers:
A. Approval workflows are secondary.
B. Ownership may vary; not always IT.
D. Not all assets need distinct classification levels.

Question 201
During a project meeting for the implementation of an enterprise resource planning
(ERP) system, a new requirement is requested by the finance department. Which of
the following would BEST indicate to an IS auditor that the resulting risk to the
project has been assessed?
A. The project status as reported in the meeting minutes
B. The analysis of the cost and time impact of the requirement
C. The updated business requirements
D. The approval of the change by the finance department
Correct Answer: B – The analysis of the cost and time impact of the
requirement
Explanation: An analysis of cost and time impact confirms that project risk has
been evaluated, helping ensure realistic expectations and appropriate decision-
making.
Incorrect Answers:
A. Meeting minutes may reflect status but not risk analysis.
C. Updated requirements show changes, not their impact.
D. Approval alone does not confirm that risk was assessed.

Question 202
An organization has implemented a quarterly job schedule to update database tables
so prices are adjusted in line with a price index. These changes do not go through the
regular change management process. Which of the following is the MOST important
control to have in place?
A. An overarching approval is obtained from the change advisory board
B. User acceptance testing (UAT) is performed after the production run
C. Each production run is approved by an authorized individual
D. Exception reports are generated to identify anomalies
Correct Answer: C – Each production run is approved by an
authorized individual
Explanation: Ensuring each run is approved provides accountability and control
over updates that bypass standard change processes.
Incorrect Answers:
A. General approvals may overlook run-specific risks.
B. Testing after production does not prevent issues.
D. Exception reports help detect, not prevent, unauthorized changes.

Question 203
Which of the following methods will BEST reduce the risk associated with the
transition to a new system using technologies that are not compatible with the old
system?
A. Pilot operation
B. Parallel changeover
C. Modular changeover
D. Phased operation
Correct Answer: B – Parallel changeover
Explanation: Running both systems in parallel allows verification of outputs,
minimizing operational risk during transition.
Incorrect Answers:
A. Pilot is limited in scope.
C. Modular change may not cover all incompatibilities.
D. Phased operation is slower and riskier in tech mismatch cases.

Question 204
Following a merger, a review of an international organization determines the IT
steering committee's decisions do not extend to regional offices as required in the
consolidated IT operating model. Which of the following is the IS auditor's BEST
recommendation?
A. Create regional centers of excellence
B. Engage an IT governance consultant
C. Update the IT steering committee's formal charter
D. Create regional IT steering committees
Correct Answer: C – Update the IT steering committee's formal
charter
Explanation: Updating the charter formalizes authority across all regions, aligning
governance with the new model.
Incorrect Answers:
A. Centers of excellence don't fix governance gaps.
B. Consultants help but don’t directly resolve structure issues.
D. Regional committees may fragment oversight.

Question 205
An organization recently decided to send the backup of its customer relationship
management (CRM) system to its cloud provider for recovery. Which of the following
should be of GREATEST concern to an IS auditor reviewing this process?
A. Testing of restore data has not been performed
B. Validation of backup data has not been performed
C. Backups are sent and stored in unencrypted format
D. The cloud provider is located in a different country
Correct Answer: C – Backups are sent and stored in unencrypted
format
Explanation: Unencrypted backups risk exposure of sensitive data in transit or
storage, posing a major security threat.
Incorrect Answers:
A. Testing is important but secondary to data protection.
B. Validation helps ensure accuracy but not confidentiality.
D. Location concerns are legal, not directly a security issue.

Question 206
A checksum is classified as which type of control?
A. Preventive control
B. Detective control
C. Administrative control
D. Corrective control
Correct Answer: B – Detective control
Explanation: Checksums detect data integrity issues after transmission or storage.
Incorrect Answers:
A. Preventive controls stop issues; checksums detect them.
C. Administrative controls are policy-related.
D. Corrective controls address issues after detection.

Question 207
During a follow-up audit, an IS auditor finds that some critical recommendations
have not been addressed as management has decided to accept the risk. Which of the
following is the IS auditor's BEST course of action?
A. Adjust the annual risk assessment accordingly
B. Require the auditee to address the recommendations in full
C. Evaluate senior management's acceptance of the risk
D. Update the audit program based on management's acceptance of risk
Correct Answer: C – Evaluate senior management's acceptance of the
risk
Explanation: The auditor must assess whether management's acceptance is
documented, justified, and properly authorized.
Incorrect Answers:
A. Risk assessment update comes after evaluation.
B. Requiring action overrides management discretion.
D. Audit program should reflect evaluated decisions.

Question 208
Management has asked internal audit to prioritize and perform a specialized
cybersecurity audit, but the IS audit team has no experience in this area. Which of
the following is the BEST course of action?
A. Delay the audit until the IS auditors are sufficiently trained
B. Delay the audit until an experienced IS auditor has been hired
C. Perform the audit as requested using third-party support
D. Perform the audit with the most experienced IS auditors
Correct Answer: C – Perform the audit as requested using third-party
support
Explanation: Engaging external experts ensures audit quality without delay, while
maintaining independence and competence.
Incorrect Answers:
A. Training delays urgent audits.
B. Hiring takes time.
D. Inexperienced auditors may miss key findings.

Question 209
When implementing a new IT maturity model, which of the following should occur
FIRST?
A. Determine the model elements to be evaluated
B. Benchmark with industry peers
C. Define the target IT maturity level
D. Develop performance metrics
Correct Answer: A – Determine the model elements to be evaluated
Explanation: Defining what to evaluate is foundational for all further actions in
maturity modeling.
Incorrect Answers:
B. Benchmarking follows element identification.
C. Target maturity needs a baseline.
D. Metrics come after defining scope.

Question 210
When reviewing an organization's information security policies, an IS auditor should
verify that the policies have been defined PRIMARILY on the basis of:
A. An information security framework
B. Past information security incidents
C. A risk management process
D. Industry best practices
Correct Answer: C – A risk management process
Explanation: Policies should be tailored to actual risks the organization faces,
ensuring relevance and effectiveness.
Incorrect Answers:
A. Frameworks guide structure but not content priorities.
B. Past incidents inform but don't drive policy creation.
D. Best practices are generic; risk-based policies are contextual.
Question 211
An organization that has suffered a cyberattack is performing a forensic analysis of
the affected users' computers. Which of the following should be of GREATEST
concern for the IS auditor reviewing this process?
A. The chain of custody has not been documented
B. An imaging process was used to obtain a copy of the data from each computer
C. Audit was only involved during extraction of the information
D. The legal department has not been engaged
Correct Answer: A – The chain of custody has not been documented
Explanation: Without a documented chain of custody, forensic evidence may not be
admissible in legal proceedings and could be challenged.
Incorrect Answers:
B. Imaging is standard practice and preserves integrity.
C. Limited audit involvement is not critical in forensic processes.
D. Legal involvement is important, but chain of custody is fundamental.

Question 212
The members of an emergency incident response team should be:
A. Assigned at the time of each incident
B. Appointed by the CISO
C. Restricted to IT personnel
D. Selected from multiple departments
Correct Answer: D – Selected from multiple departments
Explanation: Incident response requires a multidisciplinary team including legal,
communications, HR, and IT to handle all aspects of an incident.
Incorrect Answers:
A. Pre-identified teams ensure quick response.
B. While the CISO may appoint members, diversity is key.
C. IT-only teams lack needed perspectives.

Question 213
Which of the following is the BEST indicator that an application system’s agreed-
upon level of service has been met?
A. Transaction response time
B. Bandwidth usage logs
C. CPU utilization reports
D. Security incident reports
Correct Answer: A – Transaction response time
Explanation: Response time directly reflects user experience and service level
objectives defined in SLAs.
Incorrect Answers:
B. Bandwidth logs are indirect indicators.
C. CPU usage doesn’t reflect service quality.
D. Security incidents relate to security, not performance.

Question 214
The PRIMARY benefit to using a dry-pipe fire-suppression system rather than a wet-
pipe system is that a dry-pipe system:
A. Disperses dry chemical suppressants exclusively
B. Has a decreased risk of leakage
C. Allows more time to abort release of the suppressant
D. Is more effective at suppressing flames
Correct Answer: B – Has a decreased risk of leakage
Explanation: Dry-pipe systems only fill with water when activated, reducing the
risk of accidental water damage.
Incorrect Answers:
A. Dry-pipe systems typically use water, not chemicals.
C. Abort time is not a primary benefit.
D. Effectiveness depends on context, not pipe type.

Question 215
After the merger of two organizations, which of the following is the MOST important
task for an IS auditor to perform?
A. Updating the continuity plan for critical resources
B. Updating the security policy
C. Verifying that access privileges have been reviewed
D. Investigating access rights for expiration dates
Correct Answer: C – Verifying that access privileges have been
reviewed
Explanation: Mergers introduce access risks; reviewing privileges ensures only
appropriate access is granted post-integration.
Incorrect Answers:
A. Important, but secondary to access risk.
B. Security policy update is a long-term task.
D. Expiry checks alone won’t prevent unauthorized access.

Question 216
An organization sends daily backup media by courier to an offsite location. Which of
the following provides the BEST evidence that the media is transported reliably?
A. Documented backup media transport procedures
B. Signed acknowledgments by offsite manager
C. Certification of the courier company
D. Delivery schedule of the backup media
Correct Answer: B – Signed acknowledgments by offsite manager
Explanation: Acknowledgments confirm actual delivery and receipt, providing proof
that transport occurred as intended.
Incorrect Answers:
A. Procedures don’t confirm execution.
C. Certification speaks to vendor credibility, not proof.
D. Schedules don’t verify completion.

Question 217
As part of a recent business-critical initiative, an organization is re-purposing its
customer data. However, its customers are unaware that their data is being used for
another purpose. What is the BEST recommendation to address the associated data
privacy risk to the organization?
A. Ensure the data processing activity remains onshore
B. Maintain an audit trail of the data analysis activity
C. Obtain customer consent for secondary use of the data
D. Adjust the existing data retention requirements
Correct Answer: C – Obtain customer consent for secondary use of the
data
Explanation: Secondary use of personal data requires explicit consent under most
privacy regulations.
Incorrect Answers:
A. Jurisdiction doesn’t address consent.
B. Audit trails provide tracking, not authorization.
D. Retention is unrelated to repurposing.

Question 218
An organization has adopted a backup and recovery strategy that involves copying
on-premise virtual machine (VM) images to a cloud service provider. Which of the
following provides the BEST assurance that VMs can be recovered in the event of a
disaster?
A. Existence of a disaster recovery plan (DRP) with specified roles for emergencies
B. Periodic on-site restoration of VM images obtained from the cloud provider
C. Procurement of adequate storage for the VM images from the cloud service
provider
D. Inclusion of the right to audit in the cloud service provider contract
Correct Answer: B – Periodic on-site restoration of VM images
obtained from the cloud provider
Explanation: Regular recovery testing confirms that backups are usable and meet
recovery objectives.
Incorrect Answers:
A. DRPs define roles but don’t confirm recoverability.
C. Storage space doesn’t ensure recovery success.
D. Audit rights relate to oversight, not functionality.

Question 219
During the implementation of an enterprise resource planning (ERP) system, an IS
auditor is reviewing the results of user acceptance testing (UAT). The auditor’s
PRIMARY focus should be to determine if:
A. Application interfaces have been satisfactorily tested
B. All errors found in the testing process have been corrected
C. The business process owner has signed off on the results
D. System integration testing was performed
Correct Answer: C – The business process owner has signed off on the
results
Explanation: Business owner sign-off indicates acceptance and accountability that
system requirements are met.
Incorrect Answers:
A. Interface testing is part of UAT but not the main assurance.
B. Corrections are expected but not the final decision factor.
D. Integration testing occurs earlier in the process.

Question 220
A help desk has been contacted regarding a lost business mobile device. The FIRST
course of action should be to:
A. Consult the legal team regarding the impact of intellectual property loss
B. Verify the user's identity through a challenge response system
C. Involve the security response team to launch an investigation
D. Attempt to locate the device remotely
Correct Answer: D – Attempt to locate the device remotely
Explanation: Immediate response to minimize loss involves locating or locking the
device remotely.
Incorrect Answers:
A. Legal review comes later.
B. Identity confirmation delays response.
C. Investigation follows containment.

Question 221
When conducting a requirements analysis for a project, the BEST approach would be
to:
A. Conduct a control self-assessment (CSA)
B. Test operational deliverables
C. Prototype the requirements
D. Consult key stakeholders
Correct Answer: D – Consult key stakeholders
Explanation: Consulting key stakeholders ensures the requirements align with
business needs and expectations.
Incorrect Answers:
A. CSA is used for control evaluation, not requirement gathering.
B. Testing operational deliverables is done later in the lifecycle.
C. Prototyping is useful but follows after understanding needs.

Question 222
When evaluating information security governance within an organization, which of
the following findings should be of MOST concern to an IS auditor?
A. An information security governance audit was not conducted within the past year
B. Information security policies are updated annually
C. The data center manager has final sign-off on security projects
D. The information security department has difficulty filling vacancies
Correct Answer: C – The data center manager has final sign-off on
security projects
Explanation: Sign-off on security initiatives should be governed by independent
oversight, not by operations personnel, to avoid conflicts of interest.
Incorrect Answers:
A. Annual audits are not always mandatory.
B. Annual updates are acceptable if risks are assessed.
D. Staffing concerns are secondary to governance issues.

Question 223
During a post-implementation review, an IS auditor learns that while benefits were
realized according to the business case, complications during implementation added
to the cost of the solution. Which of the following is the auditor's BEST course of
action?
A. Design controls that will prevent future added costs
B. Verify that lessons learned were documented for future projects
C. Determine if project deliverables were provided on time
D. Ensure costs related to the complications were subtracted from realized benefits
Correct Answer: B – Verify that lessons learned were documented for
future projects
Explanation: Capturing lessons learned helps prevent similar issues in future
projects and supports organizational learning.
Incorrect Answers:
A. Control design is not the auditor's role.
C. Timeliness may be irrelevant if objectives were met.
D. Subtracting costs is a management responsibility.

Question 224
When reviewing an organization's IT governance processes, which of the following
provides the BEST indication that information security expectations are being met
at all levels?
A. Achievement of established security metrics
B. Approval of the security program by senior management
C. Utilization of an internationally recognized security standard
D. Implementation of a comprehensive security awareness program
Correct Answer: A – Achievement of established security metrics
Explanation: Metrics provide objective, measurable evidence of whether goals and
expectations are being met.
Incorrect Answers:
B. Approval alone does not ensure outcomes.
C. Adoption of standards is not proof of effectiveness.
D. Awareness is necessary but not a key measure of expectation fulfillment.

Question 225
When assessing whether an organization's IT performance measures are comparable
to other organizations in the same industry, which of the following would be MOST
helpful to review?
A. Balanced scorecard
B. IT governance frameworks
C. Benchmarking surveys
D. Utilization reports
Correct Answer: C – Benchmarking surveys
Explanation: Benchmarking allows comparison of performance metrics against
industry peers.
Incorrect Answers:
A. Balanced scorecards show internal performance.
B. Frameworks help guide practices, not measure them.
D. Utilization reports are internal usage metrics.

Question 226
An employee approaches an IS auditor and expresses concern about a critical security
issue in a newly installed application. Which of the following would be the MOST
appropriate action for the auditor to take?
A. Discuss the concern with audit management
B. Recommend reverting to the previous application
C. Immediately conduct a review of the application
D. Discuss the concern with additional end users
Correct Answer: A – Discuss the concern with audit management
Explanation: Escalating the concern through the proper audit channel ensures
objectivity and formal handling.
Incorrect Answers:
B. Immediate action is not within the auditor's scope.
C. A formal review requires planning.
D. Input from other users is not the priority at this point.

Question 227
An organization has outsourced its data processing function to a service provider.
Which of the following would BEST determine whether the service provider continues
to meet the organization's objectives?
A. Periodic audits of controls by an independent auditor
B. Adequacy of the service provider's insurance
C. Assessment of the personnel training processes of the provider
D. Review of performance against service level agreements (SLAs)
Correct Answer: D – Review of performance against service level
agreements (SLAs)
Explanation: SLAs provide clear expectations and performance metrics agreed upon
by both parties.
Incorrect Answers:
A. Audits may not cover day-to-day performance.
B. Insurance helps with risk transfer, not service alignment.
C. Training is important but doesn’t directly verify outcomes.

Question 228
The PRIMARY objective of value delivery in reference to IT governance is to:
A. Increase efficiency
B. Optimize investments
C. Ensure compliance
D. Promote best practices
Correct Answer: B – Optimize investments
Explanation: Value delivery ensures IT investments contribute to business value
and are cost-effective.
Incorrect Answers:
A. Efficiency is one aspect of optimization.
C. Compliance is part of risk management.
D. Best practices support governance but are not the main goal.
Question 229
What is the MAIN purpose of an organization's internal IS audit function?
A. Provide assurance to management about the effectiveness of the organization's
risk management and internal controls
B. Identify and initiate necessary changes in the control environment to help ensure
sustainable improvement
C. Review the organization's policies and procedures against industry best practice
and standards
D. Independently attest the organization's compliance with applicable legal and
regulatory requirements
Correct Answer: A – Provide assurance to management about the
effectiveness of the organization's risk management and internal controls
Explanation: The primary goal is to assess and report on risk and control
effectiveness to senior management.
Incorrect Answers:
B. Auditors recommend but do not initiate changes.
C. Comparing to standards is part of evaluation, not the main goal.
D. Attestation is external auditor territory.

Question 230
Following a recent internal data breach, an IS auditor was asked to evaluate
information security practices within the organization. Which of the following
findings would be MOST important to report to senior management?
A. Employees are not required to sign a non-compete agreement
B. Security education and awareness workshops have not been completed
C. Users lack technical knowledge related to security and data protection
D. Desktop passwords do not require special characters
Correct Answer: B – Security education and awareness workshops
have not been completed
Explanation: Awareness training is a fundamental layer of defense; lack of it
increases human error risk.
Incorrect Answers:
A. Non-compete agreements are legal concerns.
C. Technical training helps, but general awareness is broader.
D. Password complexity is important but not as impactful as lack of awareness.

Question 231
A business unit cannot achieve desired segregation of duties between operations and
programming due to size constraints. Which of the following is MOST important for
the IS auditor to identify?
A. Unauthorized user controls
B. Compensating controls
C. Controls over operational effectiveness
D. Additional control weaknesses
Correct Answer: B – Compensating controls
Explanation: When segregation of duties isn't possible due to organizational
limitations, compensating controls are crucial to mitigate the risks.
Incorrect Answers:
A. Unauthorized controls are a symptom, not a mitigation strategy.
C. Operational effectiveness is important, but not the primary concern in this
context.
D. Identifying more weaknesses is useful but not a solution.

Question 232
The BEST way to determine whether programmers have permission to alter data in
the production environment is by reviewing:
A. the access control system's configuration.
B. how the latest system changes were implemented.
C. the access rights that have been granted.
D. the access control system's log settings.
Correct Answer: C – The access rights that have been granted
Explanation: Access rights provide definitive information on who has what
permissions, making it the best indicator.
Incorrect Answers:
A. System configuration shows the structure, not individual permissions.
B. Reviewing changes may show process adherence but not permissions.
D. Logs may show usage but not direct permission levels.

Question 233
Several unattended laptops containing sensitive customer data were stolen from
personnel offices. Which of the following would be an IS auditor's BEST
recommendation to protect data in case of recurrence?
A. Enhance physical security.
B. Require the use of cable locks.
C. Require two-factor authentication.
D. Encrypt the disk drive.
Correct Answer: D – Encrypt the disk drive
Explanation: Disk encryption protects data even if the device is stolen, making it
the most effective control.
Incorrect Answers:
A. Physical security helps, but it can be bypassed.
B. Cable locks delay theft but don’t protect data.
C. 2FA is for access control, not data at rest.
Question 234
When classifying information, it is MOST important to align the classification to:
A. business risk.
B. data retention requirements.
C. industry standards.
D. security policy.
Correct Answer: A – Business risk
Explanation: Classification should reflect the potential impact on the organization,
which is tied to business risk.
Incorrect Answers:
B. Retention is a secondary concern.
C. Standards guide but don’t drive classification.
D. Policies are shaped by classification, not the other way around.

Question 235
An organization's information security department has recently created a centralized
governance model to ensure that network-related findings are remediated within the
service level agreement (SLA). What should the IS auditor use to assess the maturity
and capability of this governance model?
A. Key risk indicators (KRIs)
B. Key process controls
C. Key data elements
D. Key performance indicators (KPIs)
Correct Answer: D – Key performance indicators (KPIs)
Explanation: KPIs measure progress and effectiveness, making them ideal for
assessing governance maturity.
Incorrect Answers:
A. KRIs focus on risks, not performance.
B. Controls are mechanisms, not indicators.
C. Data elements are input, not performance metrics.

Question 236
The performance, risks, and capabilities of an IT infrastructure are BEST measured
using a:
A. risk management review.
B. control self-assessment (CSA).
C. service level agreement (SLA).
D. balanced scorecard.
Correct Answer: D – Balanced scorecard
Explanation: A balanced scorecard provides a multidimensional view of IT
performance, including risk and capability.
Incorrect Answers:
A. Risk reviews focus narrowly on risk.
B. CSA is useful but subjective.
C. SLAs only measure agreed service targets.

Question 237
To develop meaningful recommendations for findings, which of the following is MOST
important for an IS auditor to determine and understand?
A. Criteria
B. Responsible party
C. Impact
D. Root cause
Correct Answer: D – Root cause
Explanation: Understanding the root cause ensures that recommendations address
the underlying issue.
Incorrect Answers:
A. Criteria define standards but don’t solve problems.
B. Responsibility matters later, not in defining recommendations.
C. Impact explains severity but not cause.

Question 238
An organization allows employees to use personally owned mobile devices to access
customers' personal information. Which of the following is MOST important for an
IS auditor to verify?
A. Employees have signed off on an acceptable use policy.
B. Devices have adequate storage and backup capabilities.
C. Mobile devices are compatible with company infrastructure.
D. Mobile device security policies have been implemented.
Correct Answer: D – Mobile device security policies have been
implemented
Explanation: Without enforced security policies, personal devices can pose serious
risks to customer data.
Incorrect Answers:
A. Policies are only effective if implemented.
B. Backup isn’t the main risk with personal data.
C. Compatibility doesn’t address security.

Question 239
When is the BEST time to commence continuity planning for a new application
system?
A. Immediately after implementation
B. Following successful user testing
C. During the design phase
D. Just prior to the handover to the system maintenance group
Correct Answer: C – During the design phase
Explanation: Early integration of continuity planning ensures it is baked into the
system’s architecture and requirements.
Incorrect Answers:
A. Too late; risks are already present.
B. Testing comes after design.
D. Maintenance handover is post-development.

Question 240
Prior to the migration of acquired software into production, it is MOST important
that the IS auditor review the:
A. user acceptance test (UAT) report.
B. vendor testing report.
C. system documentation.
D. source code escrow agreement.
Correct Answer: A – User acceptance test (UAT) report
Explanation: UAT verifies that the software meets business needs before production
use.
Incorrect Answers:
B. Vendor testing is not sufficient.
C. Documentation supports but doesn’t validate functionality.
D. Escrow is for continuity, not readiness.

Question 241
Which type of attack poses the GREATEST risk to an organization's most sensitive
data?
A. Spear phishing attack
B. Insider attack
C. Password attack
D. Eavesdropping attack
Correct Answer: B – Insider attack
Explanation: Insider attacks are highly dangerous because insiders have legitimate
access to sensitive systems and data.
Incorrect Answers:
A. Spear phishing is targeted but still external.
C. Password attacks are mitigated by controls.
D. Eavesdropping may capture data but is harder to perform at scale.
Question 242
Using swipe cards to limit employee access to restricted areas requires implementing
which additional control?
A. Physical sign-in of all employees for access to restricted areas
B. Initial escort of all new hires by a current employee
C. Periodic review of access profiles by management
D. Employee-access criteria determined on the basis of IS experience
Correct Answer: C – Periodic review of access profiles by management
Explanation: Periodic reviews ensure that access rights are still appropriate and
aligned with employee responsibilities.
Incorrect Answers:
A. Physical sign-in is useful but less effective for validation.
B. Escorts are a one-time measure.
D. Experience does not determine access rights.

Question 243
To enable the alignment of IT staff development plans with IT strategy, which of the
following should be done FIRST?
A. Include strategic objectives in IT staff performance objectives.
B. Review IT staff job descriptions for alignment.
C. Identify required IT skill sets that support key business processes.
D. Develop quarterly training for each IT staff member.
Correct Answer: C – Identify required IT skill sets that support key
business processes
Explanation: Identifying skill gaps based on strategic goals allows focused and
relevant development planning.
Incorrect Answers:
A. Comes after identifying skill needs.
B. Job descriptions support but don’t drive training alignment.
D. Training should be based on identified needs.

Question 244
An internal audit department reports directly to the chief financial officer (CFO) of
an organization. This MOST likely leads to:
A. audit findings becoming more business-oriented.
B. concern over the independence of the auditor.
C. audit recommendations receiving greater attention.
D. biased audit findings and recommendations.
Correct Answer: B – Concern over the independence of the auditor
Explanation: Reporting to a senior manager involved in operations may impair the
independence of the audit function.
Incorrect Answers:
A. Business orientation is not a primary concern.
C. Attention to recommendations does not assure independence.
D. Bias is possible but the core issue is independence.

Question 245
An internal audit department recently established a quality assurance (QA) program.
Which of the following activities is MOST important to include as part of the QA
program requirements?
A. Long-term internal audit resource planning
B. Feedback from internal audit staff
C. Analysis of user satisfaction reports from business lines
D. Ongoing monitoring of the audit activities
Correct Answer: D – Ongoing monitoring of the audit activities
Explanation: Ongoing monitoring ensures that audit activities consistently adhere
to standards and continuously improve.
Incorrect Answers:
A. Resource planning is useful but not QA-specific.
B. Feedback helps improvement but is supplementary.
C. User satisfaction is not a core QA indicator.

Question 246
While planning a review of IT governance, the IS auditor is MOST likely to:
A. obtain information about the framework of control adopted by management.
B. examine audit committee minutes for IS-related matters and their control.
C. assess whether business process owner responsibilities are consistent across the
organization.
D. review compliance with policies and procedures issued by the board of directors.
Correct Answer: A – Obtain information about the framework of
control adopted by management
Explanation: The control framework reveals how IT governance is structured and
measured, which is essential for planning the audit.
Incorrect Answers:
B. Audit committee minutes are supplemental.
C. Role consistency may be checked later.
D. Policy compliance is part of execution, not planning.

Question 247
Many departments of an organization have not implemented audit recommendations
by their agreed upon target dates. Who should address this situation?
A. Head of internal audit
B. External auditor
C. Department managers
D. Senior management
Correct Answer: D – Senior management
Explanation: Senior management is accountable for ensuring organizational units
follow through on audit recommendations.
Incorrect Answers:
A. Internal audit reports findings but cannot enforce implementation.
B. External auditors are not responsible for internal follow-up.
C. Managers carry out actions but are overseen by senior leadership.

Question 248
An advantage of object-oriented system development is that it:
A. is easier to code than procedural languages.
B. partitions systems into a client/server architecture.
C. decreases the need for system documentation.
D. is suited to data with complex relationships.
Correct Answer: D – Is suited to data with complex relationships
Explanation: Object-oriented development models complex data relationships more
naturally and intuitively.
Incorrect Answers:
A. Ease of coding depends on the developer’s skill.
B. Architecture is unrelated to the development method.
C. Documentation is still necessary regardless of methodology.

Question 249
Which of the following MUST be completed as part of the annual audit planning
process?
A. Fieldwork
B. Risk control matrix
C. Risk assessment
D. Business impact analysis (BIA)
Correct Answer: C – Risk assessment
Explanation: Annual audit planning should be based on risk assessment to
prioritize audit activities appropriately.
Incorrect Answers:
A. Fieldwork happens after planning.
B. Control matrices are used within audits.
D. BIA is for continuity, not audit planning.

Question 250
Code changes are compiled and placed in a change folder by the developer. An
implementation team migrates changes to production from the change folder. Which
of the following BEST indicates separation of duties is in place during the migration
process?
A. A second individual performs code review before the change is released to
production.
B. The implementation team does not have access to change the source code.
C. The implementation team does not have experience writing code.
D. The developer approves changes prior to moving them to the change folder.
Correct Answer: B – The implementation team does not have access
to change the source code
Explanation: Preventing the implementation team from modifying code maintains
proper separation of duties.
Incorrect Answers:
A. Code review supports quality but doesn’t enforce SoD.
C. Experience level is irrelevant to access rights.
D. Developer approval does not assure separation.

Question 251
Management has decided to include a compliance manager in the approval process
for a new business that may require changes to the IT infrastructure. Which of the
following is the GREATEST benefit of this approach?
A. Process accountabilities to external stakeholders are improved.
B. Security breach incidents can be identified in early stages.
C. Regulatory risk exposures can be identified before they materialize.
D. Fewer reviews are needed when updating the IT compliance process.
Correct Answer: C – Regulatory risk exposures can be identified
before they materialize
Explanation: Involving the compliance manager early helps proactively identify and
mitigate regulatory risks before they become issues.
Incorrect Answers:
A. External accountability is indirect.
B. Security breaches are typically detected through monitoring, not approvals.
D. Reviews may still be necessary even with early involvement.

Question 252
Malicious program code was found in an application and corrected prior to release
into production. After the release, the same issue was reported. Which of the
following is the IS auditor's BEST recommendation?
A. Ensure corrected program code is compiled in a dedicated server.
B. Ensure change management reports are independently reviewed.
C. Ensure programmers cannot access code after the completion of program edits.
D. Ensure the business signs off on end-to-end user acceptance test (UAT) results.
Correct Answer: C – Ensure programmers cannot access code after
the completion of program edits
Explanation: Preventing programmers from accessing production code after edits
ensures changes cannot be maliciously or accidentally undone.
Incorrect Answers:
A. Compilation servers are secondary controls.
B. Report reviews don’t prevent code reintroduction.
D. UAT focuses on functionality, not development control.

Question 253
For an organization that has plans to implement web-based trading, it would be
MOST important for an IS auditor to verify the organization's information security
plan includes:
A. security training prior to implementation
B. the firewall configuration for the web server
C. security requirements for the new application
D. attributes for system passwords
Correct Answer: C – Security requirements for the new application
Explanation: Security should be built into the design phase. Requirements define
what protections are needed throughout the system.
Incorrect Answers:
A. Training is important but secondary to foundational design.
B. Firewall configuration is tactical, not strategic.
D. Password attributes are too narrow.

Question 254
Which cloud deployment model is MOST likely to be limited in scalability?
A. Hybrid
B. Private
C. Community
D. Public
Correct Answer: B – Private
Explanation: Private clouds have finite resources and are generally limited to the
owning organization, restricting scalability.
Incorrect Answers:
A. Hybrid leverages multiple models.
C. Community clouds can share across groups.
D. Public clouds are highly scalable.

Question 255
After the release of an application system, an IS auditor wants to verify that the
system is providing value to the organization. The auditor's BEST course of action
would be to:
A. review the results of compliance testing
B. perform a gap analysis against the benefits defined in the business case
C. quantify improvements in client satisfaction
D. confirm that risk has declined since the application system release
Correct Answer: B – Perform a gap analysis against the benefits
defined in the business case
Explanation: A gap analysis compares expected and actual results, validating
whether the investment delivered intended value.
Incorrect Answers:
A. Compliance is unrelated to value realization.
C. Client satisfaction is useful but less objective.
D. Risk reduction is one aspect, not the full picture.

Question 256
A chief information officer (CIO) has asked an IS auditor to implement several
security controls for an organization's IT processes and systems. The auditor should:
A. refuse due to independence issues.
B. communicate the conflict of interest to audit management.
C. perform the assignment and future audits with the due professional care.
D. obtain approval from executive management for the implementation.
Correct Answer: B – Communicate the conflict of interest to audit
management
Explanation: Performing implementation would compromise audit independence.
Reporting the conflict maintains objectivity.
Incorrect Answers:
A. Refusing is premature without proper escalation.
C. Performing the assignment violates independence.
D. Approval doesn't eliminate the conflict.

Question 257
An algorithm in an email program analyzes traffic to quarantine emails identified as
spam. The algorithm in the program is BEST characterized as which type of control?
A. Detective
B. Directive
C. Preventive
D. Corrective
Correct Answer: C – Preventive
Explanation: The control prevents spam from reaching users by acting before harm
occurs.
Incorrect Answers:
A. Detective controls identify issues after they occur.
B. Directive controls guide behavior, not block threats.
D. Corrective actions restore systems after events.

Question 258
During the implementation of a new system, an IS auditor must assess whether
certain automated calculations comply with the regulatory requirements. Which of
the following is the BEST way to obtain this assurance?
A. Re-perform the calculation with audit software
B. Review the source code related to the calculation
C. Review sign-off documentation
D. Inspect user acceptance test (UAT) results
Correct Answer: A – Re-perform the calculation with audit software
Explanation: Independent recalculation validates whether the results comply with
regulatory formulas.
Incorrect Answers:
B. Code review shows logic but not output accuracy.
C. Sign-offs are subjective and may miss errors.
D. UAT checks functionality, not regulatory compliance.

Question 259
When testing the adequacy of tape backup procedures, which step BEST verifies that
regularly scheduled backups are timely and run to completion?
A. Reviewing a sample of system-generated backup logs
B. Interviewing key personnel involved in the backup process
C. Observing the execution of a daily backup run
D. Evaluating the backup policies and procedures
Correct Answer: A – Reviewing a sample of system-generated backup
logs
Explanation: Logs offer objective, historical data on backup success and
completion.
Incorrect Answers:
B. Interviews are subjective.
C. Observation captures one point in time.
D. Policies don’t verify execution.

Question 260
During the planning stage of a compliance audit, an IS auditor discovers that a
bank's inventory of compliance requirements does not include recent regulatory
changes related to managing data risk. What should the auditor do FIRST?
A. Ask management why the regulatory changes have not been included
B. Report the missing regulatory updates to the chief information officer (CIO)
C. Discuss potential regulatory issues with the legal department
D. Exclude recent regulatory changes from the audit scope
Correct Answer: A – Ask management why the regulatory changes
have not been included
Explanation: Engaging management helps determine whether the issue is oversight
or intentional.
Incorrect Answers:
B. Escalating before understanding may be premature.
C. Legal input may come after management clarification.
D. Excluding changes without investigation undermines audit integrity.

Question 261
An organization has replaced all of the storage devices at its primary data center
with new, higher capacity units. The replaced devices have been installed at the
disaster recovery site to replace older units. An IS auditor's PRIMARY concern
would be whether:
A. The recovery site devices can handle the storage requirements
B. The procurement was in accordance with corporate policies and procedures
C. The relocation plan has been communicated to all concerned parties
D. A hardware maintenance contract is in place for both old and new storage devices
Correct Answer: A – The recovery site devices can handle the storage
requirements
Explanation: Ensuring that the DR site can accommodate the current and future
data needs is essential for business continuity.
Incorrect Answers:
B. Policy compliance is important but not critical in this scenario.
C. Communication is relevant, but storage capability is more critical.
D. Maintenance contracts matter, but don’t address capacity adequacy.

Question 262
Which of the following should be of GREATEST concern to an IS auditor reviewing
data conversion and migration during the implementation of a new application
system?
A. Data conversion was performed using manual processes
B. Unauthorized data modifications occurred during conversion
C. The change management process was not formally documented
D. Backups of the old system and data are not available online
Correct Answer: B – Unauthorized data modifications occurred during
conversion
Explanation: Unauthorized changes can compromise data integrity and introduce
compliance risks.
Incorrect Answers:
A. Manual processes increase error risk but don’t imply compromise.
C. Documentation is important, but unauthorized change is more severe.
D. Online backup availability is secondary to data integrity.

Question 263
When auditing the alignment of IT to the business strategy, it is MOST important
for the IS auditor to:
A. Ensure an IT steering committee is appointed to monitor new IT projects
B. Evaluate deliverables of new IT initiatives against planned business services
C. Interview senior managers for their opinion of the IT function
D. Compare the organization's strategic plan against industry best practice
Correct Answer: B – Evaluate deliverables of new IT initiatives
against planned business services
Explanation: This ensures that IT is actively supporting business goals and
delivering expected value.
Incorrect Answers:
A. Governance structure is useful but indirect.
C. Interviews are subjective.
D. Industry best practices don’t confirm internal alignment.

Question 264
An organization is acquiring a new customer relationship management (CRM)
system. In which of the following would the IS auditor find the MOST relevant
information on projected cost savings?
A. Request for proposal (RFP)
B. Feasibility study document
C. Business case
D. Results of prototype testing
Correct Answer: C – Business case
Explanation: The business case outlines expected financial and operational benefits,
including cost savings.
Incorrect Answers:
A. RFP focuses on vendor responses.
B. Feasibility discusses practicality, not specific savings.
D. Prototype results assess functionality, not financial value.

Question 265
During the implementation of an upgraded enterprise resource planning (ERP)
system, which of the following is the MOST important consideration for a go-live
decision?
A. Post-implementation review objectives
B. Business case
C. Rollback strategy
D. Test cases
Correct Answer: C – Rollback strategy
Explanation: A rollback strategy ensures that the organization can recover if the
go-live fails.
Incorrect Answers:
A. Review objectives occur after go-live.
B. Business case justifies the project, not readiness.
D. Test cases are important but are part of a broader readiness check.

Question 266
When reviewing the functionality of an intrusion detection system (IDS), the IS
auditor should be MOST concerned if:
A. Legitimate packets blocked by the system have increased
B. False positives have been reported
C. Detected events have increased
D. Actual attacks have not been identified
Correct Answer: D – Actual attacks have not been identified
Explanation: Failing to detect real threats undermines the purpose of IDS, posing
major security risk.
Incorrect Answers:
A. Blocking legitimate traffic is disruptive, but less severe.
B. False positives are manageable with tuning.
C. Increased events may signal effectiveness, not failure.

Question 267
An organization is disposing of a system containing sensitive data and has deleted all
files from the hard disk. An IS auditor should be concerned because:
A. Deleted data cannot easily be retrieved
B. Backup copies of files were not deleted as well
C. Deleting all files separately is not as efficient as formatting the hard disk
D. Deleting the files logically does not overwrite the files' physical data
Correct Answer: D – Deleting the files logically does not overwrite the
files' physical data
Explanation: Logical deletion does not remove actual data, making recovery
possible with forensic tools.
Incorrect Answers:
A. Deleted data can be recovered.
B. Backups are another issue, not this specific risk.
C. Efficiency is not the concern; secure erasure is.

Question 268
What is the MOST difficult aspect of access control in a multiplatform, multiple-site
client/server environment?
A. Restricting a local user to necessary resources on a local platform
B. Creating new user IDs valid only on a few hosts
C. Maintaining consistency throughout all platforms
D. Restricting a local user to necessary resources on the host server
Correct Answer: C – Maintaining consistency throughout all platforms
Explanation: Consistency is complex due to varied systems, policies, and
permissions across sites.
Incorrect Answers:
A & D. These are technical tasks, not systemic challenges.
B. Local ID creation is less complex than system-wide consistency.

Question 269
Following significant business model changes, which of the following is the MOST
important consideration when updating the IT policy?
A. The policy is endorsed by IT leadership
B. The policy is compliant with relevant laws and regulations
C. The policy is integrated into job descriptions
D. The policy is aligned with industry standards and best practice
Correct Answer: B – The policy is compliant with relevant laws and
regulations
Explanation: Legal compliance is paramount, especially after business changes that
might trigger new obligations.
Incorrect Answers:
A. Leadership support is good but not primary.
C. Integration helps implementation, but not legality.
D. Best practice is helpful, but not mandatory.

Question 270
During the design phase of a software development project, the PRIMARY
responsibility of an IS auditor is to evaluate the:
A. Development methodology employed
B. Controls incorporated into the system specifications
C. Future compatibility of the design
D. Proposed functionality of the application
Correct Answer: B – Controls incorporated into the system
specifications
Explanation: Ensuring that controls are integrated early supports security and
audit readiness.
Incorrect Answers:
A. Methodology guides process but not controls.
C. Compatibility is not the auditor's main concern.
D. Functionality is the business' responsibility.

Question 271
During an audit of a disaster recovery plan (DRP) for a critical business area, an IS
auditor finds that not all critical systems are covered. What should the auditor do
NEXT?
A. Evaluate the impact of not covering the systems
B. Escalate the finding to senior management
C. Evaluate the prior year's audit results regarding critical system coverage
D. Verify whether the systems are part of the business impact analysis (BIA)
Correct Answer: D – Verify whether the systems are part of the
business impact analysis (BIA)
Explanation: The BIA determines system criticality and drives DRP coverage.
Ensuring these systems were properly assessed is foundational.
Incorrect Answers:
A. Impact evaluation is relevant but premature.
B. Escalation should follow validation.
C. Prior audit results may not reflect current needs.

Question 272
Due to a recent business divestiture, an organization has limited IT resources to
deliver critical projects. Reviewing the IT staffing plan against which of the following
would BEST guide IT management when estimating resource requirements for future
projects?
A. Peer organization staffing benchmarks
B. Human resources (HR) sourcing strategy
C. Budgeted forecast for the next financial year
D. Records of actual time spent on projects
Correct Answer: D – Records of actual time spent on projects
Explanation: Actual historical data offers reliable insight into effort requirements
and aids in accurate planning.
Incorrect Answers:
A. Benchmarks offer comparisons but may not reflect internal efficiency.
B. HR strategy is long-term, not project-specific.
C. Budget forecasts help planning, not effort estimation.
Question 273
A bank's web-hosting provider has just completed an internal IT security audit and
provides only a summary of the findings to the bank's auditor. Which of the
following should be the bank's GREATEST concern?
A. The audit scope may not have addressed critical areas
B. The audit procedures are not provided to the bank
C. The bank's auditors are not independent of the service provider
D. The audit may be duplicative of the bank's internal audit procedures
Correct Answer: A – The audit scope may not have addressed critical
areas
Explanation: A limited or misaligned audit scope can overlook important risks,
making summary reports insufficient.
Incorrect Answers:
B. Procedure detail helps, but scope is critical.
C. Auditor independence of the host provider isn't assumed.
D. Duplication isn’t as significant as scope omissions.

Question 274
An incorrect version of source code was amended by a development team. This
MOST likely indicates a weakness in:
A. Change management
B. Project management
C. Incident management
D. Quality assurance (QA)
Correct Answer: A – Change management
Explanation: Managing versions and ensuring only approved code is changed is
central to change management.
Incorrect Answers:
B. Project management deals with broader delivery timelines and resources.
C. Incident management deals with problems, not changes.
D. QA finds defects but doesn’t manage deployment.

Question 275
An organization allows employees to retain confidential data on personal mobile
devices. Which of the following is the BEST recommendation to mitigate the risk of
data leakage from lost or stolen devices?
A. Configure to auto-wipe after multiple failed access attempts
B. Require employees to attend security awareness training
C. Enable device auto-lock function
D. Password protect critical data files
Correct Answer: A – Configure to auto-wipe after multiple failed
access attempts
Explanation: Auto-wipe minimizes risk of data exposure after unauthorized access
attempts.
Incorrect Answers:
B. Training helps prevention but not incident response.
C. Auto-lock delays access, not protects data.
D. Passwords alone are insufficient protection.

Question 276
A new regulation in one country of a global organization has recently prohibited
cross-border transfer of personal data. An IS auditor has been asked to determine the
organization's level of exposure in the affected country. Which of the following would
be MOST helpful in making this assessment?
A. Identifying data security threats in the affected jurisdiction
B. Reviewing data classification procedures associated with the affected jurisdiction
C. Identifying business processes associated with personal data exchange with the
affected jurisdiction
D. Developing an inventory of all business entities that exchange personal data with
the affected jurisdiction
Correct Answer: C – Identifying business processes associated with
personal data exchange with the affected jurisdiction
Explanation: Understanding where personal data flows helps assess compliance with
data residency laws.
Incorrect Answers:
A. Threats relate to security, not legal transfer.
B. Classification helps, but doesn’t show flow.
D. Inventory is useful, but process mapping shows actual exposure.

Question 277
When responding to an ongoing denial of service (DoS) attack, an organization's
FIRST course of action should be to:
A. Minimize impact
B. Investigate damage
C. Analyze the attack path
D. Restore service
Correct Answer: A – Minimize impact
Explanation: Immediate priority during a DoS is to contain the disruption and
limit business impact.
Incorrect Answers:
B. Damage assessment follows containment.
C. Analysis is useful but secondary during attack.
D. Restoration follows containment efforts.
Question 278
Which of the following BEST describes an audit risk?
A. The financial report may contain undetected material errors
B. Employees have been misappropriating funds
C. The company is being sued for false accusations
D. Key employees have not taken vacation for 2 years
Correct Answer: A – The financial report may contain undetected
material errors
Explanation: Audit risk is the risk of not detecting material misstatements in
financial reporting.
Incorrect Answers:
B. Misappropriation is a fraud issue, not audit risk itself.
C. Lawsuits relate to legal risk.
D. Vacation patterns are a control red flag, not audit risk.

Question 279
In an IT organization where many responsibilities are shared, which of the following
is the BEST control for detecting unauthorized data changes?
A. Users are required to periodically rotate responsibilities
B. Segregation of duties conflicts are periodically reviewed
C. Data changes are logged in an outside application
D. Data changes are independently reviewed by another group
Correct Answer: D – Data changes are independently reviewed by
another group
Explanation: Independent review ensures oversight, reducing the chance of
unauthorized activity going undetected.
Incorrect Answers:
A. Rotation reduces collusion risk but doesn’t detect changes.
B. SoD review is preventive, not detective.
C. Logging is helpful but needs analysis to detect issues.

Question 280
End users have been demanding the ability to use their own devices for work, but
want to keep personal information out of corporate control. Which of the following
would be MOST effective at reducing the risk of security incidents while satisfying
end user requirements?
A. Encrypt corporate data on the devices
B. Enable remote wipe capabilities for the devices
C. Require complex passwords
D. Implement an acceptable use policy
Correct Answer: A – Encrypt corporate data on the devices
Explanation: Encryption protects data without giving corporate full control over
personal device content.
Incorrect Answers:
B. Remote wipe may delete personal data, causing resistance.
C. Passwords help but don’t address full security.
D. Policies guide behavior but don’t secure data.

Question 281
Following the sale of a business division, employees will be transferred to a new
organization, but they will retain access to IT equipment from the previous employer.
An IS auditor has recommended that both organizations agree to and document an
acceptable use policy for the equipment. What type of control has been
recommended?
A. Corrective control
B. Preventive control
C. Detective control
D. Directive control
Correct Answer: D – Directive control
Explanation: Directive controls are designed to guide the behavior of employees
through policies and procedures, such as acceptable use agreements.
Incorrect Answers:
A. Corrective controls address issues after they occur.
B. Preventive controls stop issues from occurring but are not necessarily policy-
driven.
C. Detective controls identify issues after they occur.

Question 282
What is the BEST way for an IS auditor to assess the adequacy of an expert
consultant who was selected to be involved in an audit engagement?
A. Obtain an understanding of the expert's relevant experience.
B. Verify that the engagement letter outlines the expert's responsibilities.
C. Review the independence and objectivity of the expert.
D. Review the industry reputation of the expert consultant's firm.
Correct Answer: A – Obtain an understanding of the expert's relevant
experience
Explanation: Understanding the expert’s relevant experience ensures they possess
the necessary skills and knowledge.
Incorrect Answers:
B. While helpful, responsibilities alone don’t confirm qualifications.
C. Independence is important, but adequacy is based on skill and experience.
D. Reputation is general and not necessarily indicative of individual adequacy.

Question 283
In a small IT web development company where developers must have write access to
production, the BEST recommendation of an IS auditor would be to:
A. Perform a user access review for the development team.
B. Hire another person to perform migration to production.
C. Implement continuous monitoring controls.
D. Remove production access from the developers.
Correct Answer: C – Implement continuous monitoring controls
Explanation: In environments where segregation is not feasible, monitoring helps
detect inappropriate access or changes.
Incorrect Answers:
A. A review helps but does not control access continuously.
B. Hiring may not be feasible in a small company.
D. Removing access may hinder operations in a small team.

Question 284
Of the following, who are the MOST appropriate staff for ensuring the alignment of
user authorization tables with approved authorization forms?
A. Security administrators
B. System owners
C. Database administrators (DBAs)
D. IT managers
Correct Answer: A – Security administrators
Explanation: Security administrators are responsible for implementing and verifying
access rights per approved forms.
Incorrect Answers:
B. System owners define roles but don’t enforce access.
C. DBAs manage databases, not access rights policies.
D. IT managers oversee staff but don’t handle individual access mappings.

Question 285
As part of business continuity planning, which of the following is MOST important
to assess when conducting a business impact analysis (BIA)?
A. Risk appetite
B. Completeness of critical asset inventory
C. Critical applications in the cloud
D. Recovery scenarios
Correct Answer: B – Completeness of critical asset inventory
Explanation: A complete asset inventory ensures accurate impact assessments and
prioritization of recovery efforts.
Incorrect Answers:
A. Risk appetite influences planning, not BIA directly.
C. Cloud applications may be part of inventory but not the most important factor.
D. Recovery scenarios are developed after the BIA.

Question 286
During the post-implementation review of an application that was implemented six
months ago, which of the following would be MOST helpful in determining whether
the application meets business requirements?
A. Project closure report and lessons-learned documents from the project
management office (PMO)
B. User acceptance testing (UAT) results and sign-off from users on meeting business
requirements
C. Difference between approved budget and actual project expenditures determined
post implementation
D. Comparison between expected benefits from the business case and actual benefits
after implementation
Correct Answer: D – Comparison between expected benefits from the
business case and actual benefits after implementation
Explanation: Comparing planned vs. realized benefits helps assess whether the
application delivers the expected business value.
Incorrect Answers:
A. Project documentation shows process closure, not effectiveness.
B. UAT focuses on functional correctness, not long-term benefit.
C. Budget variances relate to cost, not business value.

Question 287
An organization maintains an inventory of the IT applications used by its staff.
Which of the following would pose the GREATEST concern with regard to the
quality of the inventory data?
A. Inventory data is available on and downloadable from the corporate intranet.
B. The inventory does not contain a formal risk ranking for all the IT applications.
C. The application owner and contact information fields are not required to be
completed.
D. The organization has not established a formal recertification process for the
inventory data.
Correct Answer: C – The application owner and contact information
fields are not required to be completed
Explanation: Missing ownership info hinders responsibility, issue resolution, and
risk management.
Incorrect Answers:
A. Availability improves accessibility.
B. Risk rankings are useful but secondary.
D. Recertification helps maintain accuracy but not as critical as ownership.

Question 288
What is BEST for an IS auditor to review when assessing the effectiveness of changes
recently made to processes and tools related to an organization's business continuity
plan (BCP)?
A. Change management processes
B. Updated inventory of systems
C. Full test results
D. Completed test plans
Correct Answer: C – Full test results
Explanation: Test results show whether the BCP changes work as intended under
realistic conditions.
Incorrect Answers:
A. Change management supports the process but doesn’t prove effectiveness.
B. Inventory updates are important but indirect.
D. Test plans show preparation, not actual outcomes.

Question 289
IS management has recently disabled certain referential integrity controls in the
database management system (DBMS) software to provide users increased query
performance. Which of the following controls will MOST effectively compensate for
the lack of referential integrity?
A. More frequent data backups
B. Periodic table link checks
C. Performance monitoring tools
D. Concurrent access controls
Correct Answer: B – Periodic table link checks
Explanation: These checks detect orphaned records and integrity issues caused by
disabled constraints.
Incorrect Answers:
A. Backups address data recovery, not integrity.
C. Performance tools don’t verify data consistency.
D. Access controls manage security, not data relationships.

Question 290
What would be an IS auditor's BEST recommendation upon finding that a third-
party IT service provider hosts the organization's human resources (HR) system in a
foreign country?
A. Review third-party audit reports.
B. Conduct a privacy impact analysis.
C. Implement change management review.
D. Perform background verification checks.
Correct Answer: B – Conduct a privacy impact analysis
Explanation: A privacy impact analysis helps assess data protection and
compliance risks in cross-border scenarios.
Incorrect Answers:
A. Audit reports support assessment but don’t fully address legal implications.
C. Change management relates to system changes, not hosting concerns.
D. Background checks are for personnel, not data compliance.

Question 291
The PRIMARY role of a control self-assessment (CSA) facilitator is to:
A. Provide solutions for control weaknesses
B. Focus the team on internal controls
C. Report on the internal control weaknesses
D. Conduct interviews to gain background information
Correct Answer: B – Focus the team on internal controls
Explanation: A CSA facilitator's main role is to guide and focus the team in
identifying and evaluating internal controls.
Incorrect Answers:
A. Providing solutions is the team's responsibility.
C. Reporting is a byproduct, not the facilitator’s core duty.
D. Interviews may be part of the process but are not the primary role.

Question 292
IT disaster recovery time objectives (RTOs) should be based on the:
A. Maximum tolerable downtime (MTD)
B. Nature of the outage
C. Maximum tolerable loss of data
D. Business-defined criticality of the systems
Correct Answer: A – Maximum tolerable downtime (MTD)
Explanation: RTO is derived from MTD, which is the maximum amount of time a
business process can be disrupted without significant harm.
Incorrect Answers:
B. The nature of the outage is considered later.
C. Data loss refers more to RPO.
D. System criticality helps, but MTD drives RTO.

Question 293
A data analytics team has developed a process automation bot for internal audit that
scans user access to all servers in the environment and then randomly selects a
sample of new users for testing. Which of the following presents the GREATEST
concern with this approach?
A. The bot can only select samples from the current period.
B. Auditor judgment is removed from the process.
C. Evidence of population completeness is not maintained.
D. Data must be validated manually before being loaded into the bot.
Correct Answer: C – Evidence of population completeness is not maintained
Explanation: Without evidence of completeness, the population sample may not be
reliable, impacting audit validity.
Incorrect Answers:
A. Current period sampling is acceptable if defined.
B. Judgment can still be applied post-sampling.
D. Manual validation is a process issue, not the greatest risk.

Question 294
What is the MOST critical finding when reviewing an organization's information
security management?
A. No official charter for the information security management system
B. No employee awareness training and education program
C. No dedicated security officer
D. No periodic assessments to identify threats and vulnerabilities
Correct Answer: D – No periodic assessments to identify threats and
vulnerabilities
Explanation: Continuous assessments are vital for proactive risk management.
Incorrect Answers:
A. Important, but not critical.
B. Affects awareness but not system-wide posture.
C. Can be mitigated by role assignment.

Question 295
The operations team of an organization has reported an IS security attack. Which of
the following should be the FIRST step for the security incident response team?
A. Report results to management
B. Document lessons learned
C. Perform a damage assessment
D. Prioritize resources for corrective action
Correct Answer: C – Perform a damage assessment
Explanation: Understanding the extent of the damage is critical to properly contain
and respond to the incident.
Incorrect Answers:
A. Reporting is done after assessment.
B. Lessons learned are post-incident.
D. Prioritization follows assessment.

Question 296
A company converted its payroll system from an external service to an internal
package. Payroll processing in April was run in parallel. To validate the completeness
of data after the conversion, which of the following comparisons from the old to the
new system would be MOST effective?
A. Cut-off dates and overwrites for a sample of employees
B. Turnaround time for payroll processing
C. Master file employee data to payroll journals
D. Employee counts and year-to-date payroll totals
Correct Answer: D – Employee counts and year-to-date payroll totals
Explanation: This comparison ensures that no data has been lost or misprocessed
during conversion.
Incorrect Answers:
A. Useful for validation but not completeness.
B. Doesn't ensure data accuracy.
C. Checks linkage, not totals.

Question 297
Following an IS audit, which of the following types of risk would be MOST critical to
communicate to key stakeholders?
A. Control
B. Inherent
C. Audit
D. Residual
Correct Answer: D – Residual
Explanation: Residual risk remains after controls are applied and must be
evaluated by stakeholders.
Incorrect Answers:
A. Control risks are managed internally.
B. Inherent risk is a baseline risk.
C. Audit risk pertains to the auditor's process.

Question 298
An organization has installed blade server technology in its data center. To determine
whether higher cooling demands are maintained, which of the following should the IS
auditor review?
A. Air conditioning capacity
B. Ventilation systems
C. Uninterruptible power supply (UPS) systems
D. Duct maintenance
Correct Answer: A – Air conditioning capacity
Explanation: Blade servers generate more heat; air conditioning must handle the
increased thermal load.
Incorrect Answers:
B. Ventilation helps but doesn’t confirm cooling sufficiency.
C. UPS is for power, not cooling.
D. Ducts are part of maintenance, not cooling performance.

Question 299
The use of control totals reduces the risk of:
A. Posting to the wrong record
B. Improper backup
C. Improper authorization
D. Incomplete processing
Correct Answer: D – Incomplete processing
Explanation: Control totals ensure data completeness by reconciling processed
figures with source figures.
Incorrect Answers:
A. Doesn’t prevent misdirection.
B. Unrelated to data processing.
C. Authorization issues are separate.

Question 300
The application systems quality assurance (QA) function should:
A. Compare programs to approved system changes
B. Ensure adherence of programs to standards
C. Assist programmers in designing and developing applications
D. Design and develop quality applications by employing system development
methodology
Correct Answer: B – Ensure adherence of programs to standards
Explanation: QA ensures that development follows standards and policies to
maintain quality.
Incorrect Answers:
A. This is part of configuration management.
C. This can impair QA independence.
D. QA does not perform development.

Question 301
An organization has begun using social media to communicate with current and
potential clients. Which of the following should be of PRIMARY concern to the
auditor?
A. Using a third-party provider to host and manage content
B. Lack of guidance on appropriate social media usage and monitoring
C. Negative posts by customers affecting the organization's image
D. Reduced productivity of staff using social media
Correct Answer: B – Lack of guidance on appropriate social media
usage and monitoring
Explanation: Without defined policies and monitoring mechanisms, the
organization is exposed to reputational, regulatory, and data leakage risks.
Incorrect Answers:
A. Hosting is less of a concern if properly governed.
C. Reputation risks exist but can be mitigated with policy and monitoring.
D. Productivity loss is a management concern, not an audit priority.

Question 302
An organization is developing data classification standards and has asked internal
audit for advice on aligning the standards with best practices. Internal audit would
MOST likely recommend the standards should be:
A. based on the business requirements for confidentiality of the information.
B. aligned with the organization's segregation of duties requirements.
C. based on the results of an organization-wide risk assessment.
D. based on the business requirements for authentication of the information.
Correct Answer: C – Based on the results of an organization-wide risk
assessment
Explanation: A risk-based approach ensures that classification reflects the true
impact of data compromise.
Incorrect Answers:
A. Confidentiality is one component, but not sufficient on its own.
B. Segregation of duties is related to roles, not data classification.
D. Authentication is a control, not a classification driver.

Question 303
An organization considers implementing a system that uses a technology that is not
in line with the organization's IT strategy. Which of the following is the BEST
justification for deviating from the IT strategy?
A. The system makes use of state-of-the-art technology.
B. The system has a reduced cost of ownership.
C. The organization has staff familiar with the technology.
D. The business benefits are achieved even with extra costs.
Correct Answer: D – The business benefits are achieved even with
extra costs
Explanation: Business value should outweigh strict adherence to strategy if benefits
justify the investment.
Incorrect Answers:
A. Innovation alone does not justify deviation.
B. Lower cost doesn’t always mean better alignment.
C. Familiarity reduces training but isn’t strategic justification.

Question 304
An organization is running servers with critical business applications that are in an
area subject to frequent but brief power outages. Knowledge of which of the following
would allow the organization's management to monitor the ongoing adequacy of the
uninterruptible power supply (UPS)?
A. Duration and interval of the power outages
B. Business impact of server downtime
C. Number of servers supported by the UPS
D. Mean time to recover servers after failure
Correct Answer: A – Duration and interval of the power outages
Explanation: Understanding how long and how often power is lost helps determine
if the UPS capacity is sufficient.
Incorrect Answers:
B. Business impact is strategic, not operationally actionable.
C. Capacity is fixed—usage patterns matter more.
D. MTTR applies to recovery, not UPS adequacy.

Question 305
An organization implemented a cybersecurity policy last year. Which of the following
is the GREATEST indicator that the policy may need to be revised?
A. A significant increase in authorized connections to third parties
B. A significant increase in cybersecurity audit findings
C. A significant increase in external attack attempts
D. A significant increase in approved exceptions
Correct Answer: D – A significant increase in approved exceptions
Explanation: Many exceptions suggest the policy is no longer aligned with current
needs and practices.
Incorrect Answers:
A. More connections may still comply with policy.
B. Audit findings suggest enforcement gaps, not policy flaws.
C. Increased attacks are external, not policy-related.

Question 306
An organization's enterprise architecture (EA) department decides to change a legacy
system's components while maintaining its original functionality. Which of the
following is MOST important for an IS auditor to understand when reviewing this
decision?
A. The current business capabilities delivered by the legacy system
B. The database entity relationships within the legacy system
C. The proposed network topology to be used by the redesigned system
D. The data flows between the components to be used by the redesigned system
Correct Answer: A – The current business capabilities delivered by the
legacy system
Explanation: Retaining functionality requires a solid understanding of the system’s
current business capabilities.
Incorrect Answers:
B. Entity relationships are technical, not functional.
C. Network topology is secondary to functionality.
D. Data flows matter, but business capabilities come first.

Question 307
A legacy application is running on an operating system that is no longer supported
by the vendor. If the organization continues to use the current application, which of
the following should be the IS auditor's GREATEST concern?
A. Potential exploitation of zero-day vulnerabilities in the system
B. Inability to update the legacy application database
C. Increased cost of maintaining the system
D. Inability to use the operating system due to potential license issues
Correct Answer: A – Potential exploitation of zero-day vulnerabilities
in the system
Explanation: Unsupported systems are not patched, making them prime targets for
new vulnerabilities.
Incorrect Answers:
B. A database update issue is secondary.
C. Cost is less critical than security.
D. License issues are legal, not security-focused.

Question 308
A system development project is experiencing delays due to ongoing staff shortages.
Which of the following strategies would provide the GREATEST assurance of system
quality at implementation?
A. Utilize new system development tools to improve productivity.
B. Deliver only the core functionality on the initial target date.
C. Implement overtime pay and bonuses for all development staff.
D. Recruit IS staff to expedite system development.
Correct Answer: B – Deliver only the core functionality on the initial
target date
Explanation: Prioritizing core functionality allows delivery with quality and reduces
scope risk.
Incorrect Answers:
A. Tools help but don’t guarantee quality.
C. Overtime may lead to burnout and errors.
D. Recruitment is slow and may not meet deadlines.

Question 309
When reviewing past results of a recurring annual audit, an IS auditor notes that
findings may not have been reported and independence may not have been
maintained. Which of the following IS the auditor's BEST course of action?
A. Reevaluate internal controls
B. Re-perform past audits to ensure independence
C. Inform senior management
D. Inform audit management
Correct Answer: D – Inform audit management
Explanation: Audit management must be made aware to address potential flaws in
audit integrity.
Incorrect Answers:
A. Reevaluation is premature.
B. Re-performing past audits is inefficient.
C. Escalation to senior management should follow internal reporting protocols.

Question 310
An information systems security officer's PRIMARY responsibility for business
process applications is to:
A. create role-based rules for each business process.
B. approve the organization's security policy.
C. ensure access rules agree with policies.
D. authorize secured emergency access.
Correct Answer: C – Ensure access rules agree with policies
Explanation: The officer ensures that access controls reflect approved policies and
roles.
Incorrect Answers:
A. Rule creation is operational, not oversight.
B. Policy approval typically lies with senior leadership.
D. Emergency access is situational, not primary duty.

Question 311
Coding standards provide which of the following?
A. Access control tables
B. Data flow diagrams
C. Field naming conventions
D. Program documentation
Correct Answer: C – Field naming conventions
Explanation: Coding standards typically include conventions like field naming to
ensure consistency and maintainability.
Incorrect Answers:
A. Access controls relate to security, not coding conventions.
B. Data flow diagrams are part of systems analysis, not coding standards.
D. Documentation may be influenced by standards but isn’t the core of them.

Question 312
During which IT project phase is it MOST appropriate to conduct a benefits
realization analysis?
A. Post-implementation review phase
B. Design review phase
C. User acceptance testing (UAT) phase
D. Final implementation phase
Correct Answer: A – Post-implementation review phase
Explanation: Benefits realization is measured after implementation to determine if
objectives were met.
Incorrect Answers:
B. Design phase is too early for measuring benefits.
C. UAT checks functionality, not value delivery.
D. Implementation is ongoing and not evaluative.

Question 313
Due to a high volume of customer orders, an organization plans to implement a new
application for customers to use for online ordering. Which type of testing is MOST
important to ensure the security of the application prior to go-live?
A. Stress testing
B. User acceptance testing (UAT)
C. Vulnerability testing
D. Regression testing
Correct Answer: C – Vulnerability testing
Explanation: Security assurance before release is best achieved through
vulnerability testing.
Incorrect Answers:
A. Stress testing checks performance, not security.
B. UAT focuses on functionality, not vulnerabilities.
D. Regression testing checks for unintended effects of changes.
Question 314
During an audit of identity and access management, an IS auditor finds that the
engagement audit plan does not include the testing of controls that regulate access
by third parties. Which of the following would be the auditor's BEST course of
action?
A. Add testing of third-party access controls to the scope of the audit.
B. Plan to test these controls in another audit.
C. Determine whether the risk has been identified in the planning documents.
D. Escalate the deficiency to audit management.
Correct Answer: C – Determine whether the risk has been identified
in the planning documents
Explanation: The auditor should assess if this was a scoped-out risk or an oversight
before adjusting the audit.
Incorrect Answers:
A. Adding to the scope should follow planning review.
B. Future audits should not delay response to significant risk.
D. Escalation is premature if the omission was deliberate.

Question 315
What is the PRIMARY reason for conducting a risk assessment when developing an
annual IS audit plan?
A. Identify and prioritize audit areas
B. Determine the existence of controls in audit areas
C. Provide assurance material items will be covered
D. Decide which audit procedures and techniques to use
Correct Answer: A – Identify and prioritize audit areas
Explanation: Risk assessments help auditors focus on the areas with the highest
impact and likelihood.
Incorrect Answers:
B. Control testing comes later in the audit.
C. Assurance is a result, not a planning goal.
D. Procedures are selected after areas are chosen.

Question 316
An employee transfers from an organization's risk management department to
become the lead IS auditor. While in the risk management department, the employee
helped develop the key performance indicators (KPIs) now used by the organization.
Which of the following would pose the GREATEST threat to the independence of
this auditor?
A. Evaluating the effectiveness of IT risk management processes
B. Recommending controls to address the IT risks identified by KPIs
C. Developing KPIs to measure the internal audit team
D. Training the IT audit team on IT risk management processes
Correct Answer: A – Evaluating the effectiveness of IT risk
management processes
Explanation: Reviewing work the auditor previously contributed to creates a
conflict of interest.
Incorrect Answers:
B. Recommending controls is consultative, not evaluative.
C. KPI creation for audit is a new function.
D. Training does not impact independence.

Question 317
As part of an audit response, an auditee has concerns with the recommendations and
is hesitant to implement them. Which of the following would be the BEST course of
action for the IS auditor?
A. Suggest hiring a third-party consultant to perform a current state assessment.
B. Issue a final report without including the opinion of the auditee.
C. Conduct further discussions with the auditee to develop a mitigation plan.
D. Accept the auditee's response and perform additional testing.
Correct Answer: C – Conduct further discussions with the auditee to
develop a mitigation plan
Explanation: Collaboration helps resolve concerns and ensures recommendations
are practical and effective.
Incorrect Answers:
A. External consultants are a last resort.
B. Reports should reflect a complete picture, including auditee responses.
D. Testing does not replace resolution of concerns.

Question 318
After discussing findings with an auditee, an IS auditor is required to obtain approval
of the report from the CEO before issuing it to the audit committee. This
requirement PRIMARILY affects the IS auditor's:
A. judgment
B. effectiveness
C. independence
D. integrity
Correct Answer: C – Independence
Explanation: Requiring approval from management before reporting to the audit
committee compromises objectivity.
Incorrect Answers:
A. Judgment is not affected if findings remain unchanged.
B. Effectiveness is impacted indirectly, but not primarily.
D. Integrity is maintained unless there’s a deliberate misrepresentation.

Question 319
During a review of IT service desk practices, an IS auditor notes that help desk
personnel are spending more time fulfilling user requests for password resets than
resolving critical incidents. Which of the following recommendations to IT
management would BEST address this situation?
A. Calculate the age of incident tickets and alert senior IT personnel when they
exceed service level agreements (SLAs).
B. Provide annual password management training to end users to reduce the number
of instances requiring password resets.
C. Incentivize service desk personnel to close incidents within agreed service levels.
D. Implement a self-service solution and redirect users to access frequently requested
services.
Correct Answer: D – Implement a self-service solution and redirect
users to access frequently requested services
Explanation: A self-service solution improves efficiency and reduces low-value
repetitive tasks.
Incorrect Answers:
A. Alerts help but don’t resolve the core issue.
B. Training alone may not be sufficient.
C. Incentives don’t address root cause of workload.

Question 320
During which phase of a system development project should key performance
indicators (KPIs) be established?
A. Planning phase
B. Initiation phase
C. Execution phase
D. Closure phase
Correct Answer: A – Planning phase
Explanation: KPIs should be defined early to track project progress and
effectiveness throughout the lifecycle.
Incorrect Answers:
B. Initiation sets objectives, not detailed metrics.
C. Execution uses KPIs, not defines them.
D. Closure evaluates KPIs, not creates them.

Question 321
An organization wants to change its project methodology to address increasing costs
and process changes. Which of the following is the BEST methodology to use?
A. Agile application development
B. Waterfall application development
C. Joint application development
D. Object-oriented application development
Correct Answer: A – Agile application development
Explanation: Agile is iterative, flexible, and better suited for managing frequent
changes and controlling costs.
Incorrect Answers:
B. Waterfall is rigid and not ideal for dynamic environments.
C. Joint application development emphasizes collaboration, not methodology change.
D. Object-oriented development is a design approach, not a project methodology.

Question 322
A USB device containing sensitive production data was lost by an employee, and its
contents were subsequently found published online. Which of the following controls is
the BEST recommendation to prevent a similar recurrence?
A. Monitoring data being downloaded on USB devices
B. Using a strong encryption algorithm
C. Training users on USB device security
D. Electronically tracking portable devices
Correct Answer: B – Using a strong encryption algorithm
Explanation: Encryption ensures that even if a device is lost, the data remains
protected from unauthorized access.
Incorrect Answers:
A. Monitoring does not protect data once lost.
C. Training is helpful but less reliable.
D. Tracking helps locate devices but does not secure the data.

Question 323
During an IT operations audit, multiple unencrypted backup tapes containing
sensitive credit card information cannot be found. Which of the following presents
the GREATEST risk to the organization?
A. Human resource cost of responding to the incident
B. Business disruption if a data restore cannot be completed
C. Reputational damage due to potential identity theft
D. The cost of recreating the missing backup tapes
Correct Answer: C – Reputational damage due to potential identity
theft
Explanation: Exposure of sensitive credit card data can damage customer trust and
result in legal and financial repercussions.
Incorrect Answers:
A. HR costs are minor in comparison.
B. Disruption is important but not as severe in this context.
D. Recreating tapes is a logistical issue, not the primary risk.

Question 324
An organization uses multiple offsite data center facilities. Which of the following is
MOST important to consider when choosing related backup devices and media?
A. Associated costs
B. Standardization
C. Backup media capacity
D. Restoration speed
Correct Answer: D – Restoration speed
Explanation: The ability to restore data quickly is critical for continuity, especially
across distributed data centers.
Incorrect Answers:
A. Cost is secondary to functionality in disaster recovery.
B. Standardization improves manageability but is not the top priority.
C. Capacity matters, but only if recovery can meet time objectives.

Question 325
Which of the following is MOST important to determine when conducting a post-
implementation review?
A. Whether the solution architecture complies with IT standards
B. Whether success criteria have been achieved
C. Whether lessons learned have been documented
D. Whether the project has been delivered within the approved budget
Correct Answer: B – Whether success criteria have been achieved
Explanation: A post-implementation review should evaluate whether the project
met its intended objectives and value.
Incorrect Answers:
A. Architecture compliance is a technical check.
C. Lessons learned support future improvements but don’t measure success.
D. Budget adherence is important, but less critical than outcomes.

Question 326
While reviewing an organization's business continuity plan (BCP), an IS auditor
observes that a recently developed application is not included. The IS auditor should:
A. ensure that the criticality of the application is determined.
B. include in the audit findings that the BCP is incomplete.
C. recommend that the application be incorporated in the BCP.
D. ignore the observation as the application is not mission critical.
Correct Answer: A – Ensure that the criticality of the application is
determined
Explanation: Before drawing conclusions or recommending inclusion, the
application’s criticality should be assessed.
Incorrect Answers:
B. The plan may not be incomplete if the app is not critical.
C. Inclusion should follow impact assessment.
D. Dismissing without evaluation could overlook potential risk.

Question 327
Data anonymization helps to prevent which types of attacks in a big data
environment?
A. Man-in-the-middle
B. Denial of service (DoS)
C. Correlation
D. Spoofing
Correct Answer: C – Correlation
Explanation: Anonymization prevents attackers from linking data to identifiable
individuals using correlation.
Incorrect Answers:
A. Man-in-the-middle involves interception, not identity linkage.
B. DoS targets availability, not privacy.
D. Spoofing involves identity falsification, not linking data points.

Question 328
During a review of a production schedule, an IS auditor observes that a staff member
is not complying with mandatory operational procedures. The auditor's NEXT step
should be to:
A. note the noncompliance in the audit working papers.
B. determine why the procedures were not followed.
C. issue an audit memorandum identifying the noncompliance.
D. include the noncompliance in the audit report.
Correct Answer: B – Determine why the procedures were not followed
Explanation: Understanding root cause is necessary before taking formal action or
issuing findings.
Incorrect Answers:
A. Documentation is important but not the first action.
C. A memo is premature without investigation.
D. Reporting should be based on full context.

Question 329
The PRIMARY objective of IT service level management is to:
A. improve IT cost control.
B. manage computer operations activities.
C. satisfy customer requirements.
D. increase awareness of IT services.
Correct Answer: C – Satisfy customer requirements
Explanation: The key goal is to ensure IT services meet agreed-upon customer
expectations.
Incorrect Answers:
A. Cost control is a by-product, not the objective.
B. Operations management is part of service delivery but not the focus.
D. Awareness is useful but not the main goal.

Question 330
The use of which of the following would BEST enhance a process improvement
program?
A. Balanced scorecard
B. Project management methodologies
C. Capability maturity models
D. Model-based design notations
Correct Answer: C – Capability maturity models
Explanation: Maturity models assess current processes and guide structured
improvements.
Incorrect Answers:
A. Balanced scorecard measures performance but doesn’t guide improvement.
B. Project methodologies support execution, not maturity.
D. Design notations focus on systems modeling, not process maturity.

Question 331
Reconciliations have identified data discrepancies between an enterprise data
warehouse and a revenue system for key financial reports. What is the GREATEST
risk to the organization in this situation?
A. The key financial reports may no longer be produced
B. Financial reports may be delayed
C. Undetected fraud may occur
D. Decisions may be made based on incorrect information
Correct Answer: D – Decisions may be made based on incorrect
information
Explanation: Inaccurate data in financial reports can lead to poor strategic
decisions, regulatory issues, and reputational damage.
Incorrect Answers:
A. Reports may still be produced, albeit with incorrect data.
B. Delays are less critical than making flawed decisions.
C. While fraud is a risk, incorrect reporting poses broader strategic consequences.

Question 332
An organization has recently implemented a Voice-over IP (VoIP) communication
system. Which of the following should be the IS auditor's PRIMARY concern?
A. Voice quality degradation due to packet loss
B. Lack of integration of voice and data communications
C. A single point of failure for both voice and data communications
D. Inability to use virtual private networks (VPNs) for internal traffic
Correct Answer: C – A single point of failure for both voice and data
communications
Explanation: Combining voice and data over a single network increases the impact
of a failure, making availability a primary concern.
Incorrect Answers:
A. Quality issues affect usability, not availability.
B. Integration is an implementation challenge, not a primary risk.
D. VPN compatibility is not the main risk focus.

Question 333
When evaluating the ability of a disaster recovery plan (DRP) to enable the recovery
of IT processing capabilities, it is MOST important for the IS auditor to verify the
plan is:
A. stored at an offsite location
B. communicated to department heads
C. regularly reviewed
D. periodically tested
Correct Answer: D – Periodically tested
Explanation: Testing ensures the DRP is effective and can restore operations during
a real disaster.
Incorrect Answers:
A. Offsite storage helps availability, but testing confirms functionality.
B. Communication is necessary but not sufficient.
C. Reviews without testing may not reveal weaknesses.

Question 334
During a disaster recovery audit, an IS auditor finds that a business impact analysis
(BIA) has not been performed. The auditor should FIRST:
A. conduct additional compliance testing
B. issue an intermediate report to management
C. perform a business impact analysis (BIA)
D. evaluate the impact on current disaster recovery capability
Correct Answer: D – Evaluate the impact on current disaster recovery
capability
Explanation: The auditor should assess how the missing BIA affects recovery
planning before making recommendations.
Incorrect Answers:
A. More testing won’t resolve the root issue.
B. Reporting should follow full evaluation.
C. Performing a BIA is not the auditor’s role.

Question 335
During a review, an IS auditor discovers that corporate users are able to access
cloud-based applications and data from any Internet-connected web browser. Which
of the following is the auditor's BEST recommendation to help prevent unauthorized
access?
A. Utilize strong anti-malware controls on all computing devices
B. Implement an intrusion detection system (IDS)
C. Update security policies and procedures
D. Implement multi-factor authentication
Correct Answer: D – Implement multi-factor authentication
Explanation: MFA adds an essential layer of security, especially for remote access to
sensitive data.
Incorrect Answers:
A. Anti-malware helps device security, not access control.
B. IDS detects intrusions but doesn't prevent them.
C. Policies are important but not a strong access control.

Question 336
To create a digital signature in a message using asymmetric encryption, it is
necessary to:
A. encrypt the authentication sequence using a public key
B. first use a symmetric algorithm for the authentication sequence
C. transmit the actual digital signature in unencrypted clear text
D. encrypt the authentication sequence using a private key
Correct Answer: D – Encrypt the authentication sequence using a
private key
Explanation: The sender’s private key is used to create a digital signature, which
recipients can verify using the public key.
Incorrect Answers:
A. Public key is used for verification, not signing.
B. Symmetric algorithms are not used in digital signatures.
C. The signature is not transmitted in plain text for integrity.
Question 337
During an audit of an access control system, an IS auditor finds that RFID card
readers are not connected via the network to a central server. Which of the following
is the GREATEST risk associated with this finding?
A. Lost or stolen cards cannot be disabled immediately
B. Card reader firmware updates cannot be rolled out automatically
C. The system is not easily scalable to accommodate a new device
D. Incidents cannot be investigated without a centralized log file
Correct Answer: A – Lost or stolen cards cannot be disabled
immediately
Explanation: Immediate deactivation is critical to maintaining security when
physical credentials are compromised.
Incorrect Answers:
B. Firmware updates are periodic, not urgent.
C. Scalability is an issue, but not the primary risk.
D. Logging is important but secondary to real-time control.

Question 338
Invoking a business continuity plan (BCP) is demonstrating which type of control?
A. Preventive
B. Corrective
C. Directive
D. Detective
Correct Answer: B – Corrective
Explanation: BCP is a corrective control because it restores operations after a
disruption.
Incorrect Answers:
A. Preventive avoids incidents; BCP reacts to them.
C. Directive guides actions but doesn't restore service.
D. Detective identifies issues but doesn’t resolve them.

Question 339
When determining whether a project in the design phase will meet organizational
objectives, what is BEST to compare against the business case?
A. Project plan
B. Requirements analysis
C. Implementation plan
D. Project budget provisions
Correct Answer: B – Requirements analysis
Explanation: Requirements analysis defines the expected outcomes and ensures
alignment with the business case.
Incorrect Answers:
A. Project plans focus on timeline, not outcomes.
C. Implementation plans cover execution, not alignment.
D. Budgets manage cost, not functional fit.

Question 340
The results of an IS audit indicating the need to strengthen controls has been
communicated to the appropriate stakeholders. Which of the following is the BEST
way for management to enforce implementation of the recommendations?
A. Copy senior management on communications related to the audit
B. Have stakeholders develop a business case for control changes
C. Assign ownership to each remediation activity
D. Request auditors to design a roadmap for closure
Correct Answer: C – Assign ownership to each remediation activity
Explanation: Assigning ownership ensures accountability and follow-through on
control implementation.
Incorrect Answers:
A. Copying management informs but doesn’t enforce.
B. Business cases justify change but don’t ensure action.
D. Auditors should not lead implementation tasks.

Question 341
Internal audit is conducting an audit of customer transaction risk. Which of the
following would be the BEST reason to use data analytics?
A. Transactional data is contained in multiple discrete systems that have varying
levels of reliability
B. Anomalies and risk trends in the data set have yet to be defined
C. The audit is being performed to comply with regulations requiring periodic
random sample testing
D. The audit focus is on a small number of predefined high-risk transactions
Correct Answer: B – Anomalies and risk trends in the data set have
yet to be defined
Explanation: Data analytics is most valuable when patterns, risks, or anomalies are
not yet clearly known, allowing the audit to explore and identify issues.
Incorrect Answers:
A. Data inconsistency may complicate analysis but is not the primary reason for
analytics.
C. Random sampling is a separate audit technique.
D. Data analytics is better suited to large data sets.
Question 342
Critical processes are not defined in an organization's business continuity plan
(BCP). Which of the following would have MOST likely identified the gap?
A. Updating the risk register
B. Reviewing the business continuity strategy
C. Reviewing the business impact analysis (BIA)
D. Testing the incident response plan
Correct Answer: C – Reviewing the business impact analysis (BIA)
Explanation: A BIA identifies critical processes; its omission or poor execution
leads to missing processes in the BCP.
Incorrect Answers:
A. The risk register focuses on threats, not process identification.
B. Strategy review focuses on alignment, not process completeness.
D. Testing may reveal execution issues, not planning gaps.

Question 343
When auditing the closing stages of a system development project, which of the
following should be the MOST important consideration?
A. Rollback procedures
B. Control requirements
C. User acceptance test (UAT) results
D. Functional requirements documentation
Correct Answer: C – User acceptance test (UAT) results
Explanation: UAT confirms the system meets user needs and is ready for
deployment.
Incorrect Answers:
A. Rollback is part of risk mitigation, not closure validation.
B. Control requirements are more relevant in design.
D. Documentation supports the project but is not proof of readiness.

Question 344
Following a breach, what is the BEST source to determine the maximum amount of
time before customers must be notified that their personal information may have
been compromised?
A. Industry standards
B. Information security policy
C. Incident response plan
D. Industry regulations
Correct Answer: D – Industry regulations
Explanation: Legal requirements define timeframes for breach notifications and
must be followed to ensure compliance.
Incorrect Answers:
A. Standards provide guidance, not enforceable requirements.
B. Policy may not be up-to-date or enforceable in court.
C. Response plans reference regulations but are not authoritative.

Question 345
A client/server configuration will:
A. optimize system performance by having a server on a front-end and clients on a
host
B. enhance system performance through the separation of front-end and back-end
processes
C. keep track of all the clients using the IS facilities of a service organization
D. limit the clients and servers' relationship by limiting the IS facilities to a single
hardware system
Correct Answer: B – Enhance system performance through the
separation of front-end and back-end processes
Explanation: This separation allows tasks to be processed more efficiently,
improving overall system performance.
Incorrect Answers:
A. Incorrect role descriptions for client-server structure.
C. Client tracking is not the main performance benefit.
D. Limiting hardware contradicts the client/server model.

Question 346
The PRIMARY benefit of information asset classification is that it:
A. enables risk management decisions
B. helps to align organizational objectives
C. prevents loss of assets
D. facilitates budgeting accuracy
Correct Answer: A – Enables risk management decisions
Explanation: Classification helps prioritize protections and allocate resources
appropriately based on risk.
Incorrect Answers:
B. Alignment is a broader strategy topic.
C. Classification does not directly prevent loss.
D. Budgeting may benefit but is not the core purpose.

Question 347
The implementation of an IT governance framework requires that the board of
directors of an organization:
A. approve the IT strategy
B. be informed of all IT initiatives
C. have an IT strategy committee
D. address technical IT issues
Correct Answer: A – Approve the IT strategy
Explanation: Board approval ensures that the IT strategy aligns with business
goals and governance.
Incorrect Answers:
B. Being informed is passive and insufficient.
C. A committee is helpful but not mandatory.
D. Technical issues are typically delegated.

Question 348
What is the PRIMARY reason to adopt a risk-based IS audit strategy?
A. To achieve synergy between audit and other risk management functions
B. To reduce the time and effort needed to perform a full audit cycle
C. To prioritize available resources and focus on areas with significant risk
D. To identify key threats, risks, and controls for the organization
Correct Answer: C – To prioritize available resources and focus on
areas with significant risk
Explanation: Risk-based audits ensure efforts are focused on areas that present the
highest threat or impact.
Incorrect Answers:
A. Synergy is a secondary benefit.
B. Time-saving is not the primary driver.
D. Identifying risks is part of the process, not the goal.

Question 349
An IS auditor finds that application servers had inconsistent security settings leading
to potential vulnerabilities. Which of the following is the BEST recommendation by
the IS auditor?
A. Improve the change management process
B. Perform a configuration review
C. Establish security metrics
D. Perform a penetration test
Correct Answer: B – Perform a configuration review
Explanation: A configuration review identifies inconsistencies and deviations from
baseline security standards.
Incorrect Answers:
A. Change management helps prevent issues but doesn't identify existing ones.
C. Metrics help measure but not resolve.
D. Penetration testing may not pinpoint configuration gaps.
Question 350
When conducting a post-implementation review of a new software application, an IS
auditor should be MOST concerned with an increasing number of:
A. change requests approved to add new services
B. updates required for the end-user operations manual
C. operational errors impacting service delivery
D. help desk calls requesting future enhancements
Correct Answer: C – Operational errors impacting service delivery
Explanation: Operational errors directly affect business continuity and indicate
implementation or system flaws.
Incorrect Answers:
A. New services may reflect evolving needs.
B. Manual updates are routine.
D. Enhancement requests are expected and not concerning.

Question 351
When an IS auditor evaluates key performance indicators (KPIs) for IT initiatives, it
is MOST important that the KPIs indicate:
A. IT deliverables are process driven
B. IT objectives are measured
C. IT resources are fully utilized
D. IT solutions are within budget
Correct Answer: B – IT objectives are measured
Explanation: KPIs are most effective when they directly reflect whether IT
objectives are being met, ensuring alignment with business goals.
Incorrect Answers:
A. Process-driven deliverables may not reflect outcomes.
C. Utilization is operational, not strategic.
D. Budget compliance is important, but not the best indicator of success.

Question 352
In which phase of penetration testing would host detection and domain name system
(DNS) interrogation be performed?
A. Reporting
B. Attacks
C. Discovery
D. Planning
Correct Answer: C – Discovery
Explanation: Discovery involves gathering information about the target, such as
host detection and DNS interrogation, before any attacks are launched.
Incorrect Answers:
A. Reporting is the documentation phase.
B. Attacks follow the discovery phase.
D. Planning focuses on scope and rules of engagement.

Question 353
Which type of control is being implemented when a biometric access device is
installed at the entrance to a facility?
A. Preventive
B. Deterrent
C. Corrective
D. Detective
Correct Answer: A – Preventive
Explanation: Biometric devices prevent unauthorized access by ensuring only
verified individuals can enter.
Incorrect Answers:
B. Deterrents discourage but do not actively block.
C. Corrective actions occur after an incident.
D. Detective controls identify issues post-occurrence.

Question 354
Which of the following would an IS auditor consider the GREATEST risk associated
with a mobile workforce environment?
A. Loss or damage to the organization's assets
B. Lack of compliance with organizational policies
C. Decrease in employee productivity and accountability
D. Inability to access data remotely
Correct Answer: A – Loss or damage to the organization's assets
Explanation: Mobile environments increase the risk of data loss or theft due to
physical device exposure outside secure areas.
Incorrect Answers:
B. Policy compliance is a concern, but secondary.
C. Productivity may vary but is not the greatest risk.
D. Inability to access is an availability issue, not a top risk.

Question 355
Which of the following key performance indicators (KPIs) provides stakeholders with
the MOST useful information about whether information security risk is being
managed?
A. The number of security controls implemented
B. Time from identifying security threats to implementing solutions
C. Time from security log capture to log analysis
D. The number of entries in the security risk register
Correct Answer: B – Time from identifying security threats to
implementing solutions
Explanation: This KPI reflects the organization's responsiveness and agility in
managing information security risks.
Incorrect Answers:
A. Quantity does not imply effectiveness.
C. Log analysis timing is a subset of threat management.
D. The number of risks logged doesn't show risk reduction.

Question 356
Which of the following is MOST important when implementing a data classification
program?
A. Planning for secure storage capacity
B. Understanding the data classification levels
C. Formalizing data ownership
D. Developing a privacy policy
Correct Answer: C – Formalizing data ownership
Explanation: Without clear ownership, data classification cannot be enforced or
maintained effectively.
Incorrect Answers:
A. Storage is logistical, not foundational.
B. Understanding levels is necessary but comes after ownership.
D. Privacy policy is related but broader in scope.

Question 357
Which of the following is an IS auditor's BEST recommendation to help an
organization increase the efficiency of computing resources?
A. Hardware upgrades
B. Real-time backups
C. Virtualization
D. Overclocking the central processing unit (CPU)
Correct Answer: C – Virtualization
Explanation: Virtualization optimizes resource use by consolidating workloads on
fewer physical machines.
Incorrect Answers:
A. Hardware upgrades are costly and may not address inefficiency.
B. Backups are for resilience, not efficiency.
D. Overclocking may cause instability or damage.

Question 358
Which of the following would BEST manage the risk of changes in requirements after
the analysis phase of a business application development project?
A. Sign-off from the IT team
B. Quality assurance (QA) review
C. Ongoing participation by relevant stakeholders
D. Expected deliverables meeting project deadlines
Correct Answer: C – Ongoing participation by relevant stakeholders
Explanation: Active stakeholder involvement ensures evolving needs are addressed
promptly, reducing requirement drift.
Incorrect Answers:
A. IT sign-off is insufficient alone.
B. QA reviews test quality, not requirement evolution.
D. Timelines do not ensure requirement accuracy.

Question 359
Which of the following is the BEST data integrity check?
A. Tracing data back to the point of origin
B. Performing a sequence check
C. Counting the transactions processed per day
D. Preparing and running test data
Correct Answer: A – Tracing data back to the point of origin
Explanation: Verifying data against its original source confirms its accuracy and
integrity.
Incorrect Answers:
B. Sequence checks detect missing entries but not source validity.
C. Counting totals shows completeness, not correctness.
D. Test data checks systems, not live data integrity.

Question 360
Which of the following BEST ensures the quality and integrity of test procedures
used in audit analytics?
A. Developing and communicating test procedure best practices to audit teams
B. Centralizing procedures and implementing change control
C. Developing and implementing an audit data repository
D. Decentralizing procedures and implementing periodic peer review
Correct Answer: B – Centralizing procedures and implementing
change control
Explanation: Centralized, controlled procedures reduce inconsistencies and
unauthorized changes, ensuring reliable results.
Incorrect Answers:
A. Communication helps, but without control, inconsistencies may remain.
C. A repository stores data but doesn't ensure procedural integrity.
D. Decentralization increases variation and risk.

Question 361
Which of the following features of a library control software package would protect
against unauthorized updating of source code?
A. Access controls for source libraries
B. Date and time stamping of source and object code
C. Required approvals at each life cycle step
D. Release-to-release comparison of source code
Correct Answer: A – Access controls for source libraries
Explanation: Restricting access to source libraries ensures only authorized
personnel can update source code.
Incorrect Answers:
B. Timestamps provide tracking, not prevention.
C. Approvals are helpful but not sufficient alone.
D. Comparisons detect changes after the fact, not prevent them.

Question 362
Which of the following security testing techniques is MOST effective in discovering
unknown malicious attacks?
A. Penetration testing
B. Sandboxing
C. Vulnerability testing
D. Reverse engineering
Correct Answer: B – Sandboxing
Explanation: Sandboxing allows code to run in isolation and observe behavior,
making it ideal for detecting unknown or zero-day threats.
Incorrect Answers:
A. Penetration testing focuses on known vulnerabilities.
C. Vulnerability testing identifies existing flaws, not unknown ones.
D. Reverse engineering is time-consuming and not preventive.

Question 363
Which of the following should be the PRIMARY objective of conducting an audit
follow-up of management action plans?
A. To verify that risks listed in the audit report have been properly mitigated
B. To ensure senior management is aware of the audit findings
C. To identify new risks and controls for the organization
D. To align the management action plans with business requirements
Correct Answer: A – To verify that risks listed in the audit report
have been properly mitigated
Explanation: The follow-up ensures that corrective actions are implemented and the
original risks are addressed.
Incorrect Answers:
B. Awareness is part of the initial audit communication.
C. New risks may be identified but are not the main goal.
D. Alignment is secondary to risk resolution.

Question 364
Which of the following is the BEST use of a balanced scorecard when evaluating IT
performance?
A. Determining compliance with relevant regulatory requirements
B. Monitoring alignment of IT with the rest of the organization
C. Evaluating implementation of the business strategy
D. Monitoring alignment of the IT project portfolio to budget
Correct Answer: B – Monitoring alignment of IT with the rest of the
organization
Explanation: A balanced scorecard links IT objectives with business goals, ensuring
strategic alignment.
Incorrect Answers:
A. Compliance can be tracked, but it's not the main purpose.
C. Implementation review is broader than scorecard metrics.
D. Budget alignment is only one component.

Question 365
Which of the following is the MOST appropriate role for an IS auditor assigned as a
team member for a software development project?
A. Implementing controls within the software
B. Developing user acceptance testing (UAT) scripts
C. Performing a mid-term evaluation of the project management process
D. Monitoring assessed risk for the project
Correct Answer: D – Monitoring assessed risk for the project
Explanation: The IS auditor’s role is advisory and monitoring in nature, ensuring
risk is identified and addressed.
Incorrect Answers:
A. Implementation compromises independence.
B. Script development is a QA role.
C. Evaluation may occur, but risk monitoring is primary.

Question 366
Which of the following should be of GREATEST concern for an IS auditor reviewing
an organization's bring your own device (BYOD) policy?
A. Not all devices are approved for BYOD
B. The policy does not include the right to audit BYOD devices
C. A mobile device management (MDM) solution is not implemented
D. The policy is not updated annually
Correct Answer: C – A mobile device management (MDM) solution is
not implemented
Explanation: MDM enforces security settings and controls on BYOD devices, and
its absence poses a significant security risk.
Incorrect Answers:
A. Approval gaps can be managed with controls.
B. Audit rights are useful but not critical.
D. Updates are important, but lack of MDM is more critical.

Question 367
Which of the following statements appearing in an organization's acceptable use
policy BEST demonstrates alignment with data classification standards related to the
protection of information assets?
A. Information assets should only be accessed by persons with a justified need
B. All information assets must be encrypted when stored on the organization's
systems
C. Any information assets transmitted over a public network must be approved by
executive management
D. All information assets will be assigned a clearly defined level to facilitate proper
employee handling
Correct Answer: D – All information assets will be assigned a clearly
defined level to facilitate proper employee handling
Explanation: Data classification is about categorizing assets to assign appropriate
controls, making option D the most aligned.
Incorrect Answers:
A. Access control is part of classification, not the classification itself.
B. Encryption is a safeguard, not a classification mechanism.
C. Executive approval is not scalable for classification purposes.

Question 368
Which of the following information security requirements BEST enables the tracking
of organizational data in a bring your own device (BYOD) environment?
A. Employees must immediately report lost or stolen mobile devices containing
organizational data
B. Employees must use auto-lock features and complex passwords on personal devices
C. Employees must sign acknowledgment of the organization's mobile device
acceptable use policy
D. Employees must enroll their personal devices in the organization's mobile device
management program
Correct Answer: D – Employees must enroll their personal devices in
the organization's mobile device management program
Explanation: MDM enables centralized tracking and control of organizational data
on BYOD devices.
Incorrect Answers:
A. Reporting is reactive, not preventive.
B. Passwords help secure access, but don’t ensure data tracking.
C. Acknowledgment is a compliance measure, not a technical control.

Question 369
Which of the following is MOST important for an IS auditor to verify when
evaluating an organization's firewall?
A. Logs are being collected in a separate protected host
B. Access to configuration files is restricted
C. Automated alerts are being sent when a risk is detected
D. Insider attacks are being controlled
Correct Answer: B – Access to configuration files is restricted
Explanation: Uncontrolled configuration access can lead to misconfigurations or
malicious changes, posing a serious threat.
Incorrect Answers:
A. Log protection is important, but less critical.
C. Alerts are reactive; access control is preventive.
D. Insider threats are broader than just firewall evaluation.

Question 370
Which of the following would be of GREATEST concern to an IS auditor reviewing
backup and recovery controls?
A. Backup procedures are not documented
B. Weekly and monthly backups are stored onsite
C. Backups are stored in an external hard drive
D. Restores from backups are not periodically tested
Correct Answer: D – Restores from backups are not periodically
tested
Explanation: Without testing, the organization cannot be confident that backups
can be successfully restored in an emergency.
Incorrect Answers:
A. Documentation is important but less critical than validation.
B. Onsite storage is risky but acceptable with redundancy.
C. Media type matters less than reliability and testing.
Question 371
Which of the following should be an IS auditor's GREATEST concern when
reviewing an organization's security controls for policy compliance?
A. Security policies are not applicable across all business units
B. End users are not required to acknowledge security policy training
C. The security policy has not been reviewed within the past year
D. Security policy documents are available on a public domain website
Correct Answer: A – Security policies are not applicable across all
business units
Explanation: Inconsistency in policy application across units creates gaps in
enforcement and increases organizational risk.
Incorrect Answers:
B. Acknowledgment supports awareness but is not as critical as universal
applicability.
C. Regular reviews are necessary but can be addressed promptly.
D. Public availability may be poor practice but doesn't directly compromise security.

Question 372
Which of the following should be the PRIMARY basis for prioritizing follow-up
audits?
A. Audit cycle defined in the audit plan
B. Recommendation from executive management
C. Residual risk from the findings of previous audits
D. Complexity of management's action plans
Correct Answer: C – Residual risk from the findings of previous audits
Explanation: Follow-up audits should focus on areas where unresolved risks
continue to pose a threat.
Incorrect Answers:
A. The cycle is a planning tool, not a risk-based trigger.
B. Executive input is important but not the primary basis.
D. Complexity may delay execution but doesn't dictate priority.

Question 373
Which of the following should be an IS auditor's GREATEST consideration when
scheduling follow-up activities for agreed-upon management responses to remediate
audit observations?
A. IT budgeting constraints
B. Availability of responsible IT personnel
C. Risk rating of original findings
D. Business interruption due to remediation
Correct Answer: C – Risk rating of original findings
Explanation: High-risk issues must be addressed first to prevent significant threats
to the organization.
Incorrect Answers:
A. Budget may influence feasibility but not urgency.
B. Personnel availability is a logistical issue, not a risk-based factor.
D. Business interruption can be mitigated but doesn’t reduce the need for follow-up.

Question 374
Which of the following is the MOST useful information for an IS auditor to review
when formulating an audit plan for the organization's outsourced service provider?
A. Service level agreement (SLA) reports
B. The service provider's control self-assessment (CSA)
C. The organization's procurement policy
D. Independent audit reports
Correct Answer: D – Independent audit reports
Explanation: Third-party audit reports provide verified insights into the service
provider’s control environment.
Incorrect Answers:
A. SLA reports show performance but not controls.
B. CSA is self-reported and less reliable.
C. Procurement policies relate to vendor selection, not ongoing risk.

Question 375
Which of the following should be the MOST important consideration when
prioritizing the funding for competing IT projects?
A. Skills and capabilities within the project management team
B. Quality and accuracy of the IT project inventory
C. Criteria used to determine the benefits of projects
D. Senior management preferences
Correct Answer: C – Criteria used to determine the benefits of
projects
Explanation: Objective criteria ensure decisions align with business value and
strategic goals.
Incorrect Answers:
A. Skills are important but do not drive prioritization.
B. Inventory accuracy supports visibility but not funding choices.
D. Preferences may introduce bias.

Question 376
Which of the following is the MOST important consideration when investigating a
security breach of an e-commerce application?
A. Skill set of the response team
B. Chain of custody
C. Notifications to law enforcement
D. Procedures to analyze evidence
Correct Answer: B – Chain of custody
Explanation: Maintaining chain of custody is essential to preserve evidence integrity
and ensure legal admissibility.
Incorrect Answers:
A. Skills are crucial but not the top concern for evidence handling.
C. Notification is secondary to securing and preserving evidence.
D. Procedures are needed, but only valid if evidence is admissible.

Question 377
Which of the following indicates that an internal audit organization is structured to
support the independence and clarity of the reporting process?
A. The internal audit manager has a reporting line to the audit committee
B. The internal audit manager reports functionally to a senior management official
C. Auditors are responsible for assessing and operating a system of internal controls
D. Auditors are responsible for performing operational duties or activities
Correct Answer: A – The internal audit manager has a reporting line
to the audit committee
Explanation: A direct line to the audit committee enhances independence and
reduces management influence.
Incorrect Answers:
B. Functional reporting to management weakens independence.
C. Operating controls compromises objectivity.
D. Performing duties outside of auditing is a conflict of interest.

Question 378
Which of the following would BEST protect the confidentiality of sensitive data in
transit between multiple offices?
A. Digital signatures
B. Public key infrastructure (PKI)
C. Hash algorithms
D. Kerberos
Correct Answer: B – Public key infrastructure (PKI)
Explanation: PKI ensures confidentiality and secure key exchange for encrypted
communication.
Incorrect Answers:
A. Digital signatures verify integrity, not confidentiality.
C. Hashing checks integrity but doesn't encrypt data.
D. Kerberos handles authentication more than encryption.
Question 379
Which of the following is MOST likely to ensure that an organization's systems
development meets its business objectives?
A. Business owner involvement
B. A project plan with clearly identified requirements
C. A focus on strategic projects
D. Segregation of systems development and testing
Correct Answer: A – Business owner involvement
Explanation: Active business involvement ensures alignment with organizational
needs and expectations.
Incorrect Answers:
B. Clear plans help but may not reflect real business needs.
C. Strategy focus is important but not sufficient alone.
D. Segregation supports integrity but not goal alignment.

Question 380
Which of the following is MOST important to review when planning for an IS audit
of an organization's cross-border data transfers?
A. Previous external audit reports
B. Applicable regulatory requirements
C. Offshore supplier risk assessments
D. Long-term IS strategy
Correct Answer: B – Applicable regulatory requirements
Explanation: Cross-border data transfers are subject to various legal and regulatory
requirements that must be reviewed to ensure compliance.
Incorrect Answers:
A. Past reports are helpful but not primary.
C. Supplier risks are relevant but secondary.
D. Strategy is broader and less audit-specific.

Question 381
Which of the following is MOST likely to be a project deliverable of an agile software
development methodology?
A. Automated software programming routines
B. Rapidly created working prototypes
C. Extensive project documentation
D. Strictly managed software requirements baselines
Correct Answer: B – Rapidly created working prototypes
Explanation: Agile emphasizes iterative development and delivering functional
prototypes early.
Incorrect Answers:
A. Automation may be involved but is not a deliverable.
C. Agile focuses on working software over comprehensive documentation.
D. Agile allows evolving requirements rather than strict baselines.

Question 382
Which of the following is the BEST way to mitigate the risk associated with
malicious changes to binary code during the software development life cycle (SDLC)?
A. Parity check
B. Digital envelope
C. Cryptographic hash
D. Segregation of duties
Correct Answer: C – Cryptographic hash
Explanation: A cryptographic hash detects unauthorized changes by verifying code
integrity.
Incorrect Answers:
A. Parity checks detect transmission errors, not tampering.
B. Digital envelopes protect confidentiality, not integrity.
D. Segregation of duties prevents but doesn’t detect binary changes.

Question 383
Which of the following application input controls would MOST likely detect data
input errors in the customer account number field during the processing of an
accounts receivable transaction?
A. Limit check
B. Reasonableness check
C. Validity check
D. Parity check
Correct Answer: C – Validity check
Explanation: A validity check ensures the account number matches a pre-approved
list of valid entries.
Incorrect Answers:
A. Limit checks validate numeric ranges, not specific codes.
B. Reasonableness checks assess plausibility, not existence.
D. Parity checks ensure transmission integrity, not input validity.

Question 384
Which of the following types of environmental equipment will MOST likely be
deployed below the floor tiles of a data center?
A. Temperature sensors
B. Humidity sensors
C. Water sensors
D. Air pressure sensors
Correct Answer: C – Water sensors
Explanation: Water sensors detect leaks under raised floors, helping prevent
damage.
Incorrect Answers:
A. Temperature sensors are typically mounted in air paths or on walls.
B. Humidity sensors are usually wall- or rack-mounted.
D. Air pressure sensors are placed for airflow analysis, not under floors.

Question 385
Which of the following is the BEST justification for deferring remediation testing
until the next audit?
A. The auditor who conducted the audit and agreed with the timeline has left the
organization.
B. Management's planned actions are sufficient given the relative importance of the
observations.
C. Auditee management has accepted all observations reported by the auditor.
D. The audit environment has changed significantly.
Correct Answer: D – The audit environment has changed significantly
Explanation: A changed environment may render prior remediation irrelevant or
outdated, justifying deferral.
Incorrect Answers:
A. Auditor departure doesn’t invalidate timelines.
B. Actions may be sufficient, but testing should confirm results.
C. Acceptance does not equate to implementation.

Question 386
Which of the following would BEST help to ensure the availability of data stored
with a cloud provider?
A. Confirming the cloud provider has a disaster recovery site
B. Requiring the provider to conduct daily backups
C. Defining service level agreements (SLAs) in the contract
D. Defining the reporting process and format
Correct Answer: C – Defining service level agreements (SLAs) in the
contract
Explanation: SLAs explicitly set availability expectations and ensure enforceable
commitments.
Incorrect Answers:
A. A DR site helps, but SLAs formalize availability expectations.
B. Backups support recovery, not continuous availability.
D. Reporting helps monitoring, not assurance.
Question 387
Which of the following security assessment techniques attempts to exploit a system's
open ports?
A. Vulnerability scanning
B. Penetration testing
C. Network scanning
D. Password cracking
Correct Answer: B – Penetration testing
Explanation: Penetration testing simulates attacks to exploit vulnerabilities like
open ports.
Incorrect Answers:
A. Vulnerability scanning identifies issues but doesn’t exploit them.
C. Network scanning identifies ports but doesn’t attempt exploitation.
D. Password cracking targets authentication, not port services.

Question 388
Which of the following provides the MOST assurance that new information systems
are ready for migration to the production environment?
A. Approval by the change advisory board
B. Results of end user acceptance testing (UAT)
C. Results of penetration testing performed by the development team
D. System quality assurance (QA) performed by an in-house team
Correct Answer: B – Results of end user acceptance testing (UAT)
Explanation: UAT confirms the system meets business needs before production.
Incorrect Answers:
A. Change board approval is administrative, not technical.
C. Pen testing ensures security, not functionality.
D. QA ensures quality but may not reflect user expectations.

Question 389
Which of the following controls BEST ensures appropriate segregation of duties
within an accounts payable department?
A. Including the creator's user ID as a field in every transaction record created
B. Ensuring that audit trails exist for transactions
C. Restricting access to update programs to accounts payable staff only
D. Restricting program functionality according to user security profiles
Correct Answer: D – Restricting program functionality according to
user security profiles
Explanation: Role-based access ensures users can only perform actions within their
responsibilities.
Incorrect Answers:
A. Logging actions helps with audits but doesn’t prevent improper access.
B. Audit trails assist after-the-fact, not during operation.
C. Limiting to A/P staff doesn't enforce segregation within that group.

Question 390
Which of the following reports would provide the GREATEST assurance to an IS
auditor about the controls of a third party that processes critical data for the
organization?
A. Independent control assessment
B. Black box penetration test report
C. The third party's control self-assessment (CSA)
D. Vulnerability scan report
Correct Answer: A – Independent control assessment
Explanation: Independent assessments by a qualified party offer the highest
assurance of control effectiveness.
Incorrect Answers:
B. Pen tests are point-in-time and limited in scope.
C. Self-assessments may lack objectivity.
D. Vulnerability scans don’t evaluate control design or operation fully.

Question 391
Which of the following is the BEST indicator of the effectiveness of signature-based
intrusion detection systems (IDSs)?
A. An increase in the number of internally reported critical incidents
B. An increase in the number of unfamiliar sources of intruders
C. An increase in the number of identified false positives
D. An increase in the number of detected incidents not previously identified
Correct Answer: D – An increase in the number of detected incidents
not previously identified
Explanation: Signature-based IDS effectiveness is best indicated by its ability to
detect known threats that were previously missed.
Incorrect Answers:
A. Internal reporting is subjective and may be delayed.
B. Source recognition doesn’t ensure detection quality.
C. More false positives indicate reduced effectiveness.

Question 392
Which of the following should be done by an IS auditor during a post-
implementation review of a critical application that has been operational for six
months?
A. Test program system interfaces
B. Verify the accuracy of data conversions
C. Assess project management risk reports
D. Examine project change request logs
Correct Answer: B – Verify the accuracy of data conversions
Explanation: After implementation, confirming data was converted correctly is
essential to system integrity.
Incorrect Answers:
A. Interface testing is typically done earlier.
C. Risk reports are more useful during project execution.
D. Change logs help but don’t validate correctness of conversion.

Question 393
Which of the following types of testing would BEST mitigate the risk of a newly
implemented system adversely impacting existing systems?
A. User acceptance testing (UAT)
B. Functionality testing
C. Sociability testing
D. Unit testing
Correct Answer: C – Sociability testing
Explanation: Sociability testing (a type of integration testing) verifies that the new
system does not disrupt existing systems.
Incorrect Answers:
A. UAT focuses on business functionality.
B. Functionality testing assesses new system operations.
D. Unit testing is isolated to code modules.

Question 394
Which of the following would be of GREATEST concern to an IS auditor reviewing
an organization's security incident handling procedures?
A. Annual tabletop exercises are performed instead of functional incident response
exercises
B. Roles for computer emergency response team (CERT) members have not been
formally documented
C. Guidelines for prioritizing incidents have not been identified
D. Workstation antivirus software alerts are not regularly reviewed
Correct Answer: C – Guidelines for prioritizing incidents have not
been identified
Explanation: Without prioritization, incidents may not be handled efficiently or
appropriately.
Incorrect Answers:
A. Tabletop exercises are acceptable for some scenarios.
B. Undocumented roles are problematic but not as critical.
D. Antivirus alerts are important but secondary in this context.

Question 395
Which of the following is the MOST important consideration for an organization
when strategizing to comply with privacy regulations?
A. Ensuring up-to-date knowledge of where customer personal data is saved
B. Ensuring there are staff members with in-depth knowledge of the regulations
C. Ensuring regular access recertification to information systems
D. Ensuring contracts with third parties that process customer data are regularly
updated
Correct Answer: A – Ensuring up-to-date knowledge of where
customer personal data is saved
Explanation: Knowing where personal data resides is foundational to ensuring
compliance with privacy requirements.
Incorrect Answers:
B. Knowledge is valuable, but action requires data awareness.
C. Recertification helps but does not address all privacy concerns.
D. Contracts are important, but data location is more critical.

Question 396
Which of the following should an IS auditor review FIRST during the audit of an
organization's business continuity plan (BCP)?
A. System recovery time objectives (RTOs)
B. List of critical business processes
C. System recovery manuals and documentation
D. Frequency of business database replication
Correct Answer: B – List of critical business processes
Explanation: Identifying critical processes ensures BCP efforts focus on the most
essential activities.
Incorrect Answers:
A. RTOs depend on process criticality.
C. Documentation follows planning.
D. Replication supports recovery but is a detail, not a starting point.

Question 397
Which of the following BEST ensures the confidentiality of sensitive data during
transmission?
A. Password protecting data over virtual local area networks (VLAN)
B. Sending data through proxy servers
C. Sending data over public networks using Transport Layer Security (TLS)
D. Restricting the recipient through destination IP addresses
Correct Answer: C – Sending data over public networks using
Transport Layer Security (TLS)
Explanation: TLS encrypts data in transit, protecting confidentiality over public
networks.
Incorrect Answers:
A. Passwords don’t encrypt data in transit.
B. Proxy servers route data, but do not encrypt it.
D. IP restrictions limit access, not confidentiality.

Question 398
Which of the following is the BEST detective control for a job scheduling process
involving data transmission?
A. Metrics denoting the volume of monthly job failures are reported and reviewed by
senior management
B. Jobs are scheduled to be completed daily and data is transmitted using a Secure
File Transfer Protocol (SFTP)
C. Job failure alerts are automatically generated and routed to support personnel
D. Jobs are scheduled and a log of this activity is retained for subsequent review
Correct Answer: C – Job failure alerts are automatically generated
and routed to support personnel
Explanation: Real-time alerts are the most effective way to detect and respond to
transmission failures.
Incorrect Answers:
A. Monthly metrics provide delayed insights.
B. SFTP is a preventive control, not detective.
D. Logs support reviews but lack immediacy.

Question 399
Which of the following is MOST important when creating a forensic image of a hard
drive?
A. Generating a content hash of the hard drive
B. Choosing an industry-leading forensics software tool
C. Requiring an independent third-party be present while imaging
D. Securing a backup copy of the hard drive
Correct Answer: A – Generating a content hash of the hard drive
Explanation: A hash ensures the integrity of the image and is essential for
admissibility in legal proceedings.
Incorrect Answers:
B. Tool choice is secondary to procedure.
C. A witness may help, but is not essential.
D. A backup is useful, but hashing is mandatory.
Question 400
Which of the following is the GREATEST concern associated with a high number of
IT policy exceptions approved by management?
A. The exceptions are likely to continue indefinitely
B. The exceptions may negatively impact process efficiency
C. The exceptions may elevate the level of operational risk
D. The exceptions may result in noncompliance
Correct Answer: C – The exceptions may elevate the level of
operational risk
Explanation: Too many exceptions undermine security and increase exposure to
risks.
Incorrect Answers:
A. Indefinite continuation is a consequence, not a risk.
B. Efficiency is less critical than risk.
D. Noncompliance is possible, but risk elevation is broader and more severe.

Question 401
Which of the following is MOST important for an IS auditor to consider when
planning an assessment of the organization's end-user computing (EUC) program?
A. The integrity of data processed by end user tools
B. The inclusion of end user tools in the IT balanced scorecard
C. Identification of IT owners for each end user tool
D. The training program curriculum for key end users
Correct Answer: A – The integrity of data processed by end user tools
Explanation: Ensuring the accuracy and reliability of data processed through EUC
tools is critical to organizational decision-making.
Incorrect Answers:
B. Balanced scorecards are helpful but not a primary concern.
C. Ownership is important but secondary to data accuracy.
D. Training supports control but is not the main audit concern.

Question 402
Which of the following access rights presents the GREATEST risk when granted to a
new member of the system development staff?
A. Write access to production program libraries
B. Execute access to development program libraries
C. Write access to development data libraries
D. Execute access to production program libraries
Correct Answer: A – Write access to production program libraries
Explanation: This access allows unauthorized changes to live code, directly
impacting production systems.
Incorrect Answers:
B. Execute rights don’t allow code modification.
C. Development data is non-production.
D. Execute access to production is less risky than write access.

Question 403
Which of the following is the FIRST step in initiating a data classification program?
A. Inventory of data assets
B. Assignment of data ownership
C. Assignment of sensitivity levels
D. Risk appetite assessment
Correct Answer: A – Inventory of data assets
Explanation: Knowing what data exists is the foundation for classification.
Incorrect Answers:
B. Ownership is based on asset identification.
C. Sensitivity cannot be assigned before identification.
D. Risk appetite is strategic, not procedural.

Question 404
Which of the following should be the FIRST step when planning an IS audit of a
third-party service provider that monitors network activities?
A. Determine if the organization has a secure connection to the provider
B. Review the roles and responsibilities of the third-party provider
C. Evaluate the organization's third-party monitoring process
D. Review the third party's monitoring logs and incident handling
Correct Answer: B – Review the roles and responsibilities of the third-
party provider
Explanation: Understanding responsibilities ensures proper scope and control
evaluation.
Incorrect Answers:
A. Connection security is reviewed later.
C. Monitoring is part of execution, not planning.
D. Logs are examined after roles and scope are defined.

Question 405
Which of the following is the BEST use of a maturity model in a small organization?
A. To assess the current maturity level and the level of compliance with key controls
B. To identify required actions to close the gap between current and desired maturity
levels
C. To benchmark against peer organizations that have attained the highest maturity
level
D. To develop a roadmap for the organization to achieve the highest maturity level
Correct Answer: B – To identify required actions to close the gap
between current and desired maturity levels
Explanation: Maturity models help identify improvement areas to align with
business goals.
Incorrect Answers:
A. Assessment is useful, but the value lies in planning improvement.
C. Benchmarking is optional and not always feasible.
D. Highest maturity may not be realistic or necessary.

Question 406
Which of the following should be defined in an audit charter?
A. Audit methodology
B. Audit authority
C. Audit results
D. Audit schedule
Correct Answer: B – Audit authority
Explanation: The audit charter formally defines the internal audit function’s
authority, purpose, and responsibilities.
Incorrect Answers:
A. Methodology is documented separately.
C. Results are outputs, not charter contents.
D. Schedule is part of planning, not the charter.

Question 407
Which of the following areas of responsibility would cause the GREATEST
segregation of duties conflict if the individual who performs the related tasks also has
approval authority?
A. Vendor selection and statements of work
B. Invoices and reconciliations
C. Purchase requisitions and purchase orders
D. Goods receipts and payments
Correct Answer: D – Goods receipts and payments
Explanation: This allows both initiating and executing payments, increasing fraud
risk.
Incorrect Answers:
A. Still needs other approvals for payments.
B. Involves review, not transaction execution.
C. Conflict is lower than combining payments and receipts.
Question 408
Which of the following would MOST likely impair the independence of the IS auditor
when performing a post-implementation review of an application system?
A. The IS auditor implemented a specific control during the development of the
application system
B. The IS auditor designed an embedded audit module exclusively for auditing the
application system
C. The IS auditor participated as a member of the application system project team,
but did not have operational responsibilities
D. The IS auditor provided consulting advice concerning application system best
practices
Correct Answer: A – The IS auditor implemented a specific control
during the development of the application system
Explanation: Implementing controls creates a conflict of interest and compromises
independence.
Incorrect Answers:
B. Designing tools does not influence implementation.
C. Participation without operations may be acceptable.
D. Consulting doesn’t equate to execution.

Question 409
Which of the following is MOST important for an IS auditor to assess during a post-
implementation review of a newly modified IT application developed in-house?
A. Rollback plans for changes
B. Sufficiency of implemented controls
C. Updates required for end user manuals
D. Resource management plan
Correct Answer: B – Sufficiency of implemented controls
Explanation: Controls ensure security, integrity, and availability in the live
environment.
Incorrect Answers:
A. Rollbacks are useful but secondary post-implementation.
C. Documentation is necessary but less critical.
D. Resource plans relate to project management, not post-review.

Question 410
Which of the following is the BEST point in time to conduct a post-implementation
review (PIR)?
A. To coincide with the annual PIR cycle
B. Immediately after deployment
C. After a full processing cycle
D. Six weeks after deployment
Correct Answer: C – After a full processing cycle
Explanation: This ensures the system has been used long enough to evaluate its
performance.
Incorrect Answers:
A. Timing should depend on operational use, not calendar.
B. Immediate reviews miss usage issues.
D. Six weeks may not cover a full cycle.

Question 411
In which phase of the internal audit process is contact established with the
individuals responsible for the business processes in scope for review?
A. Execution phase
B. Planning phase
C. Selection phase
D. Follow-up phase
Correct Answer: B – Planning phase
Explanation: Initial contact with auditees and clarification of scope occurs during
the planning phase.
Incorrect Answers:
A. Execution involves fieldwork.
C. Selection focuses on determining audit areas.
D. Follow-up comes after findings are reported.

Question 412
Which of the following would be of MOST concern for an IS auditor evaluating the
design of an organization's incident management processes?
A. Prioritization criteria are not defined.
B. Service management standards are not followed.
C. Expected time to resolve incidents is not specified.
D. Metrics are not reported to senior management.
Correct Answer: A – Prioritization criteria are not defined
Explanation: Without prioritization, critical incidents may be mishandled or
delayed.
Incorrect Answers:
B. Standards support design but are not as critical.
C. Resolution times are secondary to proper prioritization.
D. Metrics are for monitoring, not core process definition.

Question 413
Which of the following approaches would BEST ensure that data protection controls
are embedded into software being developed?
A. Utilizing a data protection template for user acceptance testing (UAT)
B. Implementing a quality assurance (QA) process during the development phase
C. Deriving data protection requirements from key stakeholders
D. Tracking data protection requirements throughout the SDLC
Correct Answer: D – Tracking data protection requirements
throughout the SDLC
Explanation: This ensures that controls are considered from design to deployment.
Incorrect Answers:
A. UAT happens late in the cycle.
B. QA supports quality but may miss data protection.
C. Deriving is helpful but must be tracked to implementation.

Question 414
Which of the following is MOST important for an IS auditor to do during an exit
meeting with an auditee?
A. Specify implementation dates for the recommendations.
B. Ensure that the facts presented in the report are correct.
C. Communicate the recommendations to senior management.
D. Request input in determining corrective action.
Correct Answer: B – Ensure that the facts presented in the report are
correct
Explanation: Confirming factual accuracy prevents disputes and ensures credibility.
Incorrect Answers:
A. Implementation is management's responsibility.
C. Communication happens post-exit.
D. Input may be sought earlier in discussions.

Question 415
Which of the following should be the PRIMARY role of an internal audit function in
the management of identified business risks?
A. Validating enterprise risk management (ERM)
B. Establishing a risk management framework
C. Operating the risk management framework
D. Establishing a risk appetite
Correct Answer: A – Validating enterprise risk management (ERM)
Explanation: Internal audit provides independent assurance over risk processes.
Incorrect Answers:
B. Establishing frameworks is a management role.
C. Operating the framework creates conflict of interest.
D. Risk appetite is determined by leadership.
Question 416
Which of the following is MOST critical for the effective implementation of IT
governance?
A. Supportive corporate culture
B. Strong risk management practices
C. Documented policies
D. Internal auditor commitment
Correct Answer: A – Supportive corporate culture
Explanation: Governance requires cultural alignment and buy-in across the
organization.
Incorrect Answers:
B. Risk management is a component, not the foundation.
C. Policies are necessary but depend on culture for enforcement.
D. Auditors provide oversight but are not the driving force.

Question 417
Which of the following controls is BEST implemented through system configuration?
A. Application user access is reviewed every 180 days for appropriateness.
B. Network user accounts for temporary workers expire after 90 days.
C. Computer operations personnel initiate batch processing jobs daily.
D. Financial data in key reports is traced to source systems for completeness and
accuracy.
Correct Answer: B – Network user accounts for temporary workers
expire after 90 days
Explanation: Account expiration can be automated through system settings.
Incorrect Answers:
A. Review requires manual oversight.
C. Batch jobs are operational tasks.
D. Tracing data is an audit or reconciliation activity.

Question 418
Which of the following techniques is MOST appropriate for verifying application
program controls?
A. Observation of data entry
B. Statistical sampling
C. Use of test data
D. Code review
Correct Answer: C – Use of test data
Explanation: This directly verifies how controls respond to valid and invalid inputs.
Incorrect Answers:
A. Observation helps understand but not verify controls.
B. Sampling supports testing but doesn’t target control logic.
D. Code review is indirect and may miss runtime issues.

Question 419
Which of the following is MOST helpful in preventing a systems failure from
occurring when an application is replaced using the abrupt changeover technique?
A. Comprehensive testing
B. Comprehensive documentation
C. Threat and risk assessment
D. Change management
Correct Answer: A – Comprehensive testing
Explanation: Abrupt changes require robust testing to ensure functionality.
Incorrect Answers:
B. Documentation aids troubleshooting, not prevention.
C. Assessment helps planning but doesn’t prevent issues.
D. Change management supports structure, not technical validation.

Question 420
Which of the following findings should be of GREATEST concern to an IS auditor
assessing the risk associated with end-user computing (EUC) in an organization?
A. Lack of defined criteria for EUC applications
B. Lack of awareness training for EUC users
C. Insufficient processes to track ownership of each EUC application
D. Insufficient processes to test for version control
Correct Answer: C – Insufficient processes to track ownership of each
EUC application
Explanation: Without ownership, accountability and control over critical
spreadsheets or tools is weak.
Incorrect Answers:
A. Criteria help classification but not as critical as ownership.
B. Training improves usage but doesn’t assign accountability.
D. Version control is important but follows ownership establishment.

Question 421
Which of the following would be of GREATEST concern if noted during an audit of
compliance with licensing agreements?
A. Distribution software is only maintained on a centralized server.
B. The software vendor required monthly verification of licenses.
C. Desktop software is personally expensed and not capitalized.
D. The organization does not monitor upgrades to its software.
Correct Answer: D – The organization does not monitor upgrades to
its software
Explanation: Failing to monitor software upgrades may result in unlicensed use,
violating agreements.
Incorrect Answers:
A. Centralized software control improves compliance.
B. Vendor requirements may be strict but not inherently risky.
C. Expensing software affects accounting, not compliance.

Question 422
Which of the following is MOST important for an IS auditor to confirm when
conducting a review of an active-active application cluster configuration?
A. Results from recent user satisfaction surveys meet operational targets.
B. The cluster configuration includes adequate network bandwidth.
C. The cluster switches between active-active and active-passive configurations.
D. The IT operations team maintains a version history of the cluster software.
Correct Answer: B – The cluster configuration includes adequate
network bandwidth
Explanation: Adequate bandwidth ensures performance and high availability in an
active-active setup.
Incorrect Answers:
A. User satisfaction is less technical and not specific to clustering.
C. Switching modes is unrelated if active-active is required.
D. Version history is important but not critical for availability.

Question 423
Which of the following is the MOST appropriate control to ensure integrity of online
orders?
A. Public key encryption
B. Digital signature
C. Data Encryption Standard (DES)
D. Multi-factor authentication
Correct Answer: B – Digital signature
Explanation: Digital signatures provide integrity by verifying data has not been
altered.
Incorrect Answers:
A. Encryption ensures confidentiality, not integrity.
C. DES is outdated and insecure.
D. MFA authenticates users but doesn't ensure data integrity.

Question 424
Which of the following should be done FIRST to develop an effective business
continuity plan (BCP)?
A. Perform a business impact analysis (BIA).
B. Secure an alternate processing site.
C. Create a business unit communications plan.
D. Create a disaster recovery plan (DRP).
Correct Answer: A – Perform a business impact analysis (BIA)
Explanation: BIA identifies critical processes and dependencies essential to
developing a BCP.
Incorrect Answers:
B. Alternate sites are selected based on BIA findings.
C. Communication plans come later in BCP.
D. DRP is a component of the BCP, not the starting point.

Question 425
During an exit meeting, an IS auditor highlights that backup cycles are being missed
due to operator error and that these exceptions are not being managed.
Which of the following is the BEST way to help management understand the
associated risk?
A. Explain the impact to resource requirements.
B. Explain the impact to disaster recovery.
C. Explain the impact to backup scheduling.
D. Explain the impact to incident management.
Correct Answer: B – Explain the impact to disaster recovery
Explanation: Missed backups compromise disaster recovery, which can be critical
during an outage.
Incorrect Answers:
A. Resource needs are secondary to recovery risk.
C. Scheduling issues are symptoms, not the main concern.
D. Incident management is a response layer, not the core risk.

Question 426
Which of the following is the BEST way to determine if IT is delivering value to the
business?
A. Analyze downtime frequency and duration.
B. Interview key IT managers and service providers.
C. Perform control self-assessments (CSAs).
D. Review IT service level agreement (SLA) results.
Correct Answer: D – Review IT service level agreement (SLA) results
Explanation: SLA results objectively measure whether IT meets business
expectations.
Incorrect Answers:
A. Downtime is part of SLA but not comprehensive.
B. Interviews are subjective.
C. CSA focuses on controls, not business value delivery.

Question 427
Which of the following is the MOST important determining factor when establishing
appropriate timeframes for follow-up activities related to audit findings?
A. Remediation dates included in management responses
B. Availability of IS audit resources
C. Peak activity periods for the business
D. Complexity of business processes identified in the audit
Correct Answer: A – Remediation dates included in management
responses
Explanation: The agreed-upon remediation schedule dictates follow-up timing.
Incorrect Answers:
B. Audit resource availability is secondary.
C. Business cycles may influence but not determine timing.
D. Complexity affects duration, not necessarily timing.

Question 428
Which of the following is MOST important to consider when assessing the scope of
privacy concerns for an IT project?
A. Business requirements and data flows
B. Applicable laws and regulations
C. Data ownership
D. End user access rights
Correct Answer: B – Applicable laws and regulations
Explanation: Legal compliance drives the extent and handling of privacy-related
data.
Incorrect Answers:
A. Business flows help identify data paths but do not define scope.
C. Ownership supports control but isn't the primary driver.
D. Access rights are part of implementation, not scope.

Question 429
Which of the following is MOST important to verify when implementing an
organization's information security program?
A. The organization's security strategy is documented and approved.
B. The security program has been benchmarked to industry standards.
C. The security program is adequately funded in the budget.
D. The IT department has developed and implemented training programs.
Correct Answer: A – The organization's security strategy is
documented and approved
Explanation: A documented and approved strategy ensures direction, alignment,
and commitment.
Incorrect Answers:
B. Benchmarking helps compare but doesn't define implementation.
C. Funding is essential but follows strategy approval.
D. Training is important but secondary to governance.

Question 430
Which of the following should be of GREATEST concern to an IS auditor performing
a review of information security controls?
A. The information security policy does not include mobile device provisions.
B. The information security policy is not frequently reviewed.
C. The information security policy has not been approved by the chief audit
executive (CAE).
D. The information security policy has not been approved by the policy owner.
Correct Answer: D – The information security policy has not been
approved by the policy owner
Explanation: Without approval from the accountable owner, enforcement and
ownership are weak.
Incorrect Answers:
A. Mobile provisions are content-level, not governance.
B. Review frequency is important but not as critical as lack of approval.
C. CAE approval is not required for security policies—it's outside their role.

Question 431
Which of the following provides the BEST method for maintaining the security of
corporate applications pushed to employee-owned mobile devices?
A. Disabling unnecessary network connectivity options
B. Implementing mobile device management (MDM)
C. Enabling remote data destruction capabilities
D. Requiring security awareness training for mobile users
Correct Answer: B – Implementing mobile device management
(MDM)
Explanation: MDM allows centralized control, enforcing security policies, updates,
and remote wipe for lost devices.
Incorrect Answers:
A. Disabling connectivity is not scalable or comprehensive.
C. Remote wipe is part of MDM but not sufficient alone.
D. Awareness training supports security but doesn’t enforce controls.
Question 432
Which of the following is found in an audit charter?
A. The authority given to the audit function
B. The process of developing the annual audit plan
C. Audit objectives and scope
D. Required training for audit staff
Correct Answer: A – The authority given to the audit function
Explanation: An audit charter formally grants authority and outlines the role of
internal audit.
Incorrect Answers:
B. Planning processes are part of operational procedures, not the charter.
C. Objectives are defined in individual audits, not the charter.
D. Training requirements are handled by HR or audit policy, not the charter.

Question 433
Which of the following would be an appropriate role of internal audit in helping to
establish an organization's privacy program?
A. Designing controls to protect personal data
B. Defining roles within the organization related to privacy
C. Analyzing risks posed by new regulations
D. Developing procedures to monitor the use of personal data
Correct Answer: C – Analyzing risks posed by new regulations
Explanation: Internal audit can assess privacy-related risks to support management
decision-making.
Incorrect Answers:
A. Designing controls compromises audit independence.
B. Defining roles is a management responsibility.
D. Procedure development is operational, not audit’s role.

Question 434
Which of the following is the PRIMARY reason for using a digital signature?
A. Authenticate the sender of a message
B. Provide confidentiality to the transmission
C. Verify the integrity of the data and the identity of the recipient
D. Provide availability to the transmission
Correct Answer: A – Authenticate the sender of a message
Explanation: Digital signatures verify the sender’s identity and message integrity.
Incorrect Answers:
B. Confidentiality is achieved through encryption, not signatures.
C. Integrity is ensured, but recipient identity is not verified.
D. Availability is unrelated to signatures.
Question 435
Which of the following is the BEST way to mitigate the impact of ransomware
attacks?
A. Paying the ransom
B. Invoking the disaster recovery plan (DRP)
C. Backing up data frequently
D. Requiring password changes for administrative accounts
Correct Answer: C – Backing up data frequently
Explanation: Frequent, secure backups allow data restoration without paying
ransom.
Incorrect Answers:
A. Paying ransom is discouraged and may not restore access.
B. DRP helps but depends on backup availability.
D. Changing passwords is a security best practice but not specific to ransomware
mitigation.

Question 436
Which of the following demonstrates the use of data analytics for a loan origination
process?
A. Evaluating whether loan records are included in the batch file and are validated
by the servicing system.
B. Validating whether reconciliations between the two systems are performed and
discrepancies are investigated.
C. Comparing a population of loans input in the origination system to loans booked
on the servicing system.
D. Reviewing error handling controls to notify appropriate personnel in the event of a
transmission failure.
Correct Answer: C – Comparing a population of loans input in the
origination system to loans booked on the servicing system
Explanation: This comparison is a direct application of analytics to ensure data
integrity between systems.
Incorrect Answers:
A. Validation is useful but more operational than analytic.
B. Reconciliation review is procedural, not analytical.
D. Reviewing controls is important, but not a use of analytics.

Question 437
Which of the following observations would an IS auditor consider the GREATEST
risk when conducting an audit of a virtual server farm for potential software
vulnerabilities?
A. Guest operating systems are updated monthly.
B. Antivirus software has been implemented on the guest operating system only.
C. A variety of guest operating systems operate on one virtual server.
D. The hypervisor is updated quarterly.
Correct Answer: B – Antivirus software has been implemented on the
guest operating system only
Explanation: The hypervisor layer also needs protection; focusing only on guests
leaves critical infrastructure exposed.
Incorrect Answers:
A. Monthly updates are standard and not alarming.
C. OS diversity can be managed with proper controls.
D. Quarterly hypervisor updates may be acceptable based on patching cycles.

Question 438
Which of the following is the PRIMARY purpose of conducting follow-up audits for
material observations?
A. To assess evidence for management reporting
B. To validate the correctness of reported findings
C. To validate remediation efforts
D. To assess the risk of the audit environment
Correct Answer: C – To validate remediation efforts
Explanation: The main goal is to ensure corrective actions have been implemented
effectively.
Incorrect Answers:
A. Management reporting is a result, not the purpose.
B. Original findings have already been validated.
D. Risk assessment is part of planning, not follow-up.

Question 439
Which of the following would be a result of utilizing a top-down maturity model
process?
A. A means of comparing the effectiveness of other processes within the enterprise
B. Identification of older, more established processes to ensure timely review
C. Identification of processes with the most improvement opportunities
D. A means of benchmarking the effectiveness of similar processes with peers
Correct Answer: C – Identification of processes with the most
improvement opportunities
Explanation: Maturity models help prioritize improvements based on current
capability levels.
Incorrect Answers:
A. Internal comparison is limited in top-down models.
B. Process age is not necessarily linked to maturity.
D. Benchmarking is separate from internal maturity modeling.

Question 440
Which of the following is the BEST recommendation to prevent fraudulent electronic
funds transfers by accounts payable employees?
A. Periodic vendor reviews
B. Independent reconciliation
C. Re-keying of monetary amounts
D. Dual control
Correct Answer: D – Dual control
Explanation: Dual control ensures no single employee can complete a transaction,
reducing fraud risk.
Incorrect Answers:
A. Vendor reviews detect issues but don't prevent fraud.
B. Reconciliation is a detective, not preventive, control.
C. Re-keying helps data entry but doesn’t reduce fraud risk alone.

Question 441
Which of the following is the MOST important issue for an IS auditor to consider
with regard to Voice-over IP (VoIP) communications?
A. Nonrepudiation
B. Identity management
C. Continuity of service
D. Homogeneity of the network
Correct Answer: C – Continuity of service
Explanation: VoIP requires continuous network availability; loss of connectivity
directly disrupts communication.
Incorrect Answers:
A. Nonrepudiation is important, but less critical for voice services.
B. Identity management is needed, but not the top concern for VoIP.
D. Network diversity is less of a concern than service continuity.

Question 442
Which of the following is the BEST control to help prevent sensitive data leaving an
organization via email?
A. Scanning outgoing emails
B. Blocking outbound emails sent without encryption
C. Conducting periodic phishing tests
D. Providing encryption solutions for employees
Correct Answer: B – Blocking outbound emails sent without
encryption
Explanation: Preventive controls like encryption enforcement stop data leaks before
they happen.
Incorrect Answers:
A. Scanning is detective, not preventive.
C. Phishing tests target user behavior, not outbound data protection.
D. Encryption tools help, but enforcement is key.

Question 443
Which of the following is the BEST indicator of the effectiveness of an organization's
portfolio management program?
A. Percentage of investments achieving their forecasted value
B. Maturity levels of the value management processes
C. Experience of the portfolio management personnel
D. Stakeholder's perception of IT's value
Correct Answer: A – Percentage of investments achieving their
forecasted value
Explanation: Meeting expected value demonstrates alignment with business
objectives.
Incorrect Answers:
B. Maturity models help guide improvement, not measure results.
C. Experience is helpful, but not a performance metric.
D. Perception is subjective and may not reflect actual value.

Question 444
Which of the following would BEST prevent the potential leakage of sensitive
corporate data from personal mobile devices accessing corporate applications?
A. Limiting access and capabilities when connecting to the Internet
B. Creating a separate secure partition on the devices
C. Monitoring employee connections to the corporate network
D. Requiring employees to sign acknowledgment of an acceptable use policy
Correct Answer: B – Creating a separate secure partition on the
devices
Explanation: Secure containers isolate corporate data from personal areas, reducing
leakage risk.
Incorrect Answers:
A. Limiting capabilities is reactive and insufficient.
C. Monitoring alone won’t prevent leakage.
D. Acknowledgments are important but do not enforce technical controls.

Question 445
Which of the following would BEST determine whether a post-implementation review
(PIR) performed by the project management office (PMO) was effective?
A. The review was performed by an external provider.
B. Management approved the PIR report.
C. Project outcomes have been realized.
D. Lessons learned were implemented.
Correct Answer: D – Lessons learned were implemented
Explanation: Effective PIRs result in actionable improvements being adopted for
future projects.
Incorrect Answers:
A. External providers don’t guarantee effectiveness.
B. Approval doesn’t ensure outcomes were acted upon.
C. Outcomes reflect project success, not PIR effectiveness.

Question 446
Which of the following applications has the MOST inherent risk and should be
prioritized during audit planning?
A. An internally developed application
B. An onsite application that is unsupported
C. A decommissioned legacy application
D. An outsourced accounting application
Correct Answer: B – An onsite application that is unsupported
Explanation: Unsupported applications pose risks due to lack of patches and vendor
support.
Incorrect Answers:
A. Internally developed systems can be secure if maintained.
C. Decommissioned apps pose minimal operational risk.
D. Outsourced systems may be well governed under SLAs.

Question 447
Which of the following BEST enables an organization to quantify acceptable data
loss in the event of a disaster?
A. Recovery time objective (RTO)
B. Recovery point objective (RPO)
C. Availability of backup software
D. Mean time to recover (MTTR)
Correct Answer: B – Recovery point objective (RPO)
Explanation: RPO defines how much data can be lost between backups, helping
quantify acceptable loss.
Incorrect Answers:
A. RTO defines downtime, not data loss.
C. Software availability supports backup but doesn’t quantify loss.
D. MTTR relates to recovery speed, not data retention.
Question 448
Which of the following is the BEST compensating control when segregation of duties
is lacking in a small IS department?
A. Transaction log review
B. Background checks
C. Mandatory holidays
D. User awareness training
Correct Answer: A – Transaction log review
Explanation: Independent reviews of activity logs help detect inappropriate actions.
Incorrect Answers:
B. Background checks are preventive, not compensating for SoD issues.
C. Mandatory leave may help but is less frequent.
D. Awareness helps prevent mistakes, not compensate for SoD.

Question 449
Which of the following would be the MOST useful metric for management to
consider when reviewing a project portfolio?
A. Cost of projects divided by total IT cost
B. Net present value (NPV) of the portfolio
C. Total cost of each project
D. Expected return divided by total project cost
Correct Answer: B – Net present value (NPV) of the portfolio
Explanation: NPV helps evaluate project value over time, aligning with financial
goals.
Incorrect Answers:
A. Cost ratios lack insight into return.
C. Total cost alone doesn’t assess benefit.
D. Return/cost is helpful but less comprehensive than NPV.

Question 450
Which of the following would BEST detect that a distributed denial of service
(DDoS) attack is occurring?
A. Server crashes
B. Customer service complaints
C. Penetration testing
D. Automated monitoring of logs
Correct Answer: D – Automated monitoring of logs
Explanation: Real-time log analysis can identify abnormal traffic patterns typical of
DDoS attacks.
Incorrect Answers:
A. Crashes indicate effects, not detection.
B. Complaints are indirect and delayed.
C. Pen testing is proactive, not for real-time detection.

Question 451
Which of the following is the BEST indicator for measuring performance of the IT
help desk function?
A. Percentage of problems raised from incidents
B. Number of reopened tickets
C. Number of incidents reported
D. Mean time to categorize tickets
Correct Answer: B – Number of reopened tickets
Explanation: A low number of reopened tickets indicates issues are being resolved
effectively the first time.
Incorrect Answers:
A. This metric doesn't directly measure resolution performance.
C. Volume alone does not reflect quality or efficiency.
D. Categorization speed matters less than resolution quality.

Question 452
Which of the following types of firewalls provide the GREATEST degree of control
against hacker intrusion?
A. Packet filtering router
B. Circuit gateway
C. Application level gateway
D. Screening router
Correct Answer: C – Application level gateway
Explanation: This firewall works at the application layer and can inspect full
payloads for malicious content.
Incorrect Answers:
A. Packet filters offer only basic filtering.
B. Circuit gateways are less granular.
D. Screening routers offer limited inspection.

Question 453
Which of the following responsibilities of an organization's quality assurance (QA)
function should raise concern for an IS auditor?
A. Ensuring the test work supports observations
B. Implementing solutions to correct defects
C. Updating development methodology
D. Ensuring standards are adhered to within the development process
Correct Answer: B – Implementing solutions to correct defects
Explanation: QA should not be involved in implementation, which could impair
independence.
Incorrect Answers:
A. Supporting observations is part of QA validation.
C. Updating methodology is an advisory role.
D. Ensuring adherence to standards is a QA responsibility.

Question 454
Which of the following is the GREATEST risk associated with data conversion and
migration during implementation of a new application?
A. Lack of data transformation rules
B. Absence of segregation of duties
C. Obsolescence and data backup compatibility
D. Inadequate audit trails and logging
Correct Answer: A – Lack of data transformation rules
Explanation: Without clear transformation rules, data integrity can be
compromised during conversion.
Incorrect Answers:
B. Important, but not the top risk in data conversion.
C. Backups matter, but transformation errors are more critical.
D. Logging supports audit, but errors in conversion are more impactful.

Question 455
Which of the following is MOST important to include within a business continuity
plan (BCP) so that backup and replication is configured in a way that ensures data
availability?
A. Recovery time objective (RTO)
B. Resource management plan
C. Disaster recovery location site
D. Recovery point objective (RPO)
Correct Answer: D – Recovery point objective (RPO)
Explanation: RPO determines how recent the restored data should be, directly
guiding backup frequency.
Incorrect Answers:
A. RTO defines recovery time, not data point recency.
B. Resource plans help planning but not backup config.
C. DR site location doesn't define backup timing.

Question 456
Which of the following concerns is BEST addressed by securing production source
libraries?
A. Changes are applied to the wrong version of production source libraries.
B. Programs are not approved before production source libraries are updated.
C. Unauthorized changes can be moved into production.
D. Production source and object libraries may not be synchronized
Correct Answer: C – Unauthorized changes can be moved into
production
Explanation: Securing source libraries restricts unauthorized access, protecting
against unapproved changes.
Incorrect Answers:
A. Version control systems address this.
B. Approval processes are related but not dependent on library security.
D. Synchronization is a process concern, not a security one.

Question 457
Which of the following is the BEST source of information for an IS auditor to use as
a baseline to assess the adequacy of an organization's privacy policy?
A. Globally accepted privacy best practices
B. Historical privacy breaches and related root causes
C. Benchmark studies of similar organizations
D. Local privacy standards and regulations
Correct Answer: D – Local privacy standards and regulations
Explanation: Compliance with applicable laws is mandatory, forming the baseline
for privacy policies.
Incorrect Answers:
A. Best practices are supplemental to legal requirements.
B. Breaches help improvement but not define adequacy.
C. Benchmarks may not reflect legal mandates.

Question 458
Which of the following findings should be of MOST concern to an IS auditor
reviewing an organization's business continuity plan (BCP)?
A. The plan has not been updated in several years.
B. The plan has not been signed by executive management.
C. No tabletop exercises have been conducted for the plan.
D. End users have not been trained on the latest version of the plan.
Correct Answer: A – The plan has not been updated in several years
Explanation: An outdated BCP may not reflect current risks or systems, making it
ineffective during a disaster.
Incorrect Answers:
B. Important, but lack of update affects usefulness more.
C. Testing is vital, but an outdated plan is foundationally flawed.
D. Training follows an updated plan.
Question 459
Which of the following conditions would be of MOST concern to an IS auditor
assessing the risk of a successful brute force attack against encrypted data at rest?
A. Short key length
B. Use of asymmetric encryption
C. Use of symmetric encryption
D. Random key generation
Correct Answer: A – Short key length
Explanation: Shorter keys are easier to crack using brute force techniques.
Incorrect Answers:
B/C. Encryption type matters, but key length is the primary brute force risk.
D. Random keys are good; not a concern.

Question 460
Which of the following metrics would be MOST useful to an IS auditor when
assessing the resilience of an application programming interface (API)?
A. Number of patches released within a time interval for the API
B. Number of defects logged during development compared to other APIs
C. Number of API calls expected versus actually received within a time interval
D. Number of developers adopting the API for their applications
Correct Answer: C – Number of API calls expected versus actually
received within a time interval
Explanation: Variances in expected vs actual calls may indicate availability or
reliability issues.
Incorrect Answers:
A. Patch volume doesn't reflect real-time resilience.
B. Defect counts are historical, not operational.
D. Developer adoption shows popularity, not resilience.
Question 461
Which of the following controls would BEST ensure that payroll system rate changes
are valid?
A. Rate changes must be entered twice to ensure that they are entered correctly.
B. Rate changes are reported to and independently verified by a manager.
C. Rate changes require visual verification before acceptance.
D. Only a payroll department manager can input the new rate.
Correct Answer: B – Rate changes are reported to and independently
verified by a manager
Explanation: Independent verification ensures the legitimacy of payroll rate changes
and reduces fraud.
Incorrect Answers:
A. Double entry helps input accuracy but not validation.
C. Visual checks are less reliable and lack documentation.
D. Restricting input alone does not confirm validity.

Question 462
Which of the following testing methods is MOST appropriate for assessing whether
system integrity has been maintained after changes have been made?
A. Integration testing
B. Regression testing
C. Acceptance testing
D. Unit testing
Correct Answer: B – Regression testing
Explanation: Regression testing verifies that new changes haven’t affected existing
functionalities, maintaining system integrity.
Incorrect Answers:
A. Integration testing focuses on module interaction, not past functionality.
C. Acceptance testing ensures business requirements are met.
D. Unit testing focuses on individual components, not overall integrity.

Question 463
Which of the following is MOST important when planning a network audit?
A. Isolation of rogue access points
B. Identification of existing nodes
C. Analysis of traffic content
D. Determination of IP range in use
Correct Answer: B – Identification of existing nodes
Explanation: Knowing what devices are on the network is essential to define the
audit scope and assess vulnerabilities.
Incorrect Answers:
A. Rogue access point detection is part of testing, not planning.
C. Traffic analysis is post-audit activity.
D. IP range helps, but node inventory is more fundamental.

Question 464
Which of the following is the MOST important benefit of involving IS audit when
implementing governance of enterprise IT?
A. Identifying relevant roles for an enterprise IT governance framework
B. Providing independent and objective feedback to facilitate improvement of IT
processes
C. Making decisions regarding risk response and monitoring of residual risk
D. Verifying that legal, regulatory, and contractual requirements are being met
Correct Answer: B – Providing independent and objective feedback to
facilitate improvement of IT processes
Explanation: IS auditors bring unbiased insights that improve governance by
identifying process gaps.
Incorrect Answers:
A. Defining roles is management’s task.
C. Risk decisions are not the auditor’s role.
D. Compliance verification is important but secondary to governance improvements.

Question 465
Which of the following governance functions is responsible for ensuring IT projects
have sufficient resources and are prioritized appropriately?
A. Executive management
B. IT steering committee
C. IT management
D. Board of directors
Correct Answer: B – IT steering committee
Explanation: The IT steering committee aligns projects with business goals and
prioritizes resources.
Incorrect Answers:
A. Executive management sets direction but does not prioritize all projects.
C. IT management handles execution, not governance prioritization.
D. The board oversees strategy but doesn’t directly manage IT project resources.

Question 466
Which of the following would be MOST useful to an IS auditor confirming that an IS
department meets its service level agreements (SLAs)?
A. System utilization reports
B. Capacity planning tools
C. System downtime reports
D. IS strategic plan
Correct Answer: C – System downtime reports
Explanation: Downtime reports directly measure SLA compliance, such as uptime
requirements.
Incorrect Answers:
A. Utilization relates to performance, not SLA fulfillment.
B. Planning tools support operations but don’t confirm SLA adherence.
D. Strategic plans set goals, not performance confirmation.

Question 467
Which of the following is the PRIMARY benefit of performing a maturity model
assessment?
A. It identifies and fixes attribute weaknesses.
B. It facilitates the execution of an improvement plan.
C. It acts as a measuring tool and progress indicator.
D. It ensures organizational consistency and improvement.
Correct Answer: C – It acts as a measuring tool and progress indicator
Explanation: Maturity models benchmark current capabilities and help track
improvements over time.
Incorrect Answers:
A. Identification is a step, not the main purpose.
B. Execution follows assessment; not the purpose.
D. Consistency is a byproduct, not the core benefit.

Question 468
Which of the following represents the HIGHEST level of maturity of an information
security program?
A. The program meets regulatory and compliance requirements.
B. Information security policies and procedures are established.
C. A framework is in place to measure risks and track effectiveness.
D. A training program is in place to promote information security awareness.
Correct Answer: C – A framework is in place to measure risks and
track effectiveness
Explanation: Mature programs use metrics and performance tracking to guide
continuous improvement.
Incorrect Answers:
A/B/D. These are earlier maturity levels, focused on compliance and foundational
practices.

Question 469
Which of the following findings should be of GREATEST concern for an IS auditor
when auditing the effectiveness of a phishing simulation test administered for staff
members?
A. Security awareness training was not provided prior to the test.
B. Staff members were not notified about the test beforehand.
C. Staff members who failed the test did not receive follow-up education.
D. Test results were not communicated to staff members.
Correct Answer: C – Staff members who failed the test did not receive
follow-up education
Explanation: Without follow-up, staff are not corrected or educated, reducing test
value.
Incorrect Answers:
A. Surprise testing is valid to assess real behavior.
B. Notification before testing reduces test effectiveness.
D. Feedback is good, but follow-up is more critical.

Question 470
Which of the following is the GREATEST risk associated with conducting
penetration testing on a business-critical application production environment?
A. Results may differ from those obtained in the test environment.
B. Data integrity may become compromised.
C. System owners may not be informed in advance.
D. This type of testing may not adhere to audit standards.
Correct Answer: B – Data integrity may become compromised
Explanation: Live penetration testing could unintentionally corrupt or alter
production data.
Incorrect Answers:
A. Differences in results are expected, not critical.
C. Notification is procedural, not the highest risk.
D. Audit standards are not the main concern during active testing.

Question 471
Which of the following documents would be MOST useful in detecting a weakness in
segregation of duties?
A. Data flow diagram
B. Systems flowchart
C. Entity-relationship diagram
D. Process flowchart
Correct Answer: B – Systems flowchart
Explanation: A systems flowchart shows the flow of data and responsibilities,
helping to identify conflicts in duties.
Incorrect Answers:
A. Data flow diagrams show information flow but not responsibilities.
C. Entity-relationship diagrams focus on database structure.
D. Process flowcharts describe steps but not role segregation.

Question 472
Which of the following should be of GREATEST concern to an IS auditor reviewing
a system software development project based on agile practices?
A. Lack of change management documentation
B. Lack of user acceptance testing (UAT) sign off
C. Lack of weekly production releases
D. Lack of secure coding practices
Correct Answer: D – Lack of secure coding practices
Explanation: Inadequate secure coding exposes the system to vulnerabilities,
regardless of methodology.
Incorrect Answers:
A. Change management is flexible in Agile.
B. UAT may be continuous and informal in Agile.
C. Weekly releases are not mandatory in all Agile setups.

Question 473
Which of the following is the PRIMARY advantage of using virtualization technology
for corporate applications?
A. Improved disaster recovery
B. Stronger data security
C. Better utilization of resources
D. Increased application performance
Correct Answer: C – Better utilization of resources
Explanation: Virtualization maximizes hardware usage by running multiple systems
on fewer physical machines.
Incorrect Answers:
A. DR is improved but not the main benefit.
B. Security depends on configuration.
D. Virtualization may add overhead, not increase speed.

Question 474
Which of the following IT service management activities is MOST likely to help with
identifying the root cause of repeated instances of network latency?
A. Change management
B. Incident management
C. Problem management
D. Configuration management
Correct Answer: C – Problem management
Explanation: Problem management investigates root causes of recurring issues like
network latency.
Incorrect Answers:
A. Change management tracks system changes.
B. Incident management handles immediate issues.
D. Configuration management tracks asset setups.

Question 475
Which of the following is the BEST indication that an information security program
is aligned with organizational objectives?
A. Senior management conducts regular reviews of information security policies.
B. The information security steering committee sets organizational security priorities.
C. Risk is managed to within organizational tolerances.
D. Information security processes are in place throughout the system development
life cycle (SDLC).
Correct Answer: C – Risk is managed to within organizational
tolerances
Explanation: Alignment is evident when risk levels match what the organization
can accept.
Incorrect Answers:
A. Reviews are important but not sufficient.
B. Committees guide policy but don’t guarantee alignment.
D. SDLC processes help but are just one aspect.

Question 476
Which of the following is the MOST effective way to maintain network integrity
when using mobile devices?
A. Implement outbound firewall rules.
B. Implement network access control.
C. Perform network reviews.
D. Review access control lists.
Correct Answer: B – Implement network access control
Explanation: Network access control ensures only compliant devices connect,
protecting network integrity.
Incorrect Answers:
A. Firewalls help but don’t validate device health.
C. Reviews are periodic, not proactive.
D. Access lists don’t validate endpoint security.

Question 477
Which of the following is a challenge in developing a service level agreement (SLA)
for network services?
A. Finding performance metrics that can be measured properly
B. Reducing the number of entry points into the network
C. Ensuring that network components are not modified by the client
D. Establishing a well-designed framework for network services
Correct Answer: A – Finding performance metrics that can be
measured properly
Explanation: Defining measurable, meaningful metrics is essential and often difficult
when drafting SLAs.
Incorrect Answers:
B. Entry points relate to security, not SLAs.
C. Component changes are governed by policy.
D. Frameworks support delivery but are not SLA-specific.

Question 478
Which of the following is MOST important to ensure when planning a black box
penetration test?
A. The management of the client organization is aware of the testing.
B. The test results will be documented and communicated to management.
C. Diagrams of the organization's network architecture are available.
D. The environment and penetration test scope have been determined.
Correct Answer: D – The environment and penetration test scope
have been determined
Explanation: Defining scope ensures the test is controlled, safe, and compliant with
agreements.
Incorrect Answers:
A. Awareness helps but doesn’t ensure safe execution.
B. Reporting is post-test.
C. Black box tests work without architectural knowledge.

Question 479
Which of the following BEST determines if a batch update job was successfully
executed?
A. Obtaining process owner confirmation that the job was completed
B. Testing a sample of transactions to confirm updates were applied
C. Verifying the timestamp from the job log
D. Reviewing a copy of the script for the job
Correct Answer: B – Testing a sample of transactions to confirm
updates were applied
Explanation: Verifying results confirms that the job executed and data was
correctly processed.
Incorrect Answers:
A. Process owner statements are not evidence.
C. Timestamps show execution, not correctness.
D. Scripts don’t verify outcome.

Question 480
Which of the following is the MOST effective approach in assessing the quality of
modifications made to financial software?
A. An independent auditor will be engaged to undertake a pre-implementation
review.
B. The quality of the implemented product will be assessed during acceptance
testing.
C. The quality plan will be assessed during the design phase of development.
D. Independent quality assurance (QA) activities will be undertaken at various
phases of the project.
Correct Answer: D – Independent quality assurance (QA) activities
will be undertaken at various phases of the project
Explanation: Continuous, independent QA throughout the project ensures
consistent software quality.
Incorrect Answers:
A. Pre-implementation reviews are limited in scope.
B. UAT focuses on user needs, not software quality.
C. Design review is early and doesn’t cover implementation.

Question 481
Which of the following is the MOST effective detective control for identifying
unauthorized changes in a critical database?
A. Use of database views
B. Periodic data integrity checks
C. Access control restrictions
D. Implementation of change control procedures
Correct Answer: B – Periodic data integrity checks
Explanation: These checks identify unauthorized alterations by comparing data
against expected norms.
Incorrect Answers:
A. Views limit access but don't detect changes.
C. Preventive, not detective.
D. Ensures changes follow protocol but doesn’t detect deviations.

Question 482
Which of the following is the PRIMARY concern when outsourcing IT services to a
vendor operating in a different jurisdiction?
A. Network latency
B. Cultural differences
C. Regulatory compliance
D. Currency exchange risk
Correct Answer: C – Regulatory compliance
Explanation: Legal and data protection laws vary across jurisdictions, possibly
impacting compliance.
Incorrect Answers:
A. Latency is technical, not legal.
B. Important but secondary.
D. Financial risk, not compliance-related.

Question 483
Which of the following is the BEST way to ensure audit logs are protected against
unauthorized changes?
A. Encrypting audit logs
B. Implementing backup rotation
C. Regularly reviewing logs
D. Storing logs in plain text
Correct Answer: A – Encrypting audit logs
Explanation: Encryption ensures logs cannot be tampered with and preserves their
integrity.
Incorrect Answers:
B. Ensures availability, not integrity.
C. Helps detection, not prevention.
D. Plain text is insecure.

Question 484
What is the MOST significant risk of not updating firewall rule sets regularly?
A. Increased network bandwidth usage
B. Unauthorized access to sensitive systems
C. Inability to log network activity
D. Excessive user support requests
Correct Answer: B – Unauthorized access to sensitive systems
Explanation: Outdated rules may allow unapproved traffic, leading to compromise.
Incorrect Answers:
A. Traffic may increase but not the primary risk.
C. Logging is separate.
D. Not relevant to firewall updates.

Question 485
Which of the following is the BEST metric for evaluating the efficiency of an IT help
desk?
A. Number of tickets closed
B. Average time to resolve tickets
C. Number of calls received
D. Percentage of calls escalated
Correct Answer: B – Average time to resolve tickets
Explanation: It reflects how efficiently the team resolves issues.
Incorrect Answers:
A. Quantity doesn’t imply quality.
C. Doesn’t indicate resolution success.
D. Escalation rate shows complexity, not efficiency.

Question 486
Which of the following would BEST support data minimization principles in a
customer onboarding process?
A. Encrypting all customer data
B. Limiting collected data to what is necessary
C. Using anonymized datasets
D. Implementing a strong authentication mechanism
Correct Answer: B – Limiting collected data to what is necessary
Explanation: Data minimization requires only collecting essential data.
Incorrect Answers:
A. Protects data but doesn’t reduce volume.
C. Helps with privacy, but may not be applicable in onboarding.
D. Security control, not minimization.

Question 487
Which of the following is the PRIMARY risk of lacking version control in software
development?
A. Source code theft
B. Delayed deployment
C. Untraceable code changes
D. Increased software licensing costs
Correct Answer: C – Untraceable code changes
Explanation: Without version control, identifying what changed and when becomes
difficult.
Incorrect Answers:
A. Access controls mitigate theft.
B. May occur, but not directly linked.
D. Versioning doesn't affect licensing.
Question 488
An IS auditor finds that the antivirus software is not centrally managed. What is the
MOST significant risk?
A. Poor vendor support
B. System performance degradation
C. Inconsistent signature updates
D. Overuse of storage space
Correct Answer: C – Inconsistent signature updates
Explanation: Without central control, endpoints may have outdated protection.
Incorrect Answers:
A. Not critical.
B. Not the main risk.
D. Minor impact.

Question 489
Which of the following BEST mitigates risk when developers are granted emergency
access to production systems?
A. Mandatory password changes
B. Logging and post-access review
C. Two-factor authentication
D. Time-limited access tokens
Correct Answer: B – Logging and post-access review
Explanation: Review ensures actions taken are justified and appropriate.
Incorrect Answers:
A. Helps control access but lacks oversight.
C. Enhances security but doesn’t validate usage.
D. Restricts time but not action.

Question 490
Which of the following would BEST help an IS auditor evaluate the effectiveness of
an organization's data archiving strategy?
A. Number of archived files
B. Storage location of archived data
C. Retrieval time of archived data
D. Type of archive media used
Correct Answer: C – Retrieval time of archived data
Explanation: Fast and reliable access demonstrates an effective archive strategy.
Incorrect Answers:
A. Volume doesn’t reflect usability.
B. Location matters, but not a direct performance measure.
D. Media choice affects durability, not performance alone.
Question 491
When evaluating the design of controls related to network monitoring, which of the
following is MOST important for an IS auditor to review?
A. Network topology diagrams
B. Reports of network traffic analysis
C. The ISP service level agreement
D. Incident monitoring logs
Correct Answer: D – Incident monitoring logs
Explanation: Reviewing incident logs reveals whether monitoring is actively
detecting and responding to anomalies.
Incorrect Answers:
A. Topology diagrams aid understanding but don’t show control operation.
B. Traffic analysis shows trends, not necessarily incidents.
C. ISP SLAs are service-focused, not control-focused.

Question 492
Which of the following is MOST important for an organization to complete prior to
developing its disaster recovery plan (DRP)?
A. Business impact analysis (BIA)
B. Comprehensive IT inventory
C. Support staff skills gap analysis
D. Risk assessment
Correct Answer: A – Business impact analysis (BIA)
Explanation: BIA identifies critical systems and recovery priorities essential for
DRP development.
Incorrect Answers:
B. Inventory supports planning but comes after the BIA.
C. Skills assessment is useful but not foundational.
D. Risk assessment supports BIA, but BIA must precede DRP design.

Question 493
Which of the following would be MOST time and cost efficient when performing a
control self-assessment (CSA) for an organization with a large number of widely
dispersed employees?
A. Survey questionnaire
B. Facilitated workshops
C. Face-to-face interviews
D. Top-down and bottom-up analysis
Correct Answer: A – Survey questionnaire
Explanation: Surveys can quickly gather input from a broad audience at low cost.
Incorrect Answers:
B. Workshops require coordination and travel.
C. Interviews are detailed but time-intensive.
D. Top-down/bottom-up analysis is thorough but resource-heavy.

Question 494
Which of the following is the BEST way to ensure that business continuity plans
(BCPs) will work effectively in the event of a major disaster?
A. Regularly update business impact assessments
B. Prepare detailed plans for each business function
C. Make senior managers responsible for their plan sections
D. Involve staff at all levels in periodic paper walk-through exercises
Correct Answer: D – Involve staff at all levels in periodic paper walk-
through exercises
Explanation: Simulations verify practicality and readiness of the plan across all
functions.
Incorrect Answers:
A. BIA is a supporting activity, not a test.
B. Detailed plans help but don’t ensure functionality.
C. Manager ownership is necessary, but testing confirms effectiveness.

Question 495
Which of the following should be of MOST concern to an IS auditor reviewing the
public key infrastructure (PKI) for enterprise email?
A. The private key certificate has not been updated
B. The certificate revocation list has not been updated
C. The certificate practice statement has not been published
D. The PKI policy has not been updated within the last year
Correct Answer: B – The certificate revocation list has not been
updated
Explanation: An outdated CRL allows compromised certificates to remain valid,
posing serious risks.
Incorrect Answers:
A. Expired private key affects individual users but not entire PKI integrity.
C. Lack of a published CPS is a compliance issue, not an operational risk.
D. Annual policy updates are important but not as urgent.

Question 496
Which of the following will MOST likely compromise the control provided by a
digital signature created using RSA encryption?
A. Altering the plaintext message
B. Deciphering the receiver's public key
C. Obtaining the sender's private key
D. Reversing the hash function using the digest
Correct Answer: C – Obtaining the sender's private key
Explanation: The private key authenticates the signature; if compromised, trust is
lost.
Incorrect Answers:
A. Altering plaintext invalidates the signature, which is the intended result.
B. Public keys are meant to be publicly available.
D. Reversing hashes is computationally infeasible and not a typical concern.

Question 497
Which of the following should be of GREATEST concern to an IS auditor conducting
an audit of an organization that recently experienced a ransomware attack?
A. Antivirus software was unable to prevent the attack even though it was properly
updated
B. Backups were only performed within the local network
C. The most recent security patches were not tested prior to implementation
D. Employees were not trained on cybersecurity policies and procedures
Correct Answer: B – Backups were only performed within the local
network
Explanation: Local backups may also be encrypted by ransomware, rendering
recovery impossible.
Incorrect Answers:
A. Antivirus bypass is common in ransomware and not the primary concern.
C. Untested patches may cause issues but are not the attack vector here.
D. Training is important, but recovery hinges on backup strategy.

Question 498
Which of the following would an IS auditor recommend as the MOST effective
preventive control to reduce the risk of data leakage?
A. Validate that all data files contain digital watermarks
B. Implement an intrusion detection system (IDS)
C. Ensure that paper documents are disposed securely
D. Verify that application logs capture any changes made
Correct Answer: A – Validate that all data files contain digital
watermarks
Explanation: Watermarking helps trace and discourage unauthorized data
distribution.
Incorrect Answers:
B. IDS is a detective control.
C. Secure disposal helps but applies to physical assets.
D. Logging is detective, not preventive.

Question 499
Which of the following should an IS auditor review FIRST when planning a customer
data privacy audit?
A. Legal and compliance requirements
B. Customer agreements
C. Data classification
D. Organizational policies and procedures
Correct Answer: A – Legal and compliance requirements
Explanation: Regulatory requirements guide the audit scope and criteria.
Incorrect Answers:
B. Agreements follow regulatory requirements.
C. Classification helps in assessing controls but is scoped by law.
D. Policies support implementation of regulatory obligations.

Question 500
Which of the following would BEST detect that a distributed denial of service
(DDoS) attack is occurring?
A. Server crashes
B. Customer service complaints
C. Penetration testing
D. Automated monitoring of logs
Correct Answer: D – Automated monitoring of logs
Explanation: Real-time monitoring can detect unusual traffic patterns indicative of
a DDoS attack.
Incorrect Answers:
A. Server crashes show impact, not detection.
B. Complaints are lagging indicators.
C. Pen testing is proactive, not reactive detection.

Question 501
Which of the following is the BEST indication of the completeness of interface
control documents used for the development of a new application?
A. Failed interface data transfers prevent subsequent processes.
B. All documents have been reviewed by end users.
C. Both successful and failed interface data transfers are recorded.
D. All inputs and outputs for potential actions are included.
Correct Answer: D – All inputs and outputs for potential actions are included
Explanation: The completeness of interface control documents is best demonstrated
when they account for all possible inputs and outputs. This ensures the application
can handle all potential interactions correctly.
Incorrect Answers:
A. This shows a failure in the system, not the document's completeness.
B. End-user review is good but not proof of completeness.
C. Logging transfer status is valuable but not sufficient to indicate document
completeness.

Question 502
Which of the following would BEST demonstrate that an effective disaster recovery
plan (DRP) is in place?
A. Full operational test
B. Periodic risk assessment
C. Annual walk-through testing
D. Frequent testing of backups
Correct Answer: A – Full operational test
Explanation: A full operational test demonstrates that systems, processes, and
personnel can effectively recover and resume operations, confirming the effectiveness
of the DRP.
Incorrect Answers:
B. Risk assessments help planning but don’t verify effectiveness.
C. Walk-throughs are theoretical, not practical.
D. Backup testing is important but limited in scope.

Question 503
Which of the following provides the MOST reliable audit evidence on the validity of
transactions in a financial application?
A. Substantive testing
B. Walk-through reviews
C. Design documentation reviews
D. Compliance testing
Correct Answer: A – Substantive testing
Explanation: Substantive testing involves directly validating transaction data and
balances, offering strong evidence of validity.
Incorrect Answers:
B. Walk-throughs are high-level and less rigorous.
C. Documentation review does not confirm transaction validity.
D. Compliance testing focuses on control adherence, not transaction accuracy.

Question 504
Which of the following establishes the role of the internal audit function?
A. Audit project plan
B. Audit objectives
C. Audit charter
D. Audit governance
Correct Answer: C – Audit charter
Explanation: The audit charter formally defines the audit function's authority,
scope, and responsibilities within the organization.
Incorrect Answers:
A. The project plan outlines a specific audit's details.
B. Objectives pertain to individual audits.
D. Governance refers to the broader framework and oversight.

Question 505
Which of the following is MOST important for an IS auditor to review when
evaluating the accuracy of a spreadsheet that contains several macros?
A. Version history
B. Formulas within macros
C. Reconciliation of key calculations
D. Encryption of the spreadsheet
Correct Answer: B – Formulas within macros
Explanation: Macros can execute automated calculations or actions, and errors in
formulas can lead to significant inaccuracies.
Incorrect Answers:
A. Version history helps tracking changes but not accuracy.
C. Reconciliation ensures consistency but not macro logic.
D. Encryption protects confidentiality, not accuracy.

Question 506
Which of the following is MOST important to include in forensic data collection and
preservation procedures?
A. Maintaining chain of custody
B. Preserving data integrity
C. Assuring the physical security of devices
D. Determining tools to be used
Correct Answer: A – Maintaining chain of custody
Explanation: Chain of custody ensures that evidence is admissible in court and that
the data has not been tampered with.
Incorrect Answers:
B. Data integrity is essential but part of maintaining chain of custody.
C. Physical security is important, but not sufficient alone.
D. Tool selection matters but is not the most critical.

Question 507
Which of the following is MOST important for an effective control self-assessment
(CSA) program?
A. Determining the scope of the assessment
B. Evaluating changes to the risk environment
C. Performing detailed test procedures
D. Understanding the business process
Correct Answer: D – Understanding the business process
Explanation: A solid understanding of the business process is foundational for
identifying relevant risks and controls.
Incorrect Answers:
A. Scope is important but should be based on business understanding.
B. Risk changes matter, but come after understanding the process.
C. Testing is part of validation, not planning.

Question 508
Which of the following is the PRIMARY protocol for protecting outbound content
from tampering and eavesdropping?
A. Internet Key Exchange (IKE)
B. Secure Shell (SSH)
C. Point-to-Point Protocol (PPP)
D. Transport Layer Security (TLS)
Correct Answer: D – Transport Layer Security (TLS)
Explanation: TLS is the standard protocol for encrypting and securing content over
the internet.
Incorrect Answers:
A. IKE is used for IPsec key management, not for general content.
B. SSH secures terminal sessions, not general outbound content.
C. PPP is for direct connections and lacks robust encryption.

Question 509
Which of the following security risks can be reduced by a properly configured
network firewall?
A. SQL injection attacks
B. Phishing attacks
C. Denial of service (DoS) attacks
D. Insider attacks
Correct Answer: C – Denial of service (DoS) attacks
Explanation: Firewalls can be configured to detect and block abnormal traffic
patterns typical of DoS attacks.
Incorrect Answers:
A. SQL injection is mitigated at the application layer.
B. Phishing is addressed by email filters and training.
D. Insider threats are managed with access control, not firewalls.
Question 510
Which of the following is the MOST effective control to prevent unauthorized
changes to production data?
A. Limiting user access to production data
B. Logging user activities in the system
C. Encrypting data during transmission
D. Requiring user acceptance testing (UAT) before deployment
Correct Answer: A – Limiting user access to production data
Explanation: Limiting access ensures that only authorized personnel can make
changes, which directly prevents unauthorized modifications.
Incorrect Answers:
B. Logging helps detect, but not prevent, unauthorized access.
C. Encryption protects data in transit, not at rest or from unauthorized changes.
D. UAT ensures correctness but does not prevent unauthorized access post-
deployment.

Question 511
Which of the following is an example of a corrective control?
A. Utilizing processes that enforce segmentation of duties
B. Generating automated batch job failure notifications
C. Restoring system information from data backups
D. Employing only qualified personnel to execute tasks
Correct Answer: C – Restoring system information from data backups
Explanation: Corrective controls restore systems after an incident; restoring data
from backups directly addresses and corrects issues caused by data loss.
Incorrect Answers:
A. Segregation of duties is a preventive control.
B. Batch job alerts are detective controls.
D. Hiring qualified personnel is a preventive measure.

Question 512
Which of the following metrics would BEST measure the agility of an organization's
IT function?
A. Number of help desk tickets closed
B. Time to deliver new functionality
C. Frequency of system patching
D. System uptime percentage
Correct Answer: B – Time to deliver new functionality
Explanation: Agility in IT is about how quickly it can adapt and deliver new
capabilities. Shorter delivery times indicate higher agility.
Incorrect Answers:
A. Ticket closures reflect support efficiency, not agility.
C. Patching frequency shows maintenance, not adaptability.
D. Uptime measures availability, not flexibility.

Question 513
Which of the following would be the MOST important reason to involve stakeholders
during the initiation phase of a project?
A. To establish a governance structure
B. To confirm audit requirements
C. To build consensus on requirements
D. To finalize the project budget
Correct Answer: C – To build consensus on requirements
Explanation: Early stakeholder involvement ensures alignment of project goals with
business needs and reduces the risk of misaligned outcomes.
Incorrect Answers:
A. Governance is important but follows requirement definition.
B. Audit input is needed but not primary at initiation.
D. Budgeting depends on well-defined requirements.

Question 514
Which of the following is the GREATEST risk when end users are allowed to develop
applications?
A. Improper version control
B. Inadequate user training
C. Inconsistent documentation
D. Lack of security controls
Correct Answer: D – Lack of security controls
Explanation: End-user-developed applications often lack proper security measures,
posing a risk to data and system integrity.
Incorrect Answers:
A. Version control issues are relevant but not as critical as security.
B. Training gaps affect usage, not application integrity.
C. Documentation matters, but security has a more direct impact.

Question 515
Which of the following BEST provides assurance of proper segregation of duties
within a system?
A. Role-based access controls
B. Audit logging
C. Management sign-off
D. Periodic user access reviews
Correct Answer: A – Role-based access controls
Explanation: Role-based access ensures users have only the permissions necessary
for their role, enforcing segregation of duties.
Incorrect Answers:
B. Logging detects issues but doesn't prevent them.
C. Sign-off doesn't enforce technical control.
D. Access reviews are detective, not preventive.

Question 516
Which of the following is MOST important to review when evaluating the adequacy
of user access provisioning?
A. The help desk ticketing process
B. User access request forms
C. Job descriptions and roles
D. The approval matrix
Correct Answer: C – Job descriptions and roles
Explanation: Access should be aligned with job responsibilities. Reviewing roles
ensures users are granted appropriate access.
Incorrect Answers:
A. Ticket systems support the process but aren’t the source of role definitions.
B. Forms show process, not appropriateness.
D. Approval matrix supports oversight but not role alignment.

Question 517
Which of the following is the PRIMARY reason for periodic reconciliation of user
accounts?
A. To reduce administrative overhead
B. To improve system performance
C. To detect unauthorized accounts
D. To enhance password complexity
Correct Answer: C – To detect unauthorized accounts
Explanation: Reconciliation helps identify dormant or rogue accounts that may
pose a security risk.
Incorrect Answers:
A. Overhead reduction is not the primary reason.
B. Account reconciliation doesn't directly affect performance.
D. It does not relate to password policies.

Question 518
Which of the following scenarios poses the GREATEST risk to an organization’s data
integrity?
A. The system does not log failed login attempts
B. Changes to production data are not logged
C. Backups are only performed weekly
D. Firewall rules are not reviewed regularly
Correct Answer: B – Changes to production data are not logged
Explanation: Unlogged data changes prevent accountability and traceability,
seriously compromising data integrity.
Incorrect Answers:
A. Failed login logs relate more to access control than data integrity.
C. Weekly backups affect availability, not immediate data integrity.
D. Firewall reviews address perimeter security.

Question 519
Which of the following would BEST detect unauthorized changes to a system
configuration?
A. Firewall ruleset review
B. Penetration testing
C. File integrity monitoring
D. Vulnerability scanning
Correct Answer: C – File integrity monitoring
Explanation: File integrity monitoring can alert on unauthorized or unexpected
changes to configuration files.
Incorrect Answers:
A. Ruleset reviews are periodic and manual.
B. Pen tests may not catch subtle config changes.
D. Vulnerability scans identify known weaknesses, not file changes.

Question 520
Which of the following provides the MOST assurance over the completeness and
accuracy of loan application processing with respect to the implementation of a new
system?
A. Running historical transactions through the new system
B. Loading balance and transaction data to the new system
C. Comparing code between old and new systems
D. Reviewing quality assurance (QA) procedures
Correct Answer: A – Running historical transactions through the new
system
Explanation: Running historical transactions through the new system allows for
direct validation of completeness and accuracy by comparing expected and actual
outcomes. This approach tests the system under real-world conditions and ensures it
processes data as intended.
Incorrect Answers:
B. Loading data ensures transfer, but not processing logic accuracy.
C. Code comparison doesn't confirm functional correctness or completeness.
D. QA reviews assess procedures, not end-to-end transaction outcomes.

Question 521
Which of the following is the PRIMARY concern when negotiating a contract for a
hot site?
A. Complete testing of the recovery plan
B. Availability of the site in the event of multiple disaster declarations
C. Reciprocal agreements with other organizations
D. Coordination with the site staff in the event of multiple disaster declarations
Correct Answer: B – Availability of the site in the event of multiple
disaster declarations
Explanation: The key risk in using a hot site is its availability when needed—
especially during regional disasters where multiple clients may invoke their DR plans
simultaneously.
Incorrect Answers:
A. Testing is important but doesn't guarantee availability.
C. Reciprocal agreements may exist but are not directly linked to commercial hot
sites.
D. Coordination is helpful but less critical than actual site availability.

Question 522
Which of the following is MOST effective in preventing unauthorized access to
corporate systems?
A. Password expiration policies
B. Two-factor authentication
C. Account lockout policies
D. Complex password requirements
Correct Answer: B – Two-factor authentication
Explanation: Two-factor authentication provides a second layer of defense,
significantly reducing the likelihood of unauthorized access.
Incorrect Answers:
A. Password expiration helps but is vulnerable to reuse and weak passwords.
C. Lockout policies help but only after repeated failed attempts.
D. Complexity alone does not prevent all forms of credential compromise.

Question 523
The PRIMARY goal of incident response is to:
A. eradicate the root cause.
B. document the breach.
C. resume normal operations.
D. identify the attacker.
Correct Answer: C – Resume normal operations
Explanation: The main objective is to quickly and safely restore business operations
to normal.
Incorrect Answers:
A. Root cause analysis is part of the process but not the primary goal.
B. Documentation is important for lessons learned and compliance.
D. Identifying the attacker may not be feasible or necessary for all incidents.

Question 524
An IS auditor finds that a company has not updated antivirus signatures for over two
months. The GREATEST risk is:
A. data loss due to malware.
B. compliance violations.
C. reputational damage.
D. reduced employee productivity.
Correct Answer: A – Data loss due to malware
Explanation: Without updated signatures, the system is vulnerable to malware that
can cause data corruption or loss.
Incorrect Answers:
B. While possible, it's secondary to the immediate security risk.
C. Reputational damage is a consequence, not the primary risk.
D. Productivity may be impacted, but data loss is more severe.

Question 525
Which of the following BEST demonstrates management’s commitment to the
information security program?
A. Budget allocation
B. Regular penetration tests
C. Employee awareness training
D. Appointment of a security officer
Correct Answer: A – Budget allocation
Explanation: Financial commitment reflects prioritization and enables effective
security measures.
Incorrect Answers:
B. Pen testing is a security control but not indicative of management buy-in.
C. Training is part of the program but does not demonstrate leadership commitment
alone.
D. Appointing a role is symbolic unless supported by resources.
Question 526
Which of the following would BEST ensure data integrity in an organization?
A. Encryption
B. Access control lists
C. Hashing
D. Backup
Correct Answer: C – Hashing
Explanation: Hashing validates data has not been altered by checking its digital
fingerprint.
Incorrect Answers:
A. Encryption protects confidentiality.
B. ACLs limit access but do not verify data integrity.
D. Backups help restore data but don’t detect unauthorized changes.

Question 527
Which of the following is MOST important when selecting a backup site?
A. Cost of the site
B. Distance from primary location
C. Type of backup media
D. Number of staff at the site
Correct Answer: B – Distance from primary location
Explanation: A site too close may be affected by the same disaster; too far may
delay recovery.
Incorrect Answers:
A. Cost is a factor, but not the most critical.
C. Media types are operational considerations.
D. Staffing is important but secondary to geographic risk.

Question 528
Which of the following is MOST important for ensuring continuity during an IS
auditor’s absence?
A. Cross-training
B. Audit documentation
C. Standard audit tools
D. Audit charter
Correct Answer: A – Cross-training
Explanation: Cross-training ensures others can step in with minimal disruption.
Incorrect Answers:
B. Documentation helps but doesn’t replace people.
C. Tools are useful but require trained personnel.
D. Charter defines scope, not continuity.
Question 529
The PRIMARY purpose of a risk register is to:
A. prioritize threats and vulnerabilities.
B. ensure audit coverage.
C. comply with regulations.
D. assign accountability.
Correct Answer: A – Prioritize threats and vulnerabilities
Explanation: A risk register tracks and ranks risks to support decision-making and
treatment plans.
Incorrect Answers:
B. Audit coverage may benefit but isn’t the goal.
C. Compliance may require a register but is not its core purpose.
D. Accountability is assigned elsewhere.

Question 530
The PRIMARY reason to conduct a vulnerability assessment is to:
A. reduce attack surface.
B. comply with regulations.
C. identify exploitable weaknesses.
D. evaluate staff awareness.
Correct Answer: C – Identify exploitable weaknesses
Explanation: The key goal is to find and address potential system vulnerabilities.
Incorrect Answers:
A. Reducing attack surface is an outcome, not the objective.
B. Compliance may require it, but the purpose is security.
D. Staff awareness is assessed through training or social engineering.

Question 531
Which of the following is the BEST method to verify backups can be successfully
restored?
A. Reviewing backup logs
B. Performing test restores
C. Checking file timestamps
D. Using checksum validation
Correct Answer: B – Performing test restores
Explanation: Only a test restore ensures backups are usable in an actual recovery.
Incorrect Answers:
A. Logs may indicate success but don’t confirm usability.
C. Timestamps show recent activity, not reliability.
D. Checksums confirm data integrity, not full restoration capability.
Question 532
What is the PRIMARY benefit of implementing a centralized identity and access
management (IAM) system?
A. Reduces system downtime
B. Improves user satisfaction
C. Enhances control over user access
D. Simplifies hardware maintenance
Correct Answer: C – Enhances control over user access
Explanation: Centralized IAM improves visibility and enforcement of access policies
across systems.
Incorrect Answers:
A. Downtime may improve indirectly, but it is not the primary goal.
B. User experience may vary; control is the main benefit.
D. IAM does not directly address hardware issues.

Question 533
Which of the following is the BEST reason to perform a business impact analysis
(BIA)?
A. Identify process owners
B. Develop backup procedures
C. Evaluate legal compliance
D. Determine recovery priorities
Correct Answer: D – Determine recovery priorities
Explanation: BIA identifies critical processes and prioritizes them for recovery in a
disaster.
Incorrect Answers:
A. Process owners may be identified, but that is not the focus.
B. Backup planning comes after BIA, not during.
C. Legal requirements may surface but are not the main purpose.

Question 534
Which of the following is MOST important to evaluate when auditing cloud-based
data storage services?
A. Availability of network bandwidth
B. Number of virtual machines deployed
C. Data ownership and access rights
D. Number of concurrent users
Correct Answer: C – Data ownership and access rights
Explanation: Ensuring clear ownership and access control is crucial for data
security in the cloud.
Incorrect Answers:
A. Bandwidth affects performance, not access control.
B. Virtual machine count is operational, not security-focused.
D. User volume is not as critical as data control.

Question 535
Which of the following is the MOST effective preventive control against accidental
data leaks via email?
A. Data loss prevention (DLP) software
B. Encryption of all email content
C. Mandatory security awareness training
D. Logging outbound email traffic
Correct Answer: A – Data loss prevention (DLP) software
Explanation: DLP proactively detects and blocks unauthorized data transmission.
Incorrect Answers:
B. Encryption protects confidentiality, not leakage.
C. Training helps but isn’t foolproof.
D. Logs help with investigation, not prevention.

Question 536
Which of the following activities is MOST effective in verifying the effectiveness of a
security awareness program?
A. Conducting annual employee surveys
B. Reviewing incident logs
C. Performing simulated phishing tests
D. Monitoring training completion rates
Correct Answer: C – Performing simulated phishing tests
Explanation: Simulated attacks test real-world behavior and measure program
impact.
Incorrect Answers:
A. Surveys reflect perception, not behavior.
B. Incident logs show outcomes but not causes.
D. Completion doesn’t guarantee understanding.

Question 537
Which of the following is the PRIMARY role of a change advisory board (CAB)?
A. Approve all user access requests
B. Review and approve changes to IT systems
C. Monitor IT performance metrics
D. Handle audit findings
Correct Answer: B – Review and approve changes to IT systems
Explanation: CAB ensures that changes are evaluated for risk and impact before
implementation.
Incorrect Answers:
A. Access approval is handled by IAM or security.
C. Performance monitoring is typically a management task.
D. Audit issues are handled separately.

Question 538
Which of the following audit techniques is MOST effective for testing automated
application controls?
A. Substantive testing
B. Interviewing end users
C. Re-performance with test data
D. Sampling production transactions
Correct Answer: C – Re-performance with test data
Explanation: Running test data through the system validates automated control
behavior.
Incorrect Answers:
A. Substantive testing verifies balances, not control logic.
B. Interviews provide understanding but not evidence.
D. Sampling shows results but not root control function.

Question 539
Which of the following provides the GREATEST assurance of effective disaster
recovery planning?
A. Annual review of recovery documentation
B. Regular testing of the recovery process
C. Having a hot site agreement
D. Employee awareness training
Correct Answer: B – Regular testing of the recovery process
Explanation: Testing confirms the plan’s viability and identifies issues before a
disaster occurs.
Incorrect Answers:
A. Reviews are helpful but insufficient without testing.
C. A hot site is useful but only part of a broader strategy.
D. Training is necessary but doesn’t validate the plan.

Question 540
Which of the following is MOST critical when performing an audit of a network
perimeter firewall?
A. Availability of spare hardware
B. Completeness of rule documentation
C. Review of change management requests
D. Configuration aligns with security policy
Correct Answer: D – Configuration aligns with security policy
Explanation: Ensuring firewall rules match the organization’s policy is essential for
enforcing proper access.
Incorrect Answers:
A. Spare hardware supports availability, not audit focus.
B. Documentation supports control but isn’t the objective.
C. Change requests are important but secondary to policy enforcement.

Question 541
What is the PRIMARY risk if an organization fails to maintain a current inventory
of its IT assets?
A. Inefficient use of storage space
B. Overpayment for software licenses
C. Inadequate response to security incidents
D. Increased power consumption
Correct Answer: C – Inadequate response to security incidents
Explanation: Without knowing what assets exist, it becomes difficult to monitor,
secure, and respond to incidents.
Incorrect Answers:
A. Storage space inefficiency is a minor risk.
B. License overpayment is possible but not the primary risk.
D. Power use is unrelated to asset tracking.

Question 542
Which of the following would BEST demonstrate management's commitment to
information security governance?
A. Appointing a security officer with budget responsibility
B. Implementing intrusion detection systems (IDS)
C. Performing regular internal audits
D. Deploying end-user antivirus software
Correct Answer: A – Appointing a security officer with budget
responsibility
Explanation: Assigning authority and resources to a responsible party shows strong
governance.
Incorrect Answers:
B. IDS is a technical control, not governance.
C. Audits support compliance, not governance leadership.
D. Antivirus is routine security, not governance.
Question 543
Which of the following is the MOST important reason to maintain segregation of
duties (SoD) in an IT environment?
A. Reduce system complexity
B. Increase operational efficiency
C. Minimize opportunities for fraud
D. Simplify troubleshooting
Correct Answer: C – Minimize opportunities for fraud
Explanation: SoD reduces risk by preventing a single individual from having too
much control.
Incorrect Answers:
A. Complexity might increase.
B. SoD may reduce efficiency.
D. Troubleshooting is unrelated.

Question 544
Which of the following would BEST assist in the prioritization of remediation efforts
for identified vulnerabilities?
A. Security audit results
B. Risk assessment
C. Patch management policies
D. Change control procedures
Correct Answer: B – Risk assessment
Explanation: Risk assessments help prioritize based on impact and likelihood.
Incorrect Answers:
A. Audit results may not address urgency.
C. Patch policies define process, not risk level.
D. Change control governs implementation, not priority.

Question 545
Which of the following is the BEST reason for conducting a penetration test?
A. To test encryption strength
B. To identify unauthorized users
C. To evaluate firewall configuration
D. To simulate real-world attacks
Correct Answer: D – To simulate real-world attacks
Explanation: Penetration tests mimic attacker behavior to uncover exploitable
weaknesses.
Incorrect Answers:
A. Encryption is tested differently.
B. User audits are separate from pen tests.
C. Firewall testing is only a component.

Question 546
Which of the following is MOST critical when developing a disaster recovery plan
(DRP)?
A. Data classification
B. Cost of backup solutions
C. Recovery time objective (RTO)
D. Test script development
Correct Answer: C – Recovery time objective (RTO)
Explanation: RTO defines acceptable downtime, guiding the DRP’s recovery
strategy.
Incorrect Answers:
A. Classification supports priorities but isn’t central.
B. Cost is a constraint, not a core element.
D. Scripts are needed but come after planning.

Question 547
What is the PRIMARY purpose of system hardening?
A. Optimize application performance
B. Increase user acceptance
C. Remove unnecessary vulnerabilities
D. Improve user interface
Correct Answer: C – Remove unnecessary vulnerabilities
Explanation: Hardening reduces attack surfaces by disabling unneeded services and
settings.
Incorrect Answers:
A. Performance is not the goal.
B. Hardening may restrict user access.
D. UI changes are unrelated.

Question 548
Which of the following activities would BEST demonstrate due diligence in third-
party risk management?
A. Annual review of vendor invoices
B. Continuous monitoring of vendor SLAs
C. Regular updates of asset inventory
D. Signing of non-disclosure agreements (NDAs)
Correct Answer: B – Continuous monitoring of vendor SLAs
Explanation: Ongoing monitoring ensures third-party compliance and reduces risk
exposure.
Incorrect Answers:
A. Invoices show spending, not risk control.
C. Asset tracking is internal.
D. NDAs help with confidentiality, not performance monitoring.

Question 549
Which of the following BEST helps protect data confidentiality when using cloud-
based file-sharing services?
A. Redundant storage
B. Encrypted data transmission
C. Data classification policies
D. Server uptime guarantees
Correct Answer: B – Encrypted data transmission
Explanation: Encryption in transit ensures that data cannot be intercepted during
transfer.
Incorrect Answers:
A. Redundancy supports availability, not confidentiality.
C. Policies help but do not enforce protection.
D. Uptime ensures availability, not data security.

Question 550
What is the BEST reason to perform a review of system logs?
A. To evaluate processor utilization
B. To ensure system updates are timely
C. To detect unusual activities or anomalies
D. To verify backup frequency
Correct Answer: C – To detect unusual activities or anomalies
Explanation: Log reviews help identify suspicious behavior or security breaches.
Incorrect Answers:
A. Utilization is monitored through performance tools.
B. Updates are verified through patch logs, not activity logs.
D. Backups are verified through backup systems, not logs.

Question 551
Which of the following is the PRIMARY purpose of implementing a data loss
prevention (DLP) solution?
A. Prevent unauthorized physical access to data centers
B. Ensure backups are created and stored offsite
C. Monitor and restrict transmission of sensitive data
D. Track user activity for compliance reporting
Correct Answer: C – Monitor and restrict transmission of sensitive
data
Explanation: DLP solutions are designed to prevent sensitive data from leaving the
organization.
Incorrect Answers:
A. Physical security is unrelated to DLP.
B. Backups are part of disaster recovery.
D. Activity tracking is typically handled by audit logs.

Question 552
Which of the following roles is PRIMARILY responsible for approving access to a
system?
A. Data custodian
B. IT administrator
C. System owner
D. Security manager
Correct Answer: C – System owner
Explanation: System owners are accountable for access decisions regarding their
systems.
Incorrect Answers:
A. Custodians maintain data but do not approve access.
B. Admins implement access, not approve it.
D. Security managers define policy but don’t approve specific access.

Question 553
Which of the following is MOST effective in ensuring timely revocation of access
rights?
A. Periodic user access reviews
B. Integration of HR and access management systems
C. User training on access procedures
D. Use of complex passwords
Correct Answer: B – Integration of HR and access management
systems
Explanation: Automation ensures that access is revoked promptly upon termination
or transfer.
Incorrect Answers:
A. Reviews are periodic, not immediate.
C. Training helps awareness, not enforcement.
D. Password complexity doesn’t relate to revocation.

Question 554
What is the PRIMARY concern when an organization allows personal devices to
connect to its internal network?
A. User dissatisfaction with IT policies
B. Increased IT support requests
C. Lack of consistent patch management
D. Incompatibility with company applications
Correct Answer: C – Lack of consistent patch management
Explanation: Unpatched personal devices may introduce vulnerabilities into the
network.
Incorrect Answers:
A. Dissatisfaction is a secondary issue.
B. Support volume is a management issue, not security.
D. Incompatibility affects functionality, not risk.

Question 555
Which of the following is the BEST control to prevent unauthorized program changes
in a production environment?
A. Implementing a robust change management process
B. Requiring user sign-off before updates
C. Maintaining system documentation
D. Using encryption on code repositories
Correct Answer: A – Implementing a robust change management
process
Explanation: Change management enforces authorization, testing, and tracking.
Incorrect Answers:
B. Sign-off helps, but not sufficient alone.
C. Documentation doesn’t prevent changes.
D. Encryption protects data, not change process.

Question 556
What is the PRIMARY objective of an information systems audit?
A. Detect fraudulent financial transactions
B. Ensure business continuity planning
C. Assess control effectiveness and compliance
D. Review IT staff qualifications
Correct Answer: C – Assess control effectiveness and compliance
Explanation: The main goal is to evaluate how well IT controls and policies are
implemented.
Incorrect Answers:
A. Fraud detection is a subset, not the core purpose.
B. BCP is part of audit scope, not the main goal.
D. Staff review is not a core audit objective.
Question 557
What is the BEST method to verify the effectiveness of antivirus software in a large
enterprise?
A. Review software licensing
B. Conduct periodic malware testing
C. Check user feedback
D. Ensure latest version is installed
Correct Answer: B – Conduct periodic malware testing
Explanation: Simulated attacks or controlled tests confirm actual performance.
Incorrect Answers:
A. Licensing ensures legality, not effectiveness.
C. Feedback is subjective and insufficient.
D. Version checks don’t validate performance.

Question 558
Which of the following BEST describes the purpose of a honeypot?
A. Monitor application performance under stress
B. Lure attackers to detect malicious behavior
C. Encrypt sensitive data before transmission
D. Prevent accidental data deletion
Correct Answer: B – Lure attackers to detect malicious behavior
Explanation: Honeypots attract attackers, allowing observation and analysis of
their tactics.
Incorrect Answers:
A. That’s stress testing.
C. Encryption is unrelated to honeypots.
D. Data deletion is not related.

Question 559
Which of the following provides the GREATEST assurance that data processed in an
application is complete?
A. System access logs
B. Application error reports
C. Reconciliation of input and output totals
D. Audit trail review
Correct Answer: C – Reconciliation of input and output totals
Explanation: Reconciling inputs and outputs ensures that all data was processed.
Incorrect Answers:
A. Access logs show entry, not completeness.
B. Error reports may not catch silent failures.
D. Audit trails help, but reconciliation is more direct.
Question 560
An IS auditor observes that some employees use the same credentials across multiple
systems. What is the BEST recommendation?
A. Enforce password length and complexity
B. Implement single sign-on (SSO)
C. Train users on password security
D. Mandate regular password changes
Correct Answer: B – Implement single sign-on (SSO)
Explanation: SSO allows secure access with one set of credentials, reducing risk of
reuse.
Incorrect Answers:
A. Strong passwords help, but don’t address reuse.
C. Training improves awareness, not behavior.
D. Frequent changes may encourage poor practices.

Question 561
Which of the following provides the BEST evidence of effective patch management?
A. A decrease in the number of help desk tickets
B. An updated inventory of installed software
C. Documentation of patch testing procedures
D. Logs showing timely deployment of critical patches
Correct Answer: D – Logs showing timely deployment of critical
patches
Explanation: Timely patch deployment demonstrates actual execution of patch
management.
Incorrect Answers:
A. Ticket volume may not be directly linked.
B. Inventory helps tracking, not execution.
C. Procedures alone don’t confirm patches were applied.

Question 562
Which of the following is the PRIMARY objective of encryption in data
transmission?
A. Ensure data integrity
B. Protect data confidentiality
C. Detect unauthorized data changes
D. Prevent data redundancy
Correct Answer: B – Protect data confidentiality
Explanation: Encryption scrambles data to prevent unauthorized access during
transmission.
Incorrect Answers:
A. Integrity is addressed through hashing or checksums.
C. Unauthorized changes are detected with integrity checks.
D. Redundancy is unrelated to encryption.

Question 563
Which of the following techniques BEST reduces the likelihood of buffer overflow
attacks?
A. Input validation
B. Data classification
C. Encryption
D. Data masking
Correct Answer: A – Input validation
Explanation: Validating input helps prevent malicious input that could overflow
memory buffers.
Incorrect Answers:
B. Classification addresses data sensitivity.
C. Encryption protects data, not system memory.
D. Masking hides sensitive values, not code injection.

Question 564
What is the PRIMARY benefit of data classification?
A. Minimizing audit effort
B. Prioritizing risk management efforts
C. Reducing data duplication
D. Simplifying disaster recovery planning
Correct Answer: B – Prioritizing risk management efforts
Explanation: Classification helps determine which data needs stronger controls
based on sensitivity.
Incorrect Answers:
A. Audit effort may be impacted, but not the main benefit.
C. Duplication reduction isn’t the goal.
D. DR planning benefits indirectly.

Question 565
Which of the following BEST mitigates the risk of unauthorized remote access to a
corporate network?
A. Limiting remote access to business hours
B. Implementing multi-factor authentication
C. Logging all remote access attempts
D. Allowing VPN access from company laptops only
Correct Answer: B – Implementing multi-factor authentication
Explanation: MFA adds a strong layer of protection beyond passwords for remote
access.
Incorrect Answers:
A. Time limits help but aren’t foolproof.
C. Logging is reactive, not preventive.
D. Device restriction helps, but MFA is stronger.

Question 566
Which of the following is the MOST appropriate control when segregation of duties is
not possible in a small IT environment?
A. Enforcing password expiration policies
B. Performing surprise audits
C. Implementing compensating controls
D. Outsourcing the IT function
Correct Answer: C – Implementing compensating controls
Explanation: When SoD isn’t feasible, compensating controls provide alternative
risk reduction.
Incorrect Answers:
A. Password policies don’t address SoD.
B. Surprise audits help detect, not prevent.
D. Outsourcing might not solve SoD risk effectively.

Question 567
Which of the following provides the GREATEST assurance that a data center
environment is properly secured?
A. Logs of physical access are reviewed monthly
B. Biometric access controls are implemented
C. Closed-circuit TV cameras are installed
D. Access to the data center is restricted to IT staff
Correct Answer: B – Biometric access controls are implemented
Explanation: Biometrics offer a high level of access control and identity verification.
Incorrect Answers:
A. Log review helps, but is reactive.
C. Cameras monitor but do not prevent access.
D. Limiting access is good, but not as strong as biometric control.

Question 568
Which of the following BEST ensures the accuracy of data input in an application
system?
A. Validity check
B. Control total
C. Access control
D. Audit trail
Correct Answer: A – Validity check
Explanation: A validity check ensures data entered conforms to acceptable values.
Incorrect Answers:
B. Control totals confirm completeness, not validity.
C. Access control restricts user access.
D. Audit trails track changes, not accuracy.

Question 569
Which of the following is MOST critical to review during an audit of network
configuration management?
A. Availability of network documentation
B. Use of standardized network hardware
C. Logs of configuration changes
D. Skills of the network administration team
Correct Answer: C – Logs of configuration changes
Explanation: Change logs provide insight into unauthorized or unapproved
modifications.
Incorrect Answers:
A. Documentation is helpful, but logs show actual changes.
B. Standard hardware helps consistency but not auditability.
D. Skills matter, but are less measurable than logs.

Question 570
Which of the following would BEST prevent unauthorized physical access to server
rooms?
A. Security awareness training
B. Alarm systems
C. Access cards with logging capability
D. Surveillance camera installation
Correct Answer: C – Access cards with logging capability
Explanation: Access cards limit entry and provide audit trails of physical access.
Incorrect Answers:
A. Training helps behavior, not enforcement.
B. Alarms respond to intrusion, not prevent access.
D. Cameras monitor but don’t control entry.

Question 571
What is the BEST way to verify whether incident response procedures are effective?
A. Reviewing past incident reports
B. Simulating a cyberattack
C. Interviewing incident response staff
D. Reviewing response time logs
Correct Answer: B – Simulating a cyberattack
Explanation: Simulations test real-time effectiveness and coordination of response
teams.
Incorrect Answers:
A. Reports show history, not current readiness.
C. Interviews assess knowledge, not actual performance.
D. Logs help measure, but don’t validate procedure effectiveness.

Question 572
Which of the following is the MOST effective preventive control to protect sensitive
data stored on laptops?
A. Two-factor authentication
B. Data loss prevention software
C. Disk encryption
D. Regular backups
Correct Answer: C – Disk encryption
Explanation: Encryption ensures that even if the device is stolen, data remains
unreadable.
Incorrect Answers:
A. 2FA helps access control, not data protection post-loss.
B. DLP helps with transmission, not stored data.
D. Backups protect availability, not confidentiality.

Question 573
Which of the following would BEST ensure that critical audit findings are addressed?
A. Report findings to the audit committee
B. Conduct follow-up audits
C. Include findings in internal newsletters
D. Assign findings to the IT department
Correct Answer: B – Conduct follow-up audits
Explanation: Follow-up audits verify whether corrective actions were implemented.
Incorrect Answers:
A. Reporting is informative but not corrective.
C. Newsletters raise awareness, not assurance.
D. Assigning helps, but without follow-up may be ineffective.

Question 574
What is the PRIMARY purpose of a data retention policy?
A. To classify data based on sensitivity
B. To define backup intervals
C. To ensure data is kept for as long as necessary
D. To outline procedures for data encryption
Correct Answer: C – To ensure data is kept for as long as necessary
Explanation: Retention policies define how long data must be retained for legal,
operational, or compliance reasons.
Incorrect Answers:
A. Classification defines sensitivity, not retention.
B. Backups are operational, not policy-related.
D. Encryption concerns protection, not retention duration.

Question 575
Which of the following is the PRIMARY objective of reviewing firewall rule sets?
A. To check for malware traffic
B. To ensure rules are documented
C. To detect unauthorized access
D. To validate compliance with security policies
Correct Answer: D – To validate compliance with security policies
Explanation: Firewall rules must reflect and enforce security policy requirements.
Incorrect Answers:
A. Malware traffic is better identified by IDS/IPS.
B. Documentation is necessary but not the main goal.
C. Access control is a result, not the primary review objective.

Question 576
Which of the following should an IS auditor verify FIRST when auditing application
controls?
A. Role-based access is implemented
B. Input validation controls are working
C. Data backups are conducted regularly
D. Business process objectives are defined
Correct Answer: D – Business process objectives are defined
Explanation: Controls must support clearly defined business objectives to be
evaluated meaningfully.
Incorrect Answers:
A. Access control is important but comes after understanding objectives.
B. Validation matters, but without objectives, its effectiveness can’t be judged.
C. Backups relate more to availability than application-specific controls.

Question 577
What is the PRIMARY goal of using hash functions in data processing?
A. Encrypt data
B. Verify integrity
C. Compress files
D. Mask sensitive fields
Correct Answer: B – Verify integrity
Explanation: Hashes generate a fixed output from input data, useful to detect
unauthorized changes.
Incorrect Answers:
A. Hashing is not reversible, unlike encryption.
C. Compression reduces size, not integrity.
D. Masking hides values, not ensures accuracy.

Question 578
Which of the following is the PRIMARY risk of allowing developers to access
production systems?
A. Reduced system performance
B. Unauthorized code changes
C. Lack of audit trail
D. Incomplete documentation
Correct Answer: B – Unauthorized code changes
Explanation: Developer access to production can lead to changes without
appropriate testing or approval.
Incorrect Answers:
A. Performance may degrade, but changes pose a bigger threat.
C. Trails may still exist even with risky access.
D. Documentation is unrelated to production access.

Question 579
Which of the following would be the BEST reason to perform a post-implementation
review (PIR) of a system?
A. Evaluate project team performance
B. Review compliance with project scope
C. Determine if expected benefits were realized
D. Identify redundant functionality
Correct Answer: C – Determine if expected benefits were realized
Explanation: PIR assesses if the system met the intended business outcomes.
Incorrect Answers:
A. Performance evaluation is not the primary PIR goal.
B. Scope review is done during project closure.
D. Redundancy may be noted, but not the primary reason.
Question 580
What is the PRIMARY objective of using a sandboxing technique in cybersecurity?
A. Monitor external threats
B. Analyze malware in an isolated environment
C. Prevent denial-of-service attacks
D. Encrypt sensitive data
Correct Answer: B – Analyze malware in an isolated environment
Explanation: Sandboxing isolates potentially harmful code to observe behavior
without risk to systems.
Incorrect Answers:
A. Threat monitoring is broader.
C. Sandboxing doesn’t mitigate DoS.
D. Encryption protects data, not systems.

Question 581
Which of the following is the GREATEST benefit of defining key risk indicators
(KRIs) for IT processes?
A. Reduces the impact of key risk events
B. Helps establish the risk tolerance
C. Enables control assessment
D. Improves security metrics
Correct Answer: B – Helps establish the risk tolerance
Explanation: Defining KRIs assists in determining the level of risk an organization
is willing to accept, helping align IT processes with the enterprise's risk appetite.
Incorrect Answers:
A. KRIs do not reduce impact but provide early warnings.
C. Control assessment is related but not the primary benefit.
D. KRIs are broader than just improving security metrics.

Question 582
Which of the following BEST helps ensure that audit findings are accepted and
resolved by management?
A. Including findings in the audit report
B. Conducting closing meetings
C. Involving auditees during planning
D. Gaining agreement on findings during fieldwork
Correct Answer: D – Gaining agreement on findings during fieldwork
Explanation: Early agreement increases ownership and commitment to resolve
findings, avoiding delays or disputes later.
Incorrect Answers:
A. Inclusion in reports documents the issue but doesn’t guarantee resolution.
B. Closing meetings may be too late for agreement.
C. Planning involvement helps, but agreement on findings is more direct.

Question 583
Which of the following is the PRIMARY purpose of performing a risk assessment?
A. Prioritize controls
B. Identify inherent threats
C. Evaluate control design
D. Guide audit planning
Correct Answer: A – Prioritize controls
Explanation: Risk assessments are performed to identify and prioritize risks so that
appropriate and cost-effective controls can be implemented.
Incorrect Answers:
B. Identifying threats is a step, not the primary purpose.
C. Evaluating control design happens after identifying risks.
D. Risk assessment supports audit planning but isn't its main purpose.

Question 584
Which of the following BEST enables secure remote access to internal systems?
A. Secure email
B. Multifactor authentication
C. Secure boot process
D. Role-based access
Correct Answer: B – Multifactor authentication
Explanation: MFA strengthens access security by requiring more than one method
of authentication, reducing risk of unauthorized access remotely.
Incorrect Answers:
A. Secure email does not control access to systems.
C. Secure boot ensures system integrity, not remote access.
D. Role-based access manages rights but doesn't address identity validation strength.

Question 585
Which of the following is the PRIMARY benefit of using a formal project
methodology?
A. More detailed documentation
B. Increased likelihood of project success
C. Easier resource scheduling
D. Reduced project duration
Correct Answer: B – Increased likelihood of project success
Explanation: A structured methodology promotes consistent planning, monitoring,
and execution, which leads to higher success rates.
Incorrect Answers:
A. Documentation is a benefit but not the primary one.
C. Resource scheduling can still be complex despite methodology.
D. Duration isn’t necessarily reduced; methodology improves outcome, not speed.

Question 586
Which of the following is the BEST method to prevent data leakage when
decommissioning media?
A. Use of data encryption
B. Logging data access
C. Overwriting the media
D. Labeling sensitive devices
Correct Answer: C – Overwriting the media
Explanation: Overwriting removes previous data, making recovery difficult and
preventing data leakage.
Incorrect Answers:
A. Encryption protects while in use but not during disposal.
B. Logging tracks access but doesn’t prevent leakage.
D. Labeling aids handling but not data sanitization.

Question 587
Which of the following would provide the BEST assurance of proper configuration of
database controls?
A. Reviewing vendor documentation
B. Performing system penetration testing
C. Conducting configuration reviews
D. Evaluating physical security
Correct Answer: C – Conducting configuration reviews
Explanation: Configuration reviews directly assess if controls like permissions and
encryption are properly set in the database.
Incorrect Answers:
A. Documentation is helpful but not sufficient.
B. Pen tests may not reach database configuration depth.
D. Physical security is important but not related to database config.

Question 588
Which of the following is the BEST way to ensure continuity of IT services during a
disaster?
A. Encrypt backup data
B. Maintain warm sites
C. Establish RPOs and RTOs
D. Perform table-top exercises
Correct Answer: C – Establish RPOs and RTOs
Explanation: RPOs and RTOs define acceptable downtime and data loss, guiding
recovery plans and resources allocation.
Incorrect Answers:
A. Encryption protects data but doesn’t ensure availability.
B. Warm sites help but must align with RPO/RTO.
D. Exercises are helpful but not a guarantee of continuity.

Question 589
Which of the following is the PRIMARY advantage of outsourcing IT services?
A. Reduced IT risk
B. Transfer of responsibilities
C. Cost reduction
D. Access to specialized expertise
Correct Answer: D – Access to specialized expertise
Explanation: Organizations often outsource to benefit from vendor’s expertise and
focus on core business.
Incorrect Answers:
A. Risk is not necessarily reduced—some risks are shared or transformed.
B. Responsibility is still retained by the organization.
C. Cost savings may not always materialize and depend on scope.

Question 590
Which of the following would BEST address the risk of unauthorized physical access
to data centers?
A. CCTV surveillance
B. Logging access events
C. Biometric access control
D. Visitor sign-in logs
Correct Answer: C – Biometric access control
Explanation: Biometrics like fingerprint or iris scan provide strong identity
verification, reducing unauthorized access.
Incorrect Answers:
A. CCTV is reactive, not preventative.
B. Logging records entry but does not prevent it.
D. Sign-in logs rely on human procedures and can be bypassed.

Question 591
Which of the following is the PRIMARY reason for involving key stakeholders in the
development of IT policies?
A. To reduce the cost of IT policy implementation
B. To ensure policies are aligned with business objectives
C. To increase awareness of IT operations
D. To enable faster decision-making
Correct Answer: B – To ensure policies are aligned with business
objectives
Explanation: Stakeholder involvement ensures IT policies support strategic and
operational needs of the business.
Incorrect Answers:
A. Cost reduction may be a side effect but not the primary reason.
C. Awareness is beneficial but not the core goal.
D. Decision-making is enhanced later but is not the main justification.

Question 592
Which of the following is the BEST method to ensure effective use of encryption to
protect sensitive data?
A. Encrypting data during backups
B. Ensuring encryption keys are stored on separate media
C. Applying encryption only to archived data
D. Encrypting all user data by default
Correct Answer: B – Ensuring encryption keys are stored on separate
media
Explanation: Encryption is only effective if keys are secured separately to prevent
unauthorized decryption.
Incorrect Answers:
A. Backup encryption is important but not sufficient alone.
C. Encrypting only archives omits data in transit or use.
D. Default encryption is ideal, but key management is more critical.

Question 593
An IS auditor finds that terminated employees still have active accounts. What is the
BEST recommendation?
A. Update the acceptable use policy
B. Conduct regular access reviews
C. Disable the accounts immediately
D. Strengthen physical access controls
Correct Answer: B – Conduct regular access reviews
Explanation: Regular access reviews help ensure that only authorized users retain
access, reducing risk of misuse.
Incorrect Answers:
A. Updating policy doesn't address existing access.
C. Immediate disabling is reactive; regular reviews are proactive.
D. Physical access doesn't address logical account issues.

Question 594
Which of the following is the BEST control to mitigate the risk of unauthorized code
changes in production?
A. Code walkthroughs
B. Segregation of development and production environments
C. Use of object-oriented programming
D. Conducting developer training
Correct Answer: B – Segregation of development and production
environments
Explanation: Separating environments ensures developers cannot implement
changes directly to production.
Incorrect Answers:
A. Walkthroughs help identify logic flaws but don’t prevent changes.
C. Programming paradigm doesn't prevent unauthorized access.
D. Training improves skills, not access control.

Question 595
Which of the following BEST mitigates the risk of a successful phishing attack?
A. URL filtering
B. Mandatory encryption
C. Endpoint detection and response
D. Security awareness training
Correct Answer: D – Security awareness training
Explanation: Educating users to recognize and avoid phishing attempts is the most
effective prevention.
Incorrect Answers:
A. Filtering helps but can miss novel phishing links.
B. Encryption doesn’t prevent phishing.
C. Endpoint tools may detect after compromise.

Question 596
The PRIMARY purpose of business impact analysis (BIA) is to:
A. identify redundant systems
B. determine recovery priorities
C. assess regulatory compliance
D. evaluate insurance requirements
Correct Answer: B – Determine recovery priorities
Explanation: BIA identifies critical business functions and helps set recovery
objectives and priorities.
Incorrect Answers:
A. Redundancy may result from BIA, but it's not the main purpose.
C. BIA isn't compliance focused.
D. Insurance is a secondary concern.

Question 597
Which of the following would be MOST important to verify during an audit of IT
asset management?
A. The inventory system is automated
B. All assets are tagged and labeled
C. Licenses are renewed annually
D. Asset records are accurate and up to date
Correct Answer: D – Asset records are accurate and up to date
Explanation: Inaccurate records can lead to compliance, financial, and operational
issues.
Incorrect Answers:
A. Automation helps, but accuracy is paramount.
B. Labeling aids tracking but doesn’t ensure accuracy.
C. Renewals are important but secondary to full asset control.

Question 598
Which of the following BEST reduces the risk of unauthorized internal access to
sensitive data?
A. Firewalls
B. Role-based access controls
C. Antivirus software
D. Secure file transfer protocol
Correct Answer: B – Role-based access controls
Explanation: RBAC ensures that users can access only the data necessary for their
roles, limiting internal risk.
Incorrect Answers:
A. Firewalls are external perimeter controls.
C. Antivirus addresses malware, not access rights.
D. Secure transfer prevents interception, not unauthorized internal access.

Question 599
Which of the following is the PRIMARY benefit of control self-assessment (CSA)?
A. Reduces the need for external audits
B. Ensures full compliance with regulations
C. Enhances ownership of controls among stakeholders
D. Eliminates the need for IS audit involvement
Correct Answer: C – Enhances ownership of controls among
stakeholders
Explanation: CSA fosters accountability and helps stakeholders understand and
take responsibility for controls.
Incorrect Answers:
A. External audits may still be needed.
B. Compliance is supported but not guaranteed.
D. Audit involvement is reduced but not eliminated.

Question 600
Which of the following would BEST help mitigate the risk of inappropriate changes
to production systems?
A. Reviewing audit trails
B. Implementing a change management process
C. Enforcing secure coding practices
D. Conducting annual user training
Correct Answer: B – Implementing a change management process
Explanation: A formal change management process ensures that only authorized
and tested changes are implemented.
Incorrect Answers:
A. Audit trails detect issues after the fact.
C. Secure coding addresses code quality, not process.
D. Training helps awareness, not direct process enforcement.

Question 601
Which of the following would be the BEST course of action for an IS auditor who
has identified unauthorized software installed on an employee workstation?
A. Revoke the employee's access credentials
B. Report the issue to the employee's supervisor
C. Notify the IT security officer
D. Document the incident in the audit report
Correct Answer: C – Notify the IT security officer
Explanation: The IT security officer should be informed immediately to initiate
investigation and remediation.
Incorrect Answers:
A. Revoking access may be premature without investigation.
B. While involving supervisors may be necessary, it is not the immediate action.
D. Documentation is important but should follow incident response.

Question 602
What is the MOST important action when performing data analysis during an audit?
A. Creating data visualizations
B. Ensuring data completeness and integrity
C. Reformatting data for comparison
D. Analyzing only financial transactions
Correct Answer: B – Ensuring data completeness and integrity
Explanation: Reliable analysis depends on complete and accurate data.
Incorrect Answers:
A. Visualization aids understanding but is secondary.
C. Reformatting is supportive but not the priority.
D. Scope should not be limited unless specified.

Question 603
Which of the following would BEST ensure accountability in an automated system?
A. Access control software
B. Audit trails
C. Session timeout
D. Segregation of duties
Correct Answer: B – Audit trails
Explanation: Audit trails provide a record of system activity and user actions.
Incorrect Answers:
A. Access controls limit entry but don’t ensure accountability.
C. Timeouts enforce idle session control.
D. Segregation helps reduce fraud, not track activity.

Question 604
The PRIMARY purpose of conducting a feasibility study during system development
is to:
A. determine if the project complies with enterprise architecture
B. confirm the project aligns with business strategy
C. estimate development costs
D. assess whether the project should proceed
Correct Answer: D – Assess whether the project should proceed
Explanation: Feasibility studies evaluate technical, operational, and financial
viability.
Incorrect Answers:
A. Architecture compliance is part of design review.
B. Strategic alignment is important but not the main feasibility focus.
C. Cost is one component, not the sole purpose.

Question 605
Which of the following is MOST important to evaluate when reviewing an
organization's change control process?
A. Frequency of software updates
B. Emergency change approvals
C. Separation of development and production environments
D. Number of implemented changes
Correct Answer: C – Separation of development and production
environments
Explanation: This reduces the risk of unauthorized changes.
Incorrect Answers:
A. Frequency doesn't indicate control effectiveness.
B. Important, but not the primary control.
D. Volume doesn’t reflect adequacy of control.

Question 606
Which of the following provides the STRONGEST evidence of user access approval?
A. User email requesting access
B. System-generated report of new users
C. Manager-signed access authorization form
D. IT ticket closure confirmation
Correct Answer: C – Manager-signed access authorization form
Explanation: A signed form from a responsible party is strong, documented
evidence.
Incorrect Answers:
A. Self-request doesn’t imply approval.
B. Reports show addition, not approval.
D. Closure logs are operational, not evidence of authorization.

Question 607
When assessing the implementation of a disaster recovery plan, which of the
following should be of MOST concern to the IS auditor?
A. The plan was tested six months ago
B. The plan does not include all critical systems
C. Backups are taken daily
D. The plan includes emergency contacts
Correct Answer: B – The plan does not include all critical systems
Explanation: Omitting critical systems can hinder recovery.
Incorrect Answers:
A. Six months may be acceptable depending on policy.
C. Backup frequency alone is not sufficient.
D. Contact information is useful, but not core.

Question 608
Which of the following is the BEST indicator of an effective patch management
process?
A. High number of patches applied
B. Low number of reported vulnerabilities
C. Short time to apply patches after release
D. Automated patch deployment tool in place
Correct Answer: C – Short time to apply patches after release
Explanation: Prompt patching reduces exposure to vulnerabilities.
Incorrect Answers:
A. Volume doesn’t equal effectiveness.
B. Could be influenced by external factors.
D. Tools help but don't guarantee efficiency.

Question 609
An IS auditor discovers that developers can access production data. The BEST
course of action is to:
A. Report it as a major security finding
B. Evaluate the business need and compensating controls
C. Recommend removing developer access immediately
D. Monitor activity logs for suspicious behavior
Correct Answer: B – Evaluate the business need and compensating
controls
Explanation: Sometimes access is needed temporarily; assess before recommending
removal.
Incorrect Answers:
A. Premature without full context.
C. May disrupt operations if unjustified.
D. Monitoring is useful but not a full solution.

Question 610
Which of the following is the MOST effective control for preventing unauthorized
data modification?
A. Logging and monitoring
B. Encryption
C. Access controls
D. Backups
Correct Answer: C – Access controls
Explanation: Access controls prevent unauthorized actions at the source.
Incorrect Answers:
A. Logging is reactive.
B. Encryption protects confidentiality, not modification.
D. Backups are restorative, not preventive.

Question 611
In order to be useful, a key performance indicator (KPI) MUST:
A. be approved by management.
B. be changed frequently to reflect organizational strategy.
C. have a target value.
D. be measurable in percentages.
Correct Answer: C – have a target value
Explanation: KPIs are most useful when they have defined targets that help assess
performance against objectives.
Incorrect Answers:
A. Approval by management is helpful but not a defining requirement.
B. Changing KPIs too often can lead to instability.
D. KPIs do not always need to be expressed in percentages.

Question 612
Which of the following should be of GREATEST concern to an IS auditor reviewing
an organization's IT process performance reports over the last quarter?
A. Metrics are not aligned with industry benchmarks.
B. Metrics were defined without stakeholder review.
C. Key performance indicators (KPIs) were met in only one month.
D. Performance reporting includes too many technical terms.
Correct Answer: C – Key performance indicators (KPIs) were met in
only one month
Explanation: Inconsistent performance over time (only one month of KPI
achievement) suggests deeper operational issues.
Incorrect Answers:
A. Misalignment with benchmarks is concerning, but consistent underperformance is
more critical.
B. Lack of stakeholder input may affect relevance, but not urgency.
D. Technical language may hinder understanding but doesn't affect performance.

Question 613
Which of the following is MOST important to have in place to build consensus
among key stakeholders on the cost-effectiveness of IT?
A. IT project governance and management
B. Standardized enterprise architecture (EA)
C. IT performance monitoring and reporting
D. A uniform IT chargeback process
Correct Answer: C – IT performance monitoring and reporting
Explanation: Transparency in how IT performs against expectations builds trust
and consensus among stakeholders.
Incorrect Answers:
A. Governance is critical but broader.
B. EA helps with alignment, not directly with cost-effectiveness consensus.
D. Chargeback processes are more about cost allocation.

Question 614
Which of the following is the PRIMARY benefit of continuous auditing?
A. It facilitates the use of robotic automation processes.
B. It allows reduced sample sizes for testing.
C. It enables timely detection of anomalies.
D. It deters fraudulent transactions.
Correct Answer: C – It enables timely detection of anomalies
Explanation: Continuous auditing enables near real-time insights that help detect
irregularities early.
Incorrect Answers:
A. Robotic process automation is not the goal.
B. Sampling is not the focus of continuous auditing.
D. Deterrence is a side benefit, not the primary one.

Question 615
Which of the following provides the MOST reliable evidence of segregation of duties
(SoD)?
A. Job descriptions are formally documented.
B. Access control matrices are up to date.
C. System audit trails are regularly reviewed.
D. Responsibility assignments are approved by management.
Correct Answer: B – Access control matrices are up to date
Explanation: Updated access matrices directly show who can do what, validating
SoD is implemented.
Incorrect Answers:
A. Documentation helps but doesn't prove practice.
C. Audit trails detect violations, not demonstrate SoD presence.
D. Approval shows intent, not enforcement.
Question 616
Which of the following would BEST prevent unauthorized access to sensitive data
when a laptop is lost?
A. Antivirus software
B. Full-disk encryption
C. Complex login password
D. Personal firewall
Correct Answer: B – Full-disk encryption
Explanation: Even if the laptop is lost, encrypted data remains inaccessible without
the encryption key.
Incorrect Answers:
A. Antivirus helps with malware, not data protection.
C. Passwords can be bypassed.
D. Firewalls are for network protection, not local data.

Question 617
An IS auditor finds that project milestones are often missed. Which of the following
would BEST help address this issue?
A. Change control board approval
B. Critical path analysis
C. Regular status meetings
D. Revised business case
Correct Answer: B – Critical path analysis
Explanation: Critical path analysis helps identify bottlenecks and dependencies
affecting project timelines.
Incorrect Answers:
A. Change control helps manage scope, not scheduling.
C. Meetings inform but don't resolve structural scheduling issues.
D. Business case supports justification, not scheduling.

Question 618
Which of the following is the MOST important factor when selecting a control
framework?
A. Ability to support regulatory compliance
B. Familiarity among employees
C. Endorsement by senior management
D. Ease of implementation
Correct Answer: A – Ability to support regulatory compliance
Explanation: A framework that ensures compliance helps reduce legal and
reputational risks.
Incorrect Answers:
B. Familiarity is helpful but not primary.
C. Management support is needed but not sufficient alone.
D. Ease is a benefit, but regulatory fit is more important.

Question 619
An IS auditor finds a critical application lacks formal user acceptance testing (UAT).
The BEST recommendation is to:
A. implement UAT retroactively.
B. conduct training for testers.
C. delay go-live until UAT is completed.
D. use test scripts for future testing.
Correct Answer: C – delay go-live until UAT is completed
Explanation: Going live without verifying user acceptance is a major risk. Testing
must occur before production.
Incorrect Answers:
A. Retroactive UAT isn't effective post-deployment.
B. Training helps but doesn't address immediate risk.
D. Scripts are tools, not substitutes for actual testing.

Question 620
Which of the following is MOST critical when defining access rights for a financial
application?
A. Job rotation policy
B. Principle of least privilege
C. User-friendly interface
D. System availability
Correct Answer: B – Principle of least privilege
Explanation: Users should only have access necessary for their duties to minimize
risk.
Incorrect Answers:
A. Job rotation is a detective control, not preventive.
C. Usability is important but secondary.
D. Availability doesn't ensure access control integrity.

Question 621
An IS auditor has discovered that unauthorized customer management software was
installed on a workstation. The auditor determines the software has been uploading
customer data to an external party. Which of the following is the IS auditor's BEST
course of action?
A. Review other workstations to determine the extent of the incident.
B. Determine the number of customer records that were uploaded.
C. Notify the incident response team.
D. Present the issue at the next audit progress meeting.
Correct Answer: C – Notify the incident response team
Explanation: The auditor’s first responsibility is to ensure the incident is escalated
appropriately to prevent further data leakage and enable containment.
Incorrect Answers:
A. Useful, but not the first action.
B. Important for impact assessment, but comes after containment.
D. Waiting for the next meeting could delay response.

Question 622
An IS auditor is reviewing an organization's information asset management process.
Which of the following would be of GREATEST concern to the auditor?
A. Process ownership has not been established.
B. Identification of asset value is not included in the process.
C. The process does not require specifying the physical locations of assets.
D. The process does not include asset review.
Correct Answer: B – Identification of asset value is not included in the process
Explanation: Without assigning value, assets cannot be prioritized or protected
appropriately.
Incorrect Answers:
A. Important, but not as critical as valuation.
C. Physical location may be secondary depending on data type.
D. Reviews are helpful but come after asset identification and valuation.

Question 623
An IS auditor is conducting a post-implementation review of an enterprise resource
planning (ERP) system. End users indicated concerns with the accuracy of critical
automatic calculations made by the system. The auditor's FIRST course of action
should be to:
A. verify completeness of user acceptance testing (UAT).
B. verify results to determine validity of user concerns.
C. review initial business requirements.
D. review recent changes to the system.
Correct Answer: B – Verify results to determine validity of user concerns
Explanation: Validation of concerns is the first step to assess the nature and scope
of potential errors.
Incorrect Answers:
A. Comes later during root cause analysis.
C. Helps, but doesn’t address immediate issue.
D. Might not relate directly to current concerns.
Question 624
An IS auditor performing an audit of backup procedures observes that backup tapes
are picked up weekly and stored offsite at a third-party hosting facility. Which of the
following recommendations would be the BEST way to protect the integrity of the
data on the backup tapes?
A. Ensure that data is encrypted before leaving the facility.
B. Confirm that data transfers are logged and recorded.
C. Confirm that data is transported in locked tamper-evident containers.
D. Ensure that the transport company obtains signatures for all shipments.
Correct Answer: A – Ensure that data is encrypted before leaving the facility
Explanation: Encrypting the data ensures its confidentiality and integrity in case of
theft or loss.
Incorrect Answers:
B. Logging helps tracking but not integrity.
C. Helpful for physical protection, but not sufficient.
D. Ensures chain of custody, not data integrity.

Question 625
An IS auditor has been asked to perform an assurance review of an organization's
mobile computing security. To ensure the organization is able to centrally manage
mobile devices to protect against data disclosure, it is MOST important for the
auditor to determine whether:
A. lost devices can be located remotely.
B. procedures for lost devices include remote wiping of data.
C. a mobile security awareness training program exists.
D. a security policy exists for mobile devices.
Correct Answer: B – Procedures for lost devices include remote wiping of data
Explanation: Remote wipe functionality is essential to prevent data loss when
devices are lost or stolen.
Incorrect Answers:
A. Useful, but less critical than data removal.
C. Helps mitigate human error but not technical protection.
D. Policies guide behavior but do not provide technical enforcement.

Question 626
An IS auditor has been asked to perform a post-implementation assessment of a new
corporate human resources (HR) system. Which of the following control areas would
be MOST important to review for the protection of employee information?
A. Data retention practices
B. Authentication mechanisms
C. System architecture
D. Logging capabilities
Correct Answer: B – Authentication mechanisms
Explanation: Strong authentication is critical to protect access to sensitive
employee data.
Incorrect Answers:
A. Important but not directly related to access control.
C. Architecture matters but doesn’t provide direct protection.
D. Logging helps detect breaches but doesn’t prevent them.

Question 627
An external IS auditor has been engaged to determine the organization's
cybersecurity posture. Which of the following is MOST useful for this purpose?
A. Capability maturity assessment
B. Compliance reports
C. Control self-assessment (CSA)
D. Industry benchmark report
Correct Answer: A – Capability maturity assessment
Explanation: This provides a structured method for evaluating the overall
effectiveness and maturity of cybersecurity practices.
Incorrect Answers:
B. Only reflects regulatory aspects.
C. May lack objectivity.
D. Benchmarking is comparative, not evaluative.

Question 628
An IS auditor observes that a business-critical application does not currently have
any level of fault tolerance. Which of the following is the GREATEST concern with
this situation?
A. Degradation of services
B. Decreased mean time between failures (MTBF)
C. Limited tolerance for damage
D. Single point of failure
Correct Answer: D – Single point of failure
Explanation: Lack of fault tolerance in a critical application creates a single point
of failure, which can disrupt business operations.
Incorrect Answers:
A. Degradation may still allow operations.
B. MTBF relates to reliability but not redundancy.
C. Broad and less specific than option D.

Question 629
An IS auditor is evaluating an organization's IT strategy and plans. Which of the
following would be of GREATEST concern?
A. IT is not engaged in business strategic planning.
B. The business strategy meeting minutes are not distributed.
C. There is inadequate documentation of IT strategic planning.
D. There is not a defined IT security policy.
Correct Answer: A – IT is not engaged in business strategic planning
Explanation: IT alignment with business goals is essential for effective strategy
execution.
Incorrect Answers:
B. Transparency issue, but not critical.
C. Impacts efficiency but not alignment.
D. Policy absence is serious, but not as strategic as misalignment.

Question 630
An IS auditor reviewing the threat assessment for a data center would be MOST
concerned if:
A. neighboring organizations' operations have been included.
B. the exercise was completed by local management.
C. all identified threats relate to external entities.
D. some of the identified threats are unlikely to occur.
Correct Answer: C – All identified threats relate to external entities
Explanation: Ignoring internal threats leads to an incomplete risk profile.
Incorrect Answers:
A. Not a concern if relevant.
B. May be valid if done thoroughly.
D. Scenario modeling often includes unlikely but impactful events.

Question 631
An IS auditor is reviewing the process of identifying application security
requirements. Which of the following is MOST important to review FIRST?
A. Conducting a threat modeling exercise
B. Performing a risk assessment
C. Performing a gap analysis
D. Conducting vulnerability scans
Correct Answer: B – Performing a risk assessment
Explanation: A risk assessment identifies potential threats and vulnerabilities to
determine what security controls are needed.
Incorrect Answers:
A. Threat modeling is part of risk assessment but not the first step.
C. Gap analysis follows requirements identification.
D. Vulnerability scans are technical steps later in the process.
Question 632
Which of the following would BEST ensure proper segregation of duties in a software
development environment?
A. Developers are not granted access to the production environment.
B. Developers participate in code reviews.
C. Developers have read-only access to production systems.
D. Developers are rotated between tasks periodically.
Correct Answer: A – Developers are not granted access to the
production environment
Explanation: Preventing developers from accessing production ensures changes go
through formal change control.
Incorrect Answers:
B. Code reviews are a detective, not preventive, control.
C. Even read-only access can be risky in some environments.
D. Task rotation helps but doesn't enforce SoD by itself.

Question 633
What is the PRIMARY risk of allowing IT personnel to use privileged IDs for
performing business operations?
A. Unauthorized system access
B. Violation of audit trail policies
C. Collusion between IT and business staff
D. Inability to trace transactions to individuals
Correct Answer: D – Inability to trace transactions to individuals
Explanation: Shared or privileged IDs can mask who performed a business
operation, weakening accountability.
Incorrect Answers:
A. Access itself may be authorized but hard to monitor.
B. Audit trail issues stem from untraceable IDs.
C. Collusion risk exists, but traceability is the primary concern.

Question 634
What is the BEST method for ensuring the completeness of application change
control documentation?
A. Peer reviews are required for all code changes.
B. Developers document changes during implementation.
C. Documentation is reviewed during change approval.
D. Production staff confirm documentation before deployment.
Correct Answer: C – Documentation is reviewed during change
approval
Explanation: Reviewing documentation during change approval ensures
completeness before implementation.
Incorrect Answers:
A. Peer review ensures quality but not documentation completeness.
B. Developer input alone is not sufficient.
D. Production staff are often not involved in early documentation review.

Question 635
Which of the following BEST reduces the likelihood of unauthorized changes in a
production environment?
A. Encryption of production data
B. Requiring dual authorization for change deployment
C. Automated patch management
D. Maintaining logs of production access
Correct Answer: B – Requiring dual authorization for change
deployment
Explanation: Dual authorization helps prevent unapproved changes.
Incorrect Answers:
A. Encryption protects data, not change control.
C. Automation helps efficiency but not approval.
D. Logs detect after the fact, not prevent.

Question 636
What is the PRIMARY concern if a security policy is not regularly reviewed and
updated?
A. Users may not follow the policy.
B. The policy may be noncompliant with laws or threats.
C. The policy may be too complex.
D. Senior management may not support the policy.
Correct Answer: B – The policy may be noncompliant with laws or
threats
Explanation: Threats and regulations change; outdated policies may expose the
organization.
Incorrect Answers:
A. Compliance is a concern, but policies must first be up-to-date.
C. Complexity is not the main concern.
D. Management support can be an issue, but compliance and effectiveness come first.

Question 637
Which of the following is MOST critical to check when reviewing the outsourcing of
critical IT services?
A. Cost comparison with internal operations
B. Third-party audit rights
C. Termination clauses
D. IT strategy alignment
Correct Answer: B – Third-party audit rights
Explanation: Without audit rights, it's difficult to assess vendor compliance or
risks.
Incorrect Answers:
A. Cost is important, but not the primary risk.
C. Termination clauses matter but follow due diligence.
D. Strategic alignment is long-term; audit rights address immediate control.

Question 638
Which of the following would BEST allow secure exchange of confidential data
between business units in different geographic locations?
A. Encryption
B. Authentication
C. Firewall
D. Virtual LANs
Correct Answer: A – Encryption
Explanation: Encryption ensures confidentiality in transit or at rest.
Incorrect Answers:
B. Authentication confirms identity, not confidentiality.
C. Firewalls control access, not confidentiality.
D. VLANs segment networks but don't encrypt data.

Question 639
An IS auditor discovers an application is using a weak encryption algorithm. What is
the BEST recommendation?
A. Immediately replace the algorithm with a stronger one
B. Monitor data traffic to identify potential leaks
C. Request a risk assessment
D. Block the application until encryption is fixed
Correct Answer: C – Request a risk assessment
Explanation: A risk assessment helps evaluate the impact and prioritize
remediation.
Incorrect Answers:
A. Replacement may be ideal but needs analysis.
B. Monitoring helps but doesn't address root cause.
D. Blocking can disrupt business operations.

Question 640
What is the MOST important reason to enforce data retention policies?
A. To ensure easy access to historical data
B. To reduce storage costs
C. To comply with legal and regulatory requirements
D. To support management decision-making
Correct Answer: C – To comply with legal and regulatory
requirements
Explanation: Regulatory compliance is the key driver for formal data retention
policies.
Incorrect Answers:
A. Accessibility is a benefit but not the driver.
B. Cost savings are a side effect.
D. Decision-making uses data, but retention is legally driven.

Question 641
Which of the following would BEST mitigate the risk of unauthorized access
resulting from tailgating?
A. Biometric access control
B. Mantraps
C. Access badges
D. Surveillance cameras
Correct Answer: B – Mantraps
Explanation: Mantraps are physical security mechanisms that prevent tailgating by
only allowing one person to enter at a time.
Incorrect Answers:
A. Biometrics validate identity but don’t prevent someone from following another
person.
C. Access badges can be shared or bypassed through tailgating.
D. Surveillance cameras detect but don’t prevent tailgating.

Question 642
Which of the following is MOST helpful in improving audit efficiency when
performing data analytics?
A. Using standard templates
B. Employing continuous auditing techniques
C. Engaging subject matter experts
D. Developing a risk and control matrix
Correct Answer: B – Employing continuous auditing techniques
Explanation: Continuous auditing enables real-time data collection and analysis,
improving efficiency.
Incorrect Answers:
A. Templates help consistency, not necessarily efficiency.
C. SMEs support depth, not speed.
D. Risk matrices guide scope, not processing speed.

Question 643
What is the GREATEST benefit of using data visualization tools in audits?
A. Enhancing report formatting
B. Improving stakeholder engagement
C. Automating sampling techniques
D. Validating audit scope
Correct Answer: B – Improving stakeholder engagement
Explanation: Visualization tools make complex data easier to understand,
improving communication and engagement.
Incorrect Answers:
A. Report formatting is improved, but not the primary benefit.
C. Sampling is separate from visualization.
D. Scope validation is done during planning.

Question 644
Which of the following is the PRIMARY goal of implementing a patch management
process?
A. Optimize software performance
B. Ensure software compatibility
C. Reduce exposure to vulnerabilities
D. Prevent unlicensed software use
Correct Answer: C – Reduce exposure to vulnerabilities
Explanation: Patching addresses known security flaws, helping reduce the risk of
exploitation.
Incorrect Answers:
A. Performance may improve but is not the main goal.
B. Compatibility may result but is not the driver.
D. License enforcement is not a patching objective.

Question 645
Which of the following is the BEST way to test whether encryption for data at rest is
functioning as intended?
A. Check compliance with encryption policies
B. Review the encryption algorithm
C. Attempt to access data on the physical disk without the key
D. Verify that data backup is encrypted
Correct Answer: C – Attempt to access data on the physical disk
without the key
Explanation: This directly tests whether encryption is effective at protecting data.
Incorrect Answers:
A. Policy checks don't test technical effectiveness.
B. Reviewing algorithms confirms use but not implementation.
D. Backup encryption is separate from live disk encryption.

Question 646
Which of the following provides the BEST assurance of secure code development?
A. Developer background checks
B. User acceptance testing
C. Static code analysis
D. Continuous integration
Correct Answer: C – Static code analysis
Explanation: Static code analysis identifies security flaws in source code before
execution.
Incorrect Answers:
A. Background checks are HR-focused.
B. UAT checks function, not security.
D. Integration focuses on delivery, not vulnerability scanning.

Question 647
Which of the following is MOST critical when evaluating a vendor’s cloud service
contract?
A. Penalty clauses
B. Service level agreements
C. Audit rights
D. Contract duration
Correct Answer: B – Service level agreements
Explanation: SLAs define expected performance and availability, which are critical
for risk and compliance.
Incorrect Answers:
A. Penalties are secondary.
C. Audit rights are important but not as central as SLAs.
D. Duration does not ensure ongoing service quality.

Question 648
Which of the following BEST indicates that an application system can be recovered
after a disaster?
A. System documentation is complete
B. System backups are regularly tested
C. Users are trained on recovery procedures
D. Business impact analysis is updated
Correct Answer: B – System backups are regularly tested
Explanation: Testing backups validates actual recovery capability.
Incorrect Answers:
A. Documentation helps but doesn’t prove recovery.
C. User training supports recovery but is not sufficient.
D. BIA supports planning, not recovery testing.

Question 649
Which of the following is the MOST effective control to prevent data loss from
removable media?
A. Access control lists
B. File encryption
C. Endpoint protection
D. Data loss prevention tools
Correct Answer: D – Data loss prevention tools
Explanation: DLP tools can monitor and restrict data transfer to removable
devices.
Incorrect Answers:
A. ACLs don’t control external device use.
B. Encryption protects data, but not transmission.
C. Endpoint protection focuses on malware, not data flow.

Question 650
Which of the following is the MOST important consideration when selecting a tool
for data analysis in audits?
A. Cost of the tool
B. Tool’s popularity
C. Integration with existing systems
D. Capability to handle large data sets
Correct Answer: D – Capability to handle large data sets
Explanation: Auditors often analyze large volumes of data; performance is key.
Incorrect Answers:
A. Cost matters but isn’t the priority.
B. Popularity doesn’t ensure suitability.
C. Integration helps but is secondary to performance.

Question 651
Which of the following is the BEST control to ensure data entered into a calculation
program is accurate?
A. Programmed edit checks to prevent entry of invalid data
B. Reasonableness checks with a data entry range
C. Manual recalculation of data
D. Visual verification of data entered
Correct Answer: A – Programmed edit checks to prevent entry of
invalid data
Explanation: Programmed edit checks help validate input before processing,
reducing the risk of incorrect data entry.
Incorrect Answers:
B. Reasonableness checks support accuracy but do not block invalid input.
C. Manual recalculation is time-consuming and prone to error.
D. Visual verification alone is insufficient for reliability.

Question 652
Which of the following user actions poses the GREATEST risk for inadvertently
introducing malware into a local network?
A. Downloading a file from an enterprise file share
B. Viewing a hypertext markup language (HTML) document
C. Uploading a file onto an internal server
D. Opening an email attachment from an external account
Correct Answer: D – Opening an email attachment from an external
account
Explanation: Email attachments from unknown sources are a common malware
vector.
Incorrect Answers:
A. Enterprise file shares are internal and usually secured.
B. HTML viewing is generally safe unless it includes scripts.
C. Uploading is less risky than executing external files.

Question 653
An IS audit report highlighting inadequate network internal controls is challenged
because no serious incident has ever occurred. What is the BEST response from the
auditor?
A. Emphasize the audit objective is risk reduction, not incident tracking
B. Recommend no action since no incident occurred
C. Escalate the challenge to executive management
D. Amend the report to reflect the organization’s history
Correct Answer: A – Emphasize the audit objective is risk reduction,
not incident tracking
Explanation: The audit focuses on potential vulnerabilities, not just past incidents.
Incorrect Answers:
B. This undermines the audit’s preventive purpose.
C. Escalation may be premature.
D. Amending the report could compromise audit integrity.

Question 654
Which of the following should an IS auditor do FIRST when assessing compliance
with logical access controls?
A. Perform a risk assessment
B. Review user access request forms
C. Test access control configurations
D. Conduct interviews with system owners
Correct Answer: A – Perform a risk assessment
Explanation: A risk assessment provides context for evaluating controls.
Incorrect Answers:
B. Access request reviews come after identifying high-risk systems.
C. Testing is a verification step, not the starting point.
D. Interviews support but don’t initiate the assessment.

Question 655
Which of the following is the BEST reason for conducting a risk assessment?
A. To satisfy regulatory requirements
B. To improve audit efficiency
C. To prioritize security investments
D. To eliminate all risk
Correct Answer: C – To prioritize security investments
Explanation: Risk assessments help allocate resources to the most critical areas.
Incorrect Answers:
A. While regulatory compliance is important, it's not the best reason.
B. Efficiency is a benefit but not the primary goal.
D. Risk cannot be fully eliminated.

Question 656
Which of the following is MOST critical for successful implementation of an
enterprise risk management (ERM) program?
A. Automation of risk processes
B. Participation of external consultants
C. Top management support
D. Compliance with industry frameworks
Correct Answer: C – Top management support
Explanation: Leadership commitment is essential for integrating ERM into
organizational processes.
Incorrect Answers:
A. Automation aids, but doesn't drive success.
B. Consultants assist but can’t ensure adoption.
D. Frameworks help structure, not implement.

Question 657
An IS auditor finds a discrepancy in access logs and suspects unauthorized access.
What is the FIRST step the auditor should take?
A. Notify senior management
B. Suspend affected accounts
C. Collect and preserve evidence
D. Begin disciplinary procedures
Correct Answer: C – Collect and preserve evidence
Explanation: Proper evidence handling is crucial before any action.
Incorrect Answers:
A. Notification follows evidence gathering.
B. Suspension may be premature.
D. Disciplinary actions require verified proof.

Question 658
Which of the following provides the BEST protection for sensitive data in transit?
A. Network address translation
B. Secure Sockets Layer (SSL) encryption
C. Packet filtering
D. Intrusion detection systems
Correct Answer: B – Secure Sockets Layer (SSL) encryption
Explanation: SSL ensures confidentiality and integrity during transmission.
Incorrect Answers:
A. NAT doesn’t encrypt data.
C. Packet filtering controls access, not encryption.
D. IDS detects but doesn’t protect data.

Question 659
Which of the following is the PRIMARY purpose of user access reviews?
A. Identify new users
B. Remove unnecessary accounts
C. Prevent unauthorized logins
D. Update organizational charts
Correct Answer: B – Remove unnecessary accounts
Explanation: Access reviews ensure users only have appropriate rights.
Incorrect Answers:
A. Adding users is not the review’s purpose.
C. Prevention is indirect; the focus is cleanup.
D. Charts are unrelated.

Question 660
An IS auditor is reviewing firewall rule sets. Which of the following should be of
GREATEST concern?
A. Rules are not labeled
B. Unused rules are not removed
C. Rules are based on IP addresses
D. Logging is not enabled
Correct Answer: D – Logging is not enabled
Explanation: Logging is critical for monitoring and forensic analysis.
Incorrect Answers:
A. Labeling helps management but isn't critical.
B. Unused rules are a concern, but logging is more urgent.
C. IP-based rules are common if properly managed.

Question 661
Which of the following should be the PRIMARY focus when communicating an IS
audit issue to management?
A. How the issue was found and who bears responsibility
B. The risk to which the organization is exposed due to the issue
C. The nature, extent, and timing of subsequent audit follow-up
D. A detailed solution for resolving the issue
Correct Answer: B – The risk to which the organization is exposed
due to the issue
Explanation: Communicating the risk ensures management understands the
potential impact and can prioritize response.
Incorrect Answers:
A. While background can be useful, it does not prioritize the issue.
C. Follow-up plans are secondary to understanding the current risk.
D. Auditors should not prescribe detailed solutions, but assess risk and control
effectiveness.

Question 662
Which of the following would BEST help ensure IT resources are allocated based on
business priorities?
A. Business case evaluation
B. Return on investment (ROI) assessment
C. IT steering committee oversight
D. IT balanced scorecard
Correct Answer: C – IT steering committee oversight
Explanation: An IT steering committee ensures alignment between IT initiatives
and business objectives, prioritizing resources accordingly.
Incorrect Answers:
A. Business cases are useful, but must be aligned and reviewed by a steering body.
B. ROI is only one factor in decision-making.
D. The balanced scorecard tracks performance but doesn't allocate resources.

Question 663
Which of the following is MOST useful when identifying patterns or trends from log
data?
A. Data warehouse
B. Statistical analysis
C. Machine learning algorithms
D. SIEM system
Correct Answer: D – SIEM system
Explanation: SIEM systems aggregate and analyze logs in real time, helping
identify patterns and trends for security monitoring.
Incorrect Answers:
A. A data warehouse stores data but doesn't provide real-time analysis.
B. Statistical tools require manual effort.
C. ML algorithms require data preparation and tuning, and aren't always integrated
with logs.

Question 664
The PRIMARY purpose of retaining an audit trail in a financial application is to:
A. support forensic investigations.
B. provide evidence for legal proceedings.
C. provide data for performance metrics.
D. support transaction accountability.
Correct Answer: D – Support transaction accountability
Explanation: Audit trails ensure accountability by allowing tracing of transactions
back to source.
Incorrect Answers:
A. Forensics is a secondary benefit.
B. Legal evidence depends on additional factors like chain of custody.
C. Metrics are not the primary purpose of audit trails.

Question 665
Which of the following is the MOST effective control to prevent privilege escalation
in an operating system?
A. Mandatory access controls
B. Role-based access control
C. Patch management
D. Strong password policy
Correct Answer: A – Mandatory access controls
Explanation: Mandatory access controls restrict even privileged users from
exceeding assigned access rights, effectively limiting privilege escalation.
Incorrect Answers:
B. RBAC supports least privilege but can be circumvented if not enforced strictly.
C. Patching is important but not preventive alone.
D. Passwords don't directly prevent privilege escalation.

Question 666
Which of the following would BEST enable traceability of user actions in a critical
system?
A. Log file access
B. Time stamping
C. Audit logging
D. Session recording
Correct Answer: C – Audit logging
Explanation: Audit logs capture user activity and provide traceability and
accountability.
Incorrect Answers:
A. Access to logs does not ensure actions are captured.
B. Time stamps support traceability but don’t log activity.
D. Session recording is effective but more resource-intensive.

Question 667
Which of the following is the BEST metric to evaluate the efficiency of the change
management process?
A. Number of emergency changes
B. Number of changes implemented
C. Time to implement approved changes
D. Number of rejected changes
Correct Answer: C – Time to implement approved changes
Explanation: This reflects how efficiently approved changes are executed.
Incorrect Answers:
A. Emergency changes may indicate inefficiency, but don’t measure efficiency directly.
B. Quantity of changes doesn't reflect efficiency.
D. Rejection rates could reflect quality but not efficiency.

Question 668
An IS auditor is assessing IT resource utilization and observes many underutilized
virtual machines (VMs). What should the auditor recommend?
A. Increase VM capacity
B. Implement workload balancing
C. Review virtualization strategy
D. Conduct a cost-benefit analysis
Correct Answer: C – Review virtualization strategy
Explanation: Reviewing the overall strategy allows better resource planning and
alignment with usage patterns.
Incorrect Answers:
A. Increasing capacity worsens the issue.
B. Workload balancing may not address root cause.
D. Cost-benefit analysis may be premature without reviewing strategy.

Question 669
Which of the following would BEST assist in identifying system bottlenecks during
peak processing times?
A. Patch level reporting
B. Asset inventory
C. Performance monitoring
D. Software licensing metrics
Correct Answer: C – Performance monitoring
Explanation: Performance monitoring tools reveal bottlenecks like CPU, memory,
or disk usage during high loads.
Incorrect Answers:
A. Patching does not monitor performance.
B. Inventory lists what is present, not how it performs.
D. Licensing deals with usage compliance, not performance.

Question 670
The PRIMARY purpose of a post-implementation review (PIR) of a new system is
to:
A. confirm lessons learned are documented.
B. assess system performance and business value.
C. validate end-user satisfaction.
D. review audit trails and logs.
Correct Answer: B – Assess system performance and business value
Explanation: PIRs measure whether the system meets intended objectives and
delivers expected benefits.
Incorrect Answers:
A. Documenting lessons is a secondary outcome.
C. User satisfaction is important but not primary.
D. Audit trail review is not the main focus.
Question 671
Which of the following is the MOST significant risk related to the use of virtualized
environments?
A. There may be increased potential for session hijacking.
B. There may be insufficient processing capacity to assign to guests.
C. Ability to change operating systems may be limited.
D. The host may be a potential single point of failure within the system.
Correct Answer: D – The host may be a potential single point of
failure within the system
Explanation: In a virtualized environment, if the host system fails, it can affect all
virtual machines, making it a single point of failure.
Incorrect Answers:
A. Session hijacking risk can be mitigated through network-level protections.
B. Capacity issues can often be managed with planning and monitoring.
C. OS flexibility is generally not a critical risk compared to complete outages.

Question 672
Which of the following is a deterrent security control that reduces the likelihood of
an insider threat event?
A. Removing malicious code
B. Distributing disciplinary policies
C. Creating contingency plans
D. Executing data recovery procedures
Correct Answer: B – Distributing disciplinary policies
Explanation: Disciplinary policies act as deterrents by warning employees of
consequences.
Incorrect Answers:
A. Malicious code removal is corrective.
C. Contingency planning is for continuity, not deterrence.
D. Data recovery is a recovery measure.

Question 673
While evaluating the data classification process of an organization, an IS auditor’s
PRIMARY focus should be on whether:
A. data is correctly classified
B. a data dictionary is maintained
C. data retention requirements are clearly defined
D. data classifications are automated
Correct Answer: A – data is correctly classified
Explanation: Accurate classification ensures appropriate handling and protection of
data.
Incorrect Answers:
B. A data dictionary is useful but secondary.
C. Retention is relevant but not the primary concern in classification.
D. Automation aids consistency but is not the core focus.

Question 674
Which of the following auditing techniques would be used to detect the validity of a
credit card transaction based on time, location, and date of purchase?
A. Integrated test facility (ITF)
B. Data analytics
C. Hash totals
D. Check sums
Correct Answer: B – Data analytics
Explanation: Data analytics enables the correlation and anomaly detection needed
for validity checks.
Incorrect Answers:
A. ITF is used for transaction testing.
C. Hash totals verify data integrity.
D. Checksums detect transmission errors.

Question 675
Which of the following poses the GREATEST risk to a virtualized environment?
A. Server cloning occurs without appropriate approval from IT management.
B. A network map has not been updated.
C. Backup testing does not occur at regular intervals.
D. Security zones within the environment are combined.
Correct Answer: D – Security zones within the environment are
combined
Explanation: Combining zones compromises isolation and exposes systems to more
threats.
Incorrect Answers:
A. Cloning without approval is a governance issue.
B. Network maps are useful but not critical.
C. Backup testing is important but not the greatest threat.

Question 676
Capacity management tools are PRIMARILY used to ensure that:
A. available resources are used efficiently and effectively
B. concurrent use by a large number of users is enabled
C. proposed hardware acquisitions meet capacity requirements
D. computer systems are used to their maximum capacity most of the time
Correct Answer: A – available resources are used efficiently and
effectively
Explanation: Capacity management focuses on balancing demand and resource
utilization.
Incorrect Answers:
B. Concurrency is a feature but not the primary purpose.
C. Acquisition planning is a secondary benefit.
D. Maximizing use is not always efficient.

Question 677
Which of the following is an example of personally identifiable information (PII)?
A. Office address
B. Marital status
C. Passport number
D. Date of birth
Correct Answer: C – Passport number
Explanation: Passport numbers uniquely identify individuals and are classified as
PII.
Incorrect Answers:
A. Office address is not private.
B. Marital status is sensitive but not uniquely identifying.
D. Date of birth is identifying only when combined with other data.

Question 678
Which of the following analytical methods would be MOST useful when trying to
identify groups with similar behavior or characteristics in a large population?
A. Deviation detection
B. Cluster sampling
C. Random sampling
D. Classification
Correct Answer: B – Cluster sampling
Explanation: Cluster sampling helps group populations based on similar traits.
Incorrect Answers:
A. Deviation detection focuses on anomalies.
C. Random sampling is for general testing.
D. Classification categorizes data, not populations.

Question 679
Which of the following BEST addresses the availability of an online store?
A. Online backups
B. A mirrored site at another location
C. Clustered architecture
D. RAID level 5 storage devices
Correct Answer: B – A mirrored site at another location
Explanation: A mirrored site ensures availability in case the main site fails.
Incorrect Answers:
A. Backups support recovery, not availability.
C. Clustering adds resilience but not full failover.
D. RAID 5 offers redundancy, not site-level protection.

Question 680
Who would provide an IS auditor with the MOST helpful input during an interview
to determine whether business requirements for an application were met?
A. User management
B. Project sponsors
C. Senior management
D. Project management
Correct Answer: A – User management
Explanation: End users can confirm whether the application meets their functional
needs.
Incorrect Answers:
B. Sponsors may not know operational details.
C. Senior management is too far removed.
D. Project management handles delivery, not use.

Question 681
Which of the following is the MOST important consideration when implementing
data leakage prevention (DLP) software in an organization?
A. Selecting a tool based on peer recommendations
B. Ensuring the solution integrates with all current hardware
C. Classifying sensitive information before deployment
D. Blocking all outbound communications by default
Correct Answer: C – Classifying sensitive information before
deployment
Explanation:
Understanding what data is sensitive is a prerequisite to enforcing appropriate DLP
controls.
Incorrect Answers:
A. Peer recommendations don't guarantee suitability for your context.
B. Integration matters but comes after classification.
D. Blocking all outbound data can disrupt normal business processes.
Question 682
An IS auditor observes that logs on a critical application server are being overwritten
every 24 hours. What should the auditor recommend?
A. Compress logs after 24 hours
B. Implement real-time monitoring
C. Increase log retention period
D. Archive logs to an external device
Correct Answer: C – Increase log retention period
Explanation:
Longer retention allows for more thorough investigation during audits or incidents.
Incorrect Answers:
A. Compression does not address the short retention.
B. Real-time monitoring is useful but not a substitute for logs.
D. Archiving is good but not effective if data is already overwritten.

Question 683
Which of the following would be the MOST effective control to detect unauthorized
changes to system configuration files?
A. Role-based access controls
B. Configuration management policies
C. File integrity monitoring
D. Mandatory change documentation
Correct Answer: C – File integrity monitoring
Explanation:
File integrity monitoring immediately detects unauthorized changes.
Incorrect Answers:
A. Access control prevents changes but doesn’t detect them.
B. Policies provide guidance but not detection.
D. Documentation relies on users' compliance.

Question 684
Which of the following is the PRIMARY reason to conduct a post-implementation
review of a new IT system?
A. Identify training gaps
B. Measure project budget adherence
C. Evaluate system controls and effectiveness
D. Ensure vendor compliance
Correct Answer: C – Evaluate system controls and effectiveness
Explanation:
The main purpose is to ensure the system meets objectives and is secure.
Incorrect Answers:
A. Training is a secondary issue.
B. Budget adherence is part of project management, not audit focus.
D. Vendor compliance is relevant but not the core reason.

Question 685
An IS auditor finds that user accounts are not disabled promptly after employee
termination. What should the auditor recommend FIRST?
A. Perform regular access reviews
B. Establish an automated deprovisioning process
C. Conduct staff awareness training
D. Require HR to inform IT via email
Correct Answer: B – Establish an automated deprovisioning process
Explanation:
Automation reduces delay and human error in disabling accounts.
Incorrect Answers:
A. Reviews are useful but reactive.
C. Training alone does not ensure timeliness.
D. Email notifications are unreliable.

Question 686
Which of the following is MOST effective for monitoring changes in production
databases?
A. Logging administrator access
B. Reviewing stored procedures monthly
C. Implementing database activity monitoring
D. Conducting periodic vulnerability scans
Correct Answer: C – Implementing database activity monitoring
Explanation:
This provides real-time monitoring and alerts for suspicious changes.
Incorrect Answers:
A. Logs can be incomplete or manipulated.
B. Monthly reviews may miss real-time issues.
D. Vulnerability scans check security, not changes.

Question 687
Which of the following would BEST reduce the risk of unauthorized physical access
to a server room?
A. Security cameras
B. Motion detectors
C. Smart card access
D. Fire suppression systems
Correct Answer: C – Smart card access
Explanation:
Smart card access restricts entry and allows tracking.
Incorrect Answers:
A. Cameras deter but don’t prevent access.
B. Motion detectors are reactive.
D. Fire suppression is for environmental risk, not access.

Question 688
An IS auditor is reviewing a system development project and notes inadequate
segregation of duties. What is the MOST significant risk?
A. Lack of system documentation
B. Unauthorized changes to code
C. Project timeline delays
D. Increased training requirements
Correct Answer: B – Unauthorized changes to code
Explanation:
Without segregation, developers could alter production systems unmonitored.
Incorrect Answers:
A. Documentation is less critical than control issues.
C. Delays are a project issue, not a security risk.
D. Training is unrelated to this risk.

Question 689
Which of the following should an IS auditor consider FIRST when planning an audit
of a third-party data center?
A. The service level agreement (SLA) terms
B. The third-party’s certifications
C. The organization’s risk assessment
D. Previous audit findings
Correct Answer: C – The organization’s risk assessment
Explanation:
Audit priorities must be based on risk to the organization.
Incorrect Answers:
A. SLAs are reviewed later during the audit.
B. Certifications help but don't replace assessment.
D. Past findings are helpful but not the starting point.

Question 690
Which of the following BEST ensures system resilience in a cloud-based
environment?
A. Regular system patching
B. Data encryption
C. Redundant architecture
D. Manual backups
Correct Answer: C – Redundant architecture
Explanation:
Redundancy ensures availability even if one component fails.
Incorrect Answers:
A. Patching is maintenance, not resilience.
B. Encryption protects confidentiality, not availability.
D. Manual backups may not be timely or consistent.

Question 691
Which of the following is the BEST control to minimize the risk of unauthorized
access to lost company-owned mobile devices?
A. Device encryption
B. Device tracking software
C. Password/PIN protection
D. Periodic backup
Correct Answer: A – Device encryption
Explanation: Encrypting a device ensures that even if the physical device is lost,
the data stored on it remains inaccessible to unauthorized users.
Incorrect Answers:
B. Tracking software helps locate the device but doesn’t protect the data.
C. Passwords alone may be bypassed or cracked.
D. Backups do not prevent unauthorized access.

Question 692
In a RACI model, which of the following roles must be assigned to only one
individual?
A. Responsible
B. Accountable
C. Informed
D. Consulted
Correct Answer: B – Accountable
Explanation: In a RACI model, only one person should be Accountable to ensure
clear ownership and prevent confusion.
Incorrect Answers:
A. Multiple people can be responsible for executing tasks.
C. Many can be informed.
D. Multiple consulted parties may provide input.
Question 693
An IS auditor has found that a vendor has gone out of business and the escrow has
an older version of the source code. What is the auditor's BEST recommendation for
the organization?
A. Perform an analysis to determine the business risk.
B. Develop a maintenance plan to support the application using the existing code.
C. Bring the escrow version up to date.
D. Analyze a new application that meets the current requirements.
Correct Answer: A – Perform an analysis to determine the business
risk
Explanation: A risk assessment is essential to understand the impact of having an
outdated source code and to guide further action.
Incorrect Answers:
B. Might be premature without understanding the risk.
C. Updating escrow requires the vendor, who is no longer available.
D. Replacing the application may be unnecessary depending on the risk.

Question 694
An IS auditor is reviewing the installation of a new server. The IS auditor's
PRIMARY objective is to ensure that:
A. security parameters are set in accordance with the manufacturer's standards.
B. security parameters are set in accordance with the organization's policies.
C. a detailed business case was formally approved prior to the purchase.
D. the procurement project invited tenders from at least three different suppliers.
Correct Answer: B – Security parameters are set in accordance with
the organization's policies
Explanation: Aligning with internal policies ensures consistency with the
organization's risk management strategy.
Incorrect Answers:
A. Manufacturer’s defaults may not meet organizational security needs.
C and D. These relate more to procurement, not installation security.

Question 695
An IS auditor finds a high-risk vulnerability in a public-facing web server used to
process online customer payments. The IS auditor should FIRST:
A. notify the audit committee.
B. review security incident reports.
C. identify compensating controls.
D. document the exception in an audit report.
Correct Answer: C – Identify compensating controls
Explanation: Before escalating or documenting, the auditor should determine
whether mitigating controls are in place.
Incorrect Answers:
A. Escalation is premature without context.
B. Reviewing reports is helpful but not the immediate action.
D. Documentation should follow after a full understanding.

Question 696
An IS auditor discovers that an IT organization serving several business units assigns
equal priority to all initiatives, creating a risk of delays in securing project funding.
Which of the following would be MOST helpful in matching demand for projects and
services with available resources in a way that supports business objectives?
A. Risk assessment results
B. IT governance framework
C. Project management
D. Portfolio management
Correct Answer: D – Portfolio management
Explanation: Portfolio management aligns project prioritization with strategic
objectives and resource availability.
Incorrect Answers:
A. Risk assessment supports prioritization but doesn’t manage the portfolio.
B. Governance provides structure but not active prioritization.
C. Project management is about execution, not strategic alignment.

Question 697
Which of the following is the MOST efficient way to identify segregation of duties
violations in a new system?
A. Observe the performance of business processes.
B. Develop a process to identify authorization conflicts.
C. Review a report of security rights in the system.
D. Examine recent system access rights violations.
Correct Answer: C – Review a report of security rights in the system
Explanation: Reviewing access reports is a direct and efficient way to identify SoD
conflicts.
Incorrect Answers:
A. Observation is time-consuming and less systematic.
B. Developing a process is not an immediate solution.
D. Violations may not yet be evident in a new system.

Question 698
An internal audit team is deciding whether to use an audit management application
hosted by a third party in a different country. What should be the MOST important
consideration related to the uploading of payroll audit documentation in the hosted
application?
A. Per-unit cost charged by the hosting services provider for storage
B. Privacy regulations affecting the organization
C. Financial regulations affecting the organization
D. Data center physical access controls where the application is hosted
Correct Answer: B – Privacy regulations affecting the organization
Explanation: Privacy laws vary by country and can impose strict limitations on
personal data handling and transfer.
Incorrect Answers:
A. Cost is secondary to compliance.
C. Financial regulations are important but not specific to payroll data.
D. Physical controls are important but not the top priority.

Question 699
Which of the following is the PRIMARY reason for an IS auditor to conduct post-
implementation reviews?
A. To document lessons learned to improve future project delivery
B. To align project objectives with business needs
C. To determine whether project objectives in the business case have been achieved
D. To ensure key stakeholder sign-off has been obtained
Correct Answer: C – To determine whether project objectives in the
business case have been achieved
Explanation: The goal is to confirm if intended results were achieved, ensuring
project success.
Incorrect Answers:
A. Lessons learned are secondary outcomes.
B. Alignment should be verified earlier.
D. Sign-off is important but not the core purpose.

Question 700
Which of the following is the BEST metric to measure the alignment of IT and
business strategy?
A. Frequency of business process capability maturity assessments
B. Percentage of enterprise risk assessments that include IT-related risk
C. Percentage of staff satisfied with their IT-related roles
D. Level of stakeholder satisfaction with the scope of planned IT projects
Correct Answer: D – Level of stakeholder satisfaction with the scope
of planned IT projects
Explanation: Satisfaction with IT project planning reflects strategic alignment with
business needs.
Incorrect Answers:
A. Maturity assessments reflect process optimization, not alignment.
B. Risk coverage is related but not specific to strategy alignment.
C. Staff satisfaction is internal and less strategic.

Question 701
Which of the following is the MOST important activity in the data classification
process?
A. Determining accountability of data owners
B. Labeling the data appropriately
C. Identifying risk associated with the data
D. Determining the adequacy of privacy controls
Correct Answer: C – Identifying risk associated with the data
Explanation: Identifying risks associated with the data helps ensure appropriate
protection and classification measures are implemented.
Incorrect Answers:
A. Accountability is important but follows identification.
B. Labeling is operational, not strategic.
D. Privacy controls come after classification is defined.

Question 702
Which of the following is MOST appropriate to prevent unauthorized retrieval of
confidential information stored in a business application system?
A. Implement segregation of duties.
B. Enforce an internal data access policy.
C. Enforce the use of digital signatures
D. Apply single sign-on for access control.
Correct Answer: B – Enforce an internal data access policy
Explanation: A data access policy clearly defines who can access what data and
under what conditions, helping prevent unauthorized retrieval.
Incorrect Answers:
A. Segregation helps prevent fraud but is not specific to data retrieval.
C. Digital signatures ensure authenticity, not access control.
D. SSO streamlines authentication but doesn't control data-level access.

Question 703
A project team has decided to switch to an agile approach to develop a replacement
for an existing business application. Which of the following should an IS auditor do
FIRST to ensure the effectiveness of the project audit?
A. Understand the specific agile methodology that will be followed.
B. Interview business process owners to compile a list of business requirements.
C. Compare the agile process with previous methodology.
D. Identify and assess existing agile process controls.
Correct Answer: A – Understand the specific agile methodology that
will be followed
Explanation: Knowing the methodology is critical for auditing effectiveness and
evaluating controls aligned with that method.
Incorrect Answers:
B. Business requirements come later.
C. Comparing methods doesn't ensure audit alignment.
D. Control assessment follows understanding the methodology.

Question 704
During an external review, an IS auditor observes an inconsistent approach in
classifying system criticality within the organization. Which of the following should
be recommended as the PRIMARY factor to determine system criticality?
A. Maximum allowable downtime (MAD)
B. Mean time to restore (MTTR)
C. Recovery point objective (RPO)
D. Key performance indicators (KPIs)
Correct Answer: A – Maximum allowable downtime (MAD)
Explanation: MAD defines how long a system can be unavailable before serious
consequences, making it essential for criticality.
Incorrect Answers:
B. MTTR is for restoration, not criticality.
C. RPO relates to data loss tolerance.
D. KPIs track performance, not downtime impact.

Question 705
Which of the following is the MOST significant risk that IS auditors are required to
consider for each engagement?
A. Irregularities and illegal acts
B. Noncompliance with organizational policies
C. Misalignment with business objectives
D. Process and resource inefficiencies
Correct Answer: A – Irregularities and illegal acts
Explanation: Detecting fraud or illegal activity is a top priority due to the severe
consequences.
Incorrect Answers:
B. Important, but less critical than illegal acts.
C. Misalignment affects value but not legality.
D. Inefficiencies are a lower risk category.
Question 706
An externally facing system containing sensitive data is configured such that users
have either read-only or administrator rights. Most users of the system have
administrator access. Which of the following is the GREATEST risk associated with
this situation?
A. Users can make unauthorized changes.
B. Users can export application logs.
C. Users can install open-licensed software.
D. Users can view sensitive data.
Correct Answer: A – Users can make unauthorized changes
Explanation: Administrator rights allow changes that could compromise security or
data integrity.
Incorrect Answers:
B. Log export is less damaging.
C. Installing software is a risk, but not as severe.
D. Viewing is passive compared to changing.

Question 707
Which of the following is the GREATEST risk associated with utilizing spreadsheets
for financial reporting in end-user computing (EUC)?
A. Lack of password protection
B. Lack of processing integrity
C. Increase in operational incidents
D. Increase in regulatory violations
Correct Answer: B – Lack of processing integrity
Explanation: Without processing integrity, financial data may be inaccurate,
impacting decisions and compliance.
Incorrect Answers:
A. Passwords help, but integrity is fundamental.
C. Incidents may not directly affect data accuracy.
D. Violations are a result, not the root cause.

Question 708
The decision to accept an IT control risk related to data quality should be the
responsibility of the:
A. IS audit manager.
B. Chief information officer (CIO).
C. Information security team.
D. Business owner.
Correct Answer: D – Business owner
Explanation: The business owner bears accountability for data and its associated
risks.
Incorrect Answers:
A. Auditors identify risks but don't own them.
B. CIOs may oversee, but not own data decisions.
C. Security teams manage controls, not risk decisions.

Question 709
An organization’s audit charter PRIMARILY:
A. describes the auditor’s authority to conduct audits.
B. formally records the annual and quarterly audit plans.
C. documents the audit process and reporting standards.
D. defines the auditors' code of conduct.
Correct Answer: A – Describes the auditor’s authority to conduct
audits
Explanation: The audit charter formally authorizes audit activity within the
organization.
Incorrect Answers:
B. Audit plans are separate from the charter.
C. Processes are covered in audit methodology.
D. Code of conduct is documented elsewhere.

Question 710
Following a security breach in which a hacker exploited a well-known vulnerability in
the domain controller, an IS auditor has been asked to conduct a control assessment.
The auditor’s BEST course of action would be to determine if:
A. the patches were updated.
B. the logs were monitored.
C. the domain controller was classified for high availability.
D. the network traffic was being monitored.
Correct Answer: A – The patches were updated
Explanation: Assessing whether patches were applied directly addresses the cause of
the breach.
Incorrect Answers:
B. Log monitoring is useful post-breach but not preventive.
C. Classification affects recovery, not prevention.
D. Traffic monitoring may detect but not prevent exploitation.

Question 711
What is MOST important to verify during an external assessment of network
vulnerability?
A. Regular review of the network security policy
B. Location of intrusion detection systems (IDS)
C. Update of security information event management (SIEM) rules
D. Completeness of network asset inventory
Correct Answer: D – Completeness of network asset inventory
Explanation: A complete inventory ensures all assets are accounted for and assessed
during vulnerability testing.
Incorrect Answers:
A. Reviewing policies is administrative and not direct to vulnerability scope.
B. IDS location helps detection but not completeness.
C. SIEM rule updates are important but secondary to asset visibility.

Question 712
Which of the following environments is BEST used for copying data and
transformation into a compatible data warehouse format?
A. Development
B. Testing
C. Replication
D. Staging
Correct Answer: D – Staging
Explanation: The staging environment is used for data transformation and loading
into a data warehouse.
Incorrect Answers:
A. Development is for coding and testing.
B. Testing validates systems.
C. Replication copies data but doesn't prepare it for warehousing.

Question 713
Which of the following is the BEST recommendation to include in an organization's
bring your own device (BYOD) policy to help prevent data leakage?
A. Specify employee responsibilities for reporting lost or stolen BYOD devices.
B. Require multi-factor authentication on BYOD devices.
C. Require employees to waive privacy rights related to data on BYOD devices.
D. Allow only registered BYOD devices to access the network.
Correct Answer: D – Allow only registered BYOD devices to access
the network
Explanation: Ensuring only authorized devices access corporate resources reduces
the risk of data leakage.
Incorrect Answers:
A. Helpful but not preventive.
B. Important but incomplete without registration.
C. May raise privacy and legal concerns.
Question 714
Which type of testing BEST determines whether a new system meets business
requirements and is ready to be placed into production?
A. Load testing
B. User acceptance testing (UAT)
C. Volume testing
D. Performance testing
Correct Answer: B – User acceptance testing (UAT)
Explanation: UAT verifies whether the system meets user/business requirements
before production deployment.
Incorrect Answers:
A/C/D. Focus more on system performance, not functional business fit.

Question 715
During audit planning, the IS audit manager is considering whether to budget for
audits of entities regarded by the business as having low risk. Which of the following
is the BEST course of action in this situation?
A. Outsource low-risk audits to external audit service providers.
B. Challenge the risk rating and include the low-risk entities in the plan.
C. Conduct limited-scope audits of low-risk business entities.
D. Validate the low-risk entity ratings and apply professional judgment.
Correct Answer: D – Validate the low-risk entity ratings and apply
professional judgment
Explanation: Validating risk ratings ensures audit plans are based on reliable inputs
and professional judgment.
Incorrect Answers:
A. Outsourcing may not be cost-efficient.
B. Challenging ratings without validation may be arbitrary.
C. Limited audits may miss risks.

Question 716
An organization has virtualized its server environment without making any other
changes to the network or security infrastructure. Which of the following is the
MOST significant risk?
A. Data center environmental controls not aligning with new configuration
B. System documentation not being updated to reflect changes in the environment
C. Vulnerability in the virtualization platform affecting multiple hosts
D. Inability of the network intrusion detection system (IDS) to monitor virtual
server-to-server communications
Correct Answer: D – Inability of the network intrusion detection
system (IDS) to monitor virtual server-to-server communications
Explanation: Without virtual-aware IDS, internal traffic between virtual servers
may go unmonitored.
Incorrect Answers:
A/B. Less critical.
C. Possible but mitigated with patching.

Question 717
During an audit of an organization's risk management practices, an IS auditor finds
several documented IT risk acceptances have not been renewed in a timely manner
after the assigned expiration date. When assessing the severity of this finding, which
mitigating factor would MOST significantly minimize the associated impact?
A. There are documented compensating controls over the business processes.
B. The risk acceptances with issues reflect a small percentage of the total population.
C. The business environment has not significantly changed since the risk acceptances
were approved.
D. The risk acceptances were previously reviewed and approved by appropriate senior
management.
Correct Answer: C – The business environment has not significantly
changed since the risk acceptances were approved
Explanation: If the environment remains unchanged, the associated risks are likely
still valid and low.
Incorrect Answers:
A. Controls help but may not address risk formally.
B. Volume doesn’t imply impact.
D. Past approval doesn't substitute for periodic review.

Question 718
Which of the following is MOST important for an IS auditor to consider when
performing the risk assessment prior to an audit engagement?
A. Availability of audit evidence
B. The organization’s audit history
C. Organizational structure
D. The business process objectives
Correct Answer: D – The business process objectives
Explanation: Understanding objectives ensures alignment between audit scope and
business goals.
Incorrect Answers:
A/B/C. Useful, but secondary to objective alignment.

Question 719
An IS auditor is assessing an organization’s information systems and needs to
understand management’s approach regarding controls. Which documentation should
the auditor review FIRST?
A. Policies
B. Standards
C. Guidelines
D. Procedures
Correct Answer: A – Policies
Explanation: Policies express management’s intent and governance approach,
forming the foundation for controls.
Incorrect Answers:
B/C/D. More detailed but derived from policy.

Question 720
Which of the following is MOST useful for matching records of incoming and
outgoing personnel to identify tailgating in physical security logs?
A. Entry/exit badge logs
B. Surveillance video logs
C. Turnstile counter logs
D. Guard shift logs
Correct Answer: A – Entry/exit badge logs
Explanation: Badge logs provide time-stamped entries and exits that can be cross-
checked for unauthorized access.
Incorrect Answers:
B. Useful but less structured.
C. Doesn’t identify individuals.
D. Lacks detailed individual data.

Question 721
Which of the following is the BEST way to mitigate the risk associated with
unintentional modifications of complex calculations in end-user computing (EUC)?
A. Have an independent party review the source calculations
B. Verify EUC results through manual calculations
C. Execute copies of EUC programs out of a secure library
D. Implement complex password controls
Correct Answer: C – Execute copies of EUC programs out of a secure
library
Explanation: Using secured and version-controlled environments ensures integrity
and protects complex formulas or macros from accidental changes.
Incorrect Answers:
A. Independent review helps but does not prevent unintentional changes.
B. Manual verification may not scale for complex EUC tools.
D. Passwords protect access, not the logic or structure of the tool.
Question 722
Which of the following must be in place before an IS auditor initiates audit follow-up
activities?
A. A management response in the final report with a committed implementation date
B. A heat map with the gaps and recommendations displayed in terms of risk
C. Supporting evidence for the gaps and recommendations mentioned in the audit
report
D. Available resources for the activities included in the action plan
Correct Answer: A – A management response in the final report with
a committed implementation date
Explanation: Audit follow-up relies on the organization’s commitment to corrective
actions, typically formalized in a management response with deadlines.
Incorrect Answers:
B. Heat maps help visualize risk but are not a prerequisite for follow-up.
C. Supporting evidence is useful for reporting, not follow-up initiation.
D. Resources are necessary for implementation, not for follow-up initiation.

Question 723
Which of the following is the BEST way to address segregation of duties issues in an
organization with budget constraints?
A. Perform an independent audit
B. Implement compensating controls
C. Hire temporary staff
D. Rotate job duties periodically
Correct Answer: B – Implement compensating controls
Explanation: When true segregation isn’t feasible, compensating controls (e.g.,
monitoring or approvals) can mitigate associated risks.
Incorrect Answers:
A. Audits detect issues but do not address the root cause.
C. Temporary staff may not be cost-effective.
D. Rotation helps but does not fully address role conflicts.

Question 724
The due date of an audit project is approaching, and the audit manager has
determined that only 60% of the audit has been completed. Which of the following
should the audit manager do FIRST?
A. Extend the audit deadline
B. Escalate to the audit committee
C. Assign additional resources to supplement the audit
D. Determine where delays have occurred
Correct Answer: D – Determine where delays have occurred
Explanation: Analyzing the root cause of delays informs the best course of action—
whether to reallocate resources or adjust timelines.
Incorrect Answers:
A. Extension might be needed, but only after root cause analysis.
B. Escalation is premature without internal analysis.
C. Assigning more resources may not be effective if bottlenecks are unclear.

Question 725
During a security audit, an IS auditor is tasked with reviewing log entries obtained
from an enterprise intrusion prevention system (IPS). Which type of risk would be
associated with the potential for the auditor to miss a sequence of logged events that
could indicate an error in the IPS configuration?
A. Detection risk
B. Control risk
C. Sampling risk
D. Inherent risk
Correct Answer: A – Detection risk
Explanation: Detection risk arises when an auditor fails to identify issues that do
exist, such as missing anomalies in logs.
Incorrect Answers:
B. Control risk refers to failure of internal controls, not audit procedures.
C. Sampling risk applies to sample selection, not full log review.
D. Inherent risk is the susceptibility of systems absent controls.

Question 726
Which of the following backup schemes is the BEST option when storage media is
limited?
A. Real-time backup
B. Differential backup
C. Virtual backup
D. Full backup
Correct Answer: B – Differential backup
Explanation: Differential backups store only changed data since the last full
backup, saving space while easing restoration.
Incorrect Answers:
A. Real-time consumes more storage.
C. “Virtual backup” is too generic.
D. Full backup uses the most space.

Question 727
Which of the following should be of GREATEST concern for an IS auditor reviewing
an organization's disaster recovery plan (DRP)?
A. The DRP has not been updated since an IT infrastructure upgrade
B. The DRP has not been distributed to end users
C. The DRP has not been formally approved by senior management
D. The DRP contains recovery procedures for critical servers only
Correct Answer: A – The DRP has not been updated since an IT
infrastructure upgrade
Explanation: Outdated plans can lead to failure during real incidents due to
misalignment with current infrastructure.
Incorrect Answers:
B. Lack of distribution is important but secondary.
C. Approval is procedural, not operational.
D. Critical server focus may be valid depending on context.

Question 728
A system administrator recently informed the IS auditor about the occurrence of
several unsuccessful intrusion attempts from outside the organization. Which of the
following is MOST effective in detecting such an intrusion?
A. Periodically reviewing log files
B. Configuring the router as a firewall
C. Installing biometrics-based authentication
D. Using smart cards with one-time passwords
Correct Answer: A – Periodically reviewing log files
Explanation: Log reviews reveal suspicious activity patterns that point to intrusion
attempts.
Incorrect Answers:
B. Firewalls block but do not detect ongoing attempts.
C. Biometrics protect access but don’t detect intrusions.
D. Smart cards are preventive, not detective.

Question 729
According to the three lines of defense model for risk management, the second line of
defense includes functions that:
A. own risks
B. oversee risks
C. define risk appetite
D. provide independent assurance
Correct Answer: B – Oversee risks
Explanation: The second line includes functions like compliance or risk
management that guide and monitor risk handling.
Incorrect Answers:
A. Risk ownership is part of the first line.
C. Risk appetite is set by senior management.
D. Assurance is provided by the third line (internal audit).

Question 730
Which of the following should be an IS auditor's PRIMARY focus when developing a
risk-based IS audit program?
A. Business processes
B. Business plans
C. Portfolio management
D. IT strategic plans
Correct Answer: A – Business processes
Explanation: Effective audits must align with the criticality and risk levels of
operational business processes.
Incorrect Answers:
B. Plans are strategic, not process-oriented.
C. Portfolio management is too high-level.
D. IT plans are secondary to operational risks.

Question 731
What is the PRIMARY purpose of conducting a system post-implementation review?
A. To evaluate whether the project was completed on time
B. To ensure that users are satisfied with the system
C. To verify that business requirements are being met
D. To assess compliance with internal policies
Correct Answer: C – To verify that business requirements are being
met
Explanation: A post-implementation review ensures that the system meets the
intended business objectives.
Incorrect Answers:
A. Schedule compliance is a project management concern.
B. User satisfaction is valuable, but not the primary objective.
D. Policy compliance is secondary to functional effectiveness.

Question 732
Which of the following would BEST support an IS auditor’s conclusion that controls
are effective?
A. No issues have been reported for a year
B. Controls are operating as designed and tested
C. Management has accepted all identified risks
D. Policies have been updated recently
Correct Answer: B – Controls are operating as designed and tested
Explanation: Effectiveness is confirmed by evidence of proper design and operation.
Incorrect Answers:
A. Lack of reported issues isn’t proof.
C. Risk acceptance isn’t control effectiveness.
D. Policy updates do not imply implementation.

Question 733
Which of the following should be the GREATEST concern when using open-source
software in a production environment?
A. Lack of professional documentation
B. Limited vendor support
C. Unknown security vulnerabilities
D. Frequent software updates
Correct Answer: C – Unknown security vulnerabilities
Explanation: Open-source software can pose risks due to public code and
inconsistent vetting.
Incorrect Answers:
A/B/D. These are secondary risks compared to unpatched or unknown
vulnerabilities.

Question 734
What is the PRIMARY purpose of integrating audit trails into an application?
A. To provide a basis for future enhancements
B. To ensure users can review their activities
C. To detect and trace unauthorized activities
D. To comply with software development standards
Correct Answer: C – To detect and trace unauthorized activities
Explanation: Audit trails support accountability and incident investigation.
Incorrect Answers:
A. Enhancements are not the goal of audit trails.
B. Not primarily for user review.
D. Compliance is a benefit but not the primary reason.

Question 735
Which of the following would BEST help prevent social engineering attacks?
A. Encrypting sensitive data
B. Implementing a strong firewall
C. Conducting employee awareness training
D. Requiring complex passwords
Correct Answer: C – Conducting employee awareness training
Explanation: Social engineering exploits human error, so training is the best
preventive measure.
Incorrect Answers:
A/B/D. These address technical risks, not human manipulation.

Question 736
Which of the following presents the GREATEST risk to maintaining information
confidentiality?
A. Weak encryption algorithms
B. Excessive user access privileges
C. Infrequent password changes
D. Lack of user activity monitoring
Correct Answer: B – Excessive user access privileges
Explanation: Too much access increases the chance of unauthorized disclosure.
Incorrect Answers:
A. Important, but limited to specific functions.
C. Weak, but not as dangerous as broad access.
D. Monitoring helps detect, not prevent.

Question 737
Which of the following is the PRIMARY reason for conducting periodic access
reviews?
A. To meet regulatory compliance
B. To detect segregation of duties conflicts
C. To ensure access remains appropriate
D. To improve the access provisioning process
Correct Answer: C – To ensure access remains appropriate
Explanation: Reviews verify that users only have necessary access.
Incorrect Answers:
A. Compliance is a driver but not the main purpose.
B/D. These are outcomes, not the main reason.

Question 738
What is the BEST indicator that an organization’s incident response program is
effective?
A. Fewer incidents are being reported
B. Incident resolution times are decreasing
C. Incidents are consistently documented
D. Employees know who to contact during incidents
Correct Answer: B – Incident resolution times are decreasing
Explanation: Reduced resolution time reflects improved detection and response.
Incorrect Answers:
A. Fewer reports may mean underreporting.
C/D. Necessary, but not performance indicators.

Question 739
Which of the following actions would BEST help ensure secure disposal of retired
hard drives?
A. Overwriting data several times
B. Formatting the drives
C. Deleting all files manually
D. Storing them in a locked room
Correct Answer: A – Overwriting data several times
Explanation: Data wiping ensures data cannot be recovered.
Incorrect Answers:
B/C. Insecure and recoverable.
D. Prevents access but not disposal.

Question 740
An IS auditor observes that multiple departments are using the same user ID to
access a critical system. What is the MOST appropriate action?
A. Recommend assigning individual IDs
B. Verify that the shared ID has limited privileges
C. Recommend stronger authentication for the shared ID
D. Ensure password changes are enforced frequently
Correct Answer: A – Recommend assigning individual IDs
Explanation: Unique IDs enable accountability and traceability.
Incorrect Answers:
B/C/D. May improve security but don’t address the root issue of shared access.

Question 741
During a new system implementation, an IS auditor has been assigned to review risk
management at each milestone. The auditor finds that several risks to project
benefits have not been addressed. Who should be accountable for managing these
risks?
A. Project manager
B. Information security officer
C. Project sponsor
D. Enterprise risk manager
Correct Answer: C – Project sponsor
Explanation: The project sponsor is ultimately accountable for ensuring the
realization of project benefits and for managing associated risks.
Incorrect Answers:
A. The project manager is responsible for operational aspects, not strategic benefits.
B. The information security officer manages security risks, not overall project benefit
risks.
D. The enterprise risk manager oversees organizational risks, not specific project
benefits.

Question 742
In a post-implementation review of a recently purchased system, it is MOST
important for the IS auditor to determine whether the:
A. vendor product offered a viable solution.
B. user requirements were met.
C. test scenarios reflected operating activities.
D. stakeholder expectations were identified.
Correct Answer: B – User requirements were met
Explanation: The primary goal of post-implementation review is to ensure the
system fulfills the defined user requirements.
Incorrect Answers:
A. The viability of the solution is less important than meeting specific needs.
C. Testing alignment is important but secondary to requirement fulfillment.
D. Expectation identification should occur earlier in the process.

Question 743
Which of the following strategies BEST optimizes data storage without
compromising data retention practices?
A. Allowing employees to store large emails on flash drives
B. Automatically deleting emails older than one year
C. Moving emails to a virtual email vault after 30 days
D. Limiting the size of file attachments being sent via email
Correct Answer: C – Moving emails to a virtual email vault after 30
days
Explanation: Archiving older emails into a vault preserves them while freeing up
storage space.
Incorrect Answers:
A. Storing on flash drives can lead to data loss or breaches.
B. Automatic deletion risks violating retention policies.
D. Limiting attachment sizes doesn’t address overall storage optimization.

Question 744
Which of the following will be the MOST effective method to verify that a service
vendor keeps control levels as required by the client?
A. Obtain evidence of the vendor's control self-assessment (CSA).
B. Periodically review the service level agreement (SLA) with the vendor.
C. Conduct periodic on-site assessments using agreed-upon criteria.
D. Conduct an unannounced vulnerability assessment of vendor's IT systems.
Correct Answer: C – Conduct periodic on-site assessments using
agreed-upon criteria
Explanation: On-site assessments allow direct verification of control adherence and
effectiveness.
Incorrect Answers:
A. Self-assessments lack objectivity.
B. SLA reviews do not verify operational controls.
D. Unannounced assessments may breach agreements.

Question 745
An IS auditor is reviewing the maturity of a large organization's IT governance.
Which of the following BEST demonstrates that IT governance has been effectively
implemented?
A. The board reviews compliance with legal and regulatory requirements.
B. The board monitors adherence to the organization's information security policy.
C. The board reviews strategic IT key performance indicators (KPIs).
D. The board approves necessary resources for IT security reviews.
Correct Answer: C – The board reviews strategic IT key performance
indicators (KPIs)
Explanation: Reviewing IT KPIs demonstrates active governance and alignment
with strategy.
Incorrect Answers:
A. Legal compliance is necessary but not a measure of governance maturity.
B. Policy monitoring shows oversight, not strategic governance.
D. Resource approval is important, but not governance maturity.

Question 746
What should an IS auditor do FIRST upon discovering that a service provider did
not notify its customers of a security breach?
A. Notify law enforcement of the finding.
B. Require the third party to notify customers.
C. Issue the audit report with a significant finding.
D. Notify audit management of the finding.
Correct Answer: D – Notify audit management of the finding
Explanation: The auditor must report findings through proper internal channels
before any external steps.
Incorrect Answers:
A. Direct notification to law enforcement is not the auditor’s role.
B. Enforcement is beyond the auditor’s authority.
C. Reporting comes after internal notification and analysis.

Question 747
An IS auditor is reviewing an organization's primary router access control list. Which
of the following should result in a finding?
A. There are conflicting permit and deny rules for the IT group.
B. There is only one rule per group with access privileges.
C. Individual permissions are overriding group permissions.
D. The network security group can change network address translation (NAT).
Correct Answer: A – There are conflicting permit and deny rules for
the IT group
Explanation: Conflicting access control rules can lead to security gaps or
unintended access.
Incorrect Answers:
B. Single rules per group is acceptable.
C. May be acceptable depending on policy.
D. NAT management by the security group may be part of normal duties.

Question 748
Which of the following is the GREATEST risk of using a reciprocal site for disaster
recovery?
A. Inability to utilize the site when required
B. Inability to test the recovery plans onsite
C. Mismatched organizational security policies
D. Equipment compatibility issues at the site
Correct Answer: A – Inability to utilize the site when required
Explanation: A reciprocal site may be unavailable if the partner is also affected
during a disaster.
Incorrect Answers:
B. Testing limitations are a concern but secondary.
C. Policy mismatch is manageable.
D. Equipment issues can be resolved during planning.

Question 749
Which of the following BEST enables the timely identification of risk exposure?
A. Periodic penetration testing
B. Real-time monitoring tools
C. Annual internal audits
D. Monthly vulnerability assessments
Correct Answer: B – Real-time monitoring tools
Explanation: Real-time tools provide continuous insights into threats and
exposures.
Incorrect Answers:
A. Pen tests are periodic and limited in scope.
C. Annual audits are not timely.
D. Monthly scans may miss emerging threats.

Question 750
Which of the following is the PRIMARY objective of implementing data loss
prevention (DLP) controls?
A. Ensure data availability
B. Protect data integrity
C. Monitor employee behavior
D. Prevent unauthorized data disclosure
Correct Answer: D – Prevent unauthorized data disclosure
Explanation: DLP is primarily designed to prevent sensitive data from leaving the
organization.
Incorrect Answers:
A. DLP is not focused on availability.
B. Integrity is not its primary concern.
C. Monitoring behavior is a secondary feature.

Question 751
Which of the following would be the BEST evidence that a vendor is complying with
the organization's contract requirements?
A. Periodic audit reports
B. Service level agreement (SLA) penalties
C. Vendor self-assessments
D. Key performance indicator (KPI) dashboards
Correct Answer: A – Periodic audit reports
Explanation: Independent audit reports provide objective assurance that the vendor
is complying with contract terms.
Incorrect Answers:
B. SLA penalties indicate non-compliance, not ongoing assurance.
C. Self-assessments lack objectivity.
D. KPI dashboards may not capture full compliance status.

Question 752
Which of the following provides the BEST evidence that network segregation is
implemented correctly in a cloud environment?
A. Network traffic is logged
B. System documentation outlines segregation
C. Configuration settings are reviewed
D. Segmentation testing results are available
Correct Answer: D – Segmentation testing results are available
Explanation: Testing results confirm the actual behavior of network segmentation.
Incorrect Answers:
A. Logging traffic helps with monitoring, not validation.
B. Documentation may not reflect the actual implementation.
C. Configuration settings alone don't prove effectiveness.

Question 753
Which of the following is MOST important for an IS auditor to consider when
evaluating controls for third-party access to sensitive data?
A. Background checks are performed
B. Contracts include confidentiality clauses
C. Data is classified by sensitivity
D. Access is logged and monitored
Correct Answer: D – Access is logged and monitored
Explanation: Logging and monitoring ensure ongoing visibility into third-party
access.
Incorrect Answers:
A. Background checks are useful but not sufficient.
B. Contractual clauses don't ensure operational controls.
C. Data classification is foundational but not control-specific.

Question 754
Which of the following BEST mitigates the risk of an attacker exploiting default
credentials in a system?
A. Implementing intrusion detection systems
B. Enforcing credential rotation policies
C. Changing default credentials before deployment
D. Restricting administrative privileges
Correct Answer: C – Changing default credentials before deployment
Explanation: Default credentials are well-known and must be changed to prevent
exploitation.
Incorrect Answers:
A. IDS may detect but not prevent initial access.
B. Credential rotation doesn't address default settings.
D. Privilege restriction helps but doesn’t eliminate this specific risk.

Question 755
Which of the following is the GREATEST risk when user provisioning processes are
not automated?
A. Delayed user onboarding
B. Excessive access rights
C. Unauthorized access remains undetected
D. Role-based access control cannot be enforced
Correct Answer: B – Excessive access rights
Explanation: Manual provisioning increases the risk of granting more access than
necessary.
Incorrect Answers:
A. Delays are inconvenient but not the greatest risk.
C. Monitoring may still occur even with manual processes.
D. Role-based control is a design issue, not provisioning-specific.

Question 756
What is the PRIMARY benefit of using hashing to store passwords?
A. Ensures password confidentiality
B. Prevents brute-force attacks
C. Protects against malware
D. Allows easy password recovery
Correct Answer: A – Ensures password confidentiality
Explanation: Hashing prevents passwords from being exposed in plaintext.
Incorrect Answers:
B. Brute-force can still occur on hashed values.
C. Malware targets endpoints, not hash functions.
D. Hashing is irreversible, so it does not support recovery.

Question 757
Which of the following BEST ensures accountability for changes made in a
production environment?
A. Requiring change tickets
B. Logging administrator activity
C. Notifying stakeholders
D. Limiting access to source code
Correct Answer: B – Logging administrator activity
Explanation: Audit logs provide traceability for changes and user accountability.
Incorrect Answers:
A. Change tickets initiate process but do not confirm action.
C. Notifications inform but do not enforce accountability.
D. Limiting access helps but doesn’t track activity.
Question 758
Which of the following is MOST important when performing a data migration
project?
A. Using a secure transfer protocol
B. Notifying affected business units
C. Scheduling the migration after business hours
D. Validating the completeness and accuracy of migrated data
Correct Answer: D – Validating the completeness and accuracy of
migrated data
Explanation: Ensuring data integrity after migration is critical.
Incorrect Answers:
A. Security is important but not the top concern.
B. Notification supports communication but not accuracy.
C. Scheduling helps minimize disruption but doesn't ensure success.

Question 759
Which of the following BEST helps an IS auditor evaluate the effectiveness of
business continuity plans (BCPs)?
A. Incident logs
B. Risk registers
C. Results of recovery testing
D. Copies of backup media
Correct Answer: C – Results of recovery testing
Explanation: Actual test results show whether plans can be executed effectively.
Incorrect Answers:
A. Logs show issues but not plan performance.
B. Risk registers inform planning but don’t evaluate execution.
D. Media copies don’t indicate recovery capability.

Question 760
Which of the following should be the FIRST step when assessing cloud security?
A. Evaluate vendor incident response capabilities
B. Review access management procedures
C. Identify applicable regulations and compliance needs
D. Perform a penetration test of the cloud environment
Correct Answer: C – Identify applicable regulations and compliance
needs
Explanation: Understanding compliance requirements guides the rest of the
assessment.
Incorrect Answers:
A. Incident response is important but comes later.
B. Access review is specific but not foundational.
D. Pen testing is a technical validation step, not an initial one.

Question 761
An IS auditor is reviewing the design of a system acquisition project. Which of the
following would provide the MOST assurance that the system will be secure and
effective?
A. Inclusion of security requirements in the business case
B. A detailed cost-benefit analysis
C. Review by legal counsel for contractual accuracy
D. Input from stakeholders during design reviews
Correct Answer: A – Inclusion of security requirements in the business
case
Explanation: Embedding security requirements early ensures the system is designed
with adequate controls.
Incorrect Answers:
B. Cost-benefit focuses on financials, not security.
C. Legal review ensures compliance, not effectiveness.
D. Stakeholder input helps functionality but not necessarily security.

Question 762
What is the PRIMARY purpose of performing a control risk assessment during an IT
audit?
A. To define detailed audit procedures
B. To identify control weaknesses
C. To determine audit scope
D. To evaluate compliance
Correct Answer: C – To determine audit scope
Explanation: Risk assessment helps focus audit efforts on high-risk areas.
Incorrect Answers:
A. Procedures are based on the scope.
B. Weaknesses are identified during testing.
D. Compliance evaluation follows the scoped testing.

Question 763
Which of the following is the BEST way to ensure the reliability of data obtained
from third-party service providers?
A. Reviewing SLAs
B. Performing periodic site visits
C. Requiring independent audit reports
D. Establishing data classification policies
Correct Answer: C – Requiring independent audit reports
Explanation: Independent audit reports (e.g., SOC 2) validate provider controls
and data reliability.
Incorrect Answers:
A. SLAs define expectations but don’t verify performance.
B. Site visits provide observation but are limited.
D. Data classification doesn’t verify provider reliability.

Question 764
Which of the following is MOST critical for an IS auditor to validate in a cloud-
based system with multiple tenants?
A. Backup frequency
B. Encryption of data at rest
C. Data segregation controls
D. SLA enforcement
Correct Answer: C – Data segregation controls
Explanation: In multi-tenant environments, data must be isolated to prevent
leakage.
Incorrect Answers:
A. Backup is important but not tenant-specific.
B. Encryption protects data but not segregation.
D. SLA enforcement ensures service but not isolation.

Question 765
Which of the following is the PRIMARY reason to perform a post-implementation
review of a system?
A. To train users
B. To evaluate project team performance
C. To confirm the system meets business requirements
D. To complete project documentation
Correct Answer: C – To confirm the system meets business
requirements
Explanation: A post-implementation review validates whether goals and
requirements were achieved.
Incorrect Answers:
A. Training is conducted earlier.
B. Team evaluation is secondary.
D. Documentation is a by-product, not a purpose.

Question 766
An IS auditor is assessing the design of controls in a system development project.
Which of the following is MOST important to evaluate?
A. Project resource allocation
B. Control objectives are aligned with business requirements
C. Vendor selection process
D. User interface design
Correct Answer: B – Control objectives are aligned with business
requirements
Explanation: Controls must support business objectives to be effective.
Incorrect Answers:
A. Resource allocation impacts execution, not design.
C. Vendor selection is procurement, not control design.
D. UI design is usability, not control.

Question 767
Which of the following BEST demonstrates the effectiveness of security awareness
training?
A. Completion rates of training modules
B. Reduction in incidents caused by user errors
C. Increased reporting of phishing attempts
D. Survey results on user satisfaction
Correct Answer: B – Reduction in incidents caused by user errors
Explanation: Fewer user-caused incidents shows training had a practical impact.
Incorrect Answers:
A. Completion alone doesn’t imply understanding.
C. Increased reports may mean higher awareness but not fewer errors.
D. Satisfaction doesn’t reflect behavioral change.

Question 768
Which of the following BEST supports the effectiveness of a data classification
policy?
A. Employees receive annual training
B. Data is encrypted during transmission
C. All systems have updated antivirus
D. Controls vary based on classification level
Correct Answer: D – Controls vary based on classification level
Explanation: Classification is meaningful only if control levels differ accordingly.
Incorrect Answers:
A. Training helps but is not direct evidence.
B. Encryption is a control, not classification-based.
C. Antivirus is a general control, not classification-specific.

Question 769
An IS auditor finds that privileged users can access production data directly. What is
the BEST recommendation?
A. Encrypt the production data
B. Implement logging and alerting
C. Revoke access immediately
D. Implement role-based access controls (RBAC)
Correct Answer: D – Implement role-based access controls (RBAC)
Explanation: RBAC limits access based on duties and reduces inappropriate access.
Incorrect Answers:
A. Encryption protects data, but doesn’t prevent access.
B. Logging helps detect but not prevent.
C. Immediate revocation may disrupt operations.

Question 770
Which of the following is the PRIMARY benefit of using hashing in password
management?
A. Prevents brute-force attacks
B. Allows storage of passwords in encrypted form
C. Ensures passwords are not stored in plaintext
D. Enables password length enforcement
Correct Answer: C – Ensures passwords are not stored in plaintext
Explanation: Hashing transforms passwords into non-reversible forms, enhancing
storage security.
Incorrect Answers:
A. Hashing doesn’t prevent brute-force by itself.
B. Encryption is reversible; hashing is not.
D. Length is enforced separately, not via hashing.

Question 771
Which of the following is MOST likely to be reduced when implementing optimal risk
management strategies?
A. Inherent risk
B. Residual risk
C. Sampling risk
D. Detection risk
Correct Answer: B – Residual risk
Explanation: Optimal risk management aims to minimize residual risk to an
acceptable level after controls are applied.
Incorrect Answers:
A. Inherent risk exists before any controls are applied and cannot be eliminated.
C. Sampling risk relates to audit testing, not general risk management.
D. Detection risk is audit-specific and not the main target of enterprise risk
management.
Question 772
A current project to develop IT-based solutions will need additional funding to meet
changes in business requirements. Who is BEST suited to obtain this additional
funding?
A. Board of directors
B. Project manager
C. Project sponsor
D. IT strategy committee
Correct Answer: C – Project sponsor
Explanation: The project sponsor is typically responsible for securing funding and
aligning the project with business needs.
Incorrect Answers:
A. Board approves budgets but is not directly involved in project funding requests.
B. The project manager manages execution, not funding.
D. The IT strategy committee oversees strategic alignment, not operational funding.

Question 773
During the implementation of an enterprise resource planning (ERP) system, an IS
auditor is reviewing the results of user acceptance testing (UAT). Which of the
following should be the auditor's PRIMARY focus?
A. Determine if the business process owner has signed off on the results.
B. Determine if application interfaces have been satisfactorily tested.
C. Confirm that all errors have been communicated to end users.
D. Verify that system integration testing was performed.
Correct Answer: A – Determine if the business process owner has
signed off on the results
Explanation: Business process owner sign-off indicates acceptance and validates
that the system meets user requirements.
Incorrect Answers:
B. Interface testing is important but is part of technical, not user, validation.
C. Communicating errors is part of test management, not the auditor’s main focus.
D. Integration testing is a separate phase from UAT.

Question 774
Which of the following observations should be of GREATEST concern to an IS
auditor assessing access controls for the accounts payable module of a finance
system?
A. Payment files are stored on a shared drive in a writable format prior to
processing.
B. Accounts payable staff have access to update vendor bank account details.
C. The IS auditor was granted access to create purchase orders.
D. Configured delegation limits do not align to the organization's delegations policy.
Correct Answer: B – Accounts payable staff have access to update
vendor bank account details
Explanation: This presents a fraud risk, as it could allow unauthorized redirection
of funds.
Incorrect Answers:
A. Writable formats are a concern but less critical than direct access to sensitive
data.
C. Auditor access should be revoked post-audit, but it’s not the highest risk.
D. Misalignment of limits is an issue but not as critical as fraudulent access
potential.

Question 775
Which of the following is the PRIMARY reason to involve IS auditors in the software
acquisition process?
A. To help ensure hardware and operating system requirements are considered
B. To help ensure proposed contracts and service level agreements (SLAs) address
key elements
C. To help ensure the project management process complies with policies and
procedures
D. To help ensure adequate controls to address common threats and risks are
considered
Correct Answer: D – To help ensure adequate controls to address
common threats and risks are considered
Explanation: IS auditors provide expertise in identifying and integrating controls to
minimize risks during software acquisition.
Incorrect Answers:
A. This is typically the role of the technical team.
B. While SLAs are important, they fall more under legal review.
C. Project process compliance is a management responsibility.

Question 776
When planning a review of IT governance, an IS auditor is MOST likely to:
A. Define key performance indicators (KPIs)
B. Obtain information about the control framework adopted by management
C. Examine audit committee minutes for IT-related controls
D. Assess whether business process owner responsibilities are consistent
Correct Answer: B – Obtain information about the control framework
adopted by management
Explanation: Understanding the adopted framework (e.g., COBIT) is foundational
to reviewing IT governance.
Incorrect Answers:
A. Defining KPIs is management's task.
C. Committee minutes may help but are not the starting point.
D. Process owner roles are reviewed after understanding the framework.

Question 777
A network analyst is monitoring the network after hours and detects activity that
appears to be a brute-force attempt to compromise a critical server. After reviewing
the alerts to ensure their accuracy, what should be done NEXT?
A. Perform a root cause analysis
B. Document all steps taken in a written report
C. Isolate the affected system
D. Invoke the incident response plan
Correct Answer: D – Invoke the incident response plan
Explanation: A verified attack should trigger the incident response process
immediately.
Incorrect Answers:
A. Root cause is part of post-incident analysis.
B. Documentation follows response actions.
C. Isolation may be part of the response but comes after activation of the plan.

Question 778
Which of the following is the BEST recommendation to drive accountability for
achieving the desired outcomes specified in a benefits realization plan for an IT
project?
A. Document the dependencies between the project and other projects within the
same program
B. Ensure that IT takes ownership for the delivery and tracking of all aspects of the
benefits realization plan
C. Ensure that the project manager has formal authority for managing the benefits
realization plan
D. Assign responsibilities, measures, and timelines for each identified benefit within
the plan
Correct Answer: D – Assign responsibilities, measures, and timelines
for each identified benefit within the plan
Explanation: Clear accountability requires assigning roles and deadlines with
measurable indicators.
Incorrect Answers:
A. Dependencies support planning but don’t ensure accountability.
B. IT ownership may not align with business goals.
C. The project manager may lack authority beyond delivery.
Question 779
A steering committee established to oversee an organization's digital transformation
program is MOST likely to be involved with which of the following activities?
A. System design review
B. Approval of daily project activities
C. Resolution of operational issues
D. Prioritization of program initiatives
Correct Answer: D – Prioritization of program initiatives
Explanation: Steering committees focus on strategic alignment and resource
prioritization.
Incorrect Answers:
A. System design is reviewed by project or technical teams.
B. Daily activities are outside the committee's strategic scope.
C. Operational issues are handled by project teams.

Question 780
Which of the following is the PRIMARY purpose of a digital signature?
A. Confirm data confidentiality
B. Ensure data availability
C. Validate sender authenticity and message integrity
D. Encrypt the content of a message
Correct Answer: C – Validate sender authenticity and message
integrity
Explanation: Digital signatures confirm the identity of the sender and that the
message has not been altered.
Incorrect Answers:
A. Confidentiality is provided by encryption, not digital signatures.
B. Availability relates to system uptime, not digital signatures.
D. Encryption ensures secrecy, not authenticity.

Question 781
Which of the following provides the MOST useful information to an IS auditor when
selecting projects for inclusion in an IT audit plan?
A. Project charter
B. Project business case
C. Project issue log
D. Project plan
Correct Answer: B – Project business case
Explanation: The business case highlights the justification, risks, and expected
benefits, enabling auditors to assess the value and criticality of the project.
Incorrect Answers:
A. The charter defines authority, not prioritization value.
C. Issue logs focus on current problems, not project selection.
D. The plan outlines tasks and timeline but not audit relevance.

Question 782
Which type of device sits on the perimeter of a corporate or home network, where it
obtains a public IP address and then generates private IP addresses internally?
A. Gateway
B. Switch
C. Intrusion prevention system (IPS)
D. Router
Correct Answer: D – Router
Explanation: Routers manage traffic between public and private networks,
performing NAT and directing data packets appropriately.
Incorrect Answers:
A. Gateways may include routers but aren’t specific to IP assignment.
B. Switches operate within LANs and don’t assign public/private IPs.
C. IPSs monitor threats but do not route network traffic.

Question 783
An IS auditor observes that a large number of departed employees have not been
removed from the accounts payable system. Which of the following is MOST
important to determine in order to assess the risk?
A. The ability of departed employees to actually access the system
B. The frequency of user access reviews performed by management
C. The process for terminating access of departed employees
D. The frequency of intrusion attempts associated with the accounts payable
Correct Answer: A – The ability of departed employees to actually
access the system
Explanation: If former employees still have access, the organization faces immediate
security and fraud risks.
Incorrect Answers:
B. Reviews are important but do not reflect current access risk.
C. Processes are preventive but don’t measure current exposure.
D. Intrusion attempts may be unrelated to former employees.

Question 784
Which of the following audit findings should be given the HIGHEST priority?
A. IT key risk indicators (KRIs) are calculated internally by the IT team.
B. The organization's IT investment exceeds industry benchmarks.
C. IT key risk indicators (KRIs) are not periodically reviewed.
D. The board’s agenda does not include the progress of IT projects.
Correct Answer: C – IT key risk indicators (KRIs) are not periodically
reviewed
Explanation: Without review, emerging threats may go undetected, leading to
significant risk.
Incorrect Answers:
A. Internal calculation may be acceptable with proper validation.
B. High spending is a concern but not a critical risk alone.
D. Board oversight is important but can be addressed strategically.

Question 785
Which of the following provides the MOST useful information for performing a
business impact analysis (BIA)?
A. Business unit risk assessments
B. Business continuity plan (BCP)
C. Application availability logs
D. Financial reports
Correct Answer: A – Business unit risk assessments
Explanation: These assessments reveal process criticality, recovery needs, and
interdependencies essential for BIA.
Incorrect Answers:
B. BCP uses BIA results—it’s not an input.
C. Logs show uptime but not business impact.
D. Financials may help, but do not cover operational dependencies.

Question 786
When reviewing the second year of a multi-year ERP implementation, which of the
following should be the PRIMARY focus of the IS auditor?
A. Data migration
B. Sociability testing
C. User acceptance testing (UAT)
D. Initial user access provisioning
Correct Answer: A – Data migration
Explanation: By year two, data migration is crucial as systems transition—accuracy
and completeness are vital.
Incorrect Answers:
B. Sociability testing is not a typical focus.
C. UAT typically occurs before rollout, likely completed.
D. Access provisioning is also earlier-stage or ongoing.

Question 787
Which of the following would be the GREATEST concern for an IS auditor
conducting a pre-implementation review of a data loss prevention (DLP) tool?
A. The tool is implemented in monitor mode rather than block mode.
B. Crawlers are used to discover sensitive data.
C. Deep packet inspection opens data packets in transit.
D. Encryption keys are not centrally managed.
Correct Answer: D – Encryption keys are not centrally managed
Explanation: Poor key management can undermine DLP effectiveness and data
confidentiality.
Incorrect Answers:
A. Monitor mode is a common initial approach.
B. Crawlers are useful for discovery.
C. Deep packet inspection is a standard DLP technique.

Question 788
Which of the following is the PRIMARY benefit of benchmarking an organization’s
software development life cycle (SDLC) practices against a capability maturity
model?
A. Security requirements are added to development processes.
B. Reliable products are guaranteed.
C. Programmers’ efficiency is improved.
D. Repeatable software development procedures are established.
Correct Answer: D – Repeatable software development procedures are
established
Explanation: Benchmarking fosters process maturity and consistency, leading to
predictable results.
Incorrect Answers:
A. Security may improve, but that’s not the primary benefit.
B. Reliability is improved indirectly, not guaranteed.
C. Efficiency may result, but is secondary.

Question 789
Which type of testing is used to identify security vulnerabilities in source code in the
development environment?
A. Dynamic analysis security testing (DAST)
B. Interactive application security testing (IAST)
C. Static analysis security testing (SAST)
D. Runtime application self-protection (RASP)
Correct Answer: C – Static analysis security testing (SAST)
Explanation: SAST analyzes code without execution, ideal for early vulnerability
detection in development.
Incorrect Answers:
A. DAST examines running applications.
B. IAST blends static and dynamic, but typically post-code.
D. RASP is runtime protection, not early-stage analysis.

Question 790
An IS auditor evaluating the change management process must select a sample from
the change log. What is the BEST way for the auditor to confirm the change log is
complete?
A. Obtain management attestation of completeness.
B. Take the last change from the system and trace it back to the log.
C. Take an item from the log and trace it back to the system.
D. Interview change management personnel about completeness.
Correct Answer: B – Take the last change from the system and trace
it back to the log
Explanation: Reverse tracing from actual system changes ensures nothing is missed
in the log.
Incorrect Answers:
A. Attestations lack verifiability.
C. Forward tracing does not reveal omissions.
D. Interviews do not confirm completeness.

Question 791
Which of the following is the BEST approach for determining the overall IT risk
appetite of an organization when business units use different methods for managing
IT risks?
A. Average the business units' IT risk levels
B. Identify the highest-rated IT risk level among the business units
C. Establish a global IT risk scoring criteria
D. Prioritize the organization's IT risk scenarios
Correct Answer: C – Establish a global IT risk scoring criteria
Explanation: A standardized global scoring approach enables consistent risk
evaluation across units, aligning with the overall enterprise risk appetite.
Incorrect Answers:
A. Averaging may dilute significant risks.
B. Using the highest rating could skew overall risk posture.
D. Prioritizing scenarios helps with mitigation but doesn’t define appetite.

Question 792
In data warehouse (DW) management, what is the BEST way to prevent data
quality issues caused by changes from a source system?
A. Use point-in-time data replication
B. Perform periodic source system reconciliation
C. Implement an extract-transform-load (ETL) validation process
D. Use data masking for sensitive information
Correct Answer: C – Implement an extract-transform-load (ETL)
validation process
Explanation: ETL validation ensures that changes in the source system are
properly captured, transformed, and loaded without compromising data quality.
Incorrect Answers:
A. Point-in-time replication captures a snapshot but may miss discrepancies.
B. Periodic reconciliation can detect issues but not prevent them.
D. Data masking protects privacy, not quality.

Question 793
Which of the following would BEST help an IS auditor determine whether an IT risk
management program aligns with business objectives?
A. Reviewing risk dashboards
B. Interviewing the chief information officer (CIO)
C. Reviewing business continuity plans
D. Evaluating the IT risk register
Correct Answer: D – Evaluating the IT risk register
Explanation: The IT risk register links risks with business objectives and controls,
making it the best source to evaluate alignment.
Incorrect Answers:
A. Dashboards may summarize but not show alignment.
B. Interviews are subjective and insufficient.
C. Continuity plans address disruption, not alignment.

Question 794
Which of the following is the MOST effective control for ensuring segregation of
duties (SoD) in a system supporting financial transactions?
A. Mandatory change approval workflows
B. Configurable access rights by role
C. Manual reviews of access logs
D. Two-person rule for transactions
Correct Answer: B – Configurable access rights by role
Explanation: Role-based access control enforces SoD by designating functions to
roles rather than individuals.
Incorrect Answers:
A. Approvals help but don’t enforce SoD.
C. Manual reviews detect but don’t prevent.
D. Two-person rule may support SoD but isn’t scalable.
Question 795
When conducting an audit of IT general controls, which of the following findings
would be of MOST concern?
A. User account password complexity not enforced
B. Audit trails are not reviewed regularly
C. Backup tapes are not encrypted
D. Changes to production code are not documented
Correct Answer: D – Changes to production code are not documented
Explanation: Lack of documentation for production code changes increases the risk
of unauthorized modifications and undermines auditability.
Incorrect Answers:
A. Weak passwords are important but can be corrected.
B. Audit trail review is critical but not as severe.
C. Encryption protects confidentiality, not integrity.

Question 796
Which of the following is the BEST evidence that a cybersecurity awareness training
program is effective?
A. Number of users completing the training
B. Frequency of training sessions
C. Reduction in successful phishing attacks
D. Improved user feedback scores
Correct Answer: C – Reduction in successful phishing attacks
Explanation: A measurable decline in phishing success indicates improved user
awareness and behavioral change.
Incorrect Answers:
A. Completion does not reflect understanding.
B. Frequency may not translate to effectiveness.
D. Feedback is subjective.

Question 797
An IS auditor is reviewing a third-party vendor contract. Which of the following
clauses should be of GREATEST concern?
A. Termination clauses favor the vendor
B. There is no requirement for audit rights
C. Data ownership is not clearly defined
D. Payment terms are based on milestones
Correct Answer: C – Data ownership is not clearly defined
Explanation: Unclear data ownership can lead to legal and operational risks,
especially regarding confidentiality and compliance.
Incorrect Answers:
A. Favorable termination clauses are negotiable.
B. Audit rights are important but secondary to data control.
D. Milestone payments are common.

Question 798
Which of the following is MOST important when evaluating the adequacy of firewall
controls?
A. Port blocking configuration
B. Number of firewall rules
C. Rule review frequency
D. Alignment with security policy
Correct Answer: D – Alignment with security policy
Explanation: Firewall rules must reflect the organization's policy to be effective.
Incorrect Answers:
A. Port blocking is one component.
B. Number of rules doesn’t reflect adequacy.
C. Review frequency is important but secondary.

Question 799
Which of the following should be the PRIMARY concern of an IS auditor when
reviewing the implementation of a patch management process?
A. Documentation of patch deployment
B. Rollback procedures are tested
C. Patches are deployed in a timely manner
D. Patches are from verified sources
Correct Answer: C – Patches are deployed in a timely manner
Explanation: Delayed patches increase exposure to known vulnerabilities.
Incorrect Answers:
A. Documentation supports auditing but not risk mitigation.
B. Rollback testing is good practice but not the primary concern.
D. Source verification is part of integrity assurance.

Question 800
Which of the following should be an IS auditor's GREATEST concern when an
international organization intends to roll out a global data privacy policy?
A. Requirements may become unreasonable
B. Local management may not accept the policy
C. Local regulations may contradict the policy
D. The policy may conflict with existing application requirements
Correct Answer: C – Local regulations may contradict the policy
Explanation: Contradicting legal requirements across jurisdictions can lead to
noncompliance, fines, or legal action.
Incorrect Answers:
A. Complexity is expected but manageable.
B. Acceptance issues can be addressed by training.
D. Application conflicts are technical and resolvable.

Question 801
Which of the following should an IS auditor do FIRST when reviewing the
implementation of a software patch management process?
A. Verify that rollback procedures exist
B. Confirm that all endpoints receive patches
C. Evaluate the risk assessment process for patches
D. Determine whether patches are applied automatically
Correct Answer: C – Evaluate the risk assessment process for patches
Explanation: Assessing the risk of patches ensures they are prioritized correctly and
applied appropriately.
Incorrect Answers:
A. Rollback procedures are important, but risk evaluation comes first.
B. Patch distribution is a later verification step.
D. Automatic application is implementation detail, not the starting point.

Question 802
What is the PRIMARY purpose of integrating business continuity and disaster
recovery planning into the system development life cycle (SDLC)?
A. To reduce downtime during maintenance
B. To ensure compliance with audit requirements
C. To minimize data loss during disasters
D. To build resilience into systems from the start
Correct Answer: D – To build resilience into systems from the start
Explanation: Integrating continuity planning into SDLC ensures proactive
consideration of system resilience.
Incorrect Answers:
A. Maintenance is not the focus of SDLC resilience planning.
B. Compliance is a benefit but not the main purpose.
C. Data loss is minimized through backup plans, not only SDLC integration.

Question 803
Which of the following is the PRIMARY benefit of conducting an IT risk assessment?
A. Identify audit objectives
B. Support compliance efforts
C. Prioritize mitigation efforts
D. Satisfy internal control requirements
Correct Answer: C – Prioritize mitigation efforts
Explanation: Risk assessments guide the allocation of resources to the most critical
risks.
Incorrect Answers:
A. Audit objectives may be informed, but it’s not the main benefit.
B. Compliance is a result, not the goal.
D. Control requirements come from other sources.

Question 804
Which of the following is the GREATEST concern when reviewing an organization’s
data retention policy?
A. Archived data is not encrypted
B. Backup media is stored offsite
C. Retention periods are not consistently enforced
D. Only hard copy records are kept
Correct Answer: C – Retention periods are not consistently enforced
Explanation: Inconsistent enforcement can lead to legal and compliance violations.
Incorrect Answers:
A. Encryption is important but enforcement gaps are riskier.
B. Offsite storage is standard practice.
D. Hard copy storage may be outdated but not a critical concern.

Question 805
Which of the following would BEST reduce the risk of unauthorized changes in a
production environment?
A. Approval by the IT operations team
B. Separation of duties between development and operations
C. Peer code reviews
D. Change logging and monitoring
Correct Answer: B – Separation of duties between development and
operations
Explanation: Separating roles ensures developers can’t implement unauthorized
changes.
Incorrect Answers:
A. Operations team alone may lack proper oversight.
C. Code reviews don’t control deployment rights.
D. Logging detects but doesn’t prevent changes.

Question 806
What is the PRIMARY reason to include IT controls in the scope of an operational
audit?
A. To improve business productivity
B. To verify alignment with IT strategy
C. To ensure data integrity and availability
D. To assess the efficiency of business processes
Correct Answer: C – To ensure data integrity and availability
Explanation: IT controls safeguard critical systems and data, supporting business
operations.
Incorrect Answers:
A. Productivity is a benefit, not the primary goal.
B. Strategy alignment is a broader IT governance concern.
D. Process efficiency is typically covered in performance audits.

Question 807
Which of the following is the PRIMARY purpose of a digital certificate?
A. Encrypt message contents
B. Validate the sender’s IP address
C. Authenticate the identity of a party
D. Track digital transactions
Correct Answer: C – Authenticate the identity of a party
Explanation: Digital certificates verify identities in electronic communications.
Incorrect Answers:
A. Encryption is done with keys, not the certificate itself.
B. IP validation is a network-level function.
D. Certificates don’t track transactions directly.

Question 808
An IS auditor is reviewing a company’s data loss prevention (DLP) implementation.
Which of the following would be MOST important to confirm?
A. All USB ports are disabled
B. Email attachments are scanned for sensitive data
C. Employees are trained on password hygiene
D. Encryption is used for all files
Correct Answer: B – Email attachments are scanned for sensitive data
Explanation: DLP focuses on detecting and preventing leakage of sensitive data,
especially via email.
Incorrect Answers:
A. USB control is part of endpoint security, not comprehensive DLP.
C. Passwords are unrelated to DLP scope.
D. Encryption protects data but doesn’t prevent unauthorized sharing.

Question 809
Which of the following BEST helps ensure that audit logs are complete and
accurate?
A. Access to logs is restricted to administrators
B. Logs are stored on write-once media
C. Logs are reviewed daily by security staff
D. Logging is enabled for all critical systems
Correct Answer: D – Logging is enabled for all critical systems
Explanation: Logs must exist for them to be reviewed; enabling logging ensures
completeness.
Incorrect Answers:
A. Restricting access is important but comes after logging is enabled.
B. Write-once media helps preserve data but doesn’t ensure completeness.
C. Daily reviews are useful but depend on the logs being available.

Question 810
What is the PRIMARY role of executive management in the IT governance process?
A. Monitor compliance with IT policies
B. Define IT risk appetite and approve budgets
C. Review security incident reports
D. Ensure daily system operations
Correct Answer: B – Define IT risk appetite and approve budgets
Explanation: Executive management sets direction and allocates resources for IT
governance.
Incorrect Answers:
A. Compliance is managed at operational levels.
C. Incident reports are reviewed by security or IT teams.
D. Executives oversee strategy, not operations.

Question 811
Which of the following is the MOST important consideration when evaluating third-
party cloud providers for disaster recovery services?
A. Ability to provide audit logs
B. Data center location
C. Cost of services
D. Recovery time objectives (RTOs)
Correct Answer: D – Recovery time objectives (RTOs)
Explanation: RTOs define acceptable downtime and are critical when evaluating
DR capabilities.
Incorrect Answers:
A. Audit logs are useful but secondary to recovery performance.
B. Location matters but is not the primary concern for DR.
C. Cost is a factor, but effectiveness comes first.
Question 812
Which of the following activities should be performed FIRST during an incident
response?
A. Containment of the incident
B. Notification to stakeholders
C. Analysis of root cause
D. Documentation of lessons learned
Correct Answer: A – Containment of the incident
Explanation: Containment minimizes damage before other actions are taken.
Incorrect Answers:
B. Stakeholders are notified after containment.
C. Root cause analysis comes during investigation.
D. Lessons learned are part of post-incident review.

Question 813
Which of the following would BEST help an IS auditor assess whether a security
awareness program is effective?
A. Surveying employee satisfaction
B. Reviewing program costs
C. Conducting a phishing simulation
D. Comparing program content to industry standards
Correct Answer: C – Conducting a phishing simulation
Explanation: Simulations provide real data on whether employees follow security
practices.
Incorrect Answers:
A. Satisfaction does not reflect behavior.
B. Cost does not measure effectiveness.
D. Content alignment does not measure real-world impact.

Question 814
When auditing logical access controls, which of the following is the BEST evidence
that access rights are appropriate?
A. The access control matrix is documented
B. User activity logs are archived
C. Management has approved access rights
D. Access is based on user job roles
Correct Answer: D – Access is based on user job roles
Explanation: Role-based access control ensures consistency and limits excessive
permissions.
Incorrect Answers:
A. Documentation alone doesn’t ensure appropriateness.
B. Archiving logs is unrelated to access validity.
C. Approvals may lack technical enforcement.

Question 815
Which of the following is the PRIMARY objective of a firewall?
A. To block malware downloads
B. To detect unauthorized access attempts
C. To filter inbound and outbound network traffic
D. To ensure high availability of web applications
Correct Answer: C – To filter inbound and outbound network traffic
Explanation: Firewalls filter traffic based on rules, controlling access.
Incorrect Answers:
A. Malware blocking is a function of antivirus.
B. Detection is done by IDS/IPS.
D. Availability is addressed through redundancy and load balancing.

Question 816
Which of the following BEST helps ensure that data is not altered during
transmission?
A. Confidentiality
B. Authentication
C. Integrity
D. Availability
Correct Answer: C – Integrity
Explanation: Integrity ensures that data remains unchanged in transit.
Incorrect Answers:
A. Confidentiality protects from unauthorized viewing.
B. Authentication verifies identity.
D. Availability ensures accessibility, not data correctness.

Question 817
Which of the following is the PRIMARY reason to implement segregation of duties in
an IT environment?
A. Reduce the risk of accidental errors
B. Ensure compliance with HR policies
C. Prevent unauthorized or fraudulent activities
D. Increase operational efficiency
Correct Answer: C – Prevent unauthorized or fraudulent activities
Explanation: Segregation of duties is a key internal control to reduce fraud risk.
Incorrect Answers:
A. Errors are reduced by reviews and testing.
B. HR compliance is unrelated.
D. Efficiency may be affected but isn’t the goal.

Question 818
Which of the following BEST ensures the long-term effectiveness of an information
security policy?
A. Annual updates by IT staff
B. Formal approval by the IT department
C. Periodic reviews and updates based on emerging risks
D. Benchmarking against industry peers
Correct Answer: C – Periodic reviews and updates based on emerging
risks
Explanation: Security policies must evolve with the threat landscape.
Incorrect Answers:
A. Annual updates may miss fast-evolving risks.
B. Approval is necessary but not enough.
D. Benchmarking helps but doesn’t drive updates.

Question 819
Which of the following is the GREATEST risk of using open-source software in a
business environment?
A. Lack of documentation
B. Incompatibility with commercial software
C. Limited vendor support
D. Unpatched security vulnerabilities
Correct Answer: D – Unpatched security vulnerabilities
Explanation: Open-source software may lack timely updates, exposing security
risks.
Incorrect Answers:
A. Documentation is a challenge but not the highest risk.
B. Compatibility issues are manageable.
C. Support limitations can be mitigated by internal expertise.

Question 820
An IS auditor is reviewing access controls for a newly implemented customer portal.
Which of the following findings should be of MOST concern?
A. Passwords must be changed every 60 days
B. Passwords are stored using reversible encryption
C. The portal logs failed login attempts
D. Users can access their own profiles
Correct Answer: B – Passwords are stored using reversible encryption
Explanation: Reversible encryption exposes stored passwords to theft if
compromised.
Incorrect Answers:
A. 60-day changes are standard practice.
C. Logging failed attempts is good.
D. Self-profile access is expected.

Question 821
Which of the following is the PRIMARY purpose of including risk scenarios in an IT
risk management program?
A. To develop key risk indicators (KRIs)
B. To estimate monetary impact of risks
C. To prioritize audit findings
D. To support risk communication and awareness
Correct Answer: D – To support risk communication and awareness
Explanation: Risk scenarios help illustrate real-world impact and facilitate
understanding among stakeholders.
Incorrect Answers:
A. KRIs may be derived later but are not the main reason.
B. Monetary estimation is part of assessment, not scenario development.
C. Audit prioritization uses risk scores, not just scenarios.

Question 822
Which of the following is the MOST important factor when determining the
frequency of vulnerability scans?
A. Number of assets in the network
B. Regulatory requirements
C. Recent system upgrades
D. System criticality and threat landscape
Correct Answer: D – System criticality and threat landscape
Explanation: Frequency should align with risk exposure and sensitivity of systems.
Incorrect Answers:
A. Asset quantity may influence scale, not frequency.
B. Compliance sets minimums, not optimal schedules.
C. Upgrades may trigger scans but don’t define overall frequency.

Question 823
Which of the following should be the FIRST consideration when reviewing IT risk
reporting?
A. Clarity of graphics used
B. Inclusion of audit recommendations
C. Relevance to business objectives
D. Number of risks highlighted
Correct Answer: C – Relevance to business objectives
Explanation: Risk reports must align with what matters most to the organization.
Incorrect Answers:
A. Presentation aids understanding but follows content priority.
B. Recommendations are secondary to relevance.
D. Quantity doesn’t indicate quality.

Question 824
Which of the following best demonstrates a preventive control?
A. System logs
B. Firewalls
C. Intrusion detection systems
D. Incident reports
Correct Answer: B – Firewalls
Explanation: Firewalls restrict access before damage occurs, making them
preventive.
Incorrect Answers:
A. Logs are detective, not preventive.
C. IDS alerts but doesn’t stop attacks.
D. Reports are used post-incident.

Question 825
Which of the following is the PRIMARY benefit of aligning IT projects with strategic
objectives?
A. Increased end-user involvement
B. Improved application security
C. Efficient resource allocation
D. Better compliance with regulations
Correct Answer: C – Efficient resource allocation
Explanation: Alignment ensures resources are used on the most valuable initiatives.
Incorrect Answers:
A. User input is helpful but not the main benefit.
B. Security is project-specific.
D. Compliance may result but isn’t the core benefit.

Question 826
Which of the following is the BEST way to prevent unauthorized changes to source
code in a production environment?
A. Logging all access to production systems
B. Requiring managerial approval for production deployments
C. Using version control with restricted access
D. Enforcing change freeze periods
Correct Answer: C – Using version control with restricted access
Explanation: Version control enforces control and auditability of code changes.
Incorrect Answers:
A. Logs detect after the fact.
B. Approval helps, but enforcement is better with restricted access.
D. Change freezes are time-bound and can be bypassed.

Question 827
Which of the following BEST validates the effectiveness of a training program on
phishing awareness?
A. Number of people attending training
B. Post-training quiz results
C. Decrease in phishing incident reports
D. Increase in phishing simulations
Correct Answer: C – Decrease in phishing incident reports
Explanation: Fewer real-world incidents indicate behavior change from training.
Incorrect Answers:
A. Attendance shows reach, not impact.
B. Quiz scores measure knowledge, not behavior.
D. Simulation increase may be unrelated to performance.

Question 828
Which of the following controls would BEST prevent the installation of unauthorized
software on end-user devices?
A. Host-based intrusion detection
B. Antivirus scanning
C. Application whitelisting
D. Logging administrative actions
Correct Answer: C – Application whitelisting
Explanation: Whitelisting only permits pre-approved applications to run.
Incorrect Answers:
A. Detection systems alert, not prevent.
B. AV scans post-installation.
D. Logging does not prevent actions.

Question 829
Which of the following is MOST important when auditing the configuration of a
cloud-based database?
A. Data replication status
B. Backup configuration
C. User access rights
D. Data processing speeds
Correct Answer: C – User access rights
Explanation: Misconfigured access can expose sensitive data.
Incorrect Answers:
A. Replication is relevant to recovery, not audit priority.
B. Backups matter, but access rights are higher risk.
D. Speed is performance-related, not security-focused.

Question 830
Which of the following is the PRIMARY reason for conducting control self-
assessments (CSAs)?
A. Reduce external audit costs
B. Identify and mitigate risk early
C. Support regulatory compliance
D. Provide input to the audit plan
Correct Answer: B – Identify and mitigate risk early
Explanation: CSAs enable proactive identification and correction of control
weaknesses.
Incorrect Answers:
A. Cost savings are secondary.
C. Compliance is supported but not the primary goal.
D. Audit plans may use CSA input but not the main reason.

Question 831
Which of the following is MOST important when selecting a key performance
indicator (KPI) for IT governance?
A. The indicator is based on historical performance
B. The indicator supports regulatory compliance
C. The indicator reflects a business objective
D. The indicator can be measured monthly
Correct Answer: C – The indicator reflects a business objective
Explanation: KPIs must directly align with what the business is trying to achieve.
Incorrect Answers:
A. Historical data may not reflect future needs.
B. Compliance is a factor but not always the main driver.
D. Frequency is useful but not more important than relevance.

Question 832
Which of the following would be of GREATEST concern to an IS auditor during an
audit of e-commerce systems?
A. No daily reconciliation of sales data
B. Weak encryption on payment data
C. Poorly documented user roles
D. Customer satisfaction scores below targets
Correct Answer: B – Weak encryption on payment data
Explanation: Sensitive payment information must be securely protected to avoid
data breaches.
Incorrect Answers:
A. Reconciliation is important but not as critical.
C. Documentation helps auditing but doesn't directly pose risk.
D. Satisfaction scores are performance metrics, not security risks.

Question 833
Which of the following is the BEST approach for ensuring effective patch
management?
A. Implementing a 90-day patching cycle
B. Relying on vendor patch alerts
C. Classifying assets based on criticality
D. Scheduling patches quarterly
Correct Answer: C – Classifying assets based on criticality
Explanation: Prioritizing based on criticality ensures high-risk systems are patched
first.
Incorrect Answers:
A & D. Fixed schedules may not be responsive to urgent threats.
B. Alerts are useful but don’t ensure implementation.

Question 834
What is the PRIMARY objective of a post-implementation review?
A. To conduct end-user satisfaction surveys
B. To validate business case assumptions
C. To review code quality and documentation
D. To assess training effectiveness
Correct Answer: B – To validate business case assumptions
Explanation: Reviews determine if the expected benefits were realized after
implementation.
Incorrect Answers:
A. Surveys are tools, not the main objective.
C. Code quality is checked earlier.
D. Training is a component, not the purpose.
Question 835
Which of the following provides the MOST effective mechanism for ensuring that end
users comply with security policies?
A. Disciplinary action
B. Management buy-in
C. Security awareness training
D. Periodic policy reviews
Correct Answer: C – Security awareness training
Explanation: Educating users promotes understanding and reduces accidental
violations.
Incorrect Answers:
A. Punishment is reactive, not proactive.
B. Buy-in helps culture but doesn’t directly ensure compliance.
D. Reviews support updates, not enforcement.

Question 836
Which of the following provides the BEST assurance of data integrity in transit?
A. Digital certificates
B. Strong passwords
C. Secure File Transfer Protocol (SFTP)
D. Hashing
Correct Answer: D – Hashing
Explanation: Hashes verify data has not been altered during transmission.
Incorrect Answers:
A. Certificates authenticate, not verify integrity.
B. Passwords restrict access but don’t confirm data integrity.
C. SFTP secures the channel but doesn’t detect tampering.

Question 837
Which of the following BEST reduces the risk of internal fraud related to cash
disbursements?
A. Conducting periodic internal audits
B. Restricting disbursement access to senior staff
C. Enforcing segregation of duties
D. Using encrypted payment gateways
Correct Answer: C – Enforcing segregation of duties
Explanation: Prevents one person from controlling the entire transaction process.
Incorrect Answers:
A. Audits are detective, not preventive.
B. Senior access doesn’t remove risk.
D. Encryption secures data, not fraud.
Question 838
Which of the following is the PRIMARY concern when using open-source software in
enterprise systems?
A. Lack of user-friendly documentation
B. Limited community support
C. Unpatched vulnerabilities
D. Compatibility with proprietary systems
Correct Answer: C – Unpatched vulnerabilities
Explanation: Open-source tools may lack timely security updates, increasing risk.
Incorrect Answers:
A. Documentation is a usability issue.
B. Many projects have strong support.
D. Compatibility issues are manageable.

Question 839
What is the PRIMARY purpose of a control objective?
A. To define how a control is implemented
B. To determine audit scope
C. To describe the desired result of a control
D. To provide technical specifications
Correct Answer: C – To describe the desired result of a control
Explanation: Control objectives state what the control is meant to achieve.
Incorrect Answers:
A. That’s the role of control procedures.
B. Scope is influenced by objectives but not their purpose.
D. Objectives are broader than technical details.

Question 840
Which of the following BEST demonstrates due diligence in vendor risk
management?
A. Signing a contract with a vendor
B. Reviewing vendor invoices
C. Performing regular third-party audits
D. Ensuring prompt payments
Correct Answer: C – Performing regular third-party audits
Explanation: Ongoing audits confirm compliance and risk mitigation.
Incorrect Answers:
A. Contracts alone don’t ensure compliance.
B. Invoice reviews focus on finance, not risk.
D. Payment is unrelated to due diligence.
Question 841
Which of the following would be the BEST method to ensure an organization’s
software license compliance?
A. Conducting regular software audits
B. Reviewing the IT budget allocation
C. Installing software only on critical systems
D. Limiting employee software installation rights
Correct Answer: A – Conducting regular software audits
Explanation: Software audits help ensure only licensed software is used and
installed properly.
Incorrect Answers:
B. Budget review doesn’t track actual installations.
C. Installing on fewer systems doesn’t ensure compliance.
D. Limiting rights helps but does not verify usage.

Question 842
An IS auditor is reviewing a system implementation project. Which of the following
findings would be of MOST concern?
A. Users received only virtual training
B. A post-implementation review was not conducted
C. Project milestones were delayed
D. External consultants were hired
Correct Answer: B – A post-implementation review was not conducted
Explanation: This review assesses whether project objectives were met and issues
are addressed.
Incorrect Answers:
A. Training type is less critical than completion.
C. Delays are not necessarily critical.
D. Use of consultants is common.

Question 843
What is the PRIMARY purpose of a risk register?
A. To document policies for IT risk
B. To list mitigation controls
C. To capture and track identified risks
D. To assign roles for risk ownership
Correct Answer: C – To capture and track identified risks
Explanation: A risk register is used to record and monitor organizational risks.
Incorrect Answers:
A. Policies are part of governance, not the register.
B. Controls are related but not the register’s core purpose.
D. Ownership is documented but not the main purpose.

Question 844
Which of the following BEST reduces the risk of data leakage from cloud
applications?
A. Encrypting data before upload
B. Reducing storage time
C. Setting up frequent backups
D. Migrating only public data
Correct Answer: A – Encrypting data before upload
Explanation: Encryption ensures data confidentiality, even if intercepted.
Incorrect Answers:
B. Retention affects storage, not leakage risk.
C. Backups relate to availability.
D. Limiting data scope reduces exposure but not leakage risk.

Question 845
Which of the following is MOST likely to detect unauthorized changes to system
configurations?
A. Firewall logs
B. Configuration management database (CMDB)
C. Change control board (CCB) reviews
D. File integrity monitoring (FIM)
Correct Answer: D – File integrity monitoring (FIM)
Explanation: FIM detects unauthorized system changes in real time.
Incorrect Answers:
A. Logs may not cover configuration files.
B. CMDB shows status but not unauthorized change.
C. CCB ensures approval, not detection.

Question 846
Which of the following would BEST help management identify potential emerging
risks to IT operations?
A. Security incident trend analysis
B. Key performance indicator (KPI) dashboards
C. Threat intelligence feeds
D. End-user surveys
Correct Answer: C – Threat intelligence feeds
Explanation: These provide early warning about new and evolving threats.
Incorrect Answers:
A. Trends analyze past issues.
B. KPIs show performance, not threat emergence.
D. Surveys reflect perception, not technical risk.

Question 847
Which of the following is the PRIMARY benefit of using multifactor authentication
(MFA)?
A. Reduces help desk calls
B. Increases system performance
C. Strengthens access security
D. Enhances password recovery
Correct Answer: C – Strengthens access security
Explanation: MFA provides additional security layers beyond just passwords.
Incorrect Answers:
A. It may increase, not reduce, support calls.
B. No performance gain is guaranteed.
D. MFA isn’t related to password reset.

Question 848
Which of the following is the BEST approach to ensure accountability for security
breaches?
A. Implement incident response plans
B. Track user activity with audit logs
C. Enforce complex password policies
D. Install endpoint protection software
Correct Answer: B – Track user activity with audit logs
Explanation: Logs provide traceability of actions, which enables accountability.
Incorrect Answers:
A. Response plans help after breaches.
C. Passwords help prevent access, not track users.
D. Endpoint protection defends, not logs actions.

Question 849
Which of the following should an IS auditor recommend to BEST support data
retention policy compliance?
A. Encryption of all stored data
B. Automated data archiving tools
C. Disaster recovery testing
D. Staff awareness training
Correct Answer: B – Automated data archiving tools
Explanation: Automation ensures timely and consistent enforcement of retention
policies.
Incorrect Answers:
A. Encryption protects data but doesn’t manage retention.
C. DR testing focuses on availability, not retention.
D. Training supports but doesn’t enforce compliance.

Question 850
Which of the following provides the GREATEST assurance that the configuration of
virtual machines (VMs) is in compliance with security policies?
A. Reviewing audit logs
B. Vulnerability scans
C. Security baselines
D. Penetration testing
Correct Answer: C – Security baselines
Explanation: Baselines define the required configuration, ensuring consistency and
compliance.
Incorrect Answers:
A. Logs show activity, not configuration.
B. Scans detect issues but don’t define standard.
D. Pen tests reveal flaws, not policy compliance.

Question 851
Which of the following is the PRIMARY reason to maintain version control in system
development?
A. Ensure traceability of code changes
B. Enforce user acceptance testing
C. Simplify deployment of patches
D. Enable rollback of incorrect changes
Correct Answer: A – Ensure traceability of code changes
Explanation: Version control maintains a record of changes, supporting
accountability and traceability.
Incorrect Answers:
B. UAT is separate from version control.
C. Patching can benefit, but not the primary reason.
D. Rollback is a benefit, but not the main objective.

Question 852
Which of the following would be the MOST appropriate compensating control when
segregation of duties is not feasible?
A. Periodic user access review
B. Dual control
C. Strong password policy
D. Two-factor authentication
Correct Answer: B – Dual control
Explanation: Dual control prevents single-user control over critical functions,
compensating for lack of segregation.
Incorrect Answers:
A. Reviews are detective, not preventive.
C. Passwords alone do not prevent abuse of access.
D. MFA secures access, not responsibilities division.

Question 853
Which of the following is the MOST significant risk when end users are allowed to
develop spreadsheet-based applications?
A. Lack of access control
B. Inconsistent design standards
C. Poor documentation
D. Inadequate testing
Correct Answer: A – Lack of access control
Explanation: Unauthorized access or data manipulation is a major risk in user-
developed tools.
Incorrect Answers:
B. Design consistency is less critical than security.
C. Documentation helps but is not the main risk.
D. Testing is important but secondary to access control.

Question 854
An IS auditor finds that security policies are not regularly reviewed. What is the
GREATEST risk?
A. Decreased employee awareness
B. Inconsistent application of controls
C. Outdated procedures not addressing new threats
D. Legal noncompliance
Correct Answer: C – Outdated procedures not addressing new threats
Explanation: Policies must evolve with the threat landscape to remain effective.
Incorrect Answers:
A. Awareness relates to training.
B. Control consistency is a risk but not the greatest.
D. Legal risk depends on the nature of the outdated policy.

Question 855
Which of the following is the MOST important factor when selecting a cloud service
provider for data hosting?
A. Cost of service
B. Service level agreements (SLAs)
C. Number of datacenters
D. Length of contract
Correct Answer: B – Service level agreements (SLAs)
Explanation: SLAs define performance, uptime, and responsibilities, critical for
assurance.
Incorrect Answers:
A. Cost is important but not primary for risk mitigation.
C. More datacenters ≠ better service.
D. Contract length affects continuity, not quality.

Question 856
Which of the following is the BEST justification for implementing a centralized log
management system?
A. Faster data recovery
B. Improved user authentication
C. Easier compliance reporting
D. Reduced storage requirements
Correct Answer: C – Easier compliance reporting
Explanation: Centralized logging improves traceability and reporting for audit and
compliance.
Incorrect Answers:
A. Recovery relates to backup.
B. Authentication is a separate mechanism.
D. Log centralization often increases storage use.

Question 857
Which of the following would BEST help reduce the risk of unauthorized physical
access to a datacenter?
A. Security cameras
B. Smartcard access controls
C. Sign-in registers
D. Surveillance logs review
Correct Answer: B – Smartcard access controls
Explanation: Preventive controls like smartcards limit access to authorized
individuals.
Incorrect Answers:
A. Cameras are detective, not preventive.
C. Sign-in sheets can be bypassed.
D. Reviewing logs detects, not prevents.
Question 858
Which of the following is the MOST appropriate control to prevent unauthorized
changes in the production environment?
A. Role-based access control
B. Patch management policies
C. Application firewall
D. Intrusion detection system
Correct Answer: A – Role-based access control
Explanation: Role-based controls enforce segregation of duties and limit
unauthorized changes.
Incorrect Answers:
B. Patch policy controls updates, not unauthorized access.
C. Firewalls protect from external threats.
D. IDS is for detection, not prevention.

Question 859
Which of the following is MOST important to confirm when reviewing audit trails for
security violations?
A. Time synchronization across systems
B. Number of administrators
C. Firewall rule configuration
D. Patch management status
Correct Answer: A – Time synchronization across systems
Explanation: Accurate and synchronized time ensures logs are reliable and events
correlate.
Incorrect Answers:
B. Admin count is relevant, but not for log integrity.
C. Firewall rules are unrelated to audit trail correlation.
D. Patching is about vulnerability, not logs.

Question 860
Which of the following is MOST important for an organization to address before
implementing Internet of Things (IoT) devices?
A. Power consumption
B. Vendor service contracts
C. Device encryption and authentication
D. Device cost and availability
Correct Answer: C – Device encryption and authentication
Explanation: Security is a primary concern with IoT due to broad connectivity and
data exposure.
Incorrect Answers:
A. Power is a minor operational issue.
B. Contracts matter after security is ensured.
D. Cost is secondary to data protection.

Question 861
In which of the following system development life cycle (SDLC) phases would an IS
auditor expect to find that controls have been incorporated into system
specifications?
A. Design
B. Feasibility
C. Implementation
D. Development
Correct Answer: A – Design
Explanation: The design phase is when system specifications are developed,
including controls that ensure security, accuracy, and completeness.
Incorrect Answers:
B. Feasibility assesses viability, not control specification.
C. Implementation involves deploying systems, not designing controls.
D. Development focuses on coding, not control design.

Question 862
Which of the following is the GREATEST advantage of vulnerability scanning over
penetration testing?
A. The testing process can be automated to cover large groups of assets
B. The testing produces a lower number of false positive results
C. Custom-developed applications can be tested more accurately
D. Network bandwidth is utilized more efficiently
Correct Answer: A – The testing process can be automated to cover
large groups of assets
Explanation: Vulnerability scanning can be automated and scaled for large asset
inventories, making it efficient for regular assessments.
Incorrect Answers:
B. Vulnerability scanning often produces more false positives than pen testing.
C. Pen testing is better suited for custom applications.
D. Network efficiency is not the main advantage of scanning.

Question 863
A CFO has requested an audit of IT capacity management due to a series of finance
system slowdowns during month-end reporting. What would be MOST important to
consider before including this audit in the program?
A. Whether the system's performance poses a significant risk to the organization
B. Whether stakeholders are committed to assisting with the audit
C. Whether system delays result in more frequent use of manual processing
D. Whether internal auditors have the required skills to perform the audit
Correct Answer: A – Whether the system's performance poses a
significant risk to the organization
Explanation: The audit's inclusion depends on the risk significance. If the issue
impacts critical operations like financial reporting, it becomes a high priority.
Incorrect Answers:
B–D are relevant but secondary to evaluating risk impact.

Question 864
An organization has introduced a capability maturity model to the system
development life cycle (SDLC) to measure improvements. Which of the following is
the BEST indication of successful process improvement?
A. Evaluation results align with defined business goals
B. Processes demonstrate the mitigation of inherent business risk
C. Evaluation results exceed process maturity benchmarks against competitors
D. Process maturity reaches the highest state of process optimization
Correct Answer: A – Evaluation results align with defined business
goals
Explanation: Process improvement success is best measured by alignment with
business objectives.
Incorrect Answers:
B. Risk mitigation is important but not the primary success indicator.
C. Exceeding benchmarks doesn’t guarantee goal alignment.
D. Reaching full optimization may not be necessary or realistic.

Question 865
Which of the following is a concern associated with virtualization?
A. One host may have multiple versions of the same operating system
B. Performance issues with the host could impact the guest operating systems
C. The physical footprint of servers could decrease within the data center
D. Processing capacity may be shared across multiple operating systems
Correct Answer: B – Performance issues with the host could impact
the guest operating systems
Explanation: A key risk in virtualization is that problems on the host affect all
guest VMs running on it.
Incorrect Answers:
A. Not a concern; it's common and manageable.
C. This is a benefit, not a risk.
D. This is normal in virtualized environments, not a specific concern.
Question 866
An organization is planning to implement a work-from-home policy that allows users
to work remotely as needed. Which of the following is the BEST solution for ensuring
secure remote access to corporate resources?
A. Virtual desktop
B. Virtual private network (VPN)
C. Multi-factor authentication
D. Additional firewall rules
Correct Answer: A – Virtual desktop
Explanation: Virtual desktops centralize access, enhance control, and minimize data
leakage, making them ideal for secure remote access.
Incorrect Answers:
B. VPN provides secure connection but lacks endpoint control.
C. MFA strengthens authentication but doesn’t control data flow.
D. Firewall rules alone are insufficient.

Question 867
An IS auditor is evaluating the progress of a web-based customer service application
development project. Which of the following would be MOST helpful for this
evaluation?
A. Developer status reports
B. Critical path analysis reports
C. Change management logs
D. Backlog consumption reports
Correct Answer: D – Backlog consumption reports
Explanation: Backlog reports show how efficiently tasks are being completed over
time and help measure progress.
Incorrect Answers:
A. Developer status reports are subjective.
B. Critical path analysis is for project planning.
C. Change logs are more relevant to configuration control.

Question 868
Which of the following should be of GREATEST concern to an IS auditor assessing
the effectiveness of an organization's release management processes?
A. Some releases are carried out with no supporting release documentation
B. Some releases exceeded the agreed-upon outage window
C. Release documentation does not follow a consistent format for all systems
D. Release management policies have not been updated in the past two years
Correct Answer: A – Some releases are carried out with no supporting
release documentation
Explanation: Lack of documentation compromises traceability, rollback capability,
and accountability, posing high risk.
Incorrect Answers:
B. Important, but operational.
C. Format inconsistencies are less critical.
D. Policy updates are important, but not the most immediate concern.

Question 869
Which of the following management decisions presents the GREATEST risk
associated with data leakage?
A. Staff is allowed to work remotely.
B. There is no requirement for desktops to be encrypted.
C. Security awareness training is not provided to staff.
D. Security policies have not been updated in the past year.
Correct Answer: B – There is no requirement for desktops to be
encrypted
Explanation: Unencrypted desktops can expose sensitive data if lost or stolen.
Incorrect Answers:
A. Remote work is manageable with controls.
C. Training helps but doesn’t physically protect data.
D. Policies guide behavior but are ineffective if not enforced.

Question 870
An IS auditor is reviewing an organization’s incident management processes and
procedures. Which of the following observations should be the auditor’s GREATEST
concern?
A. Incidents are logged and documented manually
B. Escalation procedures are not defined for all incident types
C. Post-incident review meetings are not held
D. Incident response timelines are not documented
Correct Answer: B – Escalation procedures are not defined for all
incident types
Explanation: Without defined escalation, critical incidents may not be addressed
timely, increasing risk exposure.
Incorrect Answers:
A. Manual logging is inefficient but functional.
C. Post-incident reviews are for improvement, not immediate response.
D. Timelines aid accountability but are less critical than escalation.

Question 871
Which of the following is the PRIMARY purpose of an engagement letter in an IS
audit?
A. Outline the IS auditor’s scope of work
B. Obtain management's commitment to remediate findings
C. Define the overall structure of the audit function
D. Communicate the organization’s mission and values
Correct Answer: A – Outline the IS auditor’s scope of work
Explanation: The engagement letter formally defines the scope, objectives, timing,
and responsibilities of the audit engagement.
Incorrect Answers:
B. This is done in the follow-up stage.
C. This is defined in the audit charter.
D. This is addressed in organizational governance documents.

Question 872
Which of the following would BEST protect against unauthorized changes to
production programs?
A. Logging user activity in production
B. Enforcing separation of development and production environments
C. Using a password to access the production environment
D. Requiring approval for software updates
Correct Answer: B – Enforcing separation of development and
production environments
Explanation: Separation of environments is a key preventive control against
unauthorized changes.
Incorrect Answers:
A. Logging is detective, not preventive.
C. Passwords alone do not prevent unauthorized changes.
D. Approval helps but does not ensure enforcement.

Question 873
Which of the following BEST demonstrates that an organization’s IT governance is
aligned with its business objectives?
A. The organization conducts quarterly IT risk assessments
B. IT investments are prioritized based on business strategy
C. All IT policies are updated annually
D. An IT steering committee exists
Correct Answer: B – IT investments are prioritized based on business
strategy
Explanation: Prioritizing IT initiatives based on business strategy shows alignment.
Incorrect Answers:
A. Risk assessments are important but not sufficient.
C. Policy updates do not directly demonstrate alignment.
D. A committee's existence does not ensure alignment.

Question 874
Which of the following is MOST likely to prevent unauthorized internal access to
sensitive customer data?
A. Strong password policies
B. Periodic vulnerability scanning
C. Role-based access controls
D. Encryption of stored data
Correct Answer: C – Role-based access controls
Explanation: RBAC ensures users access only the data necessary for their roles.
Incorrect Answers:
A. Strong passwords are helpful but insufficient alone.
B. Scanning identifies issues but does not prevent access.
D. Encryption protects data at rest but not necessarily access.

Question 875
Which of the following provides the MOST value when testing business continuity
planning (BCP)?
A. Reviewing the documented recovery time objectives
B. Reviewing business continuity policies
C. Performing a full-scale simulation of a disaster
D. Conducting a BCP awareness training
Correct Answer: C – Performing a full-scale simulation of a disaster
Explanation: A full-scale simulation tests the plan's practical effectiveness.
Incorrect Answers:
A. Reviewing documents doesn't test effectiveness.
B. Policies are important but don't prove functionality.
D. Training alone does not test capabilities.

Question 876
Which of the following is the PRIMARY purpose of maintaining a chain of custody
during a forensic investigation?
A. To ensure the admissibility of evidence in court
B. To support internal security policy compliance
C. To track investigation resource usage
D. To identify the root cause of an incident
Correct Answer: A – To ensure the admissibility of evidence in court
Explanation: Chain of custody helps maintain integrity and evidential value.
Incorrect Answers:
B. Compliance is a secondary benefit.
C. Not the main purpose.
D. This is a result, not the reason.

Question 877
What is the PRIMARY purpose of data normalization in an analytics audit?
A. Minimize the need for encryption
B. Protect data from unauthorized modification
C. Ensure consistency across data sources
D. Improve the quality of audit sampling
Correct Answer: C – Ensure consistency across data sources
Explanation: Normalization standardizes data formats and values across systems.
Incorrect Answers:
A. Not related to encryption.
B. That’s handled by controls, not normalization.
D. Sampling is separate from normalization.

Question 878
Which of the following would BEST support an IS auditor's evaluation of segregation
of duties?
A. Password policy logs
B. Access control matrix
C. Incident response plan
D. Antivirus software logs
Correct Answer: B – Access control matrix
Explanation: This matrix maps user roles to privileges and shows potential
conflicts.
Incorrect Answers:
A. Password logs don't reveal role conflicts.
C. IR plans are not related.
D. Antivirus logs are unrelated.

Question 879
What is the PRIMARY benefit of including business process owners in the risk
assessment process?
A. They understand IT architecture and controls
B. They define technical mitigation actions
C. They provide insight into business impacts of risks
D. They ensure IT policies are followed
Correct Answer: C – They provide insight into business impacts of
risks
Explanation: Business owners understand operational impacts better than IT staff.
Incorrect Answers:
A. This is typically IT’s role.
B. Not their primary function.
D. They may enforce but not define IT policy.

Question 880
Which of the following techniques would BEST detect unauthorized modifications to
production data?
A. System performance monitoring
B. Data loss prevention (DLP) solutions
C. File integrity monitoring (FIM)
D. Identity and access management (IAM) systems
Correct Answer: C – File integrity monitoring (FIM)
Explanation: FIM detects changes to files, making it ideal for spotting
unauthorized modifications.
Incorrect Answers:
A. System monitoring does not show file integrity.
B. DLP prevents leaks, not modifications.
D. IAM manages access, not data changes.

Question 881
Which of the following is a deterrent security control that reduces the likelihood of
an insider threat event?
A. Removing malicious code
B. Distributing disciplinary policies
C. Creating contingency plans
D. Executing data recovery procedures
Correct Answer: B – Distributing disciplinary policies
Explanation:
Disciplinary policies act as a deterrent by making employees aware of the
consequences of inappropriate actions, reducing the likelihood of insider threats.
Incorrect Answers:
A. Removing malicious code is corrective, not deterrent.
C. Contingency plans mitigate the impact, not likelihood.
D. Data recovery addresses the aftermath of an incident.

Question 882
While evaluating the data classification process of an organization, an IS auditor’s
PRIMARY focus should be on whether:
A. data is correctly classified
B. a data dictionary is maintained
C. data retention requirements are clearly defined
D. data classifications are automated
Correct Answer: A – Data is correctly classified
Explanation:
The auditor should focus on whether data is correctly classified so that appropriate
protection mechanisms are applied based on data sensitivity.
Incorrect Answers:
B. A data dictionary helps but does not ensure correct classification.
C. Retention is secondary to classification accuracy.
D. Automation supports efficiency but is not the primary audit concern.

Question 883
Which of the following auditing techniques would be used to detect the validity of a
credit card transaction based on time, location, and date of purchase?
A. Integrated test facility (ITF)
B. Data analytics
C. Hash totals
D. Check sums
Correct Answer: B – Data analytics
Explanation:
Data analytics can be used to analyze transaction patterns across time and
geography to identify anomalies or fraudulent behavior.
Incorrect Answers:
A. ITF simulates transactions, not pattern detection.
C & D. These verify data integrity, not behavioral anomalies.

Question 884
Which of the following poses the GREATEST risk to a virtualized environment?
A. Server cloning occurs without appropriate approval from IT management
B. A network map has not been updated
C. Backup testing does not occur at regular intervals
D. Security zones within the environment are combined
Correct Answer: D – Security zones within the environment are
combined
Explanation:
Combining security zones compromises isolation, increasing attack surface and the
risk of lateral movement.
Incorrect Answers:
A. While risky, cloning can be controlled.
B. Network maps are documentation issues.
C. Backup testing is operational but not the greatest security risk.
Question 885
Capacity management tools are PRIMARILY used to ensure that:
A. available resources are used efficiently and effectively
B. concurrent use by a large number of users is enabled
C. proposed hardware acquisitions meet capacity requirements
D. computer systems are used to their maximum capacity most of the time
Correct Answer: A – Available resources are used efficiently and
effectively
Explanation:
Capacity management ensures that IT resources are efficiently utilized to meet
current and future business needs.
Incorrect Answers:
B. Concurrent use is an output, not the primary purpose.
C. Hardware proposals are influenced by capacity tools, not their main focus.
D. Maximum usage isn’t always desirable; efficiency is key.

Question 886
Which of the following is an example of personally identifiable information (PII)?
A. Office address
B. Marital status
C. Passport number
D. Date of birth
Correct Answer: C – Passport number
Explanation:
Passport numbers uniquely identify an individual and are classified as sensitive PII.
Incorrect Answers:
A, B, and D are PII, but not as uniquely identifying as C.

Question 887
Which of the following analytical methods would be MOST useful when trying to
identify groups with similar behavior or characteristics in a large population?
A. Deviation detection
B. Cluster sampling
C. Random sampling
D. Classification
Correct Answer: D – Classification
Explanation:
Classification helps categorize data into predefined groups based on attributes or
behavior.
Incorrect Answers:
A. Detects outliers.
B & C. Are sampling techniques, not classification techniques.

Question 888
Which of the following BEST addresses the availability of an online store?
A. Online backups
B. A mirrored site at another location
C. Clustered architecture
D. RAID level 5 storage devices
Correct Answer: B – A mirrored site at another location
Explanation:
A mirrored site ensures business continuity and availability in case of failure at the
primary site.
Incorrect Answers:
A. Online backups support recovery, not real-time availability.
C. Clustering helps but is local.
D. RAID handles disk failures, not site failures.

Question 889
Who would provide an IS auditor with the MOST helpful input during an interview
to determine whether business requirements for an application were met?
A. User management
B. Project sponsors
C. Senior management
D. Project management
Correct Answer: A – User management
Explanation:
Users are the best source to confirm if business requirements were met as they
interact with the system directly.
Incorrect Answers:
B. Sponsors provide strategic goals.
C. Senior management has limited operational perspective.
D. Project management ensures delivery but not effectiveness.

Question 890
Which of the following should be an IS auditor’s GREATEST concern when assessing
an IT service configuration database?
A. The database is not encrypted at rest
B. The database is read-accessible for all users
C. The database is executable for all users
D. The database is write-accessible for all users
Correct Answer: D – The database is write-accessible for all users
Explanation:
Write access allows unauthorized modifications, posing the greatest integrity risk.
Incorrect Answers:
A. Encryption protects confidentiality.
B. Read access is less dangerous.
C. Executable databases are rare, but less of a concern than write access.
Question 891
Which of the following is the GREATEST benefit to an organization as a result of
effective IS audit risk assessments?
A. Credibility with management is enhanced
B. The scope for future audits is established
C. Low-risk areas can be eliminated
D. Audits will be targeted to high-risk areas
Correct Answer: D – Audits will be targeted to high-risk areas
Explanation: Effective IS audit risk assessments help ensure that audit efforts are
focused on the areas that present the greatest risk, thereby optimizing the use of
resources.
Incorrect Answers:
A. Credibility is a by-product, not the main goal.
B. Scoping follows prioritization.
C. Low-risk areas may still require minimal coverage.

Question 892
A white box testing method is applicable with which of the following testing
processes?
A. Sociability testing
B. Integration testing
C. Parallel testing
D. User acceptance testing (UAT)
Correct Answer: B – Integration testing
Explanation: White box testing is typically used during integration testing to verify
the internal structure and flow of data between modules.
Incorrect Answers:
A. Sociability testing focuses on system interaction, not internal logic.
C. Parallel testing compares outputs between systems.
D. UAT focuses on user requirements, not code structure.

Question 893
Which of the following is the GREATEST risk related to the use of virtualized
environments?
A. There may be increased potential for session hijacking.
B. There may be insufficient processing capacity to assign to guests.
C. Ability to change operating systems may be limited.
D. The host may be a potential single point of failure within the system.
Correct Answer: D – The host may be a potential single point of
failure within the system
Explanation: In virtualized environments, if the host fails, all guest systems running
on it may also fail.
Incorrect Answers:
A. Session hijacking is a risk but less critical than full system failure.
B. Capacity issues can be managed.
C. OS flexibility is not a critical risk.

Question 894
Which of the following is a deterrent security control that reduces the likelihood of
an insider threat event?
A. Removing malicious code
B. Distributing disciplinary policies
C. Creating contingency plans
D. Executing data recovery procedures
Correct Answer: B – Distributing disciplinary policies
Explanation: Disciplinary policies act as deterrents by warning employees of
consequences, reducing insider threats.
Incorrect Answers:
A. Removing malicious code is corrective.
C. Contingency plans are recovery strategies.
D. Data recovery is a corrective measure.

Question 895
While evaluating the data classification process of an organization, an IS auditor’s
PRIMARY focus should be on whether:
A. data is correctly classified
B. a data dictionary is maintained
C. data retention requirements are clearly defined
D. data classifications are automated
Correct Answer: A – Data is correctly classified
Explanation: Correct classification ensures that data receives appropriate levels of
protection based on its sensitivity.
Incorrect Answers:
B. Data dictionaries support classification but are not the focus.
C. Retention is a separate control.
D. Automation supports efficiency, not accuracy.

Question 896
Which of the following auditing techniques would be used to detect the validity of a
credit card transaction based on time, location, and date of purchase?
A. Integrated test facility (ITF)
B. Data analytics
C. Hash totals
D. Check sums
Correct Answer: B – Data analytics
Explanation: Data analytics can analyze transaction patterns (time, location, etc.)
to identify anomalies or fraud.
Incorrect Answers:
A. ITF simulates transactions, not evaluates real ones.
C. Hash totals ensure integrity, not validity.
D. Checksums detect data transmission errors.

Question 897
Which of the following poses the GREATEST risk to a virtualized environment?
A. Server cloning occurs without appropriate approval from IT management.
B. A network map has not been updated.
C. Backup testing does not occur at regular intervals.
D. Security zones within the environment are combined.
Correct Answer: D – Security zones within the environment are
combined
Explanation: Combining security zones can lead to insufficient isolation, increasing
attack surface.
Incorrect Answers:
A. Unauthorized cloning is risky but less impactful.
B. Network maps help planning, not security per se.
C. Backup testing is important but not the top risk here.

Question 898
Capacity management tools are PRIMARILY used to ensure that:
A. available resources are used efficiently and effectively
B. concurrent use by a large number of users is enabled
C. proposed hardware acquisitions meet capacity requirements
D. computer systems are used to their maximum capacity most of the time
Correct Answer: A – Available resources are used efficiently and
effectively
Explanation: Capacity management focuses on resource optimization to meet
current and future demands.
Incorrect Answers:
B. This is a result of good management, not the focus.
C. This is a subset of the broader goal.
D. Constant maximum use may lead to overload.

Question 899
Which of the following is an example of personally identifiable information (PII)?
A. Office address
B. Marital status
C. Passport number
D. Date of birth
Correct Answer: C – Passport number
Explanation: Passport numbers are unique identifiers and are classified as sensitive
PII.
Incorrect Answers:
A. Office address is generally public.
B. Marital status is not uniquely identifying.
D. Date of birth is sensitive but not always uniquely identifying.

Question 900
Which of the following analytical methods would be MOST useful when trying to
identify groups with similar behavior or characteristics in a large population?
A. Deviation detection
B. Cluster sampling
C. Random sampling
D. Classification
Correct Answer: B – Cluster sampling
Explanation: Cluster sampling groups similar data together, making it suitable for
behavior or characteristic-based analysis.
Incorrect Answers:
A. Deviation detection finds outliers.
C. Random sampling is used for unbiased selection.
D. Classification assigns predefined categories, not group discovery.

Question 901
Which of the following BEST addresses the availability of an online store?
A. Online backups
B. A mirrored site at another location
C. Clustered architecture
D. RAID level 5 storage devices
Correct Answer: B – A mirrored site at another location
Explanation: A mirrored site ensures high availability by providing redundancy in
case of site failure.
Incorrect Answers:
A. Online backups aid in data recovery, not immediate availability.
C. Clustered architecture supports performance and failover, but not full site
redundancy.
D. RAID 5 ensures disk-level redundancy, not site-level availability.
Question 902
Who would provide an IS auditor with the MOST helpful input during an interview
to determine whether business requirements for an application were met?
A. User management
B. Project sponsors
C. Senior management
D. Project management
Correct Answer: A – User management
Explanation: User management is closest to day-to-day operations and can confirm
if the system meets business needs.
Incorrect Answers:
B. Sponsors focus on strategic alignment, not functional effectiveness.
C. Senior management sets goals but may lack implementation detail.
D. Project managers focus on delivery, not post-deployment satisfaction.

Question 903
Which of the following should be an IS auditor’s GREATEST concern when assessing
an IT service configuration database?
A. The database is not encrypted at rest.
B. The database is read-accessible for all users.
C. The database is executable for all users.
D. The database is write-accessible for all users.
Correct Answer: D – The database is write-accessible for all users
Explanation: Allowing write access to all users poses a serious integrity risk.
Incorrect Answers:
A. Encryption at rest protects confidentiality but not integrity.
B. Read access may affect confidentiality, not integrity.
C. Executable access is uncommon for databases and less relevant than write access.

Question 904
Which of the following is the PRIMARY responsibility of an IT steering committee?
A. Prioritizing IT projects in accordance with business requirements
B. Validating and monitoring the skill sets of IT department staff
C. Establishing IT budgets for the business
D. Reviewing periodic IT risk assessments
Correct Answer: A – Prioritizing IT projects in accordance with
business requirements
Explanation: The IT steering committee aligns IT initiatives with business goals.
Incorrect Answers:
B. This is typically HR or departmental leadership’s responsibility.
C. Budgets are usually determined by finance and senior leadership.
D. Risk assessment review is important but secondary to strategic alignment.

Question 905
Which of the following provides an IS auditor assurance that the interface between a
point-of-sale (POS) system and the general ledger is transferring sales data
completely and accurately?
A. Electronic copies of customer sales receipts are maintained.
B. Monthly bank statements are reconciled without exception.
C. The data transferred over the POS interface is encrypted.
D. Nightly batch processing has been replaced with real-time processing.
Correct Answer: D – Nightly batch processing has been replaced with
real-time processing
Explanation: Real-time integration reduces errors and ensures immediate recording.
Incorrect Answers:
A. Receipts do not confirm interface data accuracy.
B. Bank reconciliation doesn’t verify internal system interface.
C. Encryption protects confidentiality, not accuracy or completeness.

Question 906
An IS audit manager is reviewing workpapers for a recently completed audit of the
corporate disaster recovery test. Which of the following should the IS audit manager
specifically review to substantiate the conclusions?
A. Overviews of interviews between data center personnel and the auditor
B. Summary memos reflecting audit opinions regarding noted weaknesses
C. Detailed evidence of the successes and weaknesses of all contingency testing
D. Prior audit reports involving other corporate disaster recovery audits
Correct Answer: C – Detailed evidence of the successes and
weaknesses of all contingency testing
Explanation: Detailed evidence provides the basis for audit conclusions.
Incorrect Answers:
A. Interviews offer insight, but are not conclusive evidence.
B. Summary memos must be backed by detailed work.
D. Prior reports are useful for trend analysis, not current findings.

Question 907
Which of the following is an indication of possible hacker activity involving voice
communications?
A. Direct inward system access (DISA) is found to be disabled on the company’s
exchange.
B. Outbound calls are found to significantly increase in frequency during non-
business hours.
C. Inbound calls experience significant fluctuations based on time of day and day of
week.
D. The abandonment rate of service desk calls is increasing during the early morning.
Correct Answer: B – Outbound calls are found to significantly increase
in frequency during non-business hours
Explanation: Unusual call patterns may indicate voice system misuse by hackers.
Incorrect Answers:
A. DISA being disabled reduces risk.
C. Inbound call variation may be normal.
D. Abandonment rate is a service metric, not a security one.

Question 908
Which of the following is the MOST appropriate indicator of change management
effectiveness?
A. Time lag between changes to the configuration and the update of records
B. Number of system software changes
C. Number of incidents resulting from changes
D. Time lag between changes and updates of documentation materials
Correct Answer: C – Number of incidents resulting from changes
Explanation: This directly indicates the success or failure of the change process.
Incorrect Answers:
A & D. Lag indicators are less effective than incident-based metrics.
B. Number of changes alone doesn’t indicate effectiveness.

Question 909
Which of the following should be an IS auditor’s GREATEST concern when
reviewing an organization’s capacity management planning?
A. Many of the resource requirements are based on estimates
B. The organization is increasingly dependent on the use of cloud providers
C. Some planning areas are not well developed
D. Current resource utilization is not monitored
Correct Answer: D – Current resource utilization is not monitored
Explanation: Without monitoring, proactive planning is impossible.
Incorrect Answers:
A. Estimates are common but should be refined over time.
B. Cloud dependency may help with scalability.
C. Planning gaps are an issue, but monitoring is foundational.

Question 910
Which of the following is the BEST source of information to determine the required
level of data protection on a file server?
A. Acceptable use policy and privacy statements
B. Previous data breach incident reports
C. Data classification policy and procedures
D. Access rights of similar file servers
Correct Answer: C – Data classification policy and procedures
Explanation: These define protection based on data sensitivity.
Incorrect Answers:
A. Policies provide context but not specific levels.
B. Breach reports identify past weaknesses, not requirements.
D. Similar servers may have different data types or sensitivity levels.

Question 911
Which of the following is the PRIMARY objective of implementing IT governance?
A. Resource management
B. Performance measurement
C. Value delivery
D. Strategic planning
Correct Answer: C – Value delivery
Explanation: IT governance aims to ensure that IT investments align with business
objectives and deliver value.
Incorrect Answers:
A. Resource management is a function, not the core objective.
B. Performance measurement supports governance but is not its primary goal.
D. Strategic planning is part of governance but not the central objective.

Question 912
During an information security audit of a mid-sized organization, an IS auditor notes
that the organization's information security policy is not sufficient. What is the
auditor's BEST recommendation for the organization?
A. Obtain an external consultant's support to rewrite the policy.
B. Identify and close gaps compared to a best-practice framework.
C. Perform a benchmark with competitors’ policies.
D. Define roles and responsibilities for regularly updating the policy.
Correct Answer: B – Identify and close gaps compared to a best-
practice framework
Explanation: Aligning with best practices ensures coverage of critical areas and
strengthens the policy's effectiveness.
Incorrect Answers:
A. Hiring a consultant may help, but defining gaps is more essential.
C. Benchmarking helps but doesn't guarantee best-practice compliance.
D. Role definition is important but should follow after policy revision.
Question 913
The GREATEST limitation of a network-based intrusion detection system (IDS) is
that it:
A. provides only for active rather than passive IDS monitoring
B. does not monitor for denial of service (DoS) attacks
C. consumes excessive network resources for detection
D. does not detect attacks originating on the server hosting the IDS
Correct Answer: D – does not detect attacks originating on the server
hosting the IDS
Explanation: Network-based IDSs are limited in monitoring internal attacks from
the host machine itself.
Incorrect Answers:
A. IDSs typically operate in passive mode.
B. Many IDSs monitor DoS patterns.
C. Modern IDS tools are optimized to reduce resource consumption.

Question 914
Which of the following is the MOST efficient solution for a multi-location healthcare
organization that wants to be able to access patient data wherever patients present
themselves for care?
A. Software as a Service (SaaS) provider
B. Network segmentation
C. Infrastructure as a Service (IaaS) provider
D. Dynamic localization
Correct Answer: A – Software as a Service (SaaS) provider
Explanation: SaaS solutions allow centralized and secure access to data from
multiple locations.
Incorrect Answers:
B. Segmentation improves security but not data access.
C. IaaS provides infrastructure, not complete software solutions.
D. Dynamic localization does not ensure data availability.

Question 915
Which of the following would be MOST impacted if an IS auditor were to assist with
the implementation of recommended control enhancements?
A. Materiality
B. Independence
C. Integrity
D. Accountability
Correct Answer: B – Independence
Explanation: Auditors must remain independent and avoid involvement in
implementing controls they later audit.
Incorrect Answers:
A. Materiality relates to financial thresholds.
C. Integrity is not directly affected.
D. Accountability lies with management, not auditors.

Question 916
Which of the following is the BEST report for an IS auditor to reference when tasked
with reviewing the security of code written for a newly developed website?
A. Black box testing report
B. Static software composition analysis
C. Penetration test report
D. Web application vulnerability report
Correct Answer: D – Web application vulnerability report
Explanation: This report specifically identifies exploitable flaws in web applications.
Incorrect Answers:
A. Black box testing doesn't assess source code.
B. Software composition analysis focuses on open-source components.
C. Pen tests may not provide code-level vulnerabilities.

Question 917
Which of the following observations should be of MOST concern to an IS auditor
reviewing an organization’s business impact analysis (BIA) practices?
A. A combination of questionnaires, workshops, and interviews is used.
B. Outsourced business processes are excluded from the scope of the BIA.
C. Resource dependencies for critical processes are not determined.
D. Recovery objectives are identified without conducting risk assessments.
Correct Answer: C – Resource dependencies for critical processes are
not determined
Explanation: Without identifying dependencies, the organization cannot plan
effective recovery strategies.
Incorrect Answers:
A. This method is appropriate and comprehensive.
B. Exclusions may be justified but must be documented.
D. While important, it can follow dependency identification.

Question 918
During an audit, which of the following would be MOST helpful in establishing a
baseline for measuring data quality?
A. Industry standard business definitions
B. Input from customers
C. Validation of rules by the business
D. Built-in data error prevention application controls
Correct Answer: A – Industry standard business definitions
Explanation: Standards provide a benchmark for comparison and quality
measurement.
Incorrect Answers:
B. Customer input is useful but subjective.
C. Validation helps but isn’t a baseline.
D. Controls prevent errors but don’t define baselines.

Question 919
Which of the following approaches would BEST enable an e-commerce website to
handle unpredictable amounts of traffic?
A. Index key databases to improve response time.
B. Re-factor applications to improve efficiency.
C. Cluster application servers to distribute web traffic.
D. Configure resources to scale.
Correct Answer: D – Configure resources to scale
Explanation: Scalability allows dynamic resource allocation during traffic surges.
Incorrect Answers:
A. Indexing improves speed but not capacity.
B. Re-factoring helps performance, not scaling.
C. Clustering helps load but may not auto-scale.

Question 920
An organization is permanently transitioning from onsite to fully remote business
operations. When should the existing business impact analysis (BIA) be reviewed?
A. At least one year after the transition
B. As soon as the new operating model is in place
C. During the next scheduled review
D. As soon as the decision about the transition is announced
Correct Answer: D – As soon as the decision about the transition is
announced
Explanation: Early review ensures the BIA reflects the upcoming changes in
operations.
Incorrect Answers:
A. Waiting a year poses risk.
B. Reviewing only after implementation may be too late.
C. Scheduled reviews may miss urgent changes.
Question 921
Which of the following is a PRIMARY benefit of a maturity model?
A. It facilitates communication with regulatory bodies
B. It benchmarks the organization to peer performance levels
C. It facilitates the establishment of organizational capability
D. It provides the organization with a standard assessment tool
Correct Answer: C – It facilitates the establishment of organizational
capability
Explanation: Maturity models help organizations identify where they stand in
terms of capabilities and guide them toward process improvement.
Incorrect Answers:
A. Communication with regulators is not the primary purpose.
B. Benchmarking may be an outcome, but not the main benefit.
D. While useful, the model’s core purpose is not just assessment.

Question 922
In the development of a new financial application, the IS auditor’s FIRST
involvement should be in the:
A. control design
B. application design
C. system test
D. feasibility study
Correct Answer: D – Feasibility study
Explanation: Involving the auditor early, starting from the feasibility study, ensures
risks and controls are considered from the outset.
Incorrect Answers:
A. Control design is too late for first involvement.
B. Application design is after feasibility.
C. Testing is the last phase.

Question 923
Which of the following tests would BEST indicate that a software development
project is ready to be deployed into the production environment?
A. Performance
B. Parallel
C. Unit
D. Quality assurance (QA)
Correct Answer: D – Quality assurance (QA)
Explanation: QA testing evaluates the overall functionality, quality, and readiness
of the system, making it the best pre-deployment test.
Incorrect Answers:
A. Performance testing only checks system responsiveness.
B. Parallel tests are for data validation.
C. Unit testing focuses on individual components.

Question 924
Which of the following is the MOST important element of quality control with
respect to an audit engagement?
A. Increase of audit quality through multiple follow-up audits
B. Responsibility of leadership for quality in audits
C. Assignment of engagement teams for audits
D. Resolution procedures for differences of opinion in audits
Correct Answer: B – Responsibility of leadership for quality in audits
Explanation: Leadership sets the tone and ensures the quality of audit engagements
through oversight and accountability.
Incorrect Answers:
A. Follow-ups improve quality but don’t define it.
C. Team assignment is part of planning, not quality control.
D. Dispute resolution is secondary to leadership’s responsibility.

Question 925
Which of the following threats is mitigated by a firewall?
A. Asynchronous attack
B. Intrusion attack
C. Trojan horse
D. Passive assault
Correct Answer: B – Intrusion attack
Explanation: Firewalls monitor and block unauthorized access attempts, which are
types of intrusion.
Incorrect Answers:
A. Asynchronous attacks are not specifically mitigated.
C. Trojans bypass firewalls once inside.
D. Passive attacks are harder to detect by firewalls.

Question 926
Which of the following is the GREATEST advantage of maintaining an internal IS
audit function within an organization?
A. Better understanding of the business and processes
B. Ability to negotiate recommendations with management
C. Increased IS audit staff visibility and availability throughout the year
D. Increased independence and impartiality of recommendations
Correct Answer: A – Better understanding of the business and
processes
Explanation: Internal teams inherently understand internal operations, enabling
more context-aware auditing.
Incorrect Answers:
B. Negotiation can happen, but understanding is more impactful.
C. Availability is useful but not the greatest advantage.
D. Independence may be less than that of an external team.

Question 927
The MOST appropriate person to chair the steering committee for an enterprise-wide
system development should be the:
A. business analyst
B. project manager
C. IS director
D. executive level manager
Correct Answer: D – Executive level manager
Explanation: Executive leadership ensures alignment with business goals and
facilitates cross-functional decision-making.
Incorrect Answers:
A. Business analysts don’t have the authority.
B. Project managers are too operational.
C. IS directors may focus too much on technical aspects.

Question 928
Which of the following should be of GREATEST concern to an IS auditor assessing
the effectiveness of an organization’s vulnerability scanning program?
A. Scans are performed less frequently than required by the organization’s
vulnerability scanning schedule
B. Steps taken to address identified vulnerabilities are not formally documented
C. Results are not approved by senior management
D. Results are not reported to individuals with authority to ensure resolution
Correct Answer: D – Results are not reported to individuals with
authority to ensure resolution
Explanation: Without proper reporting, vulnerabilities may not be remediated,
undermining the program’s effectiveness.
Incorrect Answers:
A. Frequency matters, but lack of follow-up is worse.
B. Documentation is important but less urgent.
C. Approval from management is secondary to operational follow-up.

Question 929
An IS audit reveals an organization has decided not to implement a new regulation
by the required deadline because the cost of rapid implementation is higher than the
penalty for noncompliance. Which of the following is the auditor’s BEST course of
action?
A. Ensure a gap analysis is conducted
B. Ensure regulatory reporting is completed
C. Ensure the risk register is updated
D. Ensure risk acceptance is documented
Correct Answer: D – Ensure risk acceptance is documented
Explanation: Documenting the decision formally shows accountability and informs
future audits or regulatory reviews.
Incorrect Answers:
A. A gap analysis is useful but doesn’t confirm the risk decision.
B. Reporting is not within the auditor’s control.
C. Updating the risk register is good, but documentation is key.

Question 930
Which of the following is the BEST way for an IS auditor to determine the
completeness of data migration?
A. Review migration logs to identify possible failures
B. Review the implemented data cleanup process
C. Reconcile migrated records with records in the source system
D. Examine formal departmental review of the data migration
Correct Answer: C – Reconcile migrated records with records in the
source system
Explanation: Reconciliation provides direct evidence of completeness and accuracy
of data migration.
Incorrect Answers:
A. Logs show failures but not completeness.
B. Cleanup doesn’t ensure completeness.
D. Departmental reviews may be subjective.

Question 931
Which of the following is the BEST indicator that management is committed to the
success of an information security program?
A. The program is approved by the IT department.
B. Management requires regular updates on program progress.
C. Funding is provided for all security initiatives.
D. The program is aligned with the strategic objectives of the organization.
Correct Answer: D – The program is aligned with the strategic objectives of
the organization
Explanation: Aligning the information security program with the organization’s
strategic objectives demonstrates that management recognizes the importance of
security in achieving business goals.
Incorrect Answers:
A. Approval alone does not reflect strategic alignment.
B. Updates show interest, but not strategic commitment.
C. Funding helps, but strategic alignment is a better indicator.

Question 932
An IS auditor is preparing a plan for audits to be carried out over a specified period.
Which of the following activities should the IS auditor perform FIRST?
A. Allocate audit resources
B. Determine the audit universe
C. Prioritize risks
D. Review prior audit reports
Correct Answer: B – Determine the audit universe
Explanation: The audit universe is the foundation of the audit plan and must be
established before other planning steps can occur. It identifies all the areas available
for audit.
Incorrect Answers:
A. Allocating resources is done after the scope is defined.
C. Risk prioritization comes after understanding the full audit scope.
D. Reviewing prior audits is useful but not the starting point.

Question 933
Which of the following would be of MOST concern to an IS auditor when reviewing
an organization's firewall configuration?
A. Firewall software is updated annually
B. Default "deny all" rule is not present
C. Rules are documented in a spreadsheet
D. Logging is enabled for all rules
Correct Answer: B – Default "deny all" rule is not present
Explanation: A default "deny all" rule ensures that any unapproved or undefined
traffic is blocked. Its absence poses a significant security risk.
Incorrect Answers:
A. Annual updates are not ideal but less risky than a missing default rule.
C. Documentation format is less critical than control effectiveness.
D. Logging is a good practice, not a concern.

Question 934
Which of the following would BEST ensure that IT strategy is aligned with the
organization’s business strategy?
A. Defining key performance indicators (KPIs)
B. Conducting regular IT steering committee meetings
C. Performing an annual IT risk assessment
D. Monitoring IT service levels
Correct Answer: B – Conducting regular IT steering committee
meetings
Explanation: An IT steering committee bridges the gap between IT and business
goals by facilitating alignment and oversight.
Incorrect Answers:
A. KPIs help measure performance but do not ensure alignment.
C. Risk assessments are valuable but not sufficient for alignment.
D. Service level monitoring addresses performance, not strategy.

Question 935
Which of the following is the PRIMARY reason for involving end users in the
requirements definition phase of a project?
A. To assign responsibility for the final outcome
B. To identify and prioritize system features
C. To manage change requests during the build phase
D. To perform early security testing
Correct Answer: B – To identify and prioritize system features
Explanation: Involving end users ensures the system will meet their needs and
increases the likelihood of user acceptance.
Incorrect Answers:
A. Final responsibility lies with project managers, not users.
C. Change management is a separate process.
D. Security testing comes later in the development cycle.

Question 936
What is the BEST method to verify that all critical patches are applied across
systems in a network?
A. Conduct penetration testing
B. Perform a configuration review
C. Analyze patch management logs
D. Review firewall change requests
Correct Answer: C – Analyze patch management logs
Explanation: Patch management logs provide direct evidence of which patches have
been applied and to which systems.
Incorrect Answers:
A. Pen testing may not reveal all missing patches.
B. Configuration review is broader and less precise.
D. Firewall rules are unrelated to system patching.
Question 937
Which of the following is the MOST important control when outsourcing IT
operations to a third party?
A. Clear documentation of the provider’s infrastructure
B. Service level agreement (SLA) with defined performance metrics
C. Right to audit clause in the contract
D. Incident escalation procedures
Correct Answer: B – Service level agreement (SLA) with defined
performance metrics
Explanation: SLAs set expectations and provide a basis for measuring third-party
performance.
Incorrect Answers:
A. Documentation is helpful but not sufficient.
C. Audit rights are necessary but only allow oversight.
D. Escalation is important for incidents, not ongoing performance.

Question 938
An IS auditor reviewing access logs discovers that system administrators can access
all files, including confidential HR data. What is the BEST control to recommend?
A. Implement mandatory leave for administrators
B. Implement role-based access control
C. Monitor file access using a data loss prevention (DLP) system
D. Encrypt confidential files
Correct Answer: B – Implement role-based access control
Explanation: Role-based access ensures users, including admins, only access data
needed for their role.
Incorrect Answers:
A. Mandatory leave detects fraud but doesn't limit access.
C. DLP is reactive, not preventive.
D. Encryption protects data but doesn't limit access.

Question 939
Which of the following is the PRIMARY purpose of conducting periodic vulnerability
scans?
A. To ensure firewall rules are up to date
B. To detect known security weaknesses
C. To test the effectiveness of antivirus software
D. To evaluate user access permissions
Correct Answer: B – To detect known security weaknesses
Explanation: Vulnerability scans identify system weaknesses that can be exploited.
Incorrect Answers:
A. Firewall rules are validated through configuration review.
C. Antivirus effectiveness requires separate testing.
D. Access reviews are not part of vulnerability scans.

Question 940
Which of the following would BEST help prevent the introduction of unauthorized
changes in a production environment?
A. Source code comparison
B. Segregation of duties between development and operations
C. Review of production logs
D. User access recertification
Correct Answer: B – Segregation of duties between development and
operations
Explanation: Segregating roles ensures developers cannot move untested code
directly into production.
Incorrect Answers:
A. Code comparison detects, but doesn't prevent changes.
C. Logs detect after-the-fact.
D. Access recertification happens periodically, not in real time.

Question 941
Which of the following is MOST important for an IS auditor to review when
assessing an organization’s change management process?
A. Changes are documented in user manuals
B. Changes are reviewed by business process owners
C. Emergency changes are tested before implementation
D. Changes are approved by the same person who requested them
Correct Answer: B – Changes are reviewed by business process owners
Explanation: Business process owners ensure that changes align with operational
needs and business impact.
Incorrect Answers:
A. User manuals are updated post-implementation.
C. Emergency changes may bypass full testing.
D. Separation of duties should prevent self-approval.

Question 942
An IS auditor identifies repeated changes to firewall configurations without
documentation. What is the BEST control to address this issue?
A. Require weekly reviews of firewall logs
B. Implement a change request system for firewall modifications
C. Enforce two-person access for all firewall changes
D. Implement automatic backup of firewall settings
Correct Answer: B – Implement a change request system for firewall
modifications
Explanation: A formal change request system ensures accountability,
documentation, and approval.
Incorrect Answers:
A. Log reviews are detective, not preventive.
C. Two-person access improves control but doesn't document changes.
D. Backups preserve state but don’t explain changes.

Question 943
Which of the following would BEST help reduce data entry errors in a critical
financial system?
A. Restricting access to input fields
B. Conducting monthly audits
C. Implementing automated field validation
D. Enforcing mandatory training
Correct Answer: C – Implementing automated field validation
Explanation: Field validation detects and prevents invalid entries in real time.
Incorrect Answers:
A. Restricting access limits exposure but doesn’t prevent errors.
B. Audits detect errors after the fact.
D. Training helps, but errors can still occur.

Question 944
During a review of software licensing compliance, an IS auditor finds that multiple
licenses are unaccounted for. What is the auditor’s BEST recommendation?
A. Conduct annual physical inventory checks
B. Use a centralized license management system
C. Require all users to submit license receipts
D. Limit software installation privileges
Correct Answer: B – Use a centralized license management system
Explanation: A license management system tracks, reconciles, and manages
software use across the organization.
Incorrect Answers:
A. Physical inventory is periodic and less efficient.
C. Receipts are difficult to manage and verify.
D. Limiting installations helps, but doesn't ensure license control.

Question 945
Which of the following is the PRIMARY purpose of key risk indicators (KRIs)?
A. To identify audit scope
B. To measure risk trends
C. To evaluate training effectiveness
D. To assess audit quality
Correct Answer: B – To measure risk trends
Explanation: KRIs track evolving risk exposure and alert management to emerging
threats.
Incorrect Answers:
A. KRIs inform risk focus but don’t define scope.
C. Training metrics require different indicators.
D. Audit quality is measured through audit-specific KPIs.

Question 946
Which of the following is the GREATEST risk when granting a system administrator
access to both production and development environments?
A. Delayed software deployment
B. Conflict of interest in change control
C. Unauthorized software testing
D. Increased complexity in access rights
Correct Answer: B – Conflict of interest in change control
Explanation: This access creates a segregation of duties conflict, enabling
unauthorized changes.
Incorrect Answers:
A. Deployment delays are unrelated.
C. Testing risks are lesser than unauthorized changes.
D. Complexity is secondary to control conflict.

Question 947
Which of the following is the PRIMARY objective of security awareness training?
A. Preventing phishing attacks
B. Reducing policy violations
C. Promoting a security-conscious culture
D. Training users on access control
Correct Answer: C – Promoting a security-conscious culture
Explanation: Awareness training aims to instill a culture where users proactively
protect information.
Incorrect Answers:
A. Phishing prevention is one outcome, not the primary goal.
B. Policy compliance improves but is not the main focus.
D. Access training is a narrow aspect.
Question 948
Which of the following would BEST help to prevent data exfiltration through
unauthorized file transfers?
A. Disabling USB ports
B. Installing intrusion prevention systems (IPS)
C. Using data loss prevention (DLP) tools
D. Implementing encryption for sensitive files
Correct Answer: C – Using data loss prevention (DLP) tools
Explanation: DLP systems monitor and control data transfers, preventing
unauthorized leakage.
Incorrect Answers:
A. USB control prevents physical transfer but not network exfiltration.
B. IPS blocks known attacks, not necessarily data leaks.
D. Encryption protects data confidentiality, not flow.

Question 949
An IS auditor is reviewing an organization's response to a ransomware attack. Which
of the following is the MOST critical aspect to verify?
A. Passwords were reset
B. Data recovery from backups was successful
C. Incident was reported to regulators
D. Users received phishing awareness training
Correct Answer: B – Data recovery from backups was successful
Explanation: Timely and complete recovery ensures business continuity and reduces
impact.
Incorrect Answers:
A. Password changes help but don't ensure recovery.
C. Reporting is a compliance step.
D. Training is preventive, not part of response.

Question 950
When auditing a disaster recovery test, which of the following findings would be of
MOST concern?
A. Some test results were not documented
B. Several participants failed to attend the test
C. Backup tapes were not transported to the recovery site
D. The recovery plan was revised after testing
Correct Answer: C – Backup tapes were not transported to the
recovery site
Explanation: Missing backups during a DR test indicates the organization cannot
restore data if a real disaster occurs.
Incorrect Answers:
A. Documentation issues reduce insight but don’t stop recovery.
B. Attendance impacts participation but not recoverability.
D. Revising the plan is a positive step.

Question 951
What is the PRIMARY purpose of implementing a data retention policy?
A. To comply with legal and regulatory requirements
B. To increase backup efficiency
C. To protect against ransomware attacks
D. To enhance database performance
Correct Answer: A – To comply with legal and regulatory
requirements
Explanation: A data retention policy ensures the organization keeps or deletes data
in compliance with legal and industry mandates.
Incorrect Answers:
B. Backup efficiency is improved, but not the primary reason.
C. Ransomware protection requires other controls.
D. Performance gains are indirect and not the main objective.

Question 952
An IS auditor is reviewing a database management system (DBMS) with critical
payroll data. What control is MOST important to prevent unauthorized data
changes?
A. Audit logging
B. Database mirroring
C. Role-based access control
D. Periodic reconciliation
Correct Answer: C – Role-based access control
Explanation: Role-based access control ensures only authorized users can perform
specific actions on data.
Incorrect Answers:
A. Logging detects but doesn’t prevent changes.
B. Mirroring supports availability, not access control.
D. Reconciliation is detective, not preventive.

Question 953
Which of the following is the MOST appropriate control when employees are allowed
to use personal devices to access company systems?
A. Install antivirus software on company systems
B. Use mobile device management (MDM)
C. Create a centralized inventory of all personal devices
D. Disable access to corporate systems from non-office IP addresses
Correct Answer: B – Use mobile device management (MDM)
Explanation: MDM enforces security policies and controls on personal devices
accessing corporate data.
Incorrect Answers:
A. Antivirus protects systems, not mobile endpoints.
C. Inventories help track, but don’t secure access.
D. IP restrictions limit remote access but are not BYOD-specific.

Question 954
An IS auditor observes that users share login credentials in a critical application.
What is the GREATEST risk?
A. Inefficient use of system resources
B. Difficulty tracking user activity
C. Slow system performance
D. Unauthorized data modification
Correct Answer: B – Difficulty tracking user activity
Explanation: Shared credentials undermine accountability, making it hard to trace
user actions.
Incorrect Answers:
A. Resource usage isn’t directly affected.
C. Performance is unrelated to login sharing.
D. While unauthorized actions may occur, the key issue is traceability.

Question 955
What is the BEST reason to implement change control procedures for system
updates?
A. To minimize system downtime
B. To ensure user satisfaction
C. To reduce audit findings
D. To maintain system integrity
Correct Answer: D – To maintain system integrity
Explanation: Change control ensures updates are planned, tested, and authorized,
preserving system reliability.
Incorrect Answers:
A. Downtime is minimized but not the primary goal.
B. Satisfaction is not guaranteed by change control.
C. Reducing audit findings is a secondary benefit.

Question 956
Which of the following is the PRIMARY purpose of an information security policy?
A. To promote user awareness
B. To define acceptable use
C. To define management’s intent and direction
D. To establish detailed security procedures
Correct Answer: C – To define management’s intent and direction
Explanation: A security policy reflects leadership’s commitment and sets the tone
for security controls.
Incorrect Answers:
A. Awareness is supported but not the main goal.
B. Acceptable use is usually part of the policy, not its core purpose.
D. Procedures are developed separately.

Question 957
Which of the following provides the BEST evidence that data restoration procedures
are effective?
A. Error-free backup logs
B. Backup copies exist offsite
C. Backup system status is healthy
D. Successful restoration test results
Correct Answer: D – Successful restoration test results
Explanation: Testing confirms backups can be used effectively for recovery.
Incorrect Answers:
A. Logs don’t confirm restorable data.
B. Location matters, but doesn’t ensure integrity.
C. Healthy status doesn’t prove recovery works.

Question 958
Which of the following BEST demonstrates the principle of least privilege?
A. Granting users full access temporarily
B. Assigning access based on job function
C. Periodically revoking all inactive accounts
D. Restricting access to confidential files to all users
Correct Answer: B – Assigning access based on job function
Explanation: Least privilege limits access to only what's necessary for users to
perform their duties.
Incorrect Answers:
A. Temporary full access contradicts least privilege.
C. Account management helps, but isn’t about permissions.
D. Blanket restrictions aren't role-specific.
Question 959
Which of the following types of testing is MOST useful for verifying system
performance under high-load conditions?
A. Regression testing
B. Functional testing
C. Load testing
D. Parallel testing
Correct Answer: C – Load testing
Explanation: Load testing assesses performance under stress or maximum usage
conditions.
Incorrect Answers:
A. Regression checks for issues after changes.
B. Functional tests verify requirements, not load.
D. Parallel compares new vs old systems.

Question 960
Which of the following would BEST help ensure that audit findings are addressed in
a timely manner?
A. Requiring auditees to acknowledge findings
B. Tracking responses in a spreadsheet
C. Assigning owners and deadlines to action items
D. Performing quarterly reviews
Correct Answer: C – Assigning owners and deadlines to action items
Explanation: Designating responsibility with timelines ensures accountability and
follow-through.
Incorrect Answers:
A. Acknowledgment doesn’t ensure action.
B. Spreadsheets may help track but don’t enforce.
D. Reviews are periodic but not proactive.

Question 961
Which of the following provides the BEST assurance that data is protected in transit
over a public network?
A. Digital signature
B. Data masking
C. End-to-end encryption
D. Secure socket layer (SSL)
Correct Answer: C – End-to-end encryption
Explanation: End-to-end encryption ensures that only the sender and recipient can
access the data, offering strong protection during transmission.
Incorrect Answers:
A. Digital signatures provide integrity, not full confidentiality.
B. Data masking is used for data at rest or in non-production environments.
D. SSL is a component of encryption but not as comprehensive as full end-to-end
encryption.

Question 962
Which of the following BEST protects private health information from data loss for
clients that utilize remote health-monitoring devices?
A. Local data backup
B. Access log reviews
C. Data loss prevention (DLP) tools
D. Personal device management software
Correct Answer: C – Data loss prevention (DLP) tools
Explanation: DLP tools are designed to detect and prevent the unauthorized
transmission or leakage of sensitive data.
Incorrect Answers:
A. Local backups protect from loss, not unauthorized leakage.
B. Log reviews are after-the-fact monitoring.
D. Device management helps control access but doesn’t directly prevent data loss.

Question 963
Which of the following would be the GREATEST risk associated with a poorly
implemented patch management process?
A. Software incompatibility
B. Performance degradation
C. Extended downtime
D. Exposure to known vulnerabilities
Correct Answer: D – Exposure to known vulnerabilities
Explanation: The primary goal of patch management is to remediate security
vulnerabilities. Poor implementation leaves systems open to known threats.
Incorrect Answers:
A. Incompatibility is a risk, but less severe than exposure.
B. Performance issues are possible but not the greatest risk.
C. Downtime is undesirable but less critical than exploitation.

Question 964
Which of the following provides the STRONGEST protection against malware
propagation across a corporate network?
A. Network segmentation
B. Antivirus updates
C. Intrusion detection system (IDS)
D. Firewalls
Correct Answer: A – Network segmentation
Explanation: Segmentation limits lateral movement of malware and isolates infected
systems.
Incorrect Answers:
B. Antivirus helps but may not stop all variants.
C. IDS detects but doesn’t block malware.
D. Firewalls help with external threats more than internal spread.

Question 965
Which of the following should be the FIRST step when auditing a data classification
program?
A. Interview key data owners
B. Review data classification policies
C. Evaluate access controls
D. Test sample data for proper classification
Correct Answer: B – Review data classification policies
Explanation: Auditing starts with reviewing governing documents to understand
intended controls.
Incorrect Answers:
A. Interviews help, but follow policy review.
C. Access control is downstream of classification.
D. Testing data is important but comes after understanding the policy.

Question 966
What is the MOST appropriate control to detect unauthorized changes in a financial
database?
A. Change approval logs
B. Segregation of duties
C. Audit trails
D. Backup logs
Correct Answer: C – Audit trails
Explanation: Audit trails provide a record of changes, supporting detection of
unauthorized access or changes.
Incorrect Answers:
A. Approval logs show intent but not actual changes.
B. SoD prevents, but doesn’t detect.
D. Backup logs relate to recovery, not change tracking.

Question 967
Which of the following is the PRIMARY purpose of a digital certificate?
A. Provide nonrepudiation
B. Enable data encryption
C. Validate user permissions
D. Authenticate identity
Correct Answer: D – Authenticate identity
Explanation: A digital certificate binds an identity to a public key, enabling
authentication.
Incorrect Answers:
A. Nonrepudiation is a feature of digital signatures.
B. Encryption uses keys, not certificates alone.
C. Permissions are handled by access control systems.

Question 968
Which of the following would BEST prevent employees from accidentally emailing
confidential information to unauthorized recipients?
A. User awareness training
B. Strong email password policies
C. Data loss prevention (DLP) software
D. Email disclaimers
Correct Answer: C – Data loss prevention (DLP) software
Explanation: DLP tools monitor outgoing messages and block or flag those
containing sensitive data.
Incorrect Answers:
A. Training helps but is not foolproof.
B. Passwords don’t address message content.
D. Disclaimers are legal but don’t prevent sending.

Question 969
Which of the following is the GREATEST risk when using production data in a test
environment?
A. Insufficient test coverage
B. Data corruption
C. Unauthorized data exposure
D. Increased testing costs
Correct Answer: C – Unauthorized data exposure
Explanation: Production data may contain sensitive information that must be
protected; using it in test environments can violate confidentiality.
Incorrect Answers:
A. Coverage is unrelated to data type.
B. Corruption is a concern but not as critical.
D. Cost is secondary to privacy concerns.
Question 970
Which of the following should be the FIRST step before performing data analytics in
an audit?
A. Prepare the data
B. Verify data integrity
C. Select the appropriate tools
D. Define audit objectives
Correct Answer: D – Define audit objectives
Explanation: Clearly defined objectives guide the entire analytics process and
determine scope.
Incorrect Answers:
A. Data preparation follows objective setting.
B. Data integrity verification is important but not first.
C. Tool selection comes after scope definition.

Question 971
Which of the following should be the PRIMARY concern when evaluating a web
application that stores sensitive customer data?
A. Whether data encryption is implemented for all stored data
B. Whether the application was developed using secure coding practices
C. Whether application-level monitoring is enabled
D. Whether the application is hosted in a private cloud
Correct Answer: A – Whether data encryption is implemented for all
stored data
Explanation: Encrypting stored sensitive customer data ensures that even if
unauthorized access is gained, the data remains protected.
Incorrect Answers:
B. Secure coding is preventive but does not address data protection post-breach.
C. Monitoring supports detection but not prevention.
D. Private hosting alone does not guarantee data security.

Question 972
An IS auditor identifies that several terminated employees still have access to a
financial application. What should the auditor do FIRST?
A. Disable all accounts manually
B. Notify senior management immediately
C. Review the organization's account deactivation procedures
D. Report the issue to the legal department
Correct Answer: C – Review the organization's account deactivation
procedures
Explanation: The first step is to assess if the issue stems from a procedural failure.
Incorrect Answers:
A. Immediate action may be warranted but must be informed by a root cause review.
B. Notification is secondary to understanding the issue.
D. Legal involvement is premature before internal assessment.

Question 973
Which of the following would BEST help to ensure the confidentiality of information
during transmission over a public network?
A. Digital signatures
B. Message hashing
C. End-to-end encryption
D. Authentication tokens
Correct Answer: C – End-to-end encryption
Explanation: End-to-end encryption ensures that only the sender and recipient can
read the message.
Incorrect Answers:
A. Digital signatures verify authenticity, not confidentiality.
B. Hashing ensures integrity, not confidentiality.
D. Tokens manage access, not message encryption.

Question 974
When conducting a review of the change management process, which of the following
should be of MOST concern to an IS auditor?
A. Emergency changes are logged and reviewed later
B. Unauthorized changes are deployed into production
C. Some changes are not documented
D. Change requests are submitted via email
Correct Answer: B – Unauthorized changes are deployed into
production
Explanation: This represents a critical breakdown in control and risks system
integrity.
Incorrect Answers:
A. Logging emergency changes is acceptable with review.
C. Lack of documentation is a concern but not as severe.
D. Email submission is less ideal but not a critical flaw.

Question 975
Which of the following is the PRIMARY risk of using production data for testing
purposes?
A. Data integrity may be compromised
B. Test results may not be reliable
C. Unauthorized disclosure of sensitive information
D. System performance may be degraded
Correct Answer: C – Unauthorized disclosure of sensitive information
Explanation: Production data often contains confidential information that must be
protected.
Incorrect Answers:
A. Data integrity is a concern but less critical than privacy.
B. Production data increases reliability, not the opposite.
D. Performance may be impacted but is not the top risk.

Question 976
Which of the following BEST supports the implementation of a risk-based audit
approach?
A. Historical findings of similar organizations
B. Results of the previous audit
C. A current risk assessment
D. An annual audit plan
Correct Answer: C – A current risk assessment
Explanation: A risk-based audit should be driven by the current risk profile.
Incorrect Answers:
A. Useful but not organization-specific.
B. Helpful context but not risk-focused.
D. The plan is guided by the assessment, not a substitute.

Question 977
A company experienced a ransomware attack and could not restore from its last
backup. Which of the following is the MOST likely root cause?
A. The backup schedule was not frequent
B. Backups were not encrypted
C. Backups were stored in the same network segment
D. The recovery procedure was not tested
Correct Answer: C – Backups were stored in the same network
segment
Explanation: Attackers often encrypt accessible backups, making separation
essential.
Incorrect Answers:
A. Frequency affects data loss, not availability.
B. Encryption protects data, not access.
D. Testing is important but wouldn’t prevent the attack.

Question 978
Which of the following roles should approve the final go-live of a critical application?
A. IT project manager
B. Application developer
C. Business process owner
D. IT operations manager
Correct Answer: C – Business process owner
Explanation: The business process owner ensures the application meets operational
needs.
Incorrect Answers:
A. The project manager manages the process, not ownership.
B. Developers are too close to the build to validate business needs.
D. Operations support post-go-live but do not approve it.

Question 979
Which of the following would MOST help mitigate phishing attacks targeting
employees?
A. Intrusion detection systems
B. Email content filters
C. Security awareness training
D. Multi-factor authentication
Correct Answer: C – Security awareness training
Explanation: Training helps users recognize and avoid phishing attempts.
Incorrect Answers:
A. IDS detects but doesn’t prevent phishing.
B. Filters help but aren’t foolproof.
D. MFA helps protect accounts but doesn’t prevent clicking links.

Question 980
An IS auditor discovers that changes to financial systems are implemented without
testing. What is the auditor’s BEST recommendation?
A. Increase audit frequency
B. Implement version control
C. Require change testing before implementation
D. Document post-implementation reviews
Correct Answer: C – Require change testing before implementation
Explanation: Testing prior to implementation reduces the risk of introducing errors.
Incorrect Answers:
A. More audits don’t fix the root issue.
B. Version control helps track changes but doesn’t validate them.
D. Post-reviews are good but can’t prevent issues.
Question 981
Which of the following would BEST ensure that outsourced data processing services
comply with the organization’s security requirements?
A. Reviewing internal audit reports of the service provider
B. Performing vulnerability scans of the provider’s systems
C. Including security clauses in the service level agreement (SLA)
D. Requiring regular reports on security incidents
Correct Answer: C – Including security clauses in the service level
agreement (SLA)
Explanation: Security clauses in the SLA make expectations contractually
enforceable.
Incorrect Answers:
A. Audit reports may not address all requirements.
B. Scans may be limited or restricted.
D. Incident reports help monitor, not enforce compliance.

Question 982
An IS auditor finds that a software developer has access to production data. Which
of the following is the GREATEST risk?
A. Software changes without documentation
B. Unintentional data corruption
C. Unauthorized data disclosure
D. Introduction of malicious code
Correct Answer: C – Unauthorized data disclosure
Explanation: Developers with production access may access sensitive data, violating
confidentiality.
Incorrect Answers:
A. This is a process issue but not the highest risk.
B. Possible, but less critical than privacy breaches.
D. Malicious code is a threat but less likely than data misuse.

Question 983
Which of the following is the PRIMARY purpose of version control in software
development?
A. Track software defects
B. Ensure secure code deployment
C. Prevent unauthorized changes
D. Manage and document code changes
Correct Answer: D – Manage and document code changes
Explanation: Version control ensures changes are tracked and can be rolled back if
needed.
Incorrect Answers:
A. Bug tracking is a separate function.
B. Security is enhanced but not the core purpose.
C. Preventing unauthorized access is handled via access control.

Question 984
Which of the following would BEST help ensure accountability for actions performed
within a financial application?
A. Password expiration policy
B. Detailed audit trail
C. Two-factor authentication
D. Role-based access
Correct Answer: B – Detailed audit trail
Explanation: An audit trail records who did what and when, enabling
accountability.
Incorrect Answers:
A. Password expiration reduces risk but doesn’t ensure accountability.
C. MFA confirms identity but not actions.
D. Role-based access restricts access, but logs show actions.

Question 985
Which of the following would MOST likely prevent a successful replay attack?
A. Hashing the message contents
B. Using time-stamped session tokens
C. Encrypting the message with a public key
D. Verifying sender IP address
Correct Answer: B – Using time-stamped session tokens
Explanation: Time-stamped tokens ensure messages are valid only within a specific
window.
Incorrect Answers:
A. Hashing verifies integrity, not freshness.
C. Encryption secures data but doesn’t prevent reuse.
D. IP verification can be spoofed.

Question 986
Which of the following BEST reduces the risk of data loss due to accidental deletion
by users?
A. Regular user training
B. Frequent data backups
C. Strict access controls
D. Mandatory multi-factor authentication
Correct Answer: B – Frequent data backups
Explanation: Backups ensure data can be restored regardless of the cause of
deletion.
Incorrect Answers:
A. Training helps but can’t eliminate mistakes.
C. Access control may not prevent authorized user errors.
D. MFA secures access, not data recovery.

Question 987
An IS auditor reviewing a critical application notes that exception reports are not
generated. What is the auditor’s BEST recommendation?
A. Implement a logging mechanism
B. Establish exception reporting
C. Enable system alerts
D. Increase audit frequency
Correct Answer: B – Establish exception reporting
Explanation: Exception reporting identifies outliers and anomalies for timely
review.
Incorrect Answers:
A. Logs help after the fact but don’t highlight exceptions.
C. Alerts are useful but not a substitute for formal reports.
D. Audits do not replace operational controls.

Question 988
What is the PRIMARY reason for maintaining an up-to-date asset inventory in an
organization?
A. Comply with regulatory standards
B. Ensure adequate insurance coverage
C. Identify vulnerabilities and exposures
D. Support change management processes
Correct Answer: C – Identify vulnerabilities and exposures
Explanation: Knowing what assets exist is essential for identifying associated risks.
Incorrect Answers:
A. Compliance is a benefit, not the core reason.
B. Insurance is financial but not security-focused.
D. Change management is supported, not driven, by asset inventories.

Question 989
An IS auditor is reviewing firewall rules that are not documented. What is the BEST
course of action?
A. Recommend the use of automated firewall tools
B. Remove undocumented rules
C. Recommend documentation and periodic review
D. Perform a risk analysis of the rules
Correct Answer: C – Recommend documentation and periodic review
Explanation: Undocumented rules pose risks; regular review ensures alignment with
policy.
Incorrect Answers:
A. Tools help but don’t replace documentation.
B. Removal without review can disrupt services.
D. Risk analysis is part of review but doesn’t address the control gap.

Question 990
Which of the following is MOST helpful in detecting fraud in a financial application?
A. Application control reviews
B. Penetration testing
C. Reconciliation procedures
D. System availability monitoring
Correct Answer: C – Reconciliation procedures
Explanation: Reconciliations match internal and external data to catch anomalies
or fraud.
Incorrect Answers:
A. Application control reviews are preventive, not detective.
B. Pen testing identifies vulnerabilities, not fraud.
D. Monitoring uptime doesn’t detect fraud.

Question 991
Which of the following is MOST important to verify during a review of remote access
policies?
A. Remote users receive password expiration notices
B. VPN connections use minimum encryption levels
C. Users agree to acceptable use policies
D. Connections are monitored in real-time
Correct Answer: B – VPN connections use minimum encryption levels
Explanation: Encryption ensures confidentiality and integrity of remote
communications.
Incorrect Answers:
A. Expirations help but don’t prevent insecure access.
C. Acceptable use is administrative, not technical.
D. Monitoring helps but doesn’t secure the connection.

Question 992
Which of the following would BEST mitigate the risk of unauthorized transactions in
a financial system?
A. Logging all user activity
B. Enforcing segregation of duties
C. Encrypting stored data
D. Implementing complex passwords
Correct Answer: B – Enforcing segregation of duties
Explanation: SoD ensures no single user can initiate and approve a transaction.
Incorrect Answers:
A. Logging detects after the fact.
C. Encryption protects data, not process.
D. Passwords protect access, not functions.

Question 993
Which of the following BEST demonstrates compliance with legal and regulatory
data retention requirements?
A. Use of encryption for sensitive data
B. Documented data archiving procedures
C. Records of data deletion requests
D. Evidence of audit log reviews
Correct Answer: B – Documented data archiving procedures
Explanation: Data retention compliance depends on clear archiving and retention
processes.
Incorrect Answers:
A. Encryption protects data, not compliance timelines.
C. Deletion is relevant but not retention-specific.
D. Logs help, but don’t address retention.

Question 994
The PRIMARY goal of periodic penetration testing is to:
A. Validate incident response capabilities
B. Discover unknown vulnerabilities
C. Monitor system performance under stress
D. Ensure regulatory compliance
Correct Answer: B – Discover unknown vulnerabilities
Explanation: Penetration tests simulate attacks to find exploitable weaknesses.
Incorrect Answers:
A. IR testing is different.
C. Stress testing is a separate process.
D. Compliance is a benefit, not the primary goal.

Question 995
Which of the following is the MOST effective way to evaluate the strength of an
encryption implementation?
A. Review the key length
B. Examine key exchange protocols
C. Conduct a code review
D. Perform cryptanalysis
Correct Answer: D – Perform cryptanalysis
Explanation: Cryptanalysis directly tests the resistance of the algorithm to attacks.
Incorrect Answers:
A. Key length is one factor.
B. Protocols are important but not conclusive.
C. Code review may not reveal cryptographic flaws.

Question 996
Which of the following BEST supports effective patch management?
A. Automated vulnerability scans
B. Network traffic monitoring
C. Encryption of backup media
D. Firewall rule reviews
Correct Answer: A – Automated vulnerability scans
Explanation: Scans detect unpatched systems and prioritize updates.
Incorrect Answers:
B. Monitoring detects traffic, not patch gaps.
C. Backup encryption is unrelated.
D. Firewall rules are perimeter controls.

Question 997
Which of the following metrics BEST indicates the effectiveness of an incident
response process?
A. Time to containment
B. Number of reported incidents
C. Number of affected systems
D. System uptime post-incident
Correct Answer: A – Time to containment
Explanation: Containment time reflects how quickly threats are controlled.
Incorrect Answers:
B. Volume alone doesn’t measure effectiveness.
C. Impact is relevant but not process-focused.
D. Uptime is too broad.

Question 998
Which of the following is the PRIMARY reason to implement multi-factor
authentication?
A. To comply with legal requirements
B. To increase password complexity
C. To reduce the risk of credential compromise
D. To enable remote access
Correct Answer: C – To reduce the risk of credential compromise
Explanation: MFA adds layers of defense if one factor is breached.
Incorrect Answers:
A. Compliance is secondary.
B. Complexity is not MFA’s main benefit.
D. Remote access can exist without MFA.

Question 999
An IS auditor finds that sensitive files on a shared network are not access restricted.
What is the BEST recommendation?
A. Implement encryption on the shared drive
B. Move the files to a private location
C. Apply role-based access control
D. Delete the files if unused
Correct Answer: C – Apply role-based access control
Explanation: RBAC limits access based on user roles and need-to-know.
Incorrect Answers:
A. Encryption helps but doesn't restrict access.
B. Location change alone doesn’t control access.
D. Deletion may not be appropriate.

Question 1000
Which of the following would be MOST helpful to an IS auditor evaluating cloud
governance practices?
A. Data center audit logs
B. Cloud provider’s ISO certifications
C. Security awareness training records
D. Network topology diagrams
Correct Answer: B – Cloud provider’s ISO certifications
Explanation: Certifications demonstrate alignment with standards and governance
practices.
Incorrect Answers:
A. Logs support monitoring, not governance.
C. Training is internal, not cloud-specific.
D. Topology is technical, not governance-focused.
Question 1001
Which of the following tools is MOST effective for determining whether an
organization’s internal policies align with its risk appetite?
A. Risk heat map
B. SWOT analysis
C. Balanced scorecard
D. Gap analysis
Correct Answer: A – Risk heat map
Explanation: Heat maps visualize risk levels versus tolerance.
Incorrect Answers:
B. SWOT assesses strengths and weaknesses.
C. Balanced scorecard tracks performance.
D. Gap analysis compares current vs. desired state.

Question 1002
Which of the following controls BEST mitigates the risk of unauthorized access in a
federated identity environment?
A. Centralized audit logs
B. Periodic password changes
C. Token-based authentication
D. Multi-tenancy controls
Correct Answer: C – Token-based authentication
Explanation: Tokens validate identity across federated systems.
Incorrect Answers:
A. Logs help detect, not prevent.
B. Passwords are basic; federated models benefit from stronger mechanisms.
D. Multi-tenancy applies to isolation, not access.

Question 1003
Which of the following would BEST support data availability in a high-demand
environment?
A. Database normalization
B. Load balancing
C. Encryption of data at rest
D. Hash indexing
Correct Answer: B – Load balancing
Explanation: Load balancing distributes traffic and prevents overload.
Incorrect Answers:
A. Normalization helps efficiency, not availability.
C. Encryption protects confidentiality.
D. Indexing improves query speed but not overall availability.
Question 1004
Which of the following is the MOST important reason to regularly review user access
rights?
A. Minimize IT administrative workload
B. Prevent accidental deletions
C. Reduce security risks
D. Ensure password compliance
Correct Answer: C – Reduce security risks
Explanation: Reviewing access rights reduces risk from excess or outdated
permissions.
Incorrect Answers:
A. Workload is not the priority.
B. Accidental deletion is less critical.
D. Passwords are separate from access rights.

Question 1005
Which of the following should be the PRIMARY consideration when selecting an
intrusion detection system (IDS)?
A. Support for IPv6
B. Cost of implementation
C. Network architecture compatibility
D. Signature update frequency
Correct Answer: D – Signature update frequency
Explanation: Frequent updates improve threat detection accuracy.
Incorrect Answers:
A. IPv6 is secondary unless required.
B. Cost matters, but performance is key.
C. Compatibility is necessary but not sufficient.

Question 1006
Which of the following poses the GREATEST risk when collecting evidence in a
cybersecurity investigation?
A. Chain of custody is broken
B. Evidence is not encrypted
C. Devices are powered off improperly
D. Logs are not retained
Correct Answer: A – Chain of custody is broken
Explanation: Broken custody makes evidence inadmissible.
Incorrect Answers:
B. Encryption helps but isn’t required.
C. Powering off is a technical issue, not legal.
D. Logs help, but custody is more critical.

Question 1007
An IS auditor reviewing third-party risk management should FIRST assess:
A. The vendor’s incident response procedures
B. The organization's vendor selection process
C. The insurance coverage of the vendor
D. The SLA review frequency
Correct Answer: B – The organization's vendor selection process
Explanation: Selection determines which vendors pose risk.
Incorrect Answers:
A. IR is important post-engagement.
C. Insurance is risk transfer, not prevention.
D. SLA reviews are ongoing, not initial.

Question 1008
Which of the following is the PRIMARY role of the data protection officer (DPO)
under GDPR?
A. Approve processing of all personal data
B. Perform regular security audits
C. Monitor compliance and advise on obligations
D. Respond to data subject access requests
Correct Answer: C – Monitor compliance and advise on obligations
Explanation: The DPO ensures ongoing compliance and guidance.
Incorrect Answers:
A. Approval is not required for every processing.
B. Audits may be part of it but not the main duty.
D. Handling requests is usually delegated.

Question 1009
Which of the following BEST demonstrates data integrity?
A. Logs are regularly archived
B. All entries are date- and time-stamped
C. Audit trail cannot be altered
D. Data is encrypted in storage
Correct Answer: C – Audit trail cannot be altered
Explanation: Unaltered records reflect true data activity.
Incorrect Answers:
A. Archiving helps storage, not integrity.
B. Timestamps help traceability, not integrity alone.
D. Encryption protects confidentiality.

Question 1010
A retail company is implementing a mobile point-of-sale (POS) system. Which of the
following is MOST critical for an IS auditor to assess?
A. Software vendor reputation
B. User training and awareness
C. Encryption of payment data
D. Compatibility with legacy systems
Correct Answer: C – Encryption of payment data
Explanation: Securing payment data is vital to prevent breaches.
Incorrect Answers:
A. Vendor matters but not as much as securing data.
B. Training is supportive, not core.
D. Compatibility is relevant but not critical.

Question 1011
Which of the following would be the MOST important consideration when planning a
penetration test?
A. Compliance with the organization’s change management process
B. Whether the test will be announced or unannounced
C. Timing to minimize impact on business operations
D. Cost of conducting the test
Correct Answer: C – Timing to minimize impact on business operations
Explanation: Penetration testing should be scheduled to minimize disruption to
critical services or operations.
Incorrect Answers:
A. Important but part of execution rather than initial planning.
B. Affects scope and style, not priority.
D. Budget matters but comes after operational planning.

Question 1012
Which of the following is MOST important when assembling an internal team to
perform penetration testing for the organization?
A. Obtain a listing of key systems for testing from management.
B. Gain agreement from management on timing and scope.
C. Perform a scan and identify in-scope assets.
D. Query the company directory to find privileged users.
Correct Answer: B – Gain agreement from management on timing and scope
Explanation: Defining scope and timing with management ensures alignment and
avoids unexpected disruptions.
Incorrect Answers:
A. Helpful after agreement is reached.
C. Technical step following scope definition.
D. Privilege review is part of execution, not planning.

Question 1013
Which of the following would a digital signature MOST likely prevent?
A. Disclosure
B. Repudiation
C. Corruption
D. Unauthorized change
Correct Answer: B – Repudiation
Explanation: Digital signatures provide authentication and non-repudiation for
electronic communications.
Incorrect Answers:
A. Encryption handles disclosure.
C. Integrity checks address corruption.
D. Access control prevents unauthorized change.

Question 1014
An IS auditor is determining the scope for an upcoming audit. Which of the
following BEST enables the auditor to ensure appropriate controls are considered?
A. Conducting interviews with IT staff
B. Reading recent industry journal articles
C. Using an IT-related framework
D. Reviewing previous audit reports
Correct Answer: C – Using an IT-related framework
Explanation: Frameworks help ensure systematic identification of relevant controls.
Incorrect Answers:
A. Interviews aid in understanding context.
B. Useful for trends but not scoping.
D. Relevant for continuity but not completeness.

Question 1015
A PRIMARY objective of risk management is to keep the total cost of risks below
the:
A. estimated amount of losses included in the firm's budget.
B. amount of losses that would materially damage the firm.
C. costs of loss prevention measures, such as physical security measures.
D. administrative costs of risk management.
Correct Answer: B – amount of losses that would materially damage the firm
Explanation: Risk management aims to prevent losses that could jeopardize the
organization’s survival.
Incorrect Answers:
A. Budgets may underestimate real risk.
C. Loss prevention cost must be balanced with exposure.
D. Administrative costs are just part of the whole.

Question 1016
Which of the following should be the role of internal audit in an organization’s move
to the cloud?
A. Identifying and mitigating risk to an acceptable level
B. Identifying impacts to organizational budgets and resources
C. Implementing security controls for data prior to migration
D. Serving as a trusted partner and advisor
Correct Answer: D – Serving as a trusted partner and advisor
Explanation: Internal audit should advise and provide assurance without taking
over operational roles.
Incorrect Answers:
A/B/C. These are roles for IT and management.

Question 1017
Which of the following should be the role of internal audit in an organization’s move
to the cloud?
A. Identifying and mitigating risk to an acceptable level
B. Identifying impacts to organizational budgets and resources
C. Implementing security controls for data prior to migration
D. Serving as a trusted partner and advisor
Correct Answer: D – Serving as a trusted partner and advisor
Explanation: Same as Question 1016. Internal audit maintains independence while
guiding process integrity.
Incorrect Answers:
A–C repeat the same operational misalignments.

Question 1018
How does a switched network reduce the risk of network sniffing?
A. Switches can detect active packet sniffing devices in their subnet.
B. Packets are not broadcasted throughout the whole subnet.
C. Network traffic is generally reduced.
D. Source and destination addresses are encrypted.
Correct Answer: B – Packets are not broadcasted throughout the whole subnet
Explanation: Switched networks direct packets to specific ports, limiting exposure.
Incorrect Answers:
A. Detection isn't the default function.
C. Traffic load is unrelated to sniffing.
D. Encryption is separate from switching.

Question 1019
Which of the following is the MOST effective way for internal audit management to
ensure the quality of IS audits is maintained?
A. Engage a third party to conduct regular quality assurance (QA) reviews.
B. Include quality metrics in audit staff annual performance evaluations.
C. Introduce a balanced scorecard for internal audit.
D. Conduct control self-assessments (CSA) with IT management.
Correct Answer: A – Engage a third party to conduct regular quality
assurance (QA) reviews
Explanation: External reviews provide independent assessment of audit quality.
Incorrect Answers:
B. Internal incentives may bias results.
C. Useful tool but indirect.
D. CSA aids operational assurance.

Question 1020
In an organization's feasibility study to acquire hardware to support a new web
server, omission of which of the following would be of MOST concern?
A. Reputation of potential vendors
B. Alternatives for financing the acquisition
C. Financial stability of potential vendors
D. Cost-benefit analysis of available products
Correct Answer: D – Cost-benefit analysis of available products
Explanation: Cost-benefit analysis is essential for justifying investment decisions.
Incorrect Answers:
A. Important, but secondary.
B. Financing comes later.
C. Financial stability is important but not the top concern at this stage.

Question 1021
Which of the following is the PRIMARY objective of cyber resiliency?
A. To efficiently and effectively recover from an incident with limited operational
impact
B. To prevent potential attacks or disruptions in operations
C. To limit the severity of security breaches and maintain continuous operations
D. To resume normal operations after service disruptions
Correct Answer: A – To efficiently and effectively recover from an
incident with limited operational impact
Explanation: Cyber resiliency focuses on maintaining operations during and after
an attack or failure, minimizing the impact.
Incorrect Answers:
B. Prevention is part of cybersecurity, not resiliency.
C. This is a supporting goal but not the primary objective.
D. Recovery is important but not the primary focus of cyber resiliency.

Question 1022
During a post-implementation review, which of the following provides the BEST
evidence that user requirements have been met?
A. Operator error logs
B. End-user documentation
C. User acceptance testing (UAT)
D. Management interviews
Correct Answer: C – User acceptance testing (UAT)
Explanation: UAT confirms that the system meets the user’s requirements and
performs as expected.
Incorrect Answers:
A. Logs show errors, not requirements validation.
B. Documentation supports usage, not validation.
D. Interviews may be subjective and not conclusive.

Question 1023
An IS auditor assessing an organization’s information systems needs to understand
management’s approach regarding controls. Which documentation should the auditor
review FIRST?
A. Policies
B. Standards
C. Guidelines
D. Procedures
Correct Answer: A – Policies
Explanation: Policies define the overall control environment and management's
intent regarding controls.
Incorrect Answers:
B. Standards are more detailed but stem from policies.
C. Guidelines are suggestions and less authoritative.
D. Procedures define actions but not intent.

Question 1024
Which of the following is MOST useful for matching records of incoming and
outgoing personnel to identify tailgating in physical security logs?
A. Entry/exit badge logs
B. Surveillance video logs
C. Turnstile counter logs
D. Guard shift logs
Correct Answer: A – Entry/exit badge logs
Explanation: Badge logs provide individual, timestamped entries and exits useful
for detecting discrepancies.
Incorrect Answers:
B. Videos are harder to review systematically.
C. Turnstiles count people but don’t identify them.
D. Guard logs may not capture every entry or exit.

Question 1025
When evaluating a project’s system development lifecycle (SDLC), which phase is
MOST concerned with whether the system meets business requirements?
A. Initiation
B. Implementation
C. Testing
D. Post-implementation review
Correct Answer: D – Post-implementation review
Explanation: This phase evaluates if the final system meets business and user
requirements.
Incorrect Answers:
A. Initiation focuses on feasibility.
B. Implementation is about deploying the system.
C. Testing validates functionality, not alignment with goals.

Question 1026
Which of the following types of evidence would provide the MOST assurance that
data restoration procedures are effective?
A. Review of documented restoration procedures
B. Results of full restoration tests
C. Logs from automated backup jobs
D. Confirmation from backup administrators
Correct Answer: B – Results of full restoration tests
Explanation: Full restoration tests validate the ability to recover data in practice.
Incorrect Answers:
A. Documentation alone doesn’t prove effectiveness.
C. Logs show backups, not restorations.
D. Administrator confirmation may lack objectivity.
Question 1027
Which of the following is MOST important for ensuring that IT risk assessments are
reliable?
A. Inclusion of internal audit input
B. Validation of data sources
C. Use of standardized templates
D. Frequency of updates
Correct Answer: B – Validation of data sources
Explanation: Reliable assessments depend on the accuracy and integrity of input
data.
Incorrect Answers:
A. Audit input is valuable but not sufficient.
C. Templates ensure consistency but not accuracy.
D. Frequent updates matter, but only with valid data.

Question 1028
Which of the following BEST enables an organization to manage unexpected or on-
request jobs?
A. Service level agreements (SLAs)
B. Job scheduling software
C. Job scheduling by the service desk
D. Console logs
Correct Answer: B – Job scheduling software
Explanation: Job scheduling software automates and prioritizes both routine and
ad hoc jobs.
Incorrect Answers:
A. SLAs define expectations, not execution.
C. Manual handling can be inefficient and error-prone.
D. Logs are reactive, not proactive tools.

Question 1029
When protecting mobile devices, which of the following is the PRIMARY risk
mitigated by authentication controls?
A. Software updates
B. Data availability and integrity
C. Internal or external security breaches
D. IT service failure
Correct Answer: C – Internal or external security breaches
Explanation: Authentication prevents unauthorized access, mitigating breach risks.
Incorrect Answers:
A. Updates are not directly related to authentication.
B. Authentication ensures confidentiality more than integrity.
D. Authentication doesn't directly address service failures.

Question 1030
During a review of an organization’s technology policies, which of the following
observations should be of MOST concern to the IS auditor?
A. Business objectives are not defined
B. Legal requirements are not considered
C. A globally acknowledged framework is not used
D. The policies have not been reviewed within the last three years
Correct Answer: B – Legal requirements are not considered
Explanation: Ignoring legal requirements can lead to regulatory violations and
penalties.
Incorrect Answers:
A. While important, objectives can be clarified.
C. Framework use improves maturity but is not mandatory.
D. Review frequency is an issue, but not as severe as legal noncompliance.

Question 1031
Which of the following provides a new IS auditor with the MOST useful information
to evaluate overall IT performance?
A. Prior audit reports
B. IT balanced scorecard
C. Vulnerability assessment report
D. IT value analysis
Correct Answer: B – IT balanced scorecard
Explanation: The IT balanced scorecard offers a holistic view of IT performance by
aligning IT goals with business objectives and tracking performance metrics.
Incorrect Answers:
A. Prior audit reports may lack current performance context.
C. Vulnerability assessments focus on security, not overall performance.
D. IT value analysis assesses return, not comprehensive performance.

Question 1032
Which risk response has been adopted by a risk owner postponing the
implementation of proper controls due to budget constraints?
A. Transfer
B. Acceptance
C. Avoidance
D. Mitigation
Correct Answer: B – Acceptance
Explanation: By delaying control implementation, the organization accepts the risk
due to limited resources.
Incorrect Answers:
A. Transfer involves shifting the risk to another party.
C. Avoidance eliminates the risk entirely.
D. Mitigation involves actively reducing the risk.

Question 1033
Before the release of a new application into an organization's production
environment, which of the following should be in place to ensure that proper testing
has occurred and rollback plans are in place?
A. Independent third-party approval
B. Standardized change requests
C. Secure code review
D. Change approval board
Correct Answer: D – Change approval board
Explanation: A Change Approval Board (CAB) ensures testing, rollback, and
compliance with change control policies.
Incorrect Answers:
A. Third-party approval is not always necessary.
B. Standardized requests alone don’t ensure proper testing.
C. Code review doesn't confirm testing and rollback planning.

Question 1034
Which of the following BEST describes the role of the IS auditor in a control self-
assessment (CSA)?
A. Implementer
B. Approver
C. Reviewer
D. Facilitator
Correct Answer: D – Facilitator
Explanation: IS auditors facilitate the CSA process by guiding teams without
enforcing outcomes.
Incorrect Answers:
A. Implementers execute controls.
B. Approvers are usually management.
C. Reviewers assess but do not lead CSA sessions.

Question 1035
Which of the following is the BEST indication that there are potential problems
within an organization's IT service desk function?
A. Lack of key performance indicators (KPIs)
B. An excessive backlog of user requests
C. Undocumented operating procedures
D. Lack of segregation of duties
Correct Answer: B – An excessive backlog of user requests
Explanation: A high backlog indicates inefficiencies or resource shortages in the
service desk.
Incorrect Answers:
A. KPIs help track performance but don’t directly indicate issues.
C. Lack of documentation affects consistency, not backlog.
D. Segregation of duties is less relevant in this context.

Question 1036
Which of the following is the PRIMARY objective of cyber resiliency?
A. To efficiently and effectively recover from an incident with limited operational
impact
B. To prevent potential attacks or disruptions in operations
C. To limit the severity of security breaches and maintain continuous operations
D. To resume normal operations after service disruptions
Correct Answer: A – To efficiently and effectively recover from an incident with
limited operational impact
Explanation: Cyber resiliency focuses on continuity with minimal disruption post-
incident.
Incorrect Answers:
B. Prevention is a security objective, not resiliency.
C. Limiting severity is part of risk management.
D. Recovery is part of business continuity, not the broader resiliency scope.

Question 1037
During a post-implementation review, which of the following provides the BEST
evidence that user requirements have been met?
A. Operator error logs
B. End-user documentation
C. User acceptance testing (UAT)
D. Management interviews
Correct Answer: C – User acceptance testing (UAT)
Explanation: UAT validates that the system meets end-user needs before final
acceptance.
Incorrect Answers:
A. Error logs reflect issues, not requirements fulfillment.
B. Documentation supports use, not requirement verification.
D. Interviews are subjective, not conclusive evidence.
Question 1038
An IS auditor assessing an organization’s information systems needs to understand
management’s approach regarding controls. Which documentation should the auditor
review FIRST?
A. Policies
B. Standards
C. Guidelines
D. Procedures
Correct Answer: A – Policies
Explanation: Policies represent management’s intentions and overarching approach
to controls.
Incorrect Answers:
B. Standards are more detailed, subordinate to policies.
C. Guidelines provide recommendations, not mandates.
D. Procedures detail steps, not strategy.

Question 1039
Which of the following is MOST useful for matching records of incoming and
outgoing personnel to identify tailgating in physical security logs?
A. Discovery sampling methodology
B. Continuous auditing
C. Data analytics tools
D. Reconciliation with HR records
Correct Answer: C – Data analytics tools
Explanation: Analytics tools can correlate entry/exit logs with personnel data to
detect anomalies like tailgating.
Incorrect Answers:
A. Discovery sampling is used for error detection.
B. Continuous auditing monitors systems, not physical logs.
D. HR reconciliation supports identity validation, not real-time log comparison.

Question 1040
An IS auditor assesses an organization's backup management practices for
optimization potential. Which of the following features of a regular backup tape
reorganization job BEST enables the organization to realize cost savings?
A. Refreshed data written on tapes
B. Rotation of backup tapes
C. Decommissioning of old tapes
D. Defragmentation of data on tapes
Correct Answer: C – Decommissioning of old tapes
Explanation: Retiring outdated tapes reduces storage and maintenance costs.
Incorrect Answers:
A. Refreshing data doesn’t inherently save cost.
B. Rotation supports availability, not cost efficiency.
D. Defragmentation improves performance, not cost.

Question 1041
Which of the following should be the PRIMARY basis for procedures to dispose of
data securely?
A. Type of media used for data storage
B. Environmental regulations
C. Classification of data
D. Data retention policy
Correct Answer: C – Classification of data
Explanation: Data disposal procedures must align with the sensitivity level of the
data being discarded to prevent unauthorized access.
Incorrect Answers:
A. Media type affects the disposal method, not the basis.
B. Regulations are important but not the primary basis.
D. Retention policies dictate when to dispose, not how.

Question 1042
Which of the following is the PRIMARY purpose for external assessments of internal
audit's quality assurance (QA) systems and frameworks?
A. To provide assurance that internal audit staff are qualified to perform their
responsibilities
B. To provide assurance that the internal audit function conforms with established
professional practices
C. To confirm the internal audit department has adequate budget to perform its
duties
D. To confirm the accuracy and reliability of prior internal audit results
Correct Answer: B – To provide assurance that the internal audit function
conforms with established professional practices
Explanation: External QA ensures the internal audit function maintains alignment
with professional standards such as the IIA.
Incorrect Answers:
A. Qualification checks are secondary.
C. Budget review is not the focus of QA.
D. Prior audit result accuracy is a byproduct, not the primary goal.

Question 1043
Which of the following would be the MOST significant factor when choosing among
several backup system alternatives with different restoration speeds?
A. Mean time between failures (MTBFs)
B. Recovery point objective (RPO)
C. Recovery time objective (RTO)
D. Maximum tolerable outages (MTOs)
Correct Answer: C – Recovery time objective (RTO)
Explanation: RTO defines how quickly systems must be restored, which directly
relates to restoration speed.
Incorrect Answers:
A. MTBF is more about reliability than restoration.
B. RPO concerns data loss, not restoration speed.
D. MTO is broader than RTO and less specific for selecting backups.

Question 1044
Which of the following should be the FIRST step in the incident response process for
a suspected breach?
A. Engage a third party to independently evaluate the alerted breach.
B. Notify business management of the security breach.
C. Inform potentially affected customers of the security breach.
D. Research the validity of the alerted breach.
Correct Answer: D – Research the validity of the alerted breach
Explanation: Verifying the incident before taking action avoids false positives and
ensures appropriate response.
Incorrect Answers:
A. Involving third parties comes later.
B. Management should be informed only after verification.
C. Notification is necessary only for confirmed breaches.

Question 1045
Which of the following is the PRIMARY benefit of automated patch management
systems?
A. They reduce the overall cost of vulnerability remediation.
B. They allow real-time vulnerability scanning.
C. They eliminate the need for change control.
D. They ensure patches are applied uniformly across systems.
Correct Answer: D – They ensure patches are applied uniformly across systems
Explanation: Automation ensures consistency and eliminates manual errors in
patch deployment.
Incorrect Answers:
A. Cost reduction is a benefit but not primary.
B. Vulnerability scanning is a separate process.
C. Change control is still required even if automated.
Question 1046
An IS auditor is reviewing an application control matrix. What should be the
auditor’s PRIMARY focus?
A. Accuracy of process documentation
B. Assurance that all risks have been addressed
C. Coverage of control objectives for the application
D. Completeness of audit trails
Correct Answer: C – Coverage of control objectives for the application
Explanation: The matrix should align all relevant controls to the application’s
control objectives.
Incorrect Answers:
A. Documentation accuracy is important but secondary.
B. Risk coverage goes beyond the matrix’s scope.
D. Audit trails are part of controls but not the matrix focus.

Question 1047
Which of the following is the PRIMARY concern when a firewall rule base grows
significantly over time?
A. Increased latency due to rule processing
B. Misconfigurations from complex rule sets
C. Greater network traffic loads
D. Higher administrative costs
Correct Answer: B – Misconfigurations from complex rule sets
Explanation: A large rule base increases the risk of errors, which may introduce
vulnerabilities.
Incorrect Answers:
A. Latency increase is minimal with modern firewalls.
C. Traffic loads are not affected by the number of rules.
D. Admin cost may rise but is not the primary concern.

Question 1048
Which of the following should be the PRIMARY focus when designing KPIs for an
IT security program?
A. Technical controls
B. Industry benchmarks
C. Strategic objectives
D. User satisfaction
Correct Answer: C – Strategic objectives
Explanation: KPIs must align with business goals to measure the true effectiveness
of the security program.
Incorrect Answers:
A. Technical metrics may not reflect strategic goals.
B. Benchmarks guide design but are not primary.
D. User satisfaction is important but not central.

Question 1049
Which of the following BEST supports an IS auditor's recommendation to implement
security awareness training?
A. Number of phishing incidents has increased
B. User satisfaction survey shows training needs
C. Security budget has surplus funds
D. Annual audit recommends more staff training
Correct Answer: A – Number of phishing incidents has increased
Explanation: Rising phishing incidents clearly indicate a need for user awareness
improvement.
Incorrect Answers:
B. Surveys are subjective evidence.
C. Budget surplus doesn't justify training need.
D. Audit recommendations may be general.

Question 1050
What is the GREATEST concern when using data replication for disaster recovery?
A. Unauthorized data modification
B. Storage space consumption
C. Data inconsistency during replication
D. Excessive network usage
Correct Answer: C – Data inconsistency during replication
Explanation: If replication is not properly managed, inconsistent data may be
copied to backup sites.
Incorrect Answers:
A. Modification is controlled through access rights.
B. Storage usage can be planned.
D. Network load is secondary to data accuracy.

Question 1051
Which of the following should be of MOST concern to an IS auditor reviewing a user
access audit log?
A. Access attempts outside of normal business hours
B. Access by privileged users to critical systems
C. Repeated login attempts by the same user
D. Successful logins from foreign IP addresses
Correct Answer: D – Successful logins from foreign IP addresses
Explanation: This could indicate unauthorized access or account compromise,
especially if foreign access is unexpected.
Incorrect Answers:
A. May warrant review, but not necessarily an indicator of compromise.
B. Expected as part of job duties, though needs oversight.
C. Could indicate a forgotten password or lockout issue.

Question 1052
Which of the following is MOST important when evaluating the effectiveness of an
organization's cybersecurity awareness program?
A. Frequency of training sessions
B. Number of phishing emails reported by users
C. Total number of employees trained
D. Topics covered in the training content
Correct Answer: B – Number of phishing emails reported by users
Explanation: This is a measurable indicator of user engagement and awareness in
practice.
Incorrect Answers:
A. Frequency doesn't guarantee effectiveness.
C. Quantity alone doesn’t ensure understanding.
D. Relevance matters, but impact is better shown through behavior.

Question 1053
An IS auditor observes that audit trails are disabled on a financial transaction
system. What is the GREATEST concern?
A. Financial reporting will be delayed
B. Non-compliance with legal regulations
C. System performance may be degraded
D. Transactions may not be backed up
Correct Answer: B – Non-compliance with legal regulations
Explanation: Disabling audit trails may violate regulations, especially for financial
systems.
Incorrect Answers:
A. Audit trails don’t affect reporting timeline.
C. Performance can be optimized; not the core issue.
D. Backups are separate from audit trails.

Question 1054
Which of the following would BEST help determine if an IT process is operating
effectively?
A. Control self-assessments
B. Historical audit findings
C. Key performance indicators
D. External benchmarking
Correct Answer: C – Key performance indicators
Explanation: KPIs provide measurable insights into process performance.
Incorrect Answers:
A. Useful but self-reported.
B. Historical and may not reflect current status.
D. Helpful for context, not effectiveness.

Question 1055
An IS auditor is reviewing an organization's backup strategy. Which of the following
is MOST critical to verify?
A. Backup jobs are scheduled during off-hours
B. Backup data is stored at a secure offsite location
C. Backup logs are reviewed weekly
D. Backup files are compressed
Correct Answer: B – Backup data is stored at a secure offsite location
Explanation: Offsite backups are essential for disaster recovery and data protection.
Incorrect Answers:
A. Good practice, not critical.
C. Review frequency depends on risk.
D. Compression improves efficiency, not recovery.

Question 1056
Which of the following is the BEST method to validate that access rights to a
financial system are aligned with job responsibilities?
A. Interview department heads
B. Review recent login records
C. Perform a user access review
D. Analyze role-based access control (RBAC) templates
Correct Answer: C – Perform a user access review
Explanation: A formal review ensures actual access aligns with job roles and
responsibilities.
Incorrect Answers:
A. Provides input but is not comprehensive.
B. Reveals activity, not appropriateness.
D. Design-level, not usage validation.

Question 1057
Which of the following is the BEST reason to use encryption on backups?
A. Improve backup performance
B. Comply with data classification policies
C. Ensure high availability
D. Meet auditing requirements
Correct Answer: B – Comply with data classification policies
Explanation: Encryption protects sensitive data based on its classification.
Incorrect Answers:
A. Encryption may reduce performance.
C. High availability relates to redundancy.
D. Compliance may require encryption, but classification dictates it.

Question 1058
What is the PRIMARY benefit of documenting IT procedures?
A. Ensuring compliance with internal policies
B. Facilitating employee onboarding
C. Supporting continuity and consistency
D. Improving IT budgeting
Correct Answer: C – Supporting continuity and consistency
Explanation: Documentation ensures standardized operations and continuity.
Incorrect Answers:
A. Compliance is a benefit, but not the primary reason.
B. Onboarding is supported, not the main goal.
D. Budgeting is influenced more by strategy than procedures.

Question 1059
Which of the following is MOST critical when auditing changes to a payroll system?
A. Approval of change requests
B. Accuracy of updated documentation
C. Testing of changes in production
D. Training of payroll staff
Correct Answer: A – Approval of change requests
Explanation: Unapproved changes can lead to fraud or payroll errors.
Incorrect Answers:
B. Important, but comes after approval.
C. Testing should occur in staging, not production.
D. Training is critical but not an audit control.

Question 1060
Which of the following BEST ensures data quality in a system interface?
A. Redundant data entry
B. Manual reconciliations
C. Automated validation checks
D. Centralized data storage
Correct Answer: C – Automated validation checks
Explanation: Automated checks catch errors in real time and improve data
integrity.
Incorrect Answers:
A. Increases risk of error.
B. Manual processes are slower and error-prone.
D. Helps with access, not quality validation.

Question 1061
To mitigate the risk of exposing data through application programming interface
(API) queries, which of the following design considerations is MOST important?
A. Data quality
B. Data integrity
C. Data minimization
D. Data retention
Correct Answer: C – Data minimization
Explanation: Minimizing data shared through APIs limits exposure of sensitive or
unnecessary information.
Incorrect Answers:
A. Data quality ensures correctness, not exposure limitation.
B. Integrity relates to accuracy, not data volume.
D. Retention controls storage, not exposure during transmission.

Question 1062
One advantage of monetary unit sampling is the fact that
A. large-value population items are segregated and audited separately.
B. it can easily be applied manually when computer resources are not available.
C. it increases the likelihood of selecting material items from the population.
D. results are stated in terms of the frequency of items in error.
Correct Answer: C – It increases the likelihood of selecting material
items from the population
Explanation: Monetary unit sampling gives more weight to larger-value items,
increasing the chance of detecting material errors.
Incorrect Answers:
A. Items are not segregated manually in MUS.
B. MUS typically requires computer processing.
D. Focus is on monetary value, not frequency.

Question 1063
Backup procedures for an organization's critical data are considered to be which type
of control?
A. Compensating
B. Directive
C. Corrective
D. Detective
Correct Answer: C – Corrective
Explanation: Backups are corrective controls because they restore systems and data
after an incident.
Incorrect Answers:
A. Compensating controls fill gaps but don't restore.
B. Directive controls guide behavior, not recovery.
D. Detective controls identify, not fix, issues.

Question 1064
An IS auditor is reviewing the system development practices of an organization that
is about to move from a waterfall to an agile approach. Which of the following is
MOST important for the auditor to focus on as a result of this move?
A. Capacity planning
B. Code versioning
C. Secure code review
D. Release management
Correct Answer: D – Release management
Explanation: Agile methods involve rapid and frequent releases, so proper release
management ensures changes are tracked and controlled.
Incorrect Answers:
A. Capacity planning is less specific to development methodology.
B. Code versioning is important but typically handled through tools.
C. Secure code reviews are relevant to both methodologies.

Question 1065
Which of the following is the PRIMARY objective of implementing privacy-related
controls within an organization?
A. To comply with legal and regulatory requirements
B. To prevent confidential data loss
C. To provide options to individuals regarding use of their data
D. To identify data at rest and data in transit for encryption
Correct Answer: A – To comply with legal and regulatory
requirements
Explanation: Privacy controls are primarily implemented to ensure compliance with
data protection laws and regulations.
Incorrect Answers:
B. This is a benefit but not the primary objective.
C. Providing data options supports compliance but is not the main goal.
D. Identification supports encryption but is a supporting step.
Question 1066
An IS auditor conducts a review of a third-party vendor's reporting of key
performance indicators (KPIs). Which of the following findings should be of MOST
concern to the auditor?
A. Some KPIs are not documented.
B. KPIs are not clearly defined.
C. KPIs have never been updated.
D. KPI data is not being analyzed.
Correct Answer: D – KPI data is not being analyzed
Explanation: Collecting KPIs without analysis limits the ability to assess
performance and make improvements.
Incorrect Answers:
A. Documentation is important but secondary.
B. Definition issues can be resolved during setup.
C. Updates are needed but less urgent than lack of analysis.

Question 1067
Which of the following is critical to the successful establishment of an enterprise IT
architecture?
A. Comparison of the architecture with that of other organizations
B. A well-defined data migration policy
C. Organizational support for standardization
D. An architecture encompassing only critical systems
Correct Answer: C – Organizational support for standardization
Explanation: Standardization ensures consistency, interoperability, and support
across the enterprise.
Incorrect Answers:
A. Comparison is informative but not foundational.
B. Data migration is part of implementation, not architecture.
D. Limiting scope undermines the architecture's effectiveness.

Question 1068
Which of the following would protect the confidentiality of information sent in email
messages?
A. Encryption
B. Secure Hash Algorithm 1 (SHA-1)
C. Digital certificates
D. Digital signatures
Correct Answer: A – Encryption
Explanation: Encryption ensures that only intended recipients can access the
contents of an email.
Incorrect Answers:
B. SHA-1 is used for integrity, not confidentiality.
C. Certificates are for identity verification.
D. Digital signatures ensure integrity and authentication.

Question 1069
Which of the following would be of GREATEST concern to an IS auditor when
evaluating governance processes for a user-developed tool?
A. Penetration testing has not been conducted.
B. Significant changes to the tool were not documented.
C. The backup strategy has not been tested.
D. A risk assessment has not been performed.
Correct Answer: D – A risk assessment has not been performed
Explanation: Without a risk assessment, the organization cannot identify or
mitigate potential threats from the tool.
Incorrect Answers:
A. Penetration testing is important but more relevant to security.
B. Documentation gaps are concerning but not foundational.
C. Backup testing matters, but risk identification comes first.

Question 1070
Which of the following is an IS auditor's BEST course of action when the auditee
indicates that a corrective action plan for a high-risk finding will take longer than
expected?
A. Determine if an interim compensating control has been implemented.
B. Require that remediation is completed in the agreed timeframe.
C. Accept the longer target date and document it in the audit system.
D. Escalate the overdue finding to the audit committee.
Correct Answer: A – Determine if an interim compensating control
has been implemented
Explanation: Interim controls can help mitigate the risk while awaiting full
remediation.
Incorrect Answers:
B. Enforcing timelines may not address current risk.
C. Documenting delay without controls leaves risk unaddressed.
D. Escalation is premature without assessing mitigation.

Question 1071
Which of the following is the PRIMARY goal of configuration management?
A. To control changes to systems and software
B. To ensure security patches are applied
C. To manage user access levels
D. To monitor system availability
Correct Answer: A – To control changes to systems and software
Explanation: Configuration management ensures that all system changes are
tracked, evaluated, and implemented in a controlled manner.
Incorrect Answers:
B. Patch management is a subset, not the primary goal.
C. Access control is managed separately.
D. Availability is managed through performance monitoring, not configuration.

Question 1072
An IS auditor discovers that an organization lacks procedures for periodic review of
user access rights. What is the GREATEST risk?
A. Segregation of duties violations
B. Unauthorized system configuration changes
C. Insufficient password strength
D. Software license violations
Correct Answer: A – Segregation of duties violations
Explanation: Without regular reviews, users may accumulate excessive privileges
that conflict with segregation of duties principles.
Incorrect Answers:
B. Configuration changes may happen, but SoD is more critical.
C. Passwords are a separate control.
D. License use is unrelated to access rights review.

Question 1073
Which of the following is MOST important to include in a business continuity plan
(BCP)?
A. Emergency contact information
B. Data classification procedures
C. System acquisition strategies
D. Audit schedules
Correct Answer: A – Emergency contact information
Explanation: Contact details are essential for coordination and response during a
disruption.
Incorrect Answers:
B. Data classification is a broader information governance task.
C. System acquisition is a procurement issue.
D. Audit schedules relate to oversight, not continuity.

Question 1074
An IS auditor reviewing controls in a financial application finds that transaction logs
are not regularly reviewed. What is the GREATEST risk?
A. Errors in processing may go undetected
B. System performance may degrade
C. Backup operations may fail
D. Users may forget their login credentials
Correct Answer: A – Errors in processing may go undetected
Explanation: Transaction logs help detect processing anomalies, errors, or fraud.
Incorrect Answers:
B. Logs don't directly affect performance.
C. Backups are separate from transaction processing.
D. Logins are unrelated to transaction log reviews.

Question 1075
Which of the following is the BEST justification for conducting a risk assessment
during an information system acquisition?
A. To support the business case
B. To determine budget allocations
C. To evaluate vendor financials
D. To identify security and operational risks
Correct Answer: D – To identify security and operational risks
Explanation: Risk assessments help identify potential vulnerabilities and issues
before system implementation.
Incorrect Answers:
A. The business case is based on broader factors.
B. Budgeting may use risk info, but isn’t the goal.
C. Vendor financials are a procurement task.

Question 1076
Which of the following would be the BEST control to ensure the accuracy of data
entered into a web-based form?
A. Implementing input validation rules
B. Encrypting submitted data
C. Using captcha to prevent bots
D. Limiting form access to internal users
Correct Answer: A – Implementing input validation rules
Explanation: Input validation ensures that only properly formatted and expected
data is accepted.
Incorrect Answers:
B. Encryption protects data in transit, not accuracy.
C. Captcha prevents bots, not incorrect input.
D. Access limits restrict users but not entry errors.
Question 1077
Which of the following would be of GREATEST concern during a post-
implementation review of a cloud-based HR system?
A. Data backups are handled by the vendor
B. The system lacks single sign-on capability
C. Access logs are not monitored by HR or IT
D. System updates are managed by the cloud provider
Correct Answer: C – Access logs are not monitored by HR or IT
Explanation: Unmonitored access logs may allow unauthorized activities to go
undetected.
Incorrect Answers:
A. Vendor-managed backups are common in cloud services.
B. SSO improves usability, not core risk.
D. Vendor updates are expected in SaaS models.

Question 1078
When assessing the adequacy of application controls, which of the following should
be the auditor’s FIRST step?
A. Identify relevant business processes
B. Evaluate technical documentation
C. Perform control testing
D. Interview key personnel
Correct Answer: A – Identify relevant business processes
Explanation: Controls must align with the business process objectives they support.
Incorrect Answers:
B. Technical review comes after understanding the business.
C. Testing is premature without scope identification.
D. Interviews help but are not the starting point.

Question 1079
Which of the following would BEST ensure accountability of administrators who have
access to sensitive systems?
A. Assigning individual user IDs
B. Implementing password complexity rules
C. Restricting administrator hours
D. Installing antivirus software
Correct Answer: A – Assigning individual user IDs
Explanation: Individual IDs enable tracking and accountability for all actions.
Incorrect Answers:
B. Passwords strengthen security but not accountability.
C. Hour limits reduce exposure but don’t track users.
D. Antivirus helps protect systems, not assign responsibility.

Question 1080
Which of the following would MOST likely cause audit evidence to be considered
insufficient?
A. It is gathered from a third party
B. It is not independently verified
C. It is not electronically stored
D. It is gathered after audit fieldwork
Correct Answer: B – It is not independently verified
Explanation: Audit evidence must be verifiable and objective to be reliable.
Incorrect Answers:
A. Third-party evidence can be sufficient if verified.
C. Paper records can still be valid.
D. Timing does not determine sufficiency alone.

Question 1081
Which of the following would provide the MOST reliable evidence of a control
deficiency in an identity and access management (IAM) system?
A. A user is unable to log in after hours
B. An access log shows unauthorized access to sensitive data
C. The system is missing multi-factor authentication
D. Several users report access delays
Correct Answer: B – An access log shows unauthorized access to
sensitive data
Explanation: Unauthorized access recorded in logs is direct and verifiable evidence
of a control failure.
Incorrect Answers:
A. Login issues may be caused by legitimate restrictions.
C. Lack of MFA is a design gap, not proof of deficiency.
D. User reports are anecdotal and need confirmation.

Question 1082
What is the PRIMARY objective of performing a walkthrough during an IS audit?
A. To test transaction accuracy
B. To validate the audit trail
C. To observe process execution
D. To evaluate audit readiness
Correct Answer: C – To observe process execution
Explanation: A walkthrough allows the auditor to understand and observe how
processes are actually performed.
Incorrect Answers:
A. Testing is done in later phases.
B. Audit trails are reviewed separately.
D. Readiness evaluation is not the main focus of a walkthrough.

Question 1083
Which of the following is MOST critical to the success of a patch management
program?
A. Adequate staff training
B. Regular compliance reporting
C. Automated patch deployment
D. Timely risk-based prioritization
Correct Answer: D – Timely risk-based prioritization
Explanation: Prioritizing patches based on risk ensures critical vulnerabilities are
addressed promptly.
Incorrect Answers:
A. Training is necessary but not the critical factor.
B. Reporting tracks performance but doesn’t mitigate risk.
C. Automation helps speed, but prioritization drives impact.

Question 1084
An IS auditor discovers that sensitive customer data is stored on an internal file
server without encryption. What is the auditor’s BEST recommendation?
A. Require full disk encryption on the server
B. Remove access to the file server
C. Classify the data and assess associated risks
D. Transfer data to a cloud-based storage system
Correct Answer: C – Classify the data and assess associated risks
Explanation: Proper data classification enables appropriate risk-based control
implementation.
Incorrect Answers:
A. Encryption may be recommended, but only after risk assessment.
B. Removing access is disruptive without justification.
D. Cloud storage is not a universal solution.

Question 1085
Which of the following is the PRIMARY purpose of maintaining an IS audit trail?
A. To detect malware
B. To monitor user productivity
C. To support forensic investigation
D. To improve data quality
Correct Answer: C – To support forensic investigation
Explanation: Audit trails are essential for investigating and analyzing incidents
post-occurrence.
Incorrect Answers:
A. Malware detection relies on other tools.
B. Productivity tracking is not an audit trail objective.
D. Data quality is not ensured by audit trails.

Question 1086
Which of the following BEST ensures traceability of changes made to application
source code?
A. Logging all file edits
B. Maintaining version control
C. Restricting access to developers
D. Testing all updates in a staging environment
Correct Answer: B – Maintaining version control
Explanation: Version control systems track every change to source code, including
who made it and when.
Incorrect Answers:
A. Logs may lack detail or structure.
C. Restriction supports security, not traceability.
D. Testing validates changes but doesn’t ensure traceability.

Question 1087
Which of the following provides the BEST assurance that IT management is
monitoring the performance of security controls?
A. An internal audit report on security
B. A list of completed security training courses
C. Regular review of key risk indicators (KRIs)
D. An annual risk assessment
Correct Answer: C – Regular review of key risk indicators (KRIs)
Explanation: KRIs offer ongoing metrics to monitor the effectiveness of security
controls.
Incorrect Answers:
A. Audit reports are periodic and retrospective.
B. Training records show awareness, not monitoring.
D. Annual assessments are not continuous.

Question 1088
An IS auditor notes that firewall logs are stored for only seven days due to storage
limitations. What is the GREATEST risk?
A. Logs may be lost due to retention misconfiguration
B. Inability to investigate older incidents
C. Difficulty in generating real-time alerts
D. Violation of data retention policies
Correct Answer: B – Inability to investigate older incidents
Explanation: Short log retention hinders forensic analysis of security incidents that
are detected later.
Incorrect Answers:
A. Misconfiguration is not indicated.
C. Real-time alerts are unrelated to log retention.
D. Policy violation depends on specific requirements.

Question 1089
Which of the following is the MOST effective way for an IS auditor to verify that
users do not have excessive access privileges?
A. Conduct periodic user access reviews
B. Use automated tools to detect dormant accounts
C. Review system configuration settings
D. Interview department managers
Correct Answer: A – Conduct periodic user access reviews
Explanation: Regular access reviews help ensure that users have appropriate and
justified permissions.
Incorrect Answers:
B. Dormant account checks do not reveal excessive privileges.
C. Configuration reviews show policy, not actual user access.
D. Interviews alone are insufficient.

Question 1090
Which of the following is MOST important when selecting controls to mitigate
identified IT risks?
A. Industry-standard control libraries
B. Audit recommendations
C. Business impact analysis (BIA) results
D. Available IT resources
Correct Answer: C – Business impact analysis (BIA) results
Explanation: BIA identifies critical processes and guides control selection based on
actual business needs.
Incorrect Answers:
A. Standards guide but do not tailor controls to business context.
B. Audit input is useful but not definitive.
D. Resources are considered after prioritization.
Question 1091
Which of the following is the MOST important consideration when evaluating the
effectiveness of a change management process?
A. Whether developers are involved in approval
B. Whether all changes are logged and tracked
C. Whether users are notified of all changes
D. Whether emergency changes are allowed
Correct Answer: B – Whether all changes are logged and tracked
Explanation: Logging and tracking ensure accountability and allow for post-
implementation review and auditability.
Incorrect Answers:
A. Developer input is relevant but not the primary control.
C. Notifications are important but secondary.
D. Emergency changes must still follow controls.

Question 1092
Which of the following is the GREATEST risk when users have direct access to a
production database?
A. Data redundancy
B. Data inconsistency
C. Unauthorized data manipulation
D. Increased data retrieval time
Correct Answer: C – Unauthorized data manipulation
Explanation: Direct access bypasses application controls, increasing the risk of
unauthorized changes.
Incorrect Answers:
A. Redundancy is a design issue.
B. Inconsistency may occur, but manipulation is the root risk.
D. Retrieval time is a performance, not security concern.

Question 1093
An IS auditor is evaluating an organization's business continuity planning (BCP)
process. Which of the following should be the FIRST step?
A. Performing a business impact analysis (BIA)
B. Developing a crisis communication plan
C. Drafting disaster recovery procedures
D. Identifying alternate processing sites
Correct Answer: A – Performing a business impact analysis (BIA)
Explanation: BIA is foundational in identifying critical processes and determining
recovery priorities.
Incorrect Answers:
B. Communication planning occurs after BIA.
C. Recovery procedures are based on BIA findings.
D. Alternate sites are selected based on process criticality.

Question 1094
What is the PRIMARY reason for requiring segregation of duties in IT?
A. To ensure system performance
B. To improve incident response times
C. To prevent unauthorized or unintentional changes
D. To reduce system development costs
Correct Answer: C – To prevent unauthorized or unintentional
changes
Explanation: Segregation limits any one individual's control over all aspects of a
transaction, reducing risk.
Incorrect Answers:
A. Performance is unrelated.
B. SoD may slow, not speed, response.
D. Costs may increase with SoD.

Question 1095
Which of the following BEST reduces the likelihood of data loss due to employee
negligence?
A. Encryption of all end-user devices
B. A strong acceptable use policy
C. Data classification procedures
D. Ongoing security awareness training
Correct Answer: D – Ongoing security awareness training
Explanation: Training keeps employees informed of risks and proper data handling,
reducing negligent behavior.
Incorrect Answers:
A. Encryption protects data but doesn't change behavior.
B. Policies are ineffective without awareness.
C. Classification is administrative and doesn’t prevent negligence.

Question 1096
Which of the following is the PRIMARY concern when migrating legacy systems to a
modern platform?
A. Increased licensing costs
B. System response time
C. Data integrity
D. Developer familiarity with new tools
Correct Answer: C – Data integrity
Explanation: Ensuring that data remains accurate and unchanged during migration
is the most critical issue.
Incorrect Answers:
A. Cost is a factor but not a control risk.
B. Performance is adjusted post-migration.
D. Familiarity impacts learning curve, not migration accuracy.

Question 1097
An IS auditor finds that some users have local administrative rights on their
workstations. What is the GREATEST risk?
A. Users may uninstall software
B. Users may accidentally delete files
C. Users may disable antivirus software
D. Users may access cloud storage
Correct Answer: C – Users may disable antivirus software
Explanation: Disabling security software exposes the system to malware and
attacks.
Incorrect Answers:
A. Uninstalling software is inconvenient but not critical.
B. File deletion is recoverable if backups exist.
D. Cloud access can be controlled separately.

Question 1098
Which of the following is the PRIMARY benefit of implementing a centralized log
management system?
A. Better compliance with password policies
B. Improved availability of backup data
C. Simplified user access provisioning
D. Enhanced ability to detect and investigate incidents
Correct Answer: D – Enhanced ability to detect and investigate
incidents
Explanation: Centralized logging allows correlation and analysis of events across
systems.
Incorrect Answers:
A. Password policies are managed via authentication systems.
B. Backups are unrelated to log management.
C. Access provisioning is managed by identity systems.

Question 1099
Which of the following should be the FIRST action when a critical application
becomes unavailable during business hours?
A. Notify senior management
B. Initiate the business continuity plan (BCP)
C. Escalate to the service desk
D. Identify the cause of the failure
Correct Answer: D – Identify the cause of the failure
Explanation: Root cause identification enables appropriate response, including
escalation or recovery.
Incorrect Answers:
A. Notification follows assessment.
B. BCP activation depends on impact.
C. Escalation is useful after initial triage.

Question 1100
An IS auditor is reviewing database security and finds that logging is disabled for
certain sensitive tables. What is the auditor's BEST recommendation?
A. Enable full logging for all database transactions
B. Classify data according to sensitivity
C. Enable logging for all access to sensitive data
D. Restrict user access to database consoles
Correct Answer: C – Enable logging for all access to sensitive data
Explanation: Monitoring access to sensitive data ensures accountability and
supports detection of unauthorized actions.
Incorrect Answers:
A. Logging everything may generate too much noise.
B. Classification is a prerequisite, not a control.
D. Console restrictions do not address data access visibility.

Question 1101
Which of the following BEST ensures that an information security strategy is aligned
with business objectives?
A. Regular internal audits
B. Involvement of stakeholders in risk assessments
C. Periodic user security training
D. Development of detailed IT policies
Correct Answer: B – Involvement of stakeholders in risk assessments
Explanation: Engaging stakeholders ensures that security efforts align with actual
business priorities and risks.
Incorrect Answers:
A. Audits verify controls but do not establish alignment.
C. Training supports awareness, not strategy alignment.
D. Policies operationalize strategy but don’t guarantee alignment.
Question 1102
Which of the following is the PRIMARY concern when an organization fails to
perform regular vulnerability scans?
A. Inability to comply with audit requirements
B. Failure to identify and remediate known threats
C. Lack of executive-level security awareness
D. Increased firewall misconfiguration
Correct Answer: B – Failure to identify and remediate known threats
Explanation: Regular scanning is essential for detecting exploitable vulnerabilities
before attackers do.
Incorrect Answers:
A. Compliance is affected, but the risk of attack is greater.
C. Awareness is a cultural issue, not directly tied to scanning.
D. Firewalls are managed separately.

Question 1103
An IS auditor identifies that user passwords are stored in plaintext within an
application’s database. What is the GREATEST risk?
A. Violation of password length policies
B. Inability to monitor failed login attempts
C. Unauthorized access to user credentials
D. Slow system performance
Correct Answer: C – Unauthorized access to user credentials
Explanation: Plaintext storage makes credentials easily retrievable by attackers or
internal threats.
Incorrect Answers:
A. Length is policy-based, not storage-based.
B. Logging is unrelated to password format.
D. Performance is not significantly impacted.

Question 1104
Which of the following is the PRIMARY advantage of single sign-on (SSO)?
A. Reduced number of user credentials
B. Faster system performance
C. Improved network segmentation
D. Enhanced encryption
Correct Answer: A – Reduced number of user credentials
Explanation: SSO simplifies authentication by allowing users to access multiple
systems with one login.
Incorrect Answers:
B. Performance is not directly improved.
C. Segmentation is a network control.
D. Encryption is separate from authentication.

Question 1105
Which of the following should an IS auditor FIRST verify when auditing a business
continuity plan (BCP)?
A. Availability of alternative communication channels
B. Results of recent BCP tests
C. Management approval of the BCP
D. Documentation of roles and responsibilities
Correct Answer: C – Management approval of the BCP
Explanation: Without formal approval, the plan may lack authority, funding, or
organizational support.
Incorrect Answers:
A. Communication is part of implementation.
B. Testing is important but comes after planning.
D. Roles follow after approval.

Question 1106
Which of the following BEST enhances accountability for privileged access to critical
systems?
A. Shared administrator accounts with complex passwords
B. Privileged session monitoring and logging
C. Periodic password changes
D. Restricted login hours
Correct Answer: B – Privileged session monitoring and logging
Explanation: Session monitoring provides traceability and deterrence for improper
privileged use.
Incorrect Answers:
A. Shared accounts eliminate accountability.
C. Password changes help but do not provide oversight.
D. Login hours reduce exposure but don’t ensure tracking.

Question 1107
Which of the following is MOST likely to ensure compliance with a data retention
policy?
A. Restricting access to archived files
B. Automating deletion of outdated data
C. Conducting regular data classification reviews
D. Storing backups offsite
Correct Answer: B – Automating deletion of outdated data
Explanation: Automation reduces the risk of human error and enforces retention
schedules effectively.
Incorrect Answers:
A. Access control supports confidentiality, not retention.
C. Classification helps policy enforcement but isn’t sufficient alone.
D. Backup location is about availability, not retention enforcement.

Question 1108
Which of the following provides the BEST evidence that IT governance is aligned
with corporate governance?
A. Security metrics are reported quarterly
B. The CIO is included in board meetings
C. IT goals are mapped to strategic business objectives
D. A formal IT steering committee exists
Correct Answer: C – IT goals are mapped to strategic business
objectives
Explanation: Direct alignment of IT and business goals demonstrates governance
integration.
Incorrect Answers:
A. Metrics may inform but don’t prove alignment.
B. Participation alone doesn’t confirm goal alignment.
D. Committees are a structure, not proof of execution.

Question 1109
What is the PRIMARY benefit of performing a root cause analysis after a major
incident?
A. To update IT documentation
B. To assign responsibility to the appropriate team
C. To identify long-term solutions and prevent recurrence
D. To improve communication among departments
Correct Answer: C – To identify long-term solutions and prevent
recurrence
Explanation: Root cause analysis aims to understand underlying issues and
implement permanent fixes.
Incorrect Answers:
A. Documentation may follow but is not the goal.
B. Blame assignment is not productive.
D. Communication is improved as a secondary benefit.

Question 1110
An IS auditor finds that an organization has not updated its risk register in over two
years. What is the GREATEST concern?
A. Failure to meet audit schedule
B. Inaccurate disaster recovery procedures
C. Misalignment of controls with current threats
D. Lack of insurance coverage
Correct Answer: C – Misalignment of controls with current threats
Explanation: Without updated risk information, controls may be outdated and
ineffective.
Incorrect Answers:
A. The audit schedule is unrelated to risk documentation.
B. Recovery plans depend on impact analysis, not the register alone.
D. Insurance is important but separate from control alignment.

Question 1111
Which of the following is the PRIMARY purpose of conducting user access reviews?
A. To comply with password complexity policies
B. To verify that users are adhering to acceptable use policies
C. To ensure access is appropriate for job responsibilities
D. To identify accounts with expired passwords
Correct Answer: C – To ensure access is appropriate for job
responsibilities
Explanation: User access reviews confirm that users have only the permissions
needed for their role, reducing risk.
Incorrect Answers:
A. Complexity is a technical control, not review-driven.
B. Acceptable use is enforced through policy, not access reviews.
D. Expired passwords are handled by authentication systems.

Question 1112
An IS auditor finds that logs are being generated by critical systems but not
reviewed regularly. What is the GREATEST risk?
A. Increased audit scope
B. Inability to track user productivity
C. Missed detection of security incidents
D. Insufficient storage space
Correct Answer: C – Missed detection of security incidents
Explanation: Without regular review, critical indicators of compromise may go
unnoticed.
Incorrect Answers:
A. Audit scope is unrelated.
B. Productivity tracking is not a primary purpose of logs.
D. Storage is a separate issue from monitoring.
Question 1113
Which of the following is MOST critical when outsourcing IT operations to a third-
party vendor?
A. The vendor’s geographical location
B. Existence of a detailed service level agreement (SLA)
C. Frequency of vendor management meetings
D. Availability of technical documentation
Correct Answer: B – Existence of a detailed service level agreement
(SLA)
Explanation: SLAs define performance, security, and compliance expectations,
making them critical in managing vendor risk.
Incorrect Answers:
A. Location matters, but SLA governs control.
C. Meetings help, but are not enforceable safeguards.
D. Documentation supports operations but not accountability.

Question 1114
Which of the following provides the BEST indication that IT policies are being
followed?
A. High policy awareness survey results
B. Logs showing user authentication
C. Results from regular compliance audits
D. Number of help desk tickets closed
Correct Answer: C – Results from regular compliance audits
Explanation: Audits provide objective evidence of policy compliance through
testing and observation.
Incorrect Answers:
A. Awareness doesn’t equal compliance.
B. Authentication shows login activity, not policy adherence.
D. Ticket volume reflects support issues, not compliance.

Question 1115
Which of the following is the PRIMARY risk of allowing remote access to internal
systems?
A. Slower application performance
B. Unauthorized access to sensitive data
C. Difficulty in system patching
D. Miscommunication across time zones
Correct Answer: B – Unauthorized access to sensitive data
Explanation: Remote access increases exposure and requires strong controls to
prevent breaches.
Incorrect Answers:
A. Performance issues are secondary.
C. Patching is not directly affected by access method.
D. Time zone issues are operational, not security-related.

Question 1116
Which of the following is MOST useful in preventing phishing attacks within an
organization?
A. Email retention policy
B. Security awareness training
C. Network segmentation
D. Secure coding practices
Correct Answer: B – Security awareness training
Explanation: Training educates users on identifying and reporting phishing
attempts, reducing risk.
Incorrect Answers:
A. Retention does not prevent attacks.
C. Segmentation limits spread, not initiation.
D. Coding relates to application, not email threats.

Question 1117
Which of the following is MOST important to verify during a software licensing
audit?
A. Total number of organizational users
B. Validity of the licensing agreements
C. Accuracy of software documentation
D. Number of help desk calls
Correct Answer: B – Validity of the licensing agreements
Explanation: Ensuring the organization holds valid and sufficient licenses prevents
legal and financial exposure.
Incorrect Answers:
A. User count helps but is secondary.
C. Documentation supports tracking but not compliance.
D. Support data is unrelated.

Question 1118
An IS auditor discovers that an application accepts input without proper validation.
What is the GREATEST risk?
A. Delays in response time
B. System unavailability
C. Unauthorized access or data manipulation
D. Increased logging requirements
Correct Answer: C – Unauthorized access or data manipulation
Explanation: Lack of input validation can lead to attacks such as SQL injection,
compromising system integrity.
Incorrect Answers:
A. Performance is not the key risk.
B. Downtime is possible, but data compromise is more severe.
D. Logging is not a consequence of poor validation.

Question 1119
Which of the following is the BEST way to prevent an attacker from gaining
persistent access to a compromised system?
A. Use multifactor authentication
B. Restrict the use of administrative accounts
C. Conduct regular vulnerability scans
D. Implement endpoint detection and response (EDR)
Correct Answer: D – Implement endpoint detection and response
(EDR)
Explanation: EDR tools detect and respond to suspicious activity, helping remove
backdoors and persistence mechanisms.
Incorrect Answers:
A. MFA prevents unauthorized entry, not persistence.
B. Restrictions help but do not detect persistence.
C. Scans identify vulnerabilities, not active threats.

Question 1120
Which of the following provides the GREATEST assurance of confidentiality for
information transmitted over a network?
A. Network segmentation
B. Message hashing
C. End-to-end encryption
D. Session timeout configuration
Correct Answer: C – End-to-end encryption
Explanation: End-to-end encryption ensures that only the sender and intended
recipient can read the data.
Incorrect Answers:
A. Segmentation limits exposure but doesn’t encrypt.
B. Hashing ensures integrity, not confidentiality.
D. Timeouts are session controls, not data protection.

Question 1121
Which of the following is the PRIMARY reason for performing periodic reviews of
firewall rules?
A. To enhance network performance
B. To ensure rules align with current business needs
C. To detect malware infections
D. To update intrusion detection signatures
Correct Answer: B – To ensure rules align with current business needs
Explanation: Regular reviews ensure that outdated or overly permissive rules are
removed or modified to match current security requirements.
Incorrect Answers:
A. Performance may improve, but it's not the main goal.
C. Malware detection is handled by other tools.
D. IDS signature updates are unrelated to firewall rule reviews.

Question 1122
Which of the following controls BEST helps detect unauthorized changes in source
code?
A. Code comments
B. Access control lists
C. Code review process
D. Developer certification
Correct Answer: C – Code review process
Explanation: Structured code reviews ensure that unauthorized or unintentional
changes are caught before implementation.
Incorrect Answers:
A. Comments aid readability but do not detect changes.
B. Access control prevents but doesn’t detect.
D. Certification ensures knowledge, not control.

Question 1123
Which of the following is MOST important when implementing segregation of duties
in an IT environment?
A. Assigning responsibilities based on user preference
B. Preventing users from performing conflicting tasks
C. Providing detailed job descriptions
D. Monitoring productivity of all users
Correct Answer: B – Preventing users from performing conflicting
tasks
Explanation: Segregation of duties aims to reduce risk by ensuring no one
individual has control over all parts of a critical process.
Incorrect Answers:
A. Preferences should not override control principles.
C. Job descriptions support implementation but are not the main control.
D. Productivity monitoring is unrelated.

Question 1124
What is the PRIMARY benefit of implementing a centralized identity and access
management (IAM) system?
A. Improved password complexity enforcement
B. Reduced system response time
C. Consistent enforcement of access policies
D. Greater ease of software upgrades
Correct Answer: C – Consistent enforcement of access policies
Explanation: Centralized IAM ensures uniform application of access controls across
all systems.
Incorrect Answers:
A. Password policies are a feature, not the primary benefit.
B. Response time depends on system resources.
D. Upgrades are infrastructure-related.

Question 1125
An IS auditor is reviewing access logs and notices repeated failed login attempts from
a single user account. What should be the auditor's PRIMARY concern?
A. The account has weak password settings
B. The system may crash due to overload
C. The user may have forgotten their credentials
D. There may be a brute-force attack in progress
Correct Answer: D – There may be a brute-force attack in progress
Explanation: Multiple failed attempts could indicate an attacker trying to guess a
password.
Incorrect Answers:
A. Weak passwords increase risk but don’t cause failures.
B. Login failures rarely crash systems.
C. User errors are possible, but repeated attempts are suspicious.

Question 1126
Which of the following is MOST important for the effectiveness of an incident
response plan (IRP)?
A. Annual training for the IT team
B. Clearly defined roles and responsibilities
C. Regular updates to hardware inventory
D. Use of automated ticketing tools
Correct Answer: B – Clearly defined roles and responsibilities
Explanation: Defined roles ensure that all required actions are taken promptly and
by the right people during an incident.
Incorrect Answers:
A. Training supports effectiveness but relies on clear roles.
C. Inventory updates are more relevant to asset management.
D. Ticketing tools aid response, but people are key.

Question 1127
Which of the following would be of GREATEST concern during a review of a
privileged access account?
A. The account requires a complex password
B. The account is not monitored or logged
C. The account is used only during business hours
D. The account is documented in the access register
Correct Answer: B – The account is not monitored or logged
Explanation: Lack of monitoring allows potential misuse of powerful accounts to go
undetected.
Incorrect Answers:
A. Strong passwords are a good control.
C. Limited use hours reduce risk.
D. Documentation supports accountability.

Question 1128
Which of the following is the PRIMARY purpose of change management controls in
IT?
A. To reduce the number of incidents reported
B. To ensure changes are made according to business needs
C. To evaluate the productivity of developers
D. To prevent budget overruns
Correct Answer: B – To ensure changes are made according to
business needs
Explanation: Change management ensures all changes are authorized, tested, and
aligned with objectives.
Incorrect Answers:
A. Fewer incidents may result, but it's not the primary goal.
C. Productivity is not the objective of change management.
D. Budgeting is managed separately.

Question 1129
Which of the following BEST reduces the risk of unauthorized access to systems in
the event of a terminated employee?
A. Logging access activity
B. Performing periodic access reviews
C. Automating account deprovisioning
D. Encrypting stored passwords
Correct Answer: C – Automating account deprovisioning
Explanation: Automated deprovisioning ensures timely removal of access rights,
reducing exposure.
Incorrect Answers:
A. Logging detects, but doesn’t prevent.
B. Reviews are periodic and not immediate.
D. Encryption protects passwords but not access control.

Question 1130
An IS auditor discovers that a system does not enforce a minimum password length.
What is the GREATEST risk?
A. Users will forget their passwords
B. The system will experience more lockouts
C. Passwords may be easily guessed or cracked
D. Passwords will need to be changed more frequently
Correct Answer: C – Passwords may be easily guessed or cracked
Explanation: Short passwords reduce entropy, making them more vulnerable to
brute-force attacks.
Incorrect Answers:
A. Short passwords are easier to remember.
B. Lockouts occur with bad attempts, not length.
D. Frequency is not affected by length policy.

Question 1131
Which of the following is the MOST effective way to detect unauthorized access
attempts to a secured facility?
A. Badge access system
B. Surveillance cameras
C. Guard patrols
D. Alarm systems
Correct Answer: A – Badge access system
Explanation: Badge access systems provide logs of entry attempts, including
unauthorized ones, enabling timely detection.
Incorrect Answers:
B. Cameras record activity but do not always provide real-time alerts.
C. Guards may miss events or be delayed.
D. Alarms only trigger when thresholds are crossed.
Question 1132
Which of the following BEST ensures the security of a web application against
injection attacks?
A. Use of strong authentication
B. Encryption of traffic using SSL
C. Input validation and parameterized queries
D. Enforcing password changes periodically
Correct Answer: C – Input validation and parameterized queries
Explanation: These techniques prevent injection of malicious input into queries or
scripts.
Incorrect Answers:
A. Authentication controls access but not input.
B. SSL protects data in transit, not from injection.
D. Password changes do not mitigate injection threats.

Question 1133
Which of the following is MOST important to verify when reviewing a disaster
recovery test report?
A. The total cost of the test
B. The number of staff who participated
C. The test results against defined objectives
D. The names of external consultants involved
Correct Answer: C – The test results against defined objectives
Explanation: Evaluating test results against objectives confirms whether the
recovery plan is effective.
Incorrect Answers:
A. Cost is relevant to budgeting, not test success.
B. Participation matters, but objectives are key.
D. Consultants’ identities are not the main concern.

Question 1134
An IS auditor identifies that terminated employee accounts remain active. What is
the GREATEST risk?
A. Violation of privacy policy
B. Breach of licensing agreement
C. Unauthorized access to systems
D. Data entry errors
Correct Answer: C – Unauthorized access to systems
Explanation: Active accounts of former employees can be exploited to gain
unauthorized access.
Incorrect Answers:
A. Privacy concerns arise later; access is immediate.
B. Licensing issues are administrative.
D. Data errors are less severe than access risks.

Question 1135
Which of the following would BEST help an IS auditor evaluate the effectiveness of
an organization’s incident response capability?
A. Review of documented procedures
B. Interviews with IT security staff
C. Analysis of recent incident trends
D. Results from incident response tests
Correct Answer: D – Results from incident response tests
Explanation: Testing validates the actual response capability under simulated or
real conditions.
Incorrect Answers:
A. Procedures provide a framework but not proof.
B. Interviews offer insight but are subjective.
C. Trends show frequency but not effectiveness.

Question 1136
Which of the following BEST helps ensure that backups are reliable?
A. Storing backups offsite
B. Using encrypted backup media
C. Performing regular backup restoration tests
D. Automating the backup process
Correct Answer: C – Performing regular backup restoration tests
Explanation: Testing restores validates that backups work when needed.
Incorrect Answers:
A. Location is important for availability, not reliability.
B. Encryption protects data, not its usability.
D. Automation helps consistency but not verification.

Question 1137
What is the PRIMARY purpose of performing a post-implementation review of an IT
project?
A. To identify key project stakeholders
B. To justify future project budgets
C. To evaluate whether project objectives were met
D. To promote team recognition
Correct Answer: C – To evaluate whether project objectives were met
Explanation: Post-implementation reviews assess whether the project delivered the
intended value.
Incorrect Answers:
A. Stakeholders are defined earlier.
B. Budgets may be reviewed later but are not the primary purpose.
D. Recognition is not an audit goal.

Question 1138
Which of the following is MOST important to include in a data classification policy?
A. Retention timelines for each class of data
B. Access controls for unclassified data
C. Definitions of each classification level
D. Approved encryption algorithms
Correct Answer: C – Definitions of each classification level
Explanation: Clear definitions guide appropriate handling and protection based on
sensitivity.
Incorrect Answers:
A. Retention is important but policy comes first.
B. Controls follow classification, not define it.
D. Encryption specifics belong in technical standards.

Question 1139
Which of the following would BEST indicate a potential violation of the segregation
of duties principle in a financial system?
A. A single user processes and approves transactions
B. Users sharing accounts for faster processing
C. Delayed transaction processing times
D. Infrequent password changes
Correct Answer: A – A single user processes and approves
transactions
Explanation: This creates a conflict of interest and increases fraud risk.
Incorrect Answers:
B. Shared accounts are a concern but not direct SoD violations.
C. Delays may be operational, not control-related.
D. Password frequency is unrelated to SoD.

Question 1140
What is the BEST way to ensure sensitive data is securely deleted from
decommissioned hard drives?
A. Reformatting the drives
B. Overwriting the drives multiple times
C. Compressing the data before deletion
D. Storing the drives in a locked cabinet
Correct Answer: B – Overwriting the drives multiple times
Explanation: Multiple overwrites prevent data recovery even with forensic tools.
Incorrect Answers:
A. Reformatting does not fully erase data.
C. Compression doesn’t remove data.
D. Storage delays disposal and introduces new risks.

Question 1141
Which of the following is the BEST way to protect data confidentiality during
transmission over a public network?
A. Implementing a firewall
B. Using a secure virtual private network (VPN)
C. Enforcing password policies
D. Applying hashing algorithms
Correct Answer: B – Using a secure virtual private network (VPN)
Explanation: A VPN encrypts data during transmission, ensuring it remains
confidential even over untrusted networks.
Incorrect Answers:
A. Firewalls control traffic but don’t encrypt it.
C. Passwords protect access, not data in transit.
D. Hashing ensures integrity, not confidentiality.

Question 1142
Which of the following is the MOST significant risk of not having a formal patch
management process?
A. Increased support calls
B. Outdated user documentation
C. Exposure to known vulnerabilities
D. Loss of software vendor support
Correct Answer: C – Exposure to known vulnerabilities
Explanation: Without patching, systems remain exposed to exploits that could have
been fixed.
Incorrect Answers:
A. Support calls may increase, but vulnerabilities pose greater risk.
B. Documentation is important but not critical.
D. Vendor support is valuable, but not as urgent as security.

Question 1143
Which of the following would BEST prevent unauthorized physical access to a data
center?
A. Mantrap entry with biometric controls
B. Motion detection sensors
C. Closed-circuit television (CCTV)
D. Electronic visitor logs
Correct Answer: A – Mantrap entry with biometric controls
Explanation: Biometric-controlled mantraps provide strong physical access control
by verifying identity before entry.
Incorrect Answers:
B. Motion detection alerts but does not prevent entry.
C. CCTV records activity but doesn’t restrict access.
D. Logs track visitors but don’t stop them from entering.

Question 1144
An IS auditor finds that developers have access to production systems. What is the
GREATEST concern?
A. Reduced system performance
B. Unauthorized changes to live data
C. Lack of software documentation
D. Increased help desk workload
Correct Answer: B – Unauthorized changes to live data
Explanation: Developer access to production bypasses change controls, risking data
integrity and security.
Incorrect Answers:
A. Performance is not directly impacted.
C. Documentation issues are separate.
D. Help desk impact is minimal.

Question 1145
Which of the following BEST supports traceability in the change management
process?
A. Version control software
B. Secure backup storage
C. Automatic patch deployment
D. Centralized service desk
Correct Answer: A – Version control software
Explanation: Version control tracks changes, authors, and timestamps, enabling full
traceability.
Incorrect Answers:
B. Backups support recovery, not traceability.
C. Patch automation enforces updates, not history.
D. Service desks handle tickets, not code changes.
Question 1146
Which of the following is the PRIMARY purpose of an information classification
policy?
A. To define user responsibilities
B. To guide the implementation of access controls
C. To ensure system availability
D. To determine backup frequency
Correct Answer: B – To guide the implementation of access controls
Explanation: Classification helps determine the appropriate level of protection
based on sensitivity.
Incorrect Answers:
A. Responsibilities are part of security awareness.
C. Availability is influenced by other controls.
D. Backup policies are based on criticality, not just classification.

Question 1147
What is the MOST important reason to conduct regular reviews of user access
rights?
A. To detect password reuse
B. To ensure compliance with data retention policies
C. To verify users have only necessary access
D. To assess employee productivity
Correct Answer: C – To verify users have only necessary access
Explanation: Periodic reviews help enforce the principle of least privilege and
prevent unauthorized access.
Incorrect Answers:
A. Password reuse is addressed through authentication policies.
B. Retention policies are unrelated.
D. Access rights do not indicate productivity.

Question 1148
An organization plans to dispose of old laptops containing confidential data. What is
the BEST method to ensure data is unrecoverable?
A. Use disk defragmentation
B. Delete files and empty the recycle bin
C. Perform secure wiping using data erasure software
D. Store devices in a locked cabinet
Correct Answer: C – Perform secure wiping using data erasure
software
Explanation: Secure wiping overwrites the entire drive, making data recovery
extremely difficult.
Incorrect Answers:
A. Defragmenting rearranges data but doesn’t erase it.
B. Deletion only removes file pointers.
D. Storage delays disposal, not erasure.

Question 1149
Which of the following controls BEST mitigates the risk of unauthorized software
installation?
A. Anti-malware software
B. Intrusion prevention systems (IPS)
C. Application whitelisting
D. File integrity monitoring
Correct Answer: C – Application whitelisting
Explanation: Whitelisting prevents any software not explicitly approved from
running.
Incorrect Answers:
A. Anti-malware detects threats, but doesn’t prevent installs.
B. IPS detects and blocks traffic, not local installs.
D. File monitoring identifies changes after the fact.

Question 1150
Which of the following is the PRIMARY reason to include security requirements in
service level agreements (SLAs) with third-party providers?
A. To define penalties for late delivery
B. To avoid legal liability
C. To ensure service availability
D. To establish enforceable security expectations
Correct Answer: D – To establish enforceable security expectations
Explanation: Including security requirements in SLAs ensures providers meet the
organization’s security standards.
Incorrect Answers:
A. Delivery timelines are performance-based, not security.
B. Legal issues are broader than SLA terms.
C. Availability is part of SLA, but not specific to security.

Question 1151
An IS auditor is reviewing access controls to an organization's financial application.
Which of the following findings presents the GREATEST risk?
A. Users do not change passwords regularly
B. Former employees still have active user accounts
C. Passwords are not encrypted in transit
D. Users can view but not edit financial data
Correct Answer: B – Former employees still have active user accounts
Explanation: Active accounts for terminated users pose a high risk of unauthorized
access.
Incorrect Answers:
A. Password changes help security but are less urgent.
C. Encryption protects passwords, but access should be revoked first.
D. Read-only access has limited risk compared to unused active accounts.

Question 1152
Which of the following is the PRIMARY reason for implementing a formal data
ownership policy?
A. To support database normalization
B. To establish accountability for data accuracy and protection
C. To improve data query performance
D. To control software license usage
Correct Answer: B – To establish accountability for data accuracy and
protection
Explanation: Assigning data ownership ensures responsibility for data security and
integrity.
Incorrect Answers:
A. Normalization is a design practice, not a policy outcome.
C. Performance is influenced by design, not ownership.
D. Licensing is unrelated to data ownership.

Question 1153
Which of the following is the MOST effective way to identify unauthorized devices on
a corporate network?
A. Perform regular vulnerability scans
B. Review firewall rules
C. Conduct a network inventory audit
D. Implement network access control (NAC)
Correct Answer: D – Implement network access control (NAC)
Explanation: NAC enforces device authentication before granting network access.
Incorrect Answers:
A. Scans detect vulnerabilities but may miss unauthorized access.
B. Firewall rules do not show connected devices.
C. Inventory helps detect but not prevent access.

Question 1154
Which of the following is the PRIMARY objective of implementing role-based access
control (RBAC)?
A. To increase user accountability
B. To limit access based on job functions
C. To log user activities
D. To enforce password complexity
Correct Answer: B – To limit access based on job functions
Explanation: RBAC enforces least privilege by aligning access with roles.
Incorrect Answers:
A. Accountability is supported but not the main purpose.
C. Logging is handled separately.
D. Password complexity is unrelated to RBAC.

Question 1155
Which of the following would BEST help to mitigate insider threats?
A. Blocking USB ports on all systems
B. Implementing a data loss prevention (DLP) system
C. Encrypting all outgoing emails
D. Requiring strong user passwords
Correct Answer: B – Implementing a data loss prevention (DLP)
system
Explanation: DLP detects and prevents unauthorized sharing of sensitive data.
Incorrect Answers:
A. Blocking ports helps but may not catch all data transfers.
C. Encryption protects data but not from intentional misuse.
D. Strong passwords help control access, not prevent leaks.

Question 1156
Which of the following is the BEST justification for implementing two-factor
authentication?
A. It complies with industry regulations
B. It eliminates the need for password changes
C. It ensures authentication without encryption
D. It strengthens user identity verification
Correct Answer: D – It strengthens user identity verification
Explanation: Two-factor authentication requires two independent forms of proof,
enhancing identity assurance.
Incorrect Answers:
A. Compliance is a benefit, not the reason.
B. Password changes may still be needed.
C. Encryption is separate from authentication.
Question 1157
Which of the following is MOST helpful in identifying the root cause of recurring
system outages?
A. System availability dashboards
B. End-user satisfaction surveys
C. Post-incident reviews
D. Network topology diagrams
Correct Answer: C – Post-incident reviews
Explanation: These reviews analyze what went wrong and why, helping prevent
future outages.
Incorrect Answers:
A. Dashboards show status, not causes.
B. Surveys show impact, not root cause.
D. Diagrams aid understanding but don’t show events.

Question 1158
Which of the following is the PRIMARY purpose of implementing a digital certificate
in secure communications?
A. To verify the integrity of backup data
B. To ensure sender identity and message integrity
C. To reduce firewall configuration errors
D. To prevent denial-of-service attacks
Correct Answer: B – To ensure sender identity and message integrity
Explanation: Digital certificates authenticate users and help confirm that data
hasn’t been altered.
Incorrect Answers:
A. Certificates are unrelated to backups.
C. Firewalls use other controls.
D. DoS prevention involves traffic management, not certificates.

Question 1159
Which of the following is the MOST important feature of an intrusion detection
system (IDS)?
A. Blocking unauthorized access attempts
B. Real-time alerting of suspicious activities
C. Generating network performance reports
D. Filtering inbound emails
Correct Answer: B – Real-time alerting of suspicious activities
Explanation: IDS systems monitor and report anomalies that could indicate an
attack.
Incorrect Answers:
A. Blocking is handled by IPS, not IDS.
C. Performance reports are not a core IDS function.
D. Email filtering is a separate toolset.

Question 1160
Which of the following is the BEST way to ensure system logs cannot be altered by
unauthorized users?
A. Store logs in a database
B. Encrypt log files
C. Transmit logs to a secure, centralized server
D. Restrict log file access to system administrators
Correct Answer: C – Transmit logs to a secure, centralized server
Explanation: Centralized logging reduces the risk of local tampering by isolating log
storage.
Incorrect Answers:
A. Local databases may still be altered.
B. Encryption protects confidentiality but not integrity.
D. Admins may still have access to change logs.

Question 1161
Which of the following is the MOST effective way to prevent unauthorized wireless
access to an internal network?
A. Enabling network address translation (NAT)
B. Disabling broadcast of the SSID
C. Implementing WPA3 encryption with strong authentication
D. Using a captive portal
Correct Answer: C – Implementing WPA3 encryption with strong
authentication
Explanation: WPA3 provides modern encryption and authentication methods that
prevent unauthorized wireless access.
Incorrect Answers:
A. NAT hides IPs but doesn't secure wireless traffic.
B. Hiding SSID offers minimal security.
D. Captive portals manage access but don’t encrypt data.

Question 1162
Which of the following is MOST important to verify when reviewing a software
development life cycle (SDLC) process?
A. Use of agile methodologies
B. Adherence to change management procedures
C. Developer productivity metrics
D. Number of help desk calls after releases
Correct Answer: B – Adherence to change management procedures
Explanation: Change management ensures that all updates are properly reviewed,
tested, and authorized.
Incorrect Answers:
A. Methodology choice is secondary to control adherence.
C. Productivity does not ensure software quality.
D. Help desk calls reflect issues, not process control.

Question 1163
Which of the following would BEST help an organization assess whether its IT
governance structure supports its business goals?
A. Annual IT budget analysis
B. IT key performance indicator (KPI) dashboard
C. Mapping IT objectives to business strategy
D. IT steering committee meeting minutes
Correct Answer: C – Mapping IT objectives to business strategy
Explanation: Alignment between IT and business objectives ensures governance
supports enterprise goals.
Incorrect Answers:
A. Budget reflects cost, not alignment.
B. KPIs may not indicate strategic alignment.
D. Meeting minutes show discussion, not alignment.

Question 1164
Which of the following is the PRIMARY concern when data is replicated between
two data centers?
A. Speed of replication
B. Encryption of data in transit
C. Availability of storage space
D. Location of the replication server
Correct Answer: B – Encryption of data in transit
Explanation: Protecting data while in transit between sites is crucial for
confidentiality and integrity.
Incorrect Answers:
A. Speed is a performance issue, not security.
C. Storage availability affects capacity, not security.
D. Location matters, but encryption is more critical.

Question 1165
An IS auditor notes that application logs are stored on the same server as the
application. What is the GREATEST risk?
A. Logs may not be retained long enough
B. Logs may become too large
C. Logs may be altered or deleted by attackers
D. Logs may not capture all user actions
Correct Answer: C – Logs may be altered or deleted by attackers
Explanation: If an attacker compromises the application server, logs stored there
can be tampered with or erased.
Incorrect Answers:
A. Retention is an administrative issue.
B. Storage capacity is manageable.
D. Logging accuracy is a configuration issue.

Question 1166
Which of the following would BEST indicate that data classification policies are
effectively enforced?
A. All files are encrypted
B. Users have access only to data they are authorized to handle
C. Data is backed up daily
D. All emails are digitally signed
Correct Answer: B – Users have access only to data they are
authorized to handle
Explanation: Enforcement of classification ensures that only authorized users access
data based on its sensitivity.
Incorrect Answers:
A. Encryption is important but doesn't prove classification enforcement.
C. Backups support availability, not classification.
D. Signatures support integrity, not classification.

Question 1167
Which of the following would be of MOST concern when reviewing an outsourced IT
help desk service?
A. Lack of training on internal IT policies
B. No service level agreement (SLA) for incident resolution times
C. Use of cloud-based help desk software
D. Monthly reporting on support ticket volumes
Correct Answer: B – No service level agreement (SLA) for incident
resolution times
Explanation: SLAs define expectations and ensure accountability for timely service
delivery.
Incorrect Answers:
A. Training is important but can be corrected.
C. Cloud-based tools can be secure if properly managed.
D. Reporting is helpful, but lack of SLA is a bigger issue.

Question 1168
Which of the following is MOST effective in ensuring that sensitive printed
documents are not left unattended?
A. Installing security cameras in the printing area
B. Implementing a pull-printing system with user authentication
C. Assigning employees to monitor print stations
D. Using paper shredders near printers
Correct Answer: B – Implementing a pull-printing system with user
authentication
Explanation: Pull-printing ensures that documents are only printed when the user
is physically present and authenticated.
Incorrect Answers:
A. Cameras monitor but don’t prevent access.
C. Manual monitoring is not scalable.
D. Shredders help dispose but don’t prevent exposure.

Question 1169
Which of the following BEST mitigates the risk of unauthorized access due to weak
remote access controls?
A. Implementing VPN client software
B. Using IP address restrictions
C. Enabling multifactor authentication
D. Conducting security awareness training
Correct Answer: C – Enabling multifactor authentication
Explanation: MFA significantly enhances access security by requiring multiple
verification methods.
Incorrect Answers:
A. VPNs secure traffic but may still be accessed with weak credentials.
B. IP restrictions can be bypassed with spoofing.
D. Awareness helps but isn’t a technical control.

Question 1170
Which of the following is the PRIMARY purpose of a risk register in IT risk
management?
A. To document past incidents and their resolutions
B. To track open audit findings
C. To identify, assess, and monitor risks
D. To plan business continuity tests
Correct Answer: C – To identify, assess, and monitor risks
Explanation: A risk register records key information about risks for ongoing
management and mitigation.
Incorrect Answers:
A. Incident logs serve that purpose.
B. Audit findings are tracked separately.
D. BCP testing is managed outside of the risk register.

Question 1171
Which of the following is the PRIMARY purpose of conducting regular penetration
testing?
A. To identify and prioritize exploitable vulnerabilities
B. To determine the efficiency of the IT help desk
C. To assess compliance with organizational policies
D. To test the speed of incident response
Correct Answer: A – To identify and prioritize exploitable
vulnerabilities
Explanation: Penetration tests simulate real attacks to find security weaknesses
before attackers do.
Incorrect Answers:
B. Help desk operations are not related.
C. Policy compliance is reviewed via audits.
D. Incident response may be tested later, but not the main purpose here.

Question 1172
Which of the following provides the BEST evidence that a firewall is properly
configured?
A. The firewall uses a deny-all default rule
B. The firewall software is updated regularly
C. Firewall change requests are approved
D. A current firewall rule review report exists
Correct Answer: D – A current firewall rule review report exists
Explanation: A review confirms that rules are appropriate, justified, and effectively
enforced.
Incorrect Answers:
A. A deny-all rule is important but must be validated.
B. Updates help security, not configuration correctness.
C. Approvals ensure process, not accuracy.

Question 1173
What is the PRIMARY concern if antivirus signatures are not updated regularly?
A. Reduced scanning speed
B. False positive results
C. Missed detection of new threats
D. Increased disk usage
Correct Answer: C – Missed detection of new threats
Explanation: Without updates, antivirus tools cannot detect the latest malware
variants.
Incorrect Answers:
A. Speed may not be impacted.
B. False positives are not due to outdated signatures.
D. Disk usage is marginally affected.

Question 1174
Which of the following is the BEST way to confirm that end users are following
acceptable use policies?
A. Conduct periodic user awareness training
B. Perform regular system log reviews
C. Review results from phishing simulations
D. Require users to sign an acknowledgment form
Correct Answer: B – Perform regular system log reviews
Explanation: Logs provide objective evidence of actual user behavior and policy
compliance.
Incorrect Answers:
A. Training educates but doesn’t confirm behavior.
C. Phishing tests target one aspect of behavior.
D. Signing forms confirms awareness, not action.

Question 1175
Which of the following poses the GREATEST risk to data confidentiality in a cloud
environment?
A. Limited storage capacity
B. Weak encryption key management
C. Infrequent backups
D. High latency in network connectivity
Correct Answer: B – Weak encryption key management
Explanation: Poor key management can lead to exposure of sensitive encrypted
data.
Incorrect Answers:
A. Capacity is a performance concern.
C. Backups affect availability, not confidentiality.
D. Latency affects user experience, not data security.
Question 1176
Which of the following BEST ensures that an organization can recover from
ransomware attacks?
A. Implementing application control policies
B. Restricting administrator privileges
C. Maintaining offline backups and testing recovery
D. Installing host-based intrusion prevention systems
Correct Answer: C – Maintaining offline backups and testing recovery
Explanation: Offline, tested backups allow systems to be restored without paying
ransoms.
Incorrect Answers:
A. Application controls may help prevent but not recover.
B. Privilege restrictions reduce risk but don't aid recovery.
D. Prevention tools don’t guarantee data recovery.

Question 1177
Which of the following is the PRIMARY objective of implementing a security
information and event management (SIEM) solution?
A. To block suspicious network traffic
B. To automate penetration testing
C. To correlate security events and generate alerts
D. To manage system configurations
Correct Answer: C – To correlate security events and generate alerts
Explanation: SIEM tools centralize, analyze, and alert on security events in real
time.
Incorrect Answers:
A. Blocking is performed by firewalls and IPS.
B. Penetration testing is a manual or separate automated task.
D. Configuration is handled by system management tools.

Question 1178
Which of the following would BEST reduce the likelihood of a successful social
engineering attack?
A. Security policy documentation
B. Multi-factor authentication
C. Security awareness campaigns
D. Role-based access control
Correct Answer: C – Security awareness campaigns
Explanation: Educated users are less likely to fall victim to manipulation or
deception.
Incorrect Answers:
A. Documentation provides rules, not behavior change.
B. MFA protects systems but not user judgment.
D. RBAC limits impact, not likelihood.

Question 1179
Which of the following is MOST important when selecting a third-party cloud
provider?
A. Data center location
B. Support for multiple programming languages
C. Alignment with regulatory compliance requirements
D. Uptime guarantees
Correct Answer: C – Alignment with regulatory compliance
requirements
Explanation: Regulatory compliance is critical to avoid legal penalties and ensure
data protection.
Incorrect Answers:
A. Location matters, but compliance is broader.
B. Language support helps developers but not compliance.
D. Uptime is important but secondary to legal obligations.

Question 1180
Which of the following is the PRIMARY reason to perform periodic vulnerability
assessments?
A. To meet service level agreements
B. To assess incident response procedures
C. To identify weaknesses before they are exploited
D. To test disaster recovery capabilities
Correct Answer: C – To identify weaknesses before they are exploited
Explanation: Regular vulnerability scans help discover and fix flaws before
attackers do.
Incorrect Answers:
A. SLAs relate to performance, not vulnerability.
B. Incident response testing is a separate activity.
D. DR testing checks recovery, not prevention.

Question 1181
Which of the following is the MOST important when reviewing a business continuity
plan (BCP)?
A. Whether the plan includes all IT assets
B. Whether recovery time objectives (RTOs) are defined
C. Whether end users are familiar with the plan
D. Whether testing is outsourced
Correct Answer: B – Whether recovery time objectives (RTOs) are
defined
Explanation: RTOs guide recovery prioritization and ensure continuity planning
aligns with business needs.
Incorrect Answers:
A. Asset listing helps, but timing is more critical.
C. Awareness is important but follows proper planning.
D. Outsourcing is secondary to content quality.

Question 1182
Which of the following provides the BEST evidence that backups are recoverable?
A. Backups are performed daily
B. Backup logs show successful completion
C. Backup procedures are documented
D. Regular restore tests are conducted
Correct Answer: D – Regular restore tests are conducted
Explanation: Successful recovery testing confirms that backup files are usable and
complete.
Incorrect Answers:
A. Frequency ensures availability but not quality.
B. Logs show process success, not result.
C. Documentation helps guide the process, not validate it.

Question 1183
What is the PRIMARY purpose of a demilitarized zone (DMZ) in a network
architecture?
A. To monitor all internal traffic
B. To block access to external websites
C. To isolate public-facing systems from internal networks
D. To encrypt outbound internet communications
Correct Answer: C – To isolate public-facing systems from internal
networks
Explanation: A DMZ prevents direct access to internal resources by placing
exposed services in a controlled zone.
Incorrect Answers:
A. Monitoring occurs elsewhere.
B. Website access control is a firewall function.
D. Encryption is a separate control.
Question 1184
An IS auditor is reviewing controls over an organization's remote work environment.
Which of the following is the GREATEST concern?
A. Employees use personally owned devices
B. Remote sessions are not time-limited
C. File transfers are permitted
D. Data is stored on local drives
Correct Answer: D – Data is stored on local drives
Explanation: Local storage of sensitive data increases the risk of loss or
compromise.
Incorrect Answers:
A. Personal devices can be secured with proper controls.
B. Timeouts reduce risk but are less critical.
C. Transfers may be monitored or restricted.

Question 1185
Which of the following is the MOST effective control to ensure data integrity during
transmission?
A. Digital signatures
B. Two-factor authentication
C. Access control lists
D. Encryption
Correct Answer: A – Digital signatures
Explanation: Digital signatures verify that data has not been altered in transit.
Incorrect Answers:
B. Authentication secures access, not content.
C. ACLs define access rights but don’t verify integrity.
D. Encryption ensures confidentiality, not integrity alone.

Question 1186
What is the PRIMARY risk of using obsolete or unsupported software?
A. Decreased system performance
B. Lack of vendor technical support
C. Increased security vulnerabilities
D. Difficulty in finding trained staff
Correct Answer: C – Increased security vulnerabilities
Explanation: Unsupported software no longer receives security updates, making it
an easy target.
Incorrect Answers:
A. Performance may degrade but is not the main risk.
B. Support loss contributes but is secondary.
D. Staffing issues can be mitigated with training.

Question 1187
Which of the following is MOST important to verify before implementing a bring-
your-own-device (BYOD) policy?
A. That employees agree to pay for their own device repairs
B. That personal devices are enrolled in mobile device management (MDM)
C. That help desk staff are trained on multiple operating systems
D. That users agree to frequent battery replacement
Correct Answer: B – That personal devices are enrolled in mobile
device management (MDM)
Explanation: MDM enables enforcement of security controls on personal devices
accessing corporate data.
Incorrect Answers:
A. Repair costs are irrelevant to security.
C. Help desk training is helpful but not essential.
D. Battery issues are unrelated.

Question 1188
Which of the following BEST helps ensure consistent security practices across
multiple departments?
A. Implementing department-specific policies
B. Appointing a security officer for each department
C. Centralizing policy creation and enforcement
D. Providing security tools to all employees
Correct Answer: C – Centralizing policy creation and enforcement
Explanation: A centralized approach promotes uniform standards and compliance.
Incorrect Answers:
A. Decentralized policies may lead to inconsistency.
B. Multiple officers can lead to fragmentation.
D. Tools are helpful but don’t ensure consistent use.

Question 1189
Which of the following is the PRIMARY benefit of logging administrative activities
in critical systems?
A. Facilitates password resets
B. Supports software version tracking
C. Provides accountability and audit trail
D. Allows faster system backups
Correct Answer: C – Provides accountability and audit trail
Explanation: Logging tracks administrative actions, aiding investigation and
compliance.
Incorrect Answers:
A. Password resets are unrelated.
B. Version tracking is done through version control tools.
D. Backups are managed separately.

Question 1190
Which of the following BEST demonstrates management's commitment to
information security?
A. Funding a security awareness program
B. Reviewing firewall rules monthly
C. Hiring additional IT staff
D. Signing off on internal audit reports
Correct Answer: A – Funding a security awareness program
Explanation: Investment in awareness shows proactive support for organizational
security culture.
Incorrect Answers:
B. Firewall reviews are technical, not strategic.
C. Staffing helps operations but doesn’t prove commitment.
D. Sign-offs are formalities, not active engagement.

Question 1191
Which of the following is the MOST effective control for ensuring that terminated
employees no longer have access to systems?
A. Changing system passwords regularly
B. Performing periodic user access reviews
C. Automating account deactivation upon termination
D. Requiring HR to submit access removal requests
Correct Answer: C – Automating account deactivation upon
termination
Explanation: Automation ensures immediate revocation of access, reducing the risk
of misuse.
Incorrect Answers:
A. Password changes help but don’t target specific users.
B. Reviews are periodic and may miss immediate risk.
D. Manual processes are slower and prone to error.

Question 1192
Which of the following is MOST important when reviewing an organization’s incident
response policy?
A. Escalation procedures are defined
B. Incident logs are stored for at least 30 days
C. The policy is aligned with industry benchmarks
D. The policy is reviewed during audits
Correct Answer: A – Escalation procedures are defined
Explanation: Defined escalation ensures appropriate and timely response during
incidents.
Incorrect Answers:
B. Retention is useful but not critical for immediate action.
C. Alignment is good but secondary to internal processes.
D. Audit review ensures oversight, not effectiveness.

Question 1193
Which of the following BEST mitigates the risk of phishing emails?
A. Regular server patching
B. DNS filtering
C. User training and simulated phishing tests
D. Implementation of a spam filter
Correct Answer: C – User training and simulated phishing tests
Explanation: Training enhances user awareness, and simulations reinforce vigilance
against phishing.
Incorrect Answers:
A. Patching protects systems, not users.
B. DNS filtering helps but can be bypassed.
D. Spam filters reduce volume but are not foolproof.

Question 1194
Which of the following is the PRIMARY reason for requiring secure coding practices
during software development?
A. To meet service level agreements
B. To prevent introduction of vulnerabilities
C. To optimize application performance
D. To reduce code review time
Correct Answer: B – To prevent introduction of vulnerabilities
Explanation: Secure coding reduces the risk of exploitable flaws in software.
Incorrect Answers:
A. SLAs deal with delivery, not code quality.
C. Performance is secondary to security.
D. Reviews are still necessary even with secure practices.

Question 1195
Which of the following is MOST important when storing cryptographic keys?
A. Storing them in encrypted text files
B. Keeping them in the same location as the encrypted data
C. Using a hardware security module (HSM)
D. Printing and filing the keys in a secure cabinet
Correct Answer: C – Using a hardware security module (HSM)
Explanation: HSMs securely generate, store, and manage cryptographic keys with
strong protection.
Incorrect Answers:
A. Text files are vulnerable even if encrypted.
B. Co-locating keys and data increases risk.
D. Paper storage is outdated and less secure.

Question 1196
Which of the following is the BEST way to determine whether critical patches have
been applied to all servers?
A. Reviewing server inventory logs
B. Verifying patch documentation
C. Performing vulnerability scans
D. Reviewing service level agreements
Correct Answer: C – Performing vulnerability scans
Explanation: Scans identify unpatched vulnerabilities regardless of documentation.
Incorrect Answers:
A. Inventory lists assets, not patch status.
B. Documentation may not reflect real-time status.
D. SLAs don’t show implementation details.

Question 1197
Which of the following BEST supports detection of unauthorized file changes on a
system?
A. Access control lists
B. File integrity monitoring
C. Intrusion prevention systems
D. Encrypted storage
Correct Answer: B – File integrity monitoring
Explanation: File integrity monitoring detects unexpected changes in critical files.
Incorrect Answers:
A. ACLs control access but don’t detect changes.
C. IPS blocks network threats, not file-level activity.
D. Encryption secures data, not its modification state.
Question 1198
Which of the following is the PRIMARY benefit of using biometric authentication?
A. It is less expensive than password systems
B. It provides higher user convenience
C. It is difficult to replicate or forge
D. It eliminates the need for access controls
Correct Answer: C – It is difficult to replicate or forge
Explanation: Biometric traits are unique and hard to duplicate, enhancing security.
Incorrect Answers:
A. Biometric systems are typically more costly.
B. Convenience varies and is subjective.
D. Biometrics complement, not replace, access controls.

Question 1199
Which of the following is the BEST control to detect unauthorized database access?
A. Encryption of stored data
B. Monitoring of database audit logs
C. Regular backup of database files
D. Use of stored procedures
Correct Answer: B – Monitoring of database audit logs
Explanation: Logs provide a record of access and help identify suspicious activity.
Incorrect Answers:
A. Encryption protects data but doesn’t detect access.
C. Backups ensure recovery, not monitoring.
D. Stored procedures control input, not access.

Question 1200
Which of the following is MOST important when implementing a new antivirus
solution organization-wide?
A. That the solution supports email scanning
B. That the software is regularly updated
C. That all employees are trained to use it
D. That it includes a firewall module
Correct Answer: B – That the software is regularly updated
Explanation: Frequent updates ensure detection of the latest threats and malware
variants.
Incorrect Answers:
A. Email scanning is useful but not as critical.
C. User training helps but is not the main control.
D. Firewalls are separate controls and not always necessary in AV software.
Question 1201
Which of the following is the MOST important reason to implement role-based access
control (RBAC) in an organization?
A. To minimize help desk workload
B. To ensure separation of duties
C. To improve network performance
D. To reduce password reset requests
Correct Answer: B – To ensure separation of duties
Explanation: RBAC helps enforce least privilege and separation of duties, reducing
the risk of unauthorized activities.
Incorrect Answers:
A. Help desk impact is minor.
C. Performance is not affected by access models.
D. Password resets relate to user behavior, not access control.

Question 1202
Which of the following is the PRIMARY concern when employees use public Wi-Fi to
access corporate systems?
A. Limited bandwidth availability
B. Inability to monitor productivity
C. Unencrypted data transmission
D. Session timeouts
Correct Answer: C – Unencrypted data transmission
Explanation: Public Wi-Fi is often untrusted, and unencrypted data can be
intercepted.
Incorrect Answers:
A. Bandwidth affects speed, not security.
B. Monitoring is less critical than secure access.
D. Timeouts protect sessions but do not address interception.

Question 1203
Which of the following would BEST help ensure that only authorized applications are
executed on company computers?
A. Antivirus software
B. Host-based intrusion detection system (HIDS)
C. Application whitelisting
D. Network firewalls
Correct Answer: C – Application whitelisting
Explanation: Whitelisting allows only approved applications to run, blocking
unauthorized software.
Incorrect Answers:
A. Antivirus detects threats but doesn’t control execution.
B. HIDS monitors behavior but doesn’t enforce application control.
D. Firewalls control network access, not local apps.

Question 1204
Which of the following is MOST important when reviewing cloud provider contracts
for data security?
A. Availability of 24/7 technical support
B. Flexibility to switch providers
C. Clarity on data ownership and protection responsibilities
D. Physical location of support staff
Correct Answer: C – Clarity on data ownership and protection
responsibilities
Explanation: Clear terms on data security, ownership, and compliance are essential
in cloud agreements.
Incorrect Answers:
A. Support helps operations, not data protection.
B. Portability matters but is secondary.
D. Staff location is less relevant than data control.

Question 1205
Which of the following BEST helps prevent the exploitation of known software
vulnerabilities?
A. Secure coding training
B. Regular patch management
C. Firewalls and intrusion prevention
D. Disaster recovery planning
Correct Answer: B – Regular patch management
Explanation: Patching fixes known vulnerabilities and is a key preventive control.
Incorrect Answers:
A. Training prevents new vulnerabilities but not exploits.
C. Firewalls mitigate risk but don’t fix vulnerabilities.
D. DR planning addresses recovery, not prevention.

Question 1206
Which of the following is the PRIMARY purpose of a risk assessment in information
security?
A. To ensure business continuity
B. To calculate system availability
C. To identify and evaluate threats and vulnerabilities
D. To perform a penetration test
Correct Answer: C – To identify and evaluate threats and
vulnerabilities
Explanation: Risk assessments help determine the exposure level and guide
mitigation strategies.
Incorrect Answers:
A. Continuity planning uses risk results but is not the goal.
B. Availability is one part of the risk picture.
D. Penetration testing is a follow-up activity.

Question 1207
What is the GREATEST concern if security patches are not tested before
deployment?
A. Users may reject system updates
B. Patches may be too large for the system
C. Unexpected system failures or incompatibilities
D. The patch will not be accepted by the firewall
Correct Answer: C – Unexpected system failures or incompatibilities
Explanation: Untested patches can break functionality or cause outages.
Incorrect Answers:
A. User rejection is not the primary risk.
B. Size typically affects download, not compatibility.
D. Firewalls do not typically block patches.

Question 1208
Which of the following is the PRIMARY purpose of log retention policies?
A. To reduce storage costs
B. To maintain compliance and support investigations
C. To monitor employee performance
D. To provide evidence for marketing claims
Correct Answer: B – To maintain compliance and support
investigations
Explanation: Retained logs are used for audits, forensics, and meeting legal
requirements.
Incorrect Answers:
A. Storage is a secondary concern.
C. Monitoring performance uses different tools.
D. Marketing does not use security logs.

Question 1209
An IS auditor reviewing a system upgrade notices the absence of rollback procedures.
What is the GREATEST risk?
A. Budget overrun
B. Prolonged system downtime
C. Unauthorized changes
D. Reduced user productivity
Correct Answer: B – Prolonged system downtime
Explanation: Without rollback, failures may not be easily reversible, extending
outages.
Incorrect Answers:
A. Costs may rise, but downtime has more impact.
C. Change approval is a separate issue.
D. Productivity is affected but is a result of downtime.

Question 1210
Which of the following would be MOST useful in detecting unauthorized changes to
system configurations?
A. Change management policy
B. Configuration baseline comparison
C. Antivirus software
D. Firewall rules
Correct Answer: B – Configuration baseline comparison
Explanation: Comparing current settings to approved baselines highlights
unauthorized changes.
Incorrect Answers:
A. Policies define rules but don’t detect changes.
C. Antivirus detects malware, not config drift.
D. Firewalls control traffic, not system setup.

Question 1211
Which of the following is the PRIMARY goal of security awareness training?
A. To improve IT support efficiency
B. To ensure compliance with licensing agreements
C. To reduce human-related security incidents
D. To teach users how to configure firewalls
Correct Answer: C – To reduce human-related security incidents
Explanation: Awareness training equips users to recognize and avoid common
threats like phishing and social engineering.
Incorrect Answers:
A. Support efficiency is not the focus.
B. Licensing is managed through asset tracking.
D. Firewall configuration is handled by IT staff, not general users.

Question 1212
Which of the following is the MOST appropriate control for securing portable devices
that store sensitive data?
A. Periodic password changes
B. Full disk encryption
C. Disabling USB ports
D. Installing antivirus software
Correct Answer: B – Full disk encryption
Explanation: Full disk encryption protects data if the device is lost or stolen.
Incorrect Answers:
A. Password changes help but don’t protect data at rest.
C. Disabling USB ports restricts input/output but not storage.
D. Antivirus protects against malware, not physical data loss.

Question 1213
Which of the following is MOST important when selecting a backup strategy for a
critical database?
A. Backup window duration
B. Type of storage media used
C. Recovery time and point objectives
D. Backup operator certifications
Correct Answer: C – Recovery time and point objectives
Explanation: RTO and RPO determine how quickly and accurately data can be
restored after a failure.
Incorrect Answers:
A. Timing is part of the process but not the priority.
B. Media affects logistics, not strategy.
D. Certification is irrelevant if recovery fails.

Question 1214
Which of the following is the PRIMARY purpose of network segmentation?
A. To reduce hardware costs
B. To simplify software licensing
C. To improve performance and security
D. To decrease data encryption requirements
Correct Answer: C – To improve performance and security
Explanation: Segmentation limits access and reduces broadcast domains, enhancing
both security and efficiency.
Incorrect Answers:
A. Hardware cost is not significantly impacted.
B. Licensing is unaffected by network layout.
D. Encryption requirements remain regardless of segments.
Question 1215
Which of the following BEST ensures the success of an information security
program?
A. Use of industry-standard tools
B. Executive management support
C. Annual penetration tests
D. End-user password complexity
Correct Answer: B – Executive management support
Explanation: Without leadership support, policies and initiatives often lack the
authority and funding needed to succeed.
Incorrect Answers:
A. Tools help implementation, not overall success.
C. Testing is important but not strategic.
D. Passwords are tactical, not programmatic.

Question 1216
Which of the following provides the BEST assurance that firewall rules are still
appropriate?
A. Reviewing change requests
B. Comparing with previous configurations
C. Conducting periodic rule reviews
D. Monitoring firewall uptime
Correct Answer: C – Conducting periodic rule reviews
Explanation: Reviewing firewall rules ensures they are current, relevant, and
aligned with business needs.
Incorrect Answers:
A. Change requests may be incomplete or outdated.
B. Comparisons may not reflect current needs.
D. Uptime relates to availability, not appropriateness.

Question 1217
What is the PRIMARY purpose of data classification?
A. To identify data owners
B. To reduce storage costs
C. To determine appropriate security controls
D. To comply with tax regulations
Correct Answer: C – To determine appropriate security controls
Explanation: Classification guides how data should be protected based on
sensitivity and risk.
Incorrect Answers:
A. Ownership is assigned based on classification but isn’t the goal.
B. Storage cost is not a classification driver.
D. Tax laws do not directly influence classification.

Question 1218
Which of the following BEST mitigates the risk of password compromise?
A. Requiring users to write down passwords
B. Sharing passwords only with authorized peers
C. Using multifactor authentication
D. Restricting access based on time of day
Correct Answer: C – Using multifactor authentication
Explanation: MFA ensures that stolen passwords alone are not enough to gain
access.
Incorrect Answers:
A. Writing passwords increases risk.
B. Sharing passwords violates policy.
D. Time restrictions help but are not as strong.

Question 1219
An IS auditor observes that logs are only reviewed manually once a month. What is
the GREATEST risk?
A. Increased storage costs
B. Delayed detection of suspicious activity
C. Incomplete audit trails
D. Lack of user awareness
Correct Answer: B – Delayed detection of suspicious activity
Explanation: Infrequent reviews mean malicious activity may go unnoticed for long
periods.
Incorrect Answers:
A. Storage is a minor concern.
C. Audit trails may exist, but issues go undetected.
D. Awareness is improved through training, not logging.

Question 1220
Which of the following is the PRIMARY benefit of integrating threat intelligence into
an organization's security operations?
A. Faster incident ticket closure
B. Automated software patching
C. Proactive identification of potential threats
D. Easier regulatory reporting
Correct Answer: C – Proactive identification of potential threats
Explanation: Threat intelligence enables early detection and preparation for
emerging attacks.
Incorrect Answers:
A. Ticket speed is an outcome, not the benefit.
B. Patching is part of vulnerability management.
D. Reporting benefits exist but are not the main value.

Question 1221
Which of the following is the MOST important factor when designing access controls
for a financial application?
A. User training level
B. Number of daily transactions
C. Segregation of duties
D. Application response time
Correct Answer: C – Segregation of duties
Explanation: Enforcing segregation of duties reduces the risk of fraud or error by
preventing a single user from having excessive control.
Incorrect Answers:
A. Training supports usage, not access control.
B. Volume may affect performance, not security.
D. Response time is unrelated to access rights.

Question 1222
Which of the following would BEST help ensure that security settings are
consistently applied across all systems?
A. Manual system audits
B. Centralized configuration management
C. Employee compliance monitoring
D. Frequent patch deployments
Correct Answer: B – Centralized configuration management
Explanation: Centralized tools enforce uniform security settings across multiple
systems.
Incorrect Answers:
A. Manual audits are reactive and may miss inconsistencies.
C. Monitoring users doesn’t address system configurations.
D. Patching updates software, not configuration standards.

Question 1223
Which of the following is the MOST effective way to reduce false positives in an
intrusion detection system (IDS)?
A. Increase scanning frequency
B. Disable low-priority alerts
C. Tune detection rules based on environment
D. Limit IDS scope to external threats
Correct Answer: C – Tune detection rules based on environment
Explanation: Customizing rules to the organization’s normal behavior reduces
irrelevant alerts.
Incorrect Answers:
A. Frequency affects volume, not accuracy.
B. Disabling alerts may hide real threats.
D. Internal threats are equally important.

Question 1224
Which of the following is MOST important for effective vulnerability management?
A. Patch deployment reports
B. Regular vulnerability scanning
C. User approval for remediation
D. Security awareness training
Correct Answer: B – Regular vulnerability scanning
Explanation: Ongoing scans ensure timely identification and prioritization of
vulnerabilities.
Incorrect Answers:
A. Reports confirm action but don’t find issues.
C. Approval delays remediation and is not always required.
D. Awareness helps users, not systems.

Question 1225
What is the PRIMARY risk of allowing users to install unauthorized software on
company devices?
A. Non-compliance with license agreements
B. Increased storage consumption
C. Introduction of malware or security vulnerabilities
D. Reduced network bandwidth
Correct Answer: C – Introduction of malware or security
vulnerabilities
Explanation: Unauthorized software may lack security controls or introduce
malicious code.
Incorrect Answers:
A. Licensing is a concern but not the greatest risk.
B. Storage is manageable.
D. Bandwidth may be affected, but it’s not critical.

Question 1226
Which of the following is the BEST control to ensure the accuracy of data entered
into a web-based application?
A. Secure cookies
B. Input validation
C. CAPTCHA
D. Session timeouts
Correct Answer: B – Input validation
Explanation: Validating user input prevents injection attacks and ensures data
integrity.
Incorrect Answers:
A. Cookies manage sessions, not input quality.
C. CAPTCHA prevents bots, not data errors.
D. Timeouts improve security, not input accuracy.

Question 1227
Which of the following is the PRIMARY reason to maintain a detailed asset
inventory?
A. To reduce software costs
B. To schedule preventive maintenance
C. To support security risk assessments
D. To track employee productivity
Correct Answer: C – To support security risk assessments
Explanation: Accurate asset data is crucial for identifying and prioritizing security
risks.
Incorrect Answers:
A. Cost tracking is secondary.
B. Maintenance is operational.
D. Productivity is not tied to inventory.

Question 1228
What is the PRIMARY objective of implementing encryption for data at rest?
A. To optimize system performance
B. To improve data compression
C. To protect data confidentiality
D. To reduce power consumption
Correct Answer: C – To protect data confidentiality
Explanation: Encryption ensures that stored data cannot be accessed without
authorization.
Incorrect Answers:
A. Encryption can slightly reduce performance.
B. Compression and encryption are unrelated.
D. Power consumption is unaffected.
Question 1229
Which of the following is MOST critical to include in a disaster recovery plan?
A. System design specifications
B. Names of system vendors
C. Roles and responsibilities during recovery
D. Employee travel policies
Correct Answer: C – Roles and responsibilities during recovery
Explanation: Clearly defined roles ensure a coordinated and efficient recovery effort.
Incorrect Answers:
A. Design specs are not useful in emergencies.
B. Vendor names help support, but roles come first.
D. Travel policies are irrelevant during emergencies.

Question 1230
Which of the following is the MOST effective way to prevent data leakage through
email?
A. Enforcing password-protected attachments
B. Configuring spam filters
C. Implementing a data loss prevention (DLP) solution
D. Requiring email signatures
Correct Answer: C – Implementing a data loss prevention (DLP)
solution
Explanation: DLP tools detect and block unauthorized sharing of sensitive
information via email.
Incorrect Answers:
A. Passwords help, but users may bypass them.
B. Spam filters reduce incoming junk, not data leaks.
D. Signatures ensure authenticity, not security.

Question 1231
Which of the following BEST reduces the risk of credential theft from phishing
attacks?
A. Security awareness training
B. Account lockout after failed attempts
C. Password history enforcement
D. Periodic system maintenance
Correct Answer: A – Security awareness training
Explanation: Training helps users recognize and avoid phishing emails, reducing the
risk of credential theft.
Incorrect Answers:
B. Lockout helps after attempts, not prevention.
C. History prevents reuse, not phishing.
D. Maintenance improves performance, not phishing defense.

Question 1232
Which of the following is MOST important when securing an organization’s wireless
network?
A. Disabling SSID broadcast
B. Using WPA3 encryption
C. Limiting the number of connected devices
D. Changing the network name frequently
Correct Answer: B – Using WPA3 encryption
Explanation: WPA3 provides robust encryption and protection against modern
wireless threats.
Incorrect Answers:
A. Hiding SSID provides minimal protection.
C. Device limits don’t secure connections.
D. Network names offer no real security.

Question 1233
What is the PRIMARY objective of implementing least privilege in user account
management?
A. To improve system performance
B. To limit access to only necessary resources
C. To simplify role assignment
D. To increase the complexity of access reviews
Correct Answer: B – To limit access to only necessary resources
Explanation: Least privilege ensures users can only access what is essential for their
duties, reducing risk.
Incorrect Answers:
A. Performance is not directly impacted.
C. Role management is a separate task.
D. Reviews should be simpler, not more complex.

Question 1234
Which of the following BEST ensures secure communication between remote
employees and the internal network?
A. Web proxies
B. Antivirus software
C. Virtual private network (VPN)
D. Email filtering
Correct Answer: C – Virtual private network (VPN)
Explanation: VPNs encrypt traffic between remote users and internal systems,
securing the connection.
Incorrect Answers:
A. Proxies filter traffic but don’t encrypt it.
B. Antivirus protects devices, not communication.
D. Email filters don’t secure network traffic.

Question 1235
What is the PRIMARY risk of not restricting administrative privileges?
A. Lack of system updates
B. Inaccurate audit logs
C. Increased risk of unauthorized system changes
D. Slow internet performance
Correct Answer: C – Increased risk of unauthorized system changes
Explanation: Admin privileges allow critical changes; unrestricted use increases risk
of errors or misuse.
Incorrect Answers:
A. Updates may be applied regardless.
B. Audit logs can still record activity.
D. Internet speed is unrelated.

Question 1236
Which of the following is MOST useful for validating the security configuration of
newly deployed servers?
A. Reviewing system logs
B. Performing a vulnerability scan
C. Checking backup status
D. Monitoring network throughput
Correct Answer: B – Performing a vulnerability scan
Explanation: Scanning identifies misconfigurations and vulnerabilities early in
deployment.
Incorrect Answers:
A. Logs show activity, not security state.
C. Backups don’t validate configurations.
D. Throughput relates to performance, not security.

Question 1237
Which of the following provides the BEST protection against insider threats?
A. Antivirus software
B. Physical security controls
C. Role-based access control with monitoring
D. Firewall rules
Correct Answer: C – Role-based access control with monitoring
Explanation: Limiting access and monitoring activities helps detect and prevent
insider misuse.
Incorrect Answers:
A. Antivirus targets malware, not internal misuse.
B. Physical security helps but isn’t sufficient.
D. Firewalls protect from external threats.

Question 1238
Which of the following BEST ensures business continuity during a cybersecurity
incident?
A. Isolated incident response tools
B. A tested and updated incident response plan
C. Frequent antivirus updates
D. Firewall log analysis
Correct Answer: B – A tested and updated incident response plan
Explanation: A well-practiced response plan enables swift containment and
recovery, maintaining continuity.
Incorrect Answers:
A. Tools help but are ineffective without a plan.
C. Antivirus helps prevent, not respond.
D. Logs are useful for forensics, not continuity.

Question 1239
Which of the following is the PRIMARY purpose of conducting regular access
reviews?
A. To optimize user experience
B. To reduce network congestion
C. To ensure only authorized access is granted
D. To assess application response time
Correct Answer: C – To ensure only authorized access is granted
Explanation: Access reviews help enforce the principle of least privilege and detect
excessive access.
Incorrect Answers:
A. Experience is not the focus.
B. Congestion is a network issue.
D. Performance isn’t directly affected.

Question 1240
Which of the following BEST helps ensure that system changes do not introduce
security vulnerabilities?
A. User acceptance testing
B. Separation of development and production environments
C. Incident response planning
D. Load balancing
Correct Answer: B – Separation of development and production
environments
Explanation: Segregating environments prevents untested changes from affecting
live systems.
Incorrect Answers:
A. UAT focuses on functionality, not security.
C. Response plans deal with incidents, not prevention.
D. Load balancing supports availability, not change control.

Question 1241
Which of the following is the PRIMARY objective of conducting information security
audits?
A. To test system performance
B. To validate compliance with policies and standards
C. To assess software usability
D. To evaluate user satisfaction
Correct Answer: B – To validate compliance with policies and
standards
Explanation: Security audits assess whether controls and procedures meet internal
and external requirements.
Incorrect Answers:
A. Performance testing is a separate function.
C. Usability is evaluated during user testing.
D. Satisfaction relates to service quality, not security.

Question 1242
What is the PRIMARY risk of not logging system administrator activity?
A. Longer system response times
B. Inability to troubleshoot system errors
C. Lack of accountability for privileged actions
D. Increased storage usage
Correct Answer: C – Lack of accountability for privileged actions
Explanation: Logging admin activity ensures traceability and supports audit and
forensic analysis.
Incorrect Answers:
A. Logging does not impact response time.
B. Troubleshooting benefits from logs but is not the main concern.
D. Storage usage is a minor issue.
Question 1243
Which of the following BEST reduces the risk of unintentional data disclosure
through mobile devices?
A. Enabling airplane mode when not in use
B. Using strong Wi-Fi passwords
C. Enforcing mobile device encryption
D. Closing background applications
Correct Answer: C – Enforcing mobile device encryption
Explanation: Encryption protects data on mobile devices even if lost or stolen.
Incorrect Answers:
A. Airplane mode disables communication but doesn’t secure data.
B. Wi-Fi security is important but doesn’t protect stored data.
D. Background apps relate to performance, not security.

Question 1244
Which of the following BEST supports secure software development practices?
A. Daily developer meetings
B. Static code analysis tools
C. Outsourced testing services
D. Weekly project status reports
Correct Answer: B – Static code analysis tools
Explanation: These tools scan source code for vulnerabilities early in the
development lifecycle.
Incorrect Answers:
A. Meetings help coordination but not security.
C. Outsourcing can help, but internal checks are more consistent.
D. Status reports track progress, not quality.

Question 1245
Which of the following is MOST effective in detecting anomalous activity on the
network?
A. Data classification
B. Multi-factor authentication
C. Security information and event management (SIEM)
D. Role-based access control
Correct Answer: C – Security information and event management
(SIEM)
Explanation: SIEM systems monitor, correlate, and alert on suspicious activities in
real time.
Incorrect Answers:
A. Classification helps protection, not detection.
B. MFA prevents unauthorized access, not anomalies.
D. RBAC limits access but doesn’t detect behavior.

Question 1246
Which of the following is MOST important when determining the classification level
of information?
A. Volume of data stored
B. Regulatory or business impact of exposure
C. Frequency of data access
D. Number of users who can access it
Correct Answer: B – Regulatory or business impact of exposure
Explanation: Classification is based on the potential damage if data is disclosed,
modified, or lost.
Incorrect Answers:
A. Volume does not determine sensitivity.
C. Access frequency affects operations, not classification.
D. Access quantity is managed post-classification.

Question 1247
What is the PRIMARY benefit of implementing centralized authentication services?
A. Reduced application development time
B. Lower hardware maintenance costs
C. Simplified user access control and auditing
D. Improved network segmentation
Correct Answer: C – Simplified user access control and auditing
Explanation: Centralized authentication provides consistent policy enforcement and
easy tracking.
Incorrect Answers:
A. Development time may not be impacted.
B. Hardware costs are unrelated.
D. Segmentation is a network design choice.

Question 1248
Which of the following is the PRIMARY purpose of using a digital certificate in a
public key infrastructure (PKI)?
A. To store passwords securely
B. To authenticate the identity of users or systems
C. To limit system access based on IP address
D. To authorize application installations
Correct Answer: B – To authenticate the identity of users or systems
Explanation: Digital certificates verify identities and establish trust in
communications.
Incorrect Answers:
A. Password storage is a different function.
C. IP restrictions are managed through firewalls.
D. App installation is handled by permissions.

Question 1249
An IS auditor is reviewing access logs and observes that several users have shared
accounts. What is the GREATEST risk?
A. Misuse of disk storage
B. Delays in help desk ticket resolution
C. Inability to determine accountability
D. Reduced productivity
Correct Answer: C – Inability to determine accountability
Explanation: Shared accounts prevent tracking actions to specific users, weakening
controls.
Incorrect Answers:
A. Storage misuse is possible, but accountability is more critical.
B. Help desk delays are operational.
D. Productivity is not directly affected.

Question 1250
Which of the following is the PRIMARY reason to require secure coding practices
during application development?
A. To increase application speed
B. To improve user interface design
C. To minimize vulnerabilities in the code
D. To reduce system resource usage
Correct Answer: C – To minimize vulnerabilities in the code
Explanation: Secure coding prevents security flaws that could be exploited in
production.
Incorrect Answers:
A. Speed is a secondary concern.
B. UI design is unrelated to security.
D. Resource use is optimized later in development.

Question 1251
Which of the following is the PRIMARY objective of implementing a patch
management process?
A. To improve system performance
B. To ensure regulatory compliance
C. To address security vulnerabilities and software bugs
D. To reduce help desk calls
Correct Answer: C – To address security vulnerabilities and software
bugs
Explanation: Patch management is designed to keep systems secure and stable by
fixing known issues.
Incorrect Answers:
A. Performance may improve, but it’s not the main goal.
B. Compliance may result from patching but is not the objective.
D. Help desk activity may decline, but it's not the priority.

Question 1252
What is the GREATEST risk if logs are not reviewed regularly?
A. Increased data storage requirements
B. Inability to detect security incidents promptly
C. Slower system performance
D. Lack of user access records
Correct Answer: B – Inability to detect security incidents promptly
Explanation: Regular log reviews help identify suspicious activity and support
incident response.
Incorrect Answers:
A. Storage growth is manageable.
C. Performance is unaffected by logging.
D. Logs exist, but they must be reviewed to be useful.

Question 1253
Which of the following BEST protects data on a lost or stolen mobile device?
A. Password-protected screensaver
B. Remote wipe capability
C. VPN client
D. Antivirus software
Correct Answer: B – Remote wipe capability
Explanation: Remote wipe allows administrators to erase sensitive data if the
device is lost or stolen.
Incorrect Answers:
A. Screen locks can be bypassed.
C. VPNs protect data in transit, not on the device.
D. Antivirus doesn’t address physical loss.

Question 1254
Which of the following BEST reduces the likelihood of successful brute-force
password attacks?
A. Password masking
B. Password expiration
C. Account lockout after failed attempts
D. Use of password hints
Correct Answer: C – Account lockout after failed attempts
Explanation: Lockouts limit how many times a password can be guessed, deterring
brute-force attacks.
Incorrect Answers:
A. Masking prevents onlookers, not automated guessing.
B. Expiration helps with reuse, not brute-force prevention.
D. Hints may aid attackers if misused.

Question 1255
Which of the following is MOST critical in securing privileged user accounts?
A. Disabling shared drive access
B. Regularly rotating passwords
C. Logging and monitoring account activities
D. Requiring weekly password changes
Correct Answer: C – Logging and monitoring account activities
Explanation: Monitoring ensures accountability for powerful accounts that can
make critical system changes.
Incorrect Answers:
A. Drive access isn’t the primary concern.
B. Rotation is good, but monitoring is better for detection.
D. Frequency alone doesn’t ensure security.

Question 1256
Which of the following is the PRIMARY purpose of a firewall?
A. To block malware from being downloaded
B. To encrypt network traffic
C. To restrict unauthorized network access
D. To monitor employee browsing activity
Correct Answer: C – To restrict unauthorized network access
Explanation: Firewalls control traffic entering and leaving the network to prevent
intrusion.
Incorrect Answers:
A. Malware protection is handled by antivirus.
B. Encryption is managed by protocols like TLS.
D. Monitoring is done by logging tools or proxies.

Question 1257
What is the PRIMARY risk of not implementing input validation in web
applications?
A. Increased page load time
B. Lack of session control
C. Exposure to injection attacks
D. Inability to generate reports
Correct Answer: C – Exposure to injection attacks
Explanation: Without validation, attackers can inject malicious code or queries.
Incorrect Answers:
A. Load times aren’t directly affected.
B. Session control is separate.
D. Reports are not related to input filtering.

Question 1258
Which of the following is MOST important when selecting a third-party service
provider for data processing?
A. Availability of 24/7 support
B. Data encryption policies
C. Service provider’s geographic location
D. Number of employees on staff
Correct Answer: B – Data encryption policies
Explanation: Encryption ensures data confidentiality and security during processing
and storage.
Incorrect Answers:
A. Support is helpful but not security-focused.
C. Location may affect compliance but is secondary.
D. Staffing levels don’t indicate data protection.

Question 1259
Which of the following is the PRIMARY reason to conduct a post-incident review
after a cybersecurity event?
A. To identify who caused the incident
B. To update the organization's website
C. To prevent similar incidents in the future
D. To meet regulatory reporting timelines
Correct Answer: C – To prevent similar incidents in the future
Explanation: Post-incident reviews analyze causes and improve controls to reduce
recurrence.
Incorrect Answers:
A. Blame assignment is not the objective.
B. Website updates are unrelated.
D. Reporting is required but not the main reason for review.
Question 1260
Which of the following is MOST effective in reducing the risk of data exfiltration via
email?
A. Password protecting all attachments
B. Using email disclaimers
C. Data loss prevention (DLP) tools
D. Training staff to use BCC instead of CC
Correct Answer: C – Data loss prevention (DLP) tools
Explanation: DLP monitors content and prevents unauthorized transmission of
sensitive data.
Incorrect Answers:
A. Passwords help, but enforcement is difficult.
B. Disclaimers are legal statements, not controls.
D. BCC improves privacy, not data security.

Question 1261
Which of the following is the MOST important reason to restrict administrative
privileges on user workstations?
A. To increase system speed
B. To reduce help desk ticket volume
C. To prevent unauthorized changes and malware installation
D. To allow faster software installations
Correct Answer: C – To prevent unauthorized changes and malware
installation
Explanation: Limiting admin rights helps prevent users from unintentionally or
maliciously installing harmful software.
Incorrect Answers:
A. Speed may improve, but that’s not the goal.
B. Help desk volume may vary regardless.
D. Fast installation should be controlled, not prioritized.

Question 1262
What is the PRIMARY benefit of using multifactor authentication (MFA)?
A. It reduces the number of login attempts
B. It simplifies user account creation
C. It enhances access security by requiring multiple proofs of identity
D. It eliminates the need for firewalls
Correct Answer: C – It enhances access security by requiring multiple
proofs of identity
Explanation: MFA strengthens authentication by combining something the user
knows, has, or is.
Incorrect Answers:
A. MFA does not reduce attempts directly.
B. Account creation is unchanged.
D. Firewalls are still necessary.

Question 1263
Which of the following BEST mitigates the risk of unauthorized access to sensitive
systems after business hours?
A. Enforcing password history
B. Implementing time-based access controls
C. Installing antivirus software
D. Using default deny firewall rules
Correct Answer: B – Implementing time-based access controls
Explanation: Time-based controls restrict access to authorized periods, reducing
risk during off-hours.
Incorrect Answers:
A. Password history prevents reuse, not timing.
C. Antivirus is not a time-based control.
D. Firewalls manage traffic, not user access timing.

Question 1264
Which of the following is the PRIMARY purpose of conducting a threat modeling
exercise during system design?
A. To identify system performance bottlenecks
B. To document audit trail requirements
C. To anticipate and address security threats
D. To finalize the user interface design
Correct Answer: C – To anticipate and address security threats
Explanation: Threat modeling identifies potential attack vectors and guides secure
design.
Incorrect Answers:
A. Performance testing is separate.
B. Audit requirements follow threat identification.
D. UI design is unrelated.

Question 1265
What is the BEST method to prevent unauthorized physical access to a data center?
A. Surveillance cameras
B. Biometric access controls
C. Visitor logbooks
D. Locked server racks
Correct Answer: B – Biometric access controls
Explanation: Biometrics provide strong identity verification, preventing
unauthorized entry.
Incorrect Answers:
A. Cameras detect, not prevent.
C. Logs track visitors, not stop them.
D. Racks protect hardware, not the facility.

Question 1266
Which of the following is MOST important when choosing a cloud service provider
for critical business applications?
A. Number of data centers
B. Employee satisfaction scores
C. Availability of a comprehensive service level agreement (SLA)
D. Types of marketing campaigns used
Correct Answer: C – Availability of a comprehensive service level
agreement (SLA)
Explanation: SLAs define uptime, response, and support expectations, which are
essential for critical services.
Incorrect Answers:
A. Data center count helps with redundancy, but SLAs enforce service quality.
B. Internal metrics are irrelevant.
D. Marketing is unrelated.

Question 1267
Which of the following is the MOST appropriate method for ensuring that backups
are successful and restorable?
A. Using cloud-based backup tools
B. Running daily antivirus scans
C. Performing regular restore tests
D. Assigning backup duties to senior staff
Correct Answer: C – Performing regular restore tests
Explanation: Restore testing validates that backup files can be recovered as
intended.
Incorrect Answers:
A. Tools are useful but don’t confirm restorability.
B. Antivirus is unrelated.
D. Responsibility doesn’t guarantee effectiveness.

Question 1268
Which of the following is the PRIMARY reason to encrypt sensitive data stored on a
server?
A. To satisfy software licensing agreements
B. To prevent unauthorized access in case of data breach
C. To improve system performance
D. To comply with firewall rules
Correct Answer: B – To prevent unauthorized access in case of data
breach
Explanation: Encryption ensures that compromised data cannot be easily used.
Incorrect Answers:
A. Licensing is administrative.
C. Encryption may slightly reduce performance.
D. Firewalls control network traffic.

Question 1269
What is the PRIMARY purpose of a business impact analysis (BIA)?
A. To determine the cost of new IT systems
B. To identify and prioritize critical business functions
C. To estimate software licensing fees
D. To define user acceptance criteria
Correct Answer: B – To identify and prioritize critical business
functions
Explanation: BIA helps determine which functions are most essential and what
their recovery needs are.
Incorrect Answers:
A. Cost estimation is a budgeting task.
C. Licensing is not part of BIA.
D. UAT is a testing phase, not impact analysis.

Question 1270
Which of the following is MOST helpful in detecting a zero-day attack?
A. Signature-based antivirus
B. Heuristic-based detection systems
C. Patch management tools
D. Data classification policies
Correct Answer: B – Heuristic-based detection systems
Explanation: Heuristics detect suspicious behavior and anomalies even if the threat
is unknown.
Incorrect Answers:
A. Signature-based tools can’t detect unknown threats.
C. Patching helps prevent, not detect.
D. Classification governs data handling, not threat detection.
Question 1271
Which of the following is the PRIMARY objective of a vulnerability management
program?
A. To schedule software upgrades
B. To track audit findings
C. To identify, assess, and remediate system weaknesses
D. To monitor employee activities
Correct Answer: C – To identify, assess, and remediate system
weaknesses
Explanation: Vulnerability management helps reduce risk by proactively managing
system flaws.
Incorrect Answers:
A. Upgrades may result from remediation but are not the core goal.
B. Audit tracking is part of governance, not vulnerability management.
D. Monitoring employees is unrelated.

Question 1272
Which of the following BEST helps ensure secure transmission of data between two
systems?
A. Digital signatures
B. Secure sockets layer (SSL)/TLS encryption
C. Firewall access control lists
D. Hash functions
Correct Answer: B – Secure sockets layer (SSL)/TLS encryption
Explanation: SSL/TLS encrypts data in transit to protect confidentiality and
integrity.
Incorrect Answers:
A. Digital signatures authenticate, not encrypt.
C. ACLs control access but not encryption.
D. Hashing ensures integrity, not confidentiality.

Question 1273
Which of the following BEST reduces the risk of data loss due to accidental deletion?
A. Antivirus software
B. Full disk encryption
C. Regular data backups
D. Intrusion prevention systems
Correct Answer: C – Regular data backups
Explanation: Backups provide recovery options in case of data loss or deletion.
Incorrect Answers:
A. Antivirus addresses malware, not user error.
B. Encryption protects data, not restores it.
D. IPS prevents attacks, not restores data.

Question 1274
Which of the following should be the FIRST step in developing an organization’s
security policy?
A. Implementing technical controls
B. Conducting a risk assessment
C. Hiring a security consultant
D. Acquiring security software
Correct Answer: B – Conducting a risk assessment
Explanation: Risk assessments guide the development of policies based on threats
and vulnerabilities.
Incorrect Answers:
A. Controls follow policy, not precede it.
C. Consultants may help, but the assessment is key.
D. Software supports policy enforcement, not creation.

Question 1275
Which of the following is the BEST control to prevent data leakage through USB
storage devices?
A. File encryption
B. Endpoint data loss prevention (DLP) software
C. Antivirus software
D. Email filters
Correct Answer: B – Endpoint data loss prevention (DLP) software
Explanation: DLP tools monitor and restrict sensitive data transfers, including to
USB devices.
Incorrect Answers:
A. Encryption protects data but doesn’t prevent transfer.
C. Antivirus targets malware, not data leakage.
D. Email filters control messages, not USB use.

Question 1276
Which of the following BEST protects against unauthorized physical access to
network infrastructure?
A. Using strong passwords
B. Locking network equipment in secure cabinets
C. Monitoring CPU utilization
D. Installing VPN software
Correct Answer: B – Locking network equipment in secure cabinets
Explanation: Physical security prevents unauthorized handling or tampering with
network devices.
Incorrect Answers:
A. Passwords protect logical, not physical, access.
C. CPU metrics relate to performance.
D. VPNs secure remote access, not physical access.

Question 1277
Which of the following provides the MOST effective protection against ransomware?
A. Implementing intrusion detection systems
B. Keeping systems fully patched
C. Increasing hard disk size
D. Using password complexity rules
Correct Answer: B – Keeping systems fully patched
Explanation: Patching addresses known vulnerabilities often exploited by
ransomware.
Incorrect Answers:
A. IDS alerts but may not block ransomware.
C. Disk size doesn’t influence attack surface.
D. Passwords don’t stop ransomware infections.

Question 1278
Which of the following is the MOST effective way to secure a wireless network?
A. Enable MAC address filtering
B. Use WEP encryption
C. Use WPA3 encryption and strong passphrases
D. Hide the SSID
Correct Answer: C – Use WPA3 encryption and strong passphrases
Explanation: WPA3 is the latest and most secure standard for protecting wireless
communication.
Incorrect Answers:
A. MAC filtering is easily bypassed.
B. WEP is outdated and vulnerable.
D. SSID hiding offers minimal protection.

Question 1279
Which of the following is the PRIMARY reason to implement access logging?
A. To monitor system performance
B. To track file storage usage
C. To support security investigations and accountability
D. To detect outdated software
Correct Answer: C – To support security investigations and
accountability
Explanation: Logs provide audit trails necessary to detect and investigate
unauthorized access.
Incorrect Answers:
A. Performance monitoring uses other tools.
B. Storage tracking is separate.
D. Software versioning is unrelated.

Question 1280
Which of the following would be the MOST effective indicator of a successful
phishing simulation exercise?
A. Number of employees who reported the phishing attempt
B. Number of phishing emails delivered
C. Size of the recipient email group
D. Frequency of security policy updates
Correct Answer: A – Number of employees who reported the phishing
attempt
Explanation: Reporting phishing attempts shows awareness and correct user
behavior.
Incorrect Answers:
B. Delivery volume doesn’t measure success.
C. Group size is irrelevant to detection.
D. Policy frequency doesn’t reflect user response.

Question 1281
Which of the following is the PRIMARY goal of a security awareness program?
A. To meet regulatory compliance requirements
B. To reduce the likelihood of human error leading to security incidents
C. To train employees on firewall configuration
D. To improve IT team efficiency
Correct Answer: B – To reduce the likelihood of human error leading
to security incidents
Explanation: Awareness programs educate users to recognize and respond to
threats, minimizing human-related risks.
Incorrect Answers:
A. Compliance is a benefit but not the main goal.
C. Firewall configuration is a technical skill, not part of general awareness.
D. IT efficiency is not the purpose of user training.

Question 1282
Which of the following would BEST ensure that critical security patches are applied
across all servers?
A. Automated patch management system
B. Weekly IT team meetings
C. Manual update procedures
D. User-reported vulnerabilities
Correct Answer: A – Automated patch management system
Explanation: Automation ensures timely, consistent, and comprehensive deployment
of patches.
Incorrect Answers:
B. Meetings inform but don’t enforce updates.
C. Manual updates are error-prone and inconsistent.
D. Users may not detect or report patch-related issues.

Question 1283
Which of the following is MOST effective in preventing unauthorized access to a
terminated employee’s email account?
A. Enabling email forwarding rules
B. Changing the shared mailbox password
C. Immediately disabling the user’s account
D. Archiving the user’s mailbox
Correct Answer: C – Immediately disabling the user’s account
Explanation: Disabling the account removes access and prevents unauthorized use.
Incorrect Answers:
A. Forwarding does not remove access.
B. Shared mailbox changes don’t affect personal accounts.
D. Archiving protects data, not access.

Question 1284
Which of the following is the PRIMARY objective of network segmentation?
A. To reduce server response time
B. To improve employee productivity
C. To limit the spread of security breaches
D. To decrease email spam
Correct Answer: C – To limit the spread of security breaches
Explanation: Segmentation confines threats to isolated segments, preventing wide-
scale impact.
Incorrect Answers:
A. Performance may improve but is secondary.
B. Productivity depends on processes, not segments.
D. Spam control is handled by mail filters.
Question 1285
Which of the following provides the BEST protection against malware introduced
through email attachments?
A. Web application firewall
B. Security information and event management (SIEM)
C. Email filtering with attachment scanning
D. Mobile device management (MDM)
Correct Answer: C – Email filtering with attachment scanning
Explanation: Email filters detect and block malicious attachments before they reach
the user.
Incorrect Answers:
A. WAFs protect web apps, not email.
B. SIEMs monitor but don’t prevent.
D. MDM focuses on mobile devices.

Question 1286
What is the PRIMARY purpose of role-based access control (RBAC)?
A. To simplify password reset procedures
B. To ensure users only access information necessary for their roles
C. To allow administrators full access to all systems
D. To provide multiple login options for users
Correct Answer: B – To ensure users only access information
necessary for their roles
Explanation: RBAC enforces least privilege by aligning access with specific job
functions.
Incorrect Answers:
A. Password resets are unrelated.
C. Admins are managed separately from RBAC logic.
D. Login flexibility is not a goal of RBAC.

Question 1287
Which of the following is the MOST effective method for securing sensitive customer
data stored in a database?
A. Obfuscating table names
B. Encrypting the data at rest
C. Blocking all external connections
D. Implementing two-factor authentication for users
Correct Answer: B – Encrypting the data at rest
Explanation: Encryption ensures that even if data is accessed, it cannot be read
without decryption keys.
Incorrect Answers:
A. Obfuscation provides minimal protection.
C. Blocking access affects usability.
D. Authentication secures user access, not stored data.

Question 1288
Which of the following is MOST important to verify during a review of user access
rights?
A. Whether users can access social media
B. Whether temporary access has been revoked
C. Whether users use the same password
D. Whether users have mobile devices
Correct Answer: B – Whether temporary access has been revoked
Explanation: Expired or unnecessary temporary access increases risk and should be
revoked promptly.
Incorrect Answers:
A. Social media access is not typically critical.
C. Password reuse is handled through policy.
D. Device ownership is managed separately.

Question 1289
Which of the following is the PRIMARY concern when system logs are not properly
secured?
A. Logs will fill up disk space
B. Logs may be accidentally deleted
C. Logs can be tampered with to conceal malicious activity
D. Logs may not be readable by users
Correct Answer: C – Logs can be tampered with to conceal malicious
activity
Explanation: Unsecured logs can be altered, undermining investigations and
accountability.
Incorrect Answers:
A. Disk space is a concern but not the greatest risk.
B. Deletion is possible but less damaging than tampering.
D. Log access should be limited to administrators.

Question 1290
Which of the following BEST ensures the effectiveness of access control policies?
A. Increasing password expiration frequency
B. Conducting periodic access reviews
C. Requiring strong password policies
D. Enforcing screen saver timeouts
Correct Answer: B – Conducting periodic access reviews
Explanation: Access reviews verify that users have only the permissions appropriate
for their roles.
Incorrect Answers:
A. Expiration helps, but review confirms appropriateness.
C. Strong passwords protect accounts, not access levels.
D. Timeouts secure sessions, not access rights.

Question 1291
Which of the following is the MOST important reason to regularly test an
organization’s incident response plan?
A. To meet audit requirements
B. To reduce employee stress during emergencies
C. To validate the effectiveness of the response procedures
D. To train new staff on policies
Correct Answer: C – To validate the effectiveness of the response
procedures
Explanation: Testing confirms that plans work in real scenarios and identifies areas
for improvement.
Incorrect Answers:
A. Compliance is secondary.
B. Training reduces stress but is not the goal.
D. Staff training is a benefit, not the purpose.

Question 1292
Which of the following controls BEST mitigates the risk of data leakage through
online file-sharing services?
A. Disabling clipboard functions
B. Monitoring internet usage
C. Implementing cloud access security brokers (CASBs)
D. Installing pop-up blockers
Correct Answer: C – Implementing cloud access security brokers
(CASBs)
Explanation: CASBs monitor and control access to cloud services, preventing
unauthorized data sharing.
Incorrect Answers:
A. Clipboard controls are local and limited.
B. Monitoring alone doesn’t prevent activity.
D. Pop-ups are irrelevant to file-sharing.

Question 1293
What is the PRIMARY reason to restrict access to source code repositories?
A. To reduce development time
B. To prevent system performance issues
C. To ensure confidentiality and integrity of application code
D. To increase documentation accuracy
Correct Answer: C – To ensure confidentiality and integrity of
application code
Explanation: Restricting access protects the code from unauthorized viewing and
tampering.
Incorrect Answers:
A. Development speed is unrelated.
B. Performance is not affected.
D. Documentation is a separate task.

Question 1294
Which of the following BEST supports continuous improvement in a security
program?
A. Annual security training
B. Quarterly risk assessments
C. User password rotation
D. Hiring external consultants
Correct Answer: B – Quarterly risk assessments
Explanation: Frequent assessments identify new threats and improve controls.
Incorrect Answers:
A. Annual training helps awareness, not program improvement.
C. Password rotation is a basic control.
D. Consultants assist but don’t guarantee continuity.

Question 1295
Which of the following is MOST useful for detecting rogue devices on a corporate
network?
A. Access control lists
B. Endpoint encryption
C. Network scanning tools
D. Password expiration policies
Correct Answer: C – Network scanning tools
Explanation: Scanning tools detect unknown or unauthorized devices connected to
the network.
Incorrect Answers:
A. ACLs enforce policies but don’t detect.
B. Encryption protects data, not networks.
D. Passwords don’t relate to device discovery.
Question 1296
What is the PRIMARY benefit of implementing a centralized log management
system?
A. Improved disk space utilization
B. Faster software updates
C. Simplified monitoring and correlation of events
D. Increased employee satisfaction
Correct Answer: C – Simplified monitoring and correlation of events
Explanation: Centralized logging improves detection and analysis of security
incidents.
Incorrect Answers:
A. Disk space is not the key benefit.
B. Updates are not related.
D. Satisfaction is not the goal.

Question 1297
Which of the following is the MOST appropriate response after discovering a critical
vulnerability in a public-facing server?
A. Notify all system users
B. Power down the server
C. Apply the necessary patch immediately
D. Monitor logs for future attacks
Correct Answer: C – Apply the necessary patch immediately
Explanation: Patching critical vulnerabilities reduces the risk of exploitation.
Incorrect Answers:
A. User notification is secondary.
B. Powering down disrupts availability.
D. Monitoring is reactive, not preventive.

Question 1298
Which of the following is MOST effective in detecting abnormal outbound traffic
patterns that may indicate data exfiltration?
A. Anti-malware software
B. Network behavior analysis tools
C. Spam filtering
D. Secure boot configuration
Correct Answer: B – Network behavior analysis tools
Explanation: These tools identify deviations from normal network behavior.
Incorrect Answers:
A. Malware tools detect known threats.
C. Spam filters protect email, not traffic.
D. Secure boot protects startup integrity.

Question 1299
Which of the following is the PRIMARY benefit of using virtualization for server
infrastructure?
A. Reduced physical cable requirements
B. Better alignment with compliance standards
C. Improved resource utilization and scalability
D. Simplified email filtering
Correct Answer: C – Improved resource utilization and scalability
Explanation: Virtualization allows efficient use of hardware and easier scaling.
Incorrect Answers:
A. Cable usage is minimal concern.
B. Compliance depends on many factors.
D. Email is unrelated.

Question 1300
What is the GREATEST risk of using unsupported software in a production
environment?
A. Higher licensing fees
B. Poor user interface
C. Lack of security patches and updates
D. Reduced customer satisfaction
Correct Answer: C – Lack of security patches and updates
Explanation: Unsupported software may have unpatched vulnerabilities that
attackers can exploit.
Incorrect Answers:
A. Licensing may not apply to unsupported tools.
B. UI is less critical than security.
D. Satisfaction is affected, but not the biggest risk.

Question 1301
Which of the following BEST ensures that access to sensitive data is granted only to
those who need it?
A. Firewall filtering
B. Role-based access control
C. Antivirus scanning
D. Cloud storage usage monitoring
Correct Answer: B – Role-based access control
Explanation: RBAC enforces the principle of least privilege by defining access based
on roles.
Incorrect Answers:
A. Firewalls manage network traffic, not data access.
C. Antivirus targets malware.
D. Monitoring detects, not controls.

Question 1302
What is the PRIMARY advantage of multifactor authentication (MFA)?
A. It prevents social engineering attacks
B. It ensures access is only available on certain networks
C. It reduces the reliance on passwords alone
D. It avoids the need for user accounts
Correct Answer: C – It reduces the reliance on passwords alone
Explanation: MFA adds additional authentication factors, improving security.
Incorrect Answers:
A. MFA doesn’t stop social engineering entirely.
B. Network-based control is separate.
D. MFA supplements user accounts, not removes them.

Question 1303
Which of the following is the PRIMARY reason to conduct a risk assessment?
A. To satisfy audit requirements
B. To determine insurance premiums
C. To identify threats and vulnerabilities to assets
D. To develop a marketing strategy
Correct Answer: C – To identify threats and vulnerabilities to assets
Explanation: Risk assessments help prioritize controls based on actual risk
exposure.
Incorrect Answers:
A. Audit is a benefit but not the purpose.
B. Insurance is influenced by, but not the goal of, assessment.
D. Marketing is unrelated.

Question 1304
Which of the following would BEST mitigate the impact of a distributed denial-of-
service (DDoS) attack?
A. Anti-malware protection
B. Rate limiting and traffic filtering
C. Virtual machine snapshots
D. Secure coding standards
Correct Answer: B – Rate limiting and traffic filtering
Explanation: These measures reduce attack traffic and maintain service availability.
Incorrect Answers:
A. Malware tools don’t mitigate DDoS.
C. Snapshots restore state, not defend against DDoS.
D. Secure coding prevents exploits, not floods.

Question 1305
Which of the following is the BEST way to ensure employee compliance with security
policies?
A. Provide annual ethics training
B. Publish policies on the intranet
C. Conduct regular security awareness campaigns
D. Monitor network bandwidth usage
Correct Answer: C – Conduct regular security awareness campaigns
Explanation: Repeated awareness ensures users understand and follow security
expectations.
Incorrect Answers:
A. Ethics training is too broad.
B. Posting policies is passive.
D. Bandwidth relates to usage, not compliance.

Question 1306
What is the PRIMARY purpose of endpoint detection and response (EDR) tools?
A. To optimize CPU utilization
B. To track software license usage
C. To detect and respond to endpoint threats
D. To manage backups across endpoints
Correct Answer: C – To detect and respond to endpoint threats
Explanation: EDR tools monitor and take action against suspicious activity on
devices.
Incorrect Answers:
A. CPU use is a performance metric.
B. Licensing is managed separately.
D. Backups are not EDR’s function.

Question 1307
Which of the following is the MOST effective way to prevent unauthorized data
transfers via removable media?
A. Email encryption
B. Group policy settings to disable USB ports
C. Password complexity enforcement
D. Disk defragmentation
Correct Answer: B – Group policy settings to disable USB ports
Explanation: Disabling ports prevents the use of unauthorized removable storage.
Incorrect Answers:
A. Email encryption protects messages, not devices.
C. Passwords secure logins, not devices.
D. Defragmentation optimizes disks, not controls access.

Question 1308
Which of the following BEST ensures that backups remain protected from
ransomware attacks?
A. Backing up to the same local system
B. Using cloud services with 99% availability
C. Storing backups offline and testing regularly
D. Scheduling daily backups during peak hours
Correct Answer: C – Storing backups offline and testing regularly
Explanation: Offline backups are isolated from attacks, and testing ensures
recoverability.
Incorrect Answers:
A. Local backups are vulnerable.
B. Availability doesn’t equal protection.
D. Peak hour backups strain systems.

Question 1309
Which of the following BEST prevents former employees from accessing cloud-based
systems?
A. Password complexity
B. Account deactivation upon termination
C. Security token expiration
D. Email retention policy
Correct Answer: B – Account deactivation upon termination
Explanation: Disabling accounts ensures that former employees can no longer log
in.
Incorrect Answers:
A. Complexity doesn’t revoke access.
C. Tokens expire but may be refreshed.
D. Email policies don’t control access.

Question 1310
Which of the following is the PRIMARY purpose of security audits?
A. To enforce password changes
B. To meet employee training objectives
C. To evaluate the effectiveness of security controls
D. To perform application testing
Correct Answer: C – To evaluate the effectiveness of security controls
Explanation: Audits review whether implemented controls are functioning as
intended.
Incorrect Answers:
A. Passwords are a detail, not a goal.
B. Training is assessed through HR.
D. App testing is a separate activity.

Question 1311
Which of the following is the PRIMARY goal of implementing data classification
policies?
A. To comply with data retention regulations
B. To reduce cloud storage costs
C. To determine appropriate handling and protection measures
D. To assign ownership of all data
Correct Answer: C – To determine appropriate handling and
protection measures
Explanation: Classification policies ensure that data is protected according to its
sensitivity and value.
Incorrect Answers:
A. Retention is related but not the core goal.
B. Cost is a possible outcome but not the focus.
D. Ownership is defined but not the main reason for classification.

Question 1312
Which of the following is MOST critical when granting temporary elevated access for
a system administrator?
A. Logging all activities performed during the session
B. Providing access without multi-factor authentication
C. Granting access for an indefinite period
D. Allowing administrative changes without approval
Correct Answer: A – Logging all activities performed during the
session
Explanation: Logs ensure accountability and enable review of elevated privileges
usage.
Incorrect Answers:
B. MFA should always be used.
C. Indefinite access increases risk.
D. Changes should be controlled and reviewed.
Question 1313
Which of the following is the PRIMARY reason to implement network access control
(NAC)?
A. To enforce password policies
B. To monitor data backups
C. To restrict access based on device compliance
D. To increase employee productivity
Correct Answer: C – To restrict access based on device compliance
Explanation: NAC ensures only compliant and authorized devices connect to the
network.
Incorrect Answers:
A. Passwords are handled separately.
B. NAC doesn’t manage backups.
D. Productivity is not the goal of NAC.

Question 1314
Which of the following BEST reduces the attack surface of a web server?
A. Increasing bandwidth
B. Disabling unused services and ports
C. Using dynamic DNS
D. Installing printer drivers
Correct Answer: B – Disabling unused services and ports
Explanation: Limiting active services reduces potential entry points for attackers.
Incorrect Answers:
A. Bandwidth doesn’t affect security.
C. Dynamic DNS is unrelated.
D. Printer drivers add unnecessary risk.

Question 1315
What is the PRIMARY risk of failing to enforce a screen lock timeout on
workstations?
A. Decreased software performance
B. Unauthorized access to systems
C. Lack of system updates
D. Increased password reset requests
Correct Answer: B – Unauthorized access to systems
Explanation: Idle systems left unlocked can be accessed by unauthorized users.
Incorrect Answers:
A. Performance is unaffected.
C. Updates are unrelated.
D. Password resets are not involved.
Question 1316
Which of the following BEST describes the role of a data owner in information
security?
A. Managing antivirus software updates
B. Ensuring access rights are properly assigned
C. Installing patches on operating systems
D. Performing routine backup verifications
Correct Answer: B – Ensuring access rights are properly assigned
Explanation: Data owners are responsible for determining who can access the data
and ensuring it is protected.
Incorrect Answers:
A. Antivirus is an IT function.
C. Patching is done by system admins.
D. Backups are handled by operations.

Question 1317
Which of the following would BEST help prevent unauthorized physical access to a
server room?
A. Motion detection cameras
B. Smart card access with biometric verification
C. Daily manual inspections
D. Employee sign-in sheets
Correct Answer: B – Smart card access with biometric verification
Explanation: Combining smart cards with biometrics provides strong, multi-factor
physical access control.
Incorrect Answers:
A. Cameras detect but don’t restrict access.
C. Inspections are reactive.
D. Sign-in sheets provide records, not prevention.

Question 1318
Which of the following is MOST important to ensure the security of data sent over
public networks?
A. Secure socket layer (SSL)/TLS encryption
B. Data redundancy
C. Firewall logs
D. Network segmentation
Correct Answer: A – Secure socket layer (SSL)/TLS encryption
Explanation: SSL/TLS protects data in transit from interception and tampering.
Incorrect Answers:
B. Redundancy ensures availability, not confidentiality.
C. Logs record events, not secure data.
D. Segmentation protects internal traffic.

Question 1319
What is the PRIMARY advantage of conducting a tabletop exercise?
A. It ensures all software patches are current
B. It provides a realistic, live simulation of an attack
C. It allows teams to evaluate their incident response procedures without disruption
D. It eliminates the need for penetration testing
Correct Answer: C – It allows teams to evaluate their incident
response procedures without disruption
Explanation: Tabletop exercises help teams identify gaps in planning in a low-risk
environment.
Incorrect Answers:
A. Patch management is not part of this exercise.
B. Live simulations involve actual systems.
D. Penetration testing is still necessary.

Question 1320
Which of the following controls BEST mitigates the risk of privilege escalation?
A. Intrusion detection systems
B. Segregation of duties
C. Full disk encryption
D. Biometric login systems
Correct Answer: B – Segregation of duties
Explanation: Separating responsibilities prevents a single user from gaining full
control of critical processes.
Incorrect Answers:
A. IDS detects activity but doesn’t prevent privilege abuse.
C. Encryption protects data, not roles.
D. Biometrics verify identity, not roles.

Question 1321
What is the PRIMARY purpose of a honeypot in cybersecurity?
A. To increase internet speed
B. To trick attackers and analyze their behavior
C. To serve as a firewall replacement
D. To optimize data backup processes
Correct Answer: B – To trick attackers and analyze their behavior
Explanation: Honeypots are decoy systems that help monitor and understand
attacker techniques.
Incorrect Answers:
A. Speed is unrelated.
C. Firewalls and honeypots serve different purposes.
D. Backup processes are separate.

Question 1322
Which of the following is MOST important when assigning access rights to a new
employee?
A. Matching access to the previous employee’s account
B. Assigning access based on job responsibilities
C. Granting full access temporarily
D. Allowing access to all shared folders
Correct Answer: B – Assigning access based on job responsibilities
Explanation: Access should follow the principle of least privilege, based on specific
duties.
Incorrect Answers:
A. Roles vary and should not be reused blindly.
C. Temporary full access is risky.
D. Not all shared folders are necessary.

Question 1323
Which of the following BEST describes a zero-day vulnerability?
A. A flaw with a vendor-issued patch
B. A known vulnerability with available mitigation
C. A vulnerability discovered before a patch is available
D. A configuration error in a firewall
Correct Answer: C – A vulnerability discovered before a patch is
available
Explanation: Zero-day exploits take advantage of flaws unknown to vendors or
unpatched.
Incorrect Answers:
A. Flawed patches are separate issues.
B. Known and mitigated vulnerabilities are not zero-day.
D. Configuration errors are not necessarily vulnerabilities.

Question 1324
What is the PRIMARY reason to separate development and production
environments?
A. To prevent network congestion
B. To ensure version control
C. To avoid accidental changes in live systems
D. To reduce software licensing costs
Correct Answer: C – To avoid accidental changes in live systems
Explanation: Separation protects operational environments from instability due to
development errors.
Incorrect Answers:
A. Network traffic is not the main concern.
B. Version control tools work in both environments.
D. Licensing is not affected by separation.

Question 1325
Which of the following is the MOST effective method for securing data on a mobile
device?
A. Remote desktop access
B. Disabling Bluetooth
C. Full device encryption
D. Installing social media apps
Correct Answer: C – Full device encryption
Explanation: Encryption ensures that data is protected even if the device is lost or
stolen.
Incorrect Answers:
A. RDP protects server data, not local device data.
B. Bluetooth disabling helps but is insufficient alone.
D. Social media apps are unrelated.

Question 1326
Which of the following is the PRIMARY purpose of a digital signature?
A. To compress files
B. To ensure message confidentiality
C. To verify sender authenticity and message integrity
D. To enable auto-login features
Correct Answer: C – To verify sender authenticity and message
integrity
Explanation: Digital signatures validate the origin and content of electronic
messages.
Incorrect Answers:
A. Compression is unrelated.
B. Confidentiality is provided by encryption.
D. Auto-login is not secure.

Question 1327
Which of the following BEST demonstrates that a security incident response process
is effective?
A. All staff have been trained on security policies
B. The number of incidents decreases over time
C. Incident recovery time meets defined objectives
D. Logs are retained for at least one year
Correct Answer: C – Incident recovery time meets defined objectives
Explanation: Timely recovery indicates that incident response processes are
functioning as intended.
Incorrect Answers:
A. Training supports but does not prove effectiveness.
B. Fewer incidents may result from other factors.
D. Log retention helps audits, not recovery.

Question 1328
Which of the following would be MOST useful for detecting data breaches that
involve large outbound transfers?
A. Email filters
B. Data loss prevention (DLP) solutions
C. Disk quota enforcement
D. Login time restrictions
Correct Answer: B – Data loss prevention (DLP) solutions
Explanation: DLP tools monitor data transfers and prevent unauthorized data
exfiltration.
Incorrect Answers:
A. Email filters control spam, not file movement.
C. Disk quotas limit storage, not transfers.
D. Login time control is not sufficient.

Question 1329
Which of the following is the PRIMARY benefit of a layered security approach
(defense in depth)?
A. It reduces software licensing costs
B. It simplifies system configurations
C. It increases the likelihood of threat detection and prevention
D. It avoids the need for encryption
Correct Answer: C – It increases the likelihood of threat detection and
prevention
Explanation: Layered defenses ensure multiple safeguards are in place if one fails.
Incorrect Answers:
A. Costs may increase.
B. Configurations may become more complex.
D. Encryption remains essential.

Question 1330
Which of the following is MOST critical when disposing of decommissioned hard
drives that stored sensitive information?
A. Formatting the drives
B. Physically destroying the drives
C. Archiving the drives in a warehouse
D. Assigning them to a backup pool
Correct Answer: B – Physically destroying the drives
Explanation: Physical destruction is the most secure method to ensure data cannot
be recovered.
Incorrect Answers:
A. Formatting can leave recoverable data.
C. Archiving poses continued risk.
D. Reuse without sanitization is insecure.

Question 1331
Which of the following is the PRIMARY goal of implementing a security policy?
A. To describe organizational structure
B. To define acceptable use of systems and protect information assets
C. To detail software development procedures
D. To reduce hardware costs
Correct Answer: B – To define acceptable use of systems and protect
information assets
Explanation: Security policies set the rules for protecting assets and define user
responsibilities.
Incorrect Answers:
A. Organizational charts are not part of a security policy.
C. Development procedures belong in SDLC documentation.
D. Cost reduction is not a policy objective.

Question 1332
Which of the following is MOST important when implementing a bring your own
device (BYOD) policy?
A. Requiring monthly performance reviews
B. Monitoring social media usage
C. Enforcing mobile device management (MDM)
D. Providing employee device repair services
Correct Answer: C – Enforcing mobile device management (MDM)
Explanation: MDM tools help enforce security policies and control data access on
personal devices.
Incorrect Answers:
A. Performance reviews are unrelated.
B. Social media monitoring does not secure data.
D. Repair services are optional, not security-related.

Question 1333
Which of the following BEST ensures the integrity of data stored in a database?
A. Regular data backups
B. Use of encryption algorithms
C. Implementation of database access controls
D. Use of checksums and transaction logs
Correct Answer: D – Use of checksums and transaction logs
Explanation: These mechanisms detect and help recover from data corruption or
unauthorized changes.
Incorrect Answers:
A. Backups help recovery but not integrity verification.
B. Encryption ensures confidentiality, not integrity.
C. Access controls protect but don’t validate integrity.

Question 1334
Which of the following is the PRIMARY reason to enforce the principle of least
privilege?
A. To simplify user training
B. To minimize the risk of unauthorized access
C. To speed up authentication
D. To avoid password reuse
Correct Answer: B – To minimize the risk of unauthorized access
Explanation: Limiting access reduces the attack surface and limits potential
damage.
Incorrect Answers:
A. Training is unrelated.
C. Authentication speed is not affected.
D. Password reuse is controlled through policy.

Question 1335
Which of the following BEST describes the function of a proxy server?
A. It encrypts data on disk
B. It forwards client requests and filters content
C. It performs load balancing
D. It creates virtual machines
Correct Answer: B – It forwards client requests and filters content
Explanation: Proxy servers act as intermediaries, often inspecting and controlling
traffic.
Incorrect Answers:
A. Disk encryption is separate.
C. Load balancers distribute network traffic.
D. VM creation is unrelated.

Question 1336
Which of the following would BEST help detect unauthorized internal access to
confidential information?
A. Intrusion prevention system
B. User access certification reviews
C. Security awareness training
D. Biometric access control
Correct Answer: B – User access certification reviews
Explanation: Periodic reviews ensure that only authorized users retain access to
sensitive data.
Incorrect Answers:
A. IPS detects network threats, not internal misuse.
C. Training prevents misuse, not detects it.
D. Biometrics control entry, not monitor usage.

Question 1337
What is the PRIMARY objective of change management in IT environments?
A. To ensure that software is updated monthly
B. To allow developers unrestricted access
C. To ensure changes are made in a controlled and coordinated manner
D. To avoid budget overruns
Correct Answer: C – To ensure changes are made in a controlled and
coordinated manner
Explanation: Change management helps prevent unintended consequences by
enforcing review and approval.
Incorrect Answers:
A. Frequency of updates depends on context.
B. Unrestricted access contradicts control goals.
D. Budget control is a secondary concern.

Question 1338
Which of the following BEST helps prevent privilege abuse by system
administrators?
A. Segregation of duties and activity logging
B. Strong antivirus software
C. Quarterly risk assessments
D. Use of biometric authentication
Correct Answer: A – Segregation of duties and activity logging
Explanation: Separation of roles and logging ensure oversight and accountability.
Incorrect Answers:
B. Antivirus targets malware, not access control.
C. Risk assessments identify issues but don’t enforce controls.
D. Biometrics confirm identity, not activity.

Question 1339
Which of the following would BEST protect data in a shared folder from
unauthorized modification?
A. Configuring read-only permissions for unauthorized users
B. Disabling file sharing
C. Removing all users from the access control list
D. Using unencrypted file formats
Correct Answer: A – Configuring read-only permissions for
unauthorized users
Explanation: Proper permissions prevent unauthorized changes while allowing
necessary access.
Incorrect Answers:
B. Disabling sharing limits all collaboration.
C. Removing access entirely may hinder operations.
D. Unencrypted files don’t restrict access.

Question 1340
What is the PRIMARY purpose of a demilitarized zone (DMZ) in a network?
A. To store confidential internal data
B. To serve as a backup location
C. To host public-facing services while isolating internal systems
D. To isolate mobile devices from Wi-Fi
Correct Answer: C – To host public-facing services while isolating
internal systems
Explanation: DMZs limit external access to sensitive systems while allowing public
services.
Incorrect Answers:
A. Internal data should remain inside the secure zone.
B. Backup storage is unrelated.
D. Mobile security is handled separately.
Question 1341
Which of the following BEST reduces the risk of unauthorized remote access to
corporate systems?
A. Implementing multifactor authentication
B. Using a high-speed internet connection
C. Encrypting hard drives
D. Upgrading display resolution
Correct Answer: A – Implementing multifactor authentication
Explanation: MFA adds additional layers of security beyond passwords.
Incorrect Answers:
B. Internet speed doesn’t enhance security.
C. Disk encryption protects data at rest, not remote access.
D. Resolution is unrelated.

Question 1342
Which of the following is MOST important to verify during a firewall configuration
review?
A. The number of firewall rules
B. The version of the firewall software
C. That rules are aligned with business needs and least privilege
D. That the firewall hardware is under warranty
Correct Answer: C – That rules are aligned with business needs and
least privilege
Explanation: Firewall effectiveness depends on properly scoped and justified rules.
Incorrect Answers:
A. Quantity matters less than quality.
B. Versioning is important, but not the main concern.
D. Warranty does not affect security function.

Question 1343
Which of the following would BEST prevent unauthorized users from gaining
physical access to server equipment?
A. Strong passwords
B. Surveillance cameras
C. Locked server racks in secured rooms
D. Encrypted storage drives
Correct Answer: C – Locked server racks in secured rooms
Explanation: Physical barriers are essential to prevent tampering or theft.
Incorrect Answers:
A. Passwords protect systems, not physical access.
B. Cameras detect, not prevent.
D. Encryption protects data, not devices.

Question 1344
What is the BEST indicator of the effectiveness of a phishing awareness program?
A. Percentage of employees completing training
B. Reduction in system downtime
C. Decrease in successful phishing attempts
D. Increase in email usage
Correct Answer: C – Decrease in successful phishing attempts
Explanation: Fewer successful attacks indicate greater user awareness and program
impact.
Incorrect Answers:
A. Completion doesn’t guarantee learning.
B. Downtime may be unrelated.
D. Email volume is not a metric of success.

Question 1345
Which of the following BEST mitigates the risk of unauthorized application
installation?
A. Antivirus scanning
B. Application whitelisting
C. Encrypted drives
D. High-speed internet
Correct Answer: B – Application whitelisting
Explanation: Whitelisting allows only approved applications to run.
Incorrect Answers:
A. Antivirus detects threats but doesn’t control installation.
C. Encryption protects data, not software usage.
D. Speed is not a security factor.

Question 1346
Which of the following is the PRIMARY purpose of implementing logging on critical
systems?
A. To track system uptime
B. To detect unauthorized activity
C. To improve user productivity
D. To reduce data storage requirements
Correct Answer: B – To detect unauthorized activity
Explanation: Logging creates audit trails that support security monitoring.
Incorrect Answers:
A. Uptime is monitored separately.
C. Productivity is unrelated.
D. Logs increase storage needs.

Question 1347
Which of the following would BEST mitigate the risk of password cracking attacks?
A. Frequent password reuse
B. Using short and simple passwords
C. Implementing account lockout after failed attempts
D. Sharing passwords only with authorized staff
Correct Answer: C – Implementing account lockout after failed
attempts
Explanation: Lockouts limit brute-force attempts by disabling accounts after
several failures.
Incorrect Answers:
A. Reuse increases risk.
B. Simplicity reduces strength.
D. Password sharing is a violation.

Question 1348
Which of the following BEST reduces the likelihood of social engineering attacks?
A. Hardware upgrades
B. Regular password changes
C. User awareness and training programs
D. Encrypting hard drives
Correct Answer: C – User awareness and training programs
Explanation: Educated users are less likely to fall victim to manipulation.
Incorrect Answers:
A. Hardware is unrelated.
B. Password changes don’t educate users.
D. Encryption protects data, not behavior.

Question 1349
Which of the following would be the BEST control for securing wireless access in a
corporate environment?
A. MAC address filtering
B. WPA3 encryption with strong authentication
C. Broadcasting SSID
D. Using WEP encryption
Correct Answer: B – WPA3 encryption with strong authentication
Explanation: WPA3 provides strong wireless encryption and authentication.
Incorrect Answers:
A. MAC filtering is easily bypassed.
C. Broadcasting is not a security measure.
D. WEP is outdated and insecure.

Question 1350
Which of the following is the PRIMARY benefit of having an incident response
team?
A. To reduce training costs
B. To ensure rapid and organized response to security incidents
C. To eliminate the need for antivirus software
D. To create disaster recovery documentation
Correct Answer: B – To ensure rapid and organized response to
security incidents
Explanation: Incident response teams help contain and recover from attacks
efficiently.
Incorrect Answers:
A. Cost savings are indirect.
C. Antivirus is still needed.
D. DR documentation is a separate function.

Question 1351
Which of the following is MOST important when reviewing access logs for anomalies?
A. Number of log entries
B. Log file size
C. Timestamp consistency and unusual access patterns
D. User interface layout
Correct Answer: C – Timestamp consistency and unusual access
patterns
Explanation: Anomalous patterns and inconsistent timestamps can indicate
unauthorized or suspicious behavior.
Incorrect Answers:
A. Quantity alone is not useful.
B. Size doesn’t indicate threat.
D. Interface layout is unrelated.

Question 1352
What is the PRIMARY purpose of implementing email filtering?
A. To improve internet speed
B. To reduce inbox storage usage
C. To block spam and malicious content
D. To archive old messages
Correct Answer: C – To block spam and malicious content
Explanation: Email filtering helps prevent phishing and malware from reaching
users.
Incorrect Answers:
A. Speed is not affected.
B. Storage reduction is secondary.
D. Archiving is a separate function.

Question 1353
Which of the following is the MOST effective method to verify that access controls
are working as intended?
A. Reviewing the organization chart
B. Performing access control testing
C. Updating user passwords regularly
D. Reinstalling the access control software
Correct Answer: B – Performing access control testing
Explanation: Testing confirms that only authorized users have appropriate access.
Incorrect Answers:
A. Charts show structure, not permissions.
C. Passwords alone don’t verify controls.
D. Reinstallation is unrelated.

Question 1354
Which of the following would BEST help prevent attackers from exploiting known
software vulnerabilities?
A. Increasing memory
B. Using longer passwords
C. Regularly applying security patches
D. Rebooting systems weekly
Correct Answer: C – Regularly applying security patches
Explanation: Patching fixes known weaknesses, reducing risk of exploitation.
Incorrect Answers:
A. Memory size doesn’t prevent attacks.
B. Passwords don’t address software flaws.
D. Rebooting doesn’t fix vulnerabilities.

Question 1355
Which of the following is the PRIMARY reason to conduct penetration testing?
A. To audit employee performance
B. To identify exploitable weaknesses
C. To evaluate coding speed
D. To test power supply redundancy
Correct Answer: B – To identify exploitable weaknesses
Explanation: Pen tests simulate attacks to find and fix vulnerabilities before real
attackers do.
Incorrect Answers:
A. Performance reviews are not part of testing.
C. Coding speed is irrelevant.
D. Power is a physical, not logical, concern.

Question 1356
Which of the following would BEST mitigate the risk of users accessing websites with
known malware?
A. Implementing endpoint encryption
B. Enabling content delivery networks
C. Using web filtering solutions
D. Enforcing password complexity
Correct Answer: C – Using web filtering solutions
Explanation: Web filters block access to unsafe or restricted sites.
Incorrect Answers:
A. Encryption protects data, not web traffic.
B. CDNs improve speed, not security.
D. Passwords protect accounts, not browsing.

Question 1357
What is the BEST control to prevent unauthorized physical access to backup media?
A. Encrypting the backups
B. Labeling media clearly
C. Storing media in a locked, access-controlled location
D. Using redundant disks
Correct Answer: C – Storing media in a locked, access-controlled
location
Explanation: Physical protection is necessary to prevent theft or tampering.
Incorrect Answers:
A. Encryption helps but doesn’t prevent physical access.
B. Labels assist inventory, not security.
D. Redundancy supports availability.

Question 1358
Which of the following is MOST important to do after a data breach?
A. Archive affected systems
B. Replace all user devices
C. Notify stakeholders and regulatory bodies as required
D. Upgrade memory and storage
Correct Answer: C – Notify stakeholders and regulatory bodies as
required
Explanation: Legal and compliance obligations often require disclosure.
Incorrect Answers:
A. Archiving is not a first step.
B. Devices may not need replacement.
D. Upgrades don’t address breaches.

Question 1359
Which of the following is the BEST reason to restrict administrator access on
production systems?
A. To reduce network congestion
B. To prevent unauthorized changes
C. To avoid duplicate data entries
D. To eliminate help desk calls
Correct Answer: B – To prevent unauthorized changes
Explanation: Restricting admin rights limits potential damage from misuse or
mistakes.
Incorrect Answers:
A. Congestion is unrelated.
C. Data duplication is a database issue.
D. Help desk calls may still occur.

Question 1360
Which of the following would BEST help prevent the use of unauthorized software?
A. User training on secure browsing
B. System restore points
C. Application whitelisting
D. Real-time clock monitoring
Correct Answer: C – Application whitelisting
Explanation: Only approved applications are allowed to run, blocking unauthorized
ones.
Incorrect Answers:
A. Training helps but doesn’t enforce.
B. Restore points assist recovery, not prevention.
D. Clock settings are unrelated.

Question 1361
What is the PRIMARY purpose of a disaster recovery plan (DRP)?
A. To secure the network perimeter
B. To manage software licenses
C. To restore business operations after disruption
D. To detect phishing emails
Correct Answer: C – To restore business operations after disruption
Explanation: DRPs define how to resume operations after major events or failures.
Incorrect Answers:
A. Perimeter defense is a separate control.
B. Licensing is managed elsewhere.
D. Phishing detection is unrelated.

Question 1362
Which of the following is the MOST effective way to prevent employees from
accessing restricted websites?
A. DNS blacklisting
B. Content delivery networks
C. Email encryption
D. Social media policies
Correct Answer: A – DNS blacklisting
Explanation: DNS filtering blocks access to disallowed domain names.
Incorrect Answers:
B. CDNs improve speed, not filter access.
C. Encryption secures email, not browsing.
D. Policies guide behavior but don’t enforce.

Question 1363
Which of the following is the PRIMARY purpose of a business continuity plan
(BCP)?
A. To eliminate need for backups
B. To ensure continued operations during disruptive events
C. To provide internet access to remote users
D. To reduce software installation time
Correct Answer: B – To ensure continued operations during disruptive
events
Explanation: BCPs ensure that critical services continue despite outages or crises.
Incorrect Answers:
A. Backups are still necessary.
C. Internet access is part of remote support.
D. Installation time is irrelevant.
Question 1364
Which of the following BEST protects confidential data on a lost or stolen laptop?
A. Strong user password
B. BIOS update
C. Full disk encryption
D. Deleting browser history
Correct Answer: C – Full disk encryption
Explanation: Encryption ensures that data remains unreadable without keys.
Incorrect Answers:
A. Passwords can be bypassed.
B. BIOS updates don’t secure data.
D. History deletion is superficial.

Question 1365
Which of the following is the BEST control to detect unauthorized modifications to
system files?
A. Data backup
B. File integrity monitoring
C. Password policies
D. Change control documentation
Correct Answer: B – File integrity monitoring
Explanation: Integrity monitoring detects changes to critical files in real time.
Incorrect Answers:
A. Backups help recover, not detect.
C. Passwords protect access, not files.
D. Documentation supports process, not detection.

Question 1366
What is the PRIMARY reason for requiring periodic password changes?
A. To increase user satisfaction
B. To avoid licensing issues
C. To limit exposure from compromised credentials
D. To save storage space
Correct Answer: C – To limit exposure from compromised credentials
Explanation: Regular changes reduce the window of opportunity for attackers.
Incorrect Answers:
A. Frequent changes may reduce satisfaction.
B. Licensing is unrelated.
D. Storage is unaffected.
Question 1367
Which of the following would BEST prevent a user from installing unauthorized
software?
A. Removing administrator privileges
B. Requiring strong passwords
C. Enabling Bluetooth only during work hours
D. Changing the screensaver timeout
Correct Answer: A – Removing administrator privileges
Explanation: Without admin rights, users can’t install software on systems.
Incorrect Answers:
B. Passwords protect logins, not installations.
C. Bluetooth is unrelated.
D. Screensavers don’t restrict installation.

Question 1368
Which of the following is the PRIMARY purpose of encryption?
A. To compress data
B. To restrict file size
C. To protect confidentiality
D. To increase internet speed
Correct Answer: C – To protect confidentiality
Explanation: Encryption ensures that data cannot be read without proper
authorization.
Incorrect Answers:
A. Compression reduces size.
B. Size limitation is unrelated.
D. Speed is not affected by encryption.

Question 1369
Which of the following would BEST protect a server from known exploits?
A. Role-based access
B. Disabling USB ports
C. Timely patch management
D. Daily password changes
Correct Answer: C – Timely patch management
Explanation: Applying patches closes known vulnerabilities that attackers target.
Incorrect Answers:
A. RBAC limits access, not vulnerabilities.
B. USB ports affect physical risks.
D. Password changes don’t fix software issues.
Question 1370
Which of the following is the PRIMARY purpose of using antivirus software?
A. To optimize hard drive speed
B. To detect and remove malicious software
C. To manage network bandwidth
D. To install software patches
Correct Answer: B – To detect and remove malicious software
Explanation: Antivirus tools scan for known threats and help remove them.
Incorrect Answers:
A. Disk speed is unrelated.
C. Bandwidth is a network issue.
D. Patching is a separate process.

Question 1371
Which of the following BEST ensures that only authorized users can make
configuration changes to network devices?
A. Network segmentation
B. Strong firewall rules
C. Role-based access control
D. Use of wireless encryption
Correct Answer: C – Role-based access control
Explanation: RBAC limits actions to users based on their roles, ensuring only
authorized personnel can make changes.
Incorrect Answers:
A. Segmentation limits traffic, not configuration rights.
B. Firewalls filter traffic, not user permissions.
D. Wireless encryption protects data in transit.

Question 1372
What is the PRIMARY purpose of conducting a security risk assessment?
A. To assign budgets to departments
B. To define employee responsibilities
C. To identify and evaluate potential threats and vulnerabilities
D. To schedule system maintenance
Correct Answer: C – To identify and evaluate potential threats and
vulnerabilities
Explanation: Risk assessments help prioritize mitigation strategies based on actual
exposure.
Incorrect Answers:
A. Budgets follow from risk priorities.
B. Responsibilities are clarified elsewhere.
D. Maintenance scheduling is operational.

Question 1373
Which of the following would BEST help detect unauthorized access attempts?
A. Data classification
B. Log monitoring and alerting
C. Disk defragmentation
D. Backup restoration
Correct Answer: B – Log monitoring and alerting
Explanation: Monitoring access logs allows real-time detection of suspicious
activity.
Incorrect Answers:
A. Classification defines data handling rules.
C. Defragmentation is unrelated.
D. Restoration helps recovery, not detection.

Question 1374
Which of the following is the PRIMARY risk of using default passwords on newly
deployed systems?
A. Poor user experience
B. Unauthorized access
C. Increased bandwidth usage
D. System overheating
Correct Answer: B – Unauthorized access
Explanation: Default credentials are widely known and easily exploited by
attackers.
Incorrect Answers:
A. User experience is secondary.
C. Bandwidth is unaffected.
D. Heat is unrelated.

Question 1375
Which of the following BEST describes the principle of least privilege?
A. Users should have administrator rights
B. Access should be limited to what is necessary for a task
C. All users should have the same access
D. Access rights should never change
Correct Answer: B – Access should be limited to what is necessary for
a task
Explanation: Limiting access minimizes risk and enforces good security hygiene.
Incorrect Answers:
A. Admin rights are excessive for most users.
C. Uniform access increases risk.
D. Rights should adapt to responsibilities.

Question 1376
Which of the following would BEST help protect against phishing attacks?
A. Installing a spam filter
B. Using disk encryption
C. Updating the OS regularly
D. Implementing RAID 5
Correct Answer: A – Installing a spam filter
Explanation: Spam filters reduce the number of malicious emails reaching users.
Incorrect Answers:
B. Encryption protects stored data, not emails.
C. Updates fix vulnerabilities but don’t filter email.
D. RAID is for redundancy.

Question 1377
What is the PRIMARY reason for conducting a tabletop exercise in incident
response?
A. To test system performance
B. To simulate disaster recovery failover
C. To evaluate team readiness and coordination
D. To audit third-party vendors
Correct Answer: C – To evaluate team readiness and coordination
Explanation: Tabletop exercises help teams practice incident response procedures in
a non-disruptive environment.
Incorrect Answers:
A. Performance is not tested.
B. Failover requires full simulation.
D. Vendor audits are separate.

Question 1378
Which of the following is the PRIMARY reason to implement endpoint protection
software?
A. To manage user licenses
B. To optimize CPU utilization
C. To detect and prevent malware on user devices
D. To enable single sign-on
Correct Answer: C – To detect and prevent malware on user devices
Explanation: Endpoint protection defends against threats targeting individual
systems.
Incorrect Answers:
A. Licensing is unrelated.
B. CPU use may increase, not decrease.
D. SSO is an identity solution.

Question 1379
Which of the following BEST reduces the risk of unauthorized use of privileged
accounts?
A. Using long passwords
B. Implementing privileged access management (PAM)
C. Running daily backups
D. Enabling auto-login
Correct Answer: B – Implementing privileged access management
(PAM)
Explanation: PAM solutions control, monitor, and log the use of privileged
accounts.
Incorrect Answers:
A. Long passwords help, but PAM adds full control.
C. Backups don’t address access.
D. Auto-login is insecure.

Question 1380
Which of the following would BEST mitigate the risk of accidental data loss due to
user error?
A. Role-based access control
B. Biometric login
C. Full disk encryption
D. Regular automated backups
Correct Answer: D – Regular automated backups
Explanation: Backups allow recovery if data is accidentally deleted or changed.
Incorrect Answers:
A. RBAC limits access but not accidents.
B. Biometrics confirm identity, not prevent loss.
C. Encryption protects confidentiality.

Question 1381
What is the PRIMARY benefit of conducting security awareness training?
A. To teach users how to install software
B. To prepare employees for system upgrades
C. To reduce the success rate of social engineering attacks
D. To increase internet browsing speed
Correct Answer: C – To reduce the success rate of social engineering
attacks
Explanation: Trained users are less likely to fall for phishing and related threats.
Incorrect Answers:
A. Software installation is not the focus.
B. Upgrades are managed by IT.
D. Browsing speed is irrelevant.

Question 1382
Which of the following is MOST effective in preventing brute-force attacks?
A. Changing default usernames
B. Implementing account lockout policies
C. Encrypting data in transit
D. Logging user activity
Correct Answer: B – Implementing account lockout policies
Explanation: Lockouts stop repeated login attempts after failures.
Incorrect Answers:
A. Changing usernames helps but is not enough.
C. Encryption protects data, not login processes.
D. Logging detects but doesn’t block.

Question 1383
Which of the following is the PRIMARY purpose of using a VPN?
A. To increase upload speeds
B. To allow access to social media
C. To secure communication over untrusted networks
D. To bypass firewalls
Correct Answer: C – To secure communication over untrusted
networks
Explanation: VPNs encrypt data and ensure secure access over public internet
connections.
Incorrect Answers:
A. Speed is not the focus.
B. Access policies govern social media.
D. VPNs are not designed for evasion.

Question 1384
Which of the following would BEST prevent an attacker from exploiting a recently
discovered vulnerability?
A. Firewall segmentation
B. System reboot
C. Applying the latest vendor patch
D. Increasing password complexity
Correct Answer: C – Applying the latest vendor patch
Explanation: Patches address known flaws and prevent exploitation.
Incorrect Answers:
A. Firewalls help limit access, but not patch vulnerabilities.
B. Rebooting doesn’t fix bugs.
D. Passwords protect user accounts, not vulnerabilities.

Question 1385
Which of the following should be the FIRST step after detecting a potential malware
infection?
A. Shut down all systems immediately
B. Inform the media
C. Isolate the affected system from the network
D. Reinstall the operating system
Correct Answer: C – Isolate the affected system from the network
Explanation: Isolation prevents malware from spreading to other systems.
Incorrect Answers:
A. Shutting down all systems is unnecessary.
B. Media involvement is not immediate.
D. Reinstallation is later in the process.

Question 1386
What is the PRIMARY reason for enforcing password history requirements?
A. To increase storage capacity
B. To prevent reuse of old passwords
C. To allow easier access to systems
D. To speed up login times
Correct Answer: B – To prevent reuse of old passwords
Explanation: History policies discourage repeating previously used credentials.
Incorrect Answers:
A. Password policies don’t affect storage.
C. Access is not the goal.
D. Speed is not improved.

Question 1387
Which of the following BEST mitigates the risk of data theft from lost laptops?
A. Updating antivirus signatures
B. Deleting temporary files
C. Enabling full disk encryption
D. Using default usernames
Correct Answer: C – Enabling full disk encryption
Explanation: Encryption ensures data remains inaccessible even if the device is lost.
Incorrect Answers:
A. Antivirus protects against malware.
B. Temp files may remain.
D. Default names can be predictable.

Question 1388
Which of the following is the BEST method to verify that critical patches have been
applied?
A. Reviewing system documentation
B. Performing a vulnerability scan
C. Asking the system administrator
D. Rebooting the system
Correct Answer: B – Performing a vulnerability scan
Explanation: Scans confirm whether vulnerabilities still exist.
Incorrect Answers:
A. Documentation may be outdated.
C. Admin reports may be incomplete.
D. Reboots don’t apply patches.

Question 1389
What is the PRIMARY purpose of access control reviews?
A. To identify unused accounts
B. To reduce software costs
C. To log user activity
D. To test patch deployment
Correct Answer: A – To identify unused accounts
Explanation: Reviews ensure that only valid, active users retain access.
Incorrect Answers:
B. Cost control is indirect.
C. Logging is a separate process.
D. Patches are not related.

Question 1390
Which of the following BEST supports detection of insider threats?
A. Intrusion prevention systems
B. Strong password policies
C. User behavior analytics
D. Firewall rule reviews
Correct Answer: C – User behavior analytics
Explanation: UBA tools monitor and alert on anomalous insider behavior.
Incorrect Answers:
A. IPS focuses on external attacks.
B. Passwords secure accounts but don’t monitor use.
D. Firewalls protect perimeters.

Question 1391
Which of the following is the PRIMARY reason to maintain an up-to-date asset
inventory?
A. To reduce audit scope
B. To manage software licenses
C. To identify systems that require security updates
D. To prepare financial statements
Correct Answer: C – To identify systems that require security updates
Explanation: An accurate inventory helps ensure all systems are patched and
protected.
Incorrect Answers:
A. Audit scope depends on policies, not just inventory.
B. Licensing is a secondary benefit.
D. Asset tracking for financials is not a security function.

Question 1392
Which of the following BEST helps ensure sensitive data is not transmitted outside
the organization?
A. Antivirus software
B. Data loss prevention (DLP) systems
C. Secure boot
D. User access reviews
Correct Answer: B – Data loss prevention (DLP) systems
Explanation: DLP monitors and controls data transfers to prevent leaks.
Incorrect Answers:
A. Antivirus targets malware.
C. Secure boot verifies system integrity.
D. Access reviews manage permissions.

Question 1393
Which of the following is the PRIMARY benefit of using two-factor authentication?
A. It eliminates the need for complex passwords
B. It allows access from any device
C. It enhances security by requiring two forms of verification
D. It provides single sign-on functionality
Correct Answer: C – It enhances security by requiring two forms of
verification
Explanation: Two-factor authentication improves account protection by using
multiple methods.
Incorrect Answers:
A. Password complexity is still needed.
B. Access from any device is unrelated.
D. SSO is a separate feature.

Question 1394
What is the MOST effective control to prevent unauthorized changes to production
systems?
A. Antivirus software
B. Change management process
C. File encryption
D. Disk compression
Correct Answer: B – Change management process
Explanation: Controlled change processes ensure all changes are reviewed and
approved.
Incorrect Answers:
A. Antivirus protects against malware, not process violations.
C. Encryption secures data, not controls changes.
D. Compression is for storage efficiency.

Question 1395
Which of the following BEST ensures that audit logs cannot be altered by
administrators?
A. Role-based access control
B. Storing logs on write-once media
C. Antivirus software
D. Log retention policies
Correct Answer: B – Storing logs on write-once media
Explanation: Write-once storage ensures logs remain tamper-proof.
Incorrect Answers:
A. RBAC can still allow admin access.
C. Antivirus doesn’t prevent tampering.
D. Retention policies define duration, not integrity.
Question 1396
Which of the following BEST mitigates the risk of SQL injection?
A. Password complexity
B. Using parameterized queries
C. Frequent backups
D. Port filtering
Correct Answer: B – Using parameterized queries
Explanation: Parameterized queries ensure user input is treated as data, not
executable code.
Incorrect Answers:
A. Passwords don’t prevent SQL injection.
C. Backups help recovery, not prevention.
D. Ports don’t affect input validation.

Question 1397
What is the PRIMARY benefit of a centralized identity and access management
(IAM) system?
A. It allows access to personal social media
B. It eliminates password usage
C. It simplifies user provisioning and de-provisioning
D. It replaces antivirus solutions
Correct Answer: C – It simplifies user provisioning and de-
provisioning
Explanation: Centralized IAM ensures consistent and efficient account
management.
Incorrect Answers:
A. Social media access is not a goal.
B. Passwords may still be used.
D. Antivirus addresses different threats.

Question 1398
Which of the following BEST ensures employees follow acceptable use policies?
A. Requiring policy acknowledgment and regular audits
B. Providing unlimited administrative access
C. Allowing anonymous internet browsing
D. Enabling pop-up ads
Correct Answer: A – Requiring policy acknowledgment and regular
audits
Explanation: Acknowledgment ensures awareness, while audits verify compliance.
Incorrect Answers:
B. Admin access increases risk.
C. Anonymous browsing lacks accountability.
D. Ads are unrelated.

Question 1399
Which of the following is the PRIMARY purpose of conducting log reviews?
A. To calculate system uptime
B. To verify user satisfaction
C. To identify unusual or unauthorized activity
D. To update the security policy
Correct Answer: C – To identify unusual or unauthorized activity
Explanation: Reviewing logs helps detect anomalies and potential breaches.
Incorrect Answers:
A. Uptime monitoring is a different function.
B. Satisfaction is measured via surveys.
D. Policies are updated based on broader factors.

Question 1400
Which of the following BEST mitigates the risk of a stolen password being used?
A. Disk defragmentation
B. Using multifactor authentication
C. Posting policies on the intranet
D. Logging off before lunch
Correct Answer: B – Using multifactor authentication
Explanation: MFA adds another layer of security beyond the password.
Incorrect Answers:
A. Defragmentation is unrelated.
C. Policies are passive controls.
D. Logging off is good practice, but not a strong defense.

Question 1401
What is the PRIMARY objective of a security baseline?
A. To define user training goals
B. To establish minimum acceptable configurations
C. To enforce password complexity
D. To limit use of external storage
Correct Answer: B – To establish minimum acceptable configurations
Explanation: Baselines define the minimum standards systems must meet.
Incorrect Answers:
A. Training is addressed elsewhere.
C. Passwords are part of configuration.
D. Storage use is a policy matter.
Question 1402
Which of the following BEST ensures users don’t retain access after leaving the
organization?
A. Review help desk tickets
B. Disable accounts upon termination
C. Change the company logo
D. Archive emails annually
Correct Answer: B – Disable accounts upon termination
Explanation: Immediate account deactivation prevents post-employment access.
Incorrect Answers:
A. Tickets may not reflect access.
C. Logos have no effect.
D. Archiving is for records, not access control.

Question 1403
Which of the following is MOST important when implementing an information
classification scheme?
A. Number of users
B. Encryption algorithms used
C. Business impact of data exposure
D. Operating system versions
Correct Answer: C – Business impact of data exposure
Explanation: Data should be classified based on its sensitivity and risk if exposed.
Incorrect Answers:
A. User count is irrelevant.
B. Encryption is a control, not a classification factor.
D. OS version doesn’t define data value.

Question 1404
Which of the following is the PRIMARY function of a firewall?
A. To encrypt communications
B. To block spam messages
C. To control incoming and outgoing network traffic
D. To update antivirus signatures
Correct Answer: C – To control incoming and outgoing network traffic
Explanation: Firewalls enforce rules for network traffic based on security policy.
Incorrect Answers:
A. Encryption is handled by other tools.
B. Spam is filtered by email systems.
D. AV tools handle signatures.
Question 1405
Which of the following would BEST ensure a terminated contractor cannot access
company systems?
A. Send an exit interview survey
B. Wipe their workstation hard drive
C. Remove access credentials from all systems
D. Provide a reference letter
Correct Answer: C – Remove access credentials from all systems
Explanation: Access removal ensures the individual can’t return virtually.
Incorrect Answers:
A. Surveys are administrative.
B. Wiping the device is helpful, but credentials can be reused elsewhere.
D. References are not a control.

Question 1406
Which of the following is the PRIMARY risk of storing passwords in plain text?
A. Slower login speed
B. Increased support tickets
C. Easy disclosure in the event of compromise
D. Inaccurate logging
Correct Answer: C – Easy disclosure in the event of compromise
Explanation: Plain text passwords are easily readable if systems are breached.
Incorrect Answers:
A. Speed is unaffected.
B. Tickets are unrelated.
D. Logging is not affected.

Question 1407
Which of the following would BEST help detect anomalies in user behavior?
A. Security policy updates
B. User behavior analytics (UBA)
C. Antivirus scans
D. Web proxy logging
Correct Answer: B – User behavior analytics (UBA)
Explanation: UBA tools identify behavior that deviates from norms.
Incorrect Answers:
A. Policies define rules, not detect behavior.
C. Antivirus targets malware.
D. Web logs are useful but not analytical.
Question 1408
Which of the following is MOST critical when sending sensitive data over email?
A. Sending it after hours
B. Encrypting the message contents
C. Using a high-speed internet connection
D. Including a signature
Correct Answer: B – Encrypting the message contents
Explanation: Encryption ensures confidentiality during transmission.
Incorrect Answers:
A. Timing does not protect data.
C. Speed is irrelevant to security.
D. Signatures authenticate, not secure.

Question 1409
Which of the following is the PRIMARY goal of security awareness training?
A. To enhance the organization’s public image
B. To reduce the number of IT support requests
C. To influence employee behavior and reduce risky actions
D. To encourage policy reading
Correct Answer: C – To influence employee behavior and reduce risky
actions
Explanation: Awareness helps build a security-conscious culture and reduce threats.
Incorrect Answers:
A. PR is not the goal.
B. Support requests may not decrease.
D. Reading is encouraged, but behavior change is key.

Question 1410
Which of the following BEST helps prevent unauthorized access to an unattended
workstation?
A. Screen lock timeout
B. Antivirus software
C. Strong password policy
D. Increased RAM
Correct Answer: A – Screen lock timeout
Explanation: Screen locks reduce the chance of someone using an unattended
device.
Incorrect Answers:
B. Antivirus targets malware.
C. Passwords protect logins, not idle systems.
D. RAM affects performance, not security.
Question 1411
Which of the following BEST helps ensure that only authorized users can access a
specific application?
A. Data loss prevention tools
B. Intrusion detection systems
C. Access control lists (ACLs)
D. Firewall traffic shaping
Correct Answer: C – Access control lists (ACLs)
Explanation: ACLs define which users or systems can access resources, ensuring
authorized use.
Incorrect Answers:
A. DLP monitors data, not application access.
B. IDS detects intrusions but doesn't enforce access.
D. Traffic shaping manages bandwidth, not access rights.

Question 1412
Which of the following would BEST help mitigate insider threats?
A. Mandatory vacation policies
B. Disabling pop-ups
C. Secure boot configuration
D. Regular file defragmentation
Correct Answer: A – Mandatory vacation policies
Explanation: Mandatory time off can help uncover suspicious or hidden activities.
Incorrect Answers:
B. Pop-up controls are unrelated.
C. Secure boot protects startup integrity.
D. Defragmentation is a performance task.

Question 1413
Which of the following BEST reduces the attack surface of a system?
A. Installing more applications
B. Disabling unnecessary services
C. Increasing network bandwidth
D. Changing the display resolution
Correct Answer: B – Disabling unnecessary services
Explanation: Fewer services mean fewer potential vulnerabilities for attackers to
exploit.
Incorrect Answers:
A. More applications can increase the attack surface.
C. Bandwidth is unrelated to vulnerability.
D. Display settings don't affect system exposure.

Question 1414
Which of the following is the PRIMARY goal of network segmentation in security?
A. Improve Wi-Fi speed
B. Increase firewall throughput
C. Limit lateral movement of attackers
D. Enhance mobile device compatibility
Correct Answer: C – Limit lateral movement of attackers
Explanation: Segmentation isolates systems, making it harder for threats to spread.
Incorrect Answers:
A. Speed may be impacted, but it's not the purpose.
B. Firewall performance is separate.
D. Compatibility isn’t influenced by segmentation.

Question 1415
Which of the following is MOST effective for validating the authenticity of a software
download?
A. Antivirus scan
B. File compression
C. Comparing hash values
D. Checking file size
Correct Answer: C – Comparing hash values
Explanation: Hashes confirm that a file hasn’t been altered.
Incorrect Answers:
A. AV may miss modified files.
B. Compression doesn't ensure authenticity.
D. Size can match even if altered.

Question 1416
Which of the following is the BEST reason to use biometric authentication?
A. Lower cost than passwords
B. Elimination of usernames
C. Harder to forge than other forms of ID
D. Faster wireless speeds
Correct Answer: C – Harder to forge than other forms of ID
Explanation: Biometric traits are unique and difficult to replicate.
Incorrect Answers:
A. Biometric systems can be more expensive.
B. Usernames are still used.
D. Biometrics do not affect internet speed.

Question 1417
What is the PRIMARY reason to implement least functionality on servers?
A. Reduce licensing fees
B. Maximize memory use
C. Minimize potential vulnerabilities
D. Simplify reporting
Correct Answer: C – Minimize potential vulnerabilities
Explanation: Limiting functions reduces potential attack vectors.
Incorrect Answers:
A. Licensing is not the main concern.
B. Functionality doesn't maximize memory.
D. Reporting isn't affected.

Question 1418
Which of the following BEST supports a rapid and coordinated response to a cyber
incident?
A. Backup rotation policy
B. Security information and event management (SIEM)
C. Monthly team meetings
D. Hardware inventory list
Correct Answer: B – Security information and event management
(SIEM)
Explanation: SIEM tools aggregate and correlate data for faster incident detection
and response.
Incorrect Answers:
A. Backups are for recovery.
C. Meetings don’t offer real-time coordination.
D. Inventory is useful but not for incident response.

Question 1419
What is the PRIMARY purpose of vulnerability scanning?
A. To enforce password expiration
B. To identify known weaknesses in systems
C. To block spam emails
D. To upgrade hardware
Correct Answer: B – To identify known weaknesses in systems
Explanation: Vulnerability scans help detect flaws that need remediation.
Incorrect Answers:
A. Password policy is separate.
C. Email is unrelated.
D. Upgrades are based on performance, not scans.

Question 1420
Which of the following BEST ensures email communications remain confidential
during transmission?
A. Digital signatures
B. Email disclaimers
C. Transport layer encryption (TLS)
D. BCC fields
Correct Answer: C – Transport layer encryption (TLS)
Explanation: TLS encrypts data in transit, protecting email content.
Incorrect Answers:
A. Signatures verify identity, not encrypt content.
B. Disclaimers don’t protect data.
D. BCC hides addresses, not content.

Question 1421
Which of the following is the MOST important element of incident response?
A. Isolating affected systems
B. Restarting the network
C. Informing all employees
D. Replacing all hardware
Correct Answer: A – Isolating affected systems
Explanation: Isolation prevents further spread of the threat.
Incorrect Answers:
B. Restarting can delay containment.
C. Not all employees need immediate notice.
D. Hardware replacement isn’t always necessary.

Question 1422
Which of the following BEST mitigates the risk of unauthorized changes to
production systems?
A. Quarterly audits
B. Patch testing
C. Change control process
D. Firewall installation
Correct Answer: C – Change control process
Explanation: A formal process ensures all changes are reviewed and approved.
Incorrect Answers:
A. Audits are after-the-fact.
B. Testing helps, but control is broader.
D. Firewalls protect networks, not systems.

Question 1423
What is the PRIMARY risk of allowing users to have local administrator privileges?
A. Higher electricity costs
B. Delays in system updates
C. Installation of unauthorized software
D. Increased printer usage
Correct Answer: C – Installation of unauthorized software
Explanation: Admin privileges allow users to install unapproved and potentially
harmful software.
Incorrect Answers:
A. Power usage is minimal.
B. Updates can still occur.
D. Printing isn’t the core issue.

Question 1424
Which of the following BEST protects sensitive data on lost or stolen mobile devices?
A. Longer passwords
B. File compression
C. Mobile device encryption
D. Frequent reboots
Correct Answer: C – Mobile device encryption
Explanation: Encryption ensures that data is unreadable without credentials.
Incorrect Answers:
A. Passwords help, but encryption is stronger.
B. Compression doesn’t secure data.
D. Reboots don’t protect data.

Question 1425
Which of the following BEST supports the principle of separation of duties?
A. Implementing single sign-on
B. Assigning unique user IDs
C. Requiring two individuals to approve financial transactions
D. Using biometric authentication
Correct Answer: C – Requiring two individuals to approve financial
transactions
Explanation: Separation of duties divides responsibilities to reduce fraud risk.
Incorrect Answers:
A. SSO manages identity, not duties.
B. Unique IDs ensure traceability.
D. Biometrics confirm identity.

Question 1426
What is the BEST control to detect policy violations regarding internet use?
A. Email filters
B. Browser plug-ins
C. Web proxy logging and monitoring
D. Antivirus software
Correct Answer: C – Web proxy logging and monitoring
Explanation: Web proxies record internet activity for review.
Incorrect Answers:
A. Email doesn’t show browsing.
B. Plug-ins vary in reliability.
D. Antivirus doesn’t track web use.

Question 1427
Which of the following BEST prevents data exfiltration through removable media?
A. File compression tools
B. USB port disablement
C. Wi-Fi access control
D. Password strength enforcement
Correct Answer: B – USB port disablement
Explanation: Disabling ports blocks unauthorized data transfer via USB.
Incorrect Answers:
A. Compression doesn’t prevent access.
C. Wi-Fi controls don’t address USB.
D. Passwords protect login, not ports.

Question 1428
Which of the following is MOST important in securing APIs?
A. Using short URLs
B. Rate limiting and authentication
C. Hiding documentation
D. Enabling browser auto-complete
Correct Answer: B – Rate limiting and authentication
Explanation: These controls prevent abuse and unauthorized access.
Incorrect Answers:
A. URL length has no impact.
C. Docs may still be discovered.
D. Auto-complete poses security risks.

Question 1429
Which of the following BEST reduces the risk of phishing attacks?
A. Full disk encryption
B. Educating users on how to identify suspicious emails
C. Defragmenting hard drives
D. Enabling password reuse
Correct Answer: B – Educating users on how to identify suspicious
emails
Explanation: User training increases awareness and reduces click-throughs.
Incorrect Answers:
A. Disk encryption protects stored data.
C. Defragmentation affects performance.
D. Reuse increases risk.

Question 1430
Which of the following is MOST useful for detecting internal misuse of credentials?
A. Periodic backups
B. Biometric authentication
C. Security information and event management (SIEM)
D. Disk cleanup utilities
Correct Answer: C – Security information and event management
(SIEM)
Explanation: SIEM tools detect suspicious account activity through log analysis.
Incorrect Answers:
A. Backups don’t detect misuse.
B. Biometrics confirm identity, not behavior.
D. Cleanup tools manage storage, not access.

Question 1431
Which of the following BEST helps prevent unauthorized wireless access?
A. Lowering signal strength
B. Broadcasting the SSID
C. Using WPA3 encryption with strong passphrases
D. Increasing the router's range
Correct Answer: C – Using WPA3 encryption with strong passphrases
Explanation: WPA3 provides the latest and most secure encryption for wireless
communications.
Incorrect Answers:
A. Lowering signal can reduce exposure, but doesn’t ensure secure access.
B. Broadcasting SSID doesn’t provide security.
D. Increasing range can actually increase exposure.

Question 1432
Which of the following would BEST ensure that terminated users no longer have
access to company systems?
A. Monitoring VPN usage
B. Implementing password complexity rules
C. Conducting periodic access reviews
D. Automating account deactivation upon termination
Correct Answer: D – Automating account deactivation upon
termination
Explanation: Automated processes ensure immediate removal of access when
employment ends.
Incorrect Answers:
A. Monitoring may detect misuse, but not prevent access.
B. Complexity doesn’t revoke access.
C. Reviews are important but less immediate.

Question 1433
Which of the following is the PRIMARY reason to use digital certificates in secure
communications?
A. To provide backup functionality
B. To reduce spam emails
C. To verify identity and enable encryption
D. To speed up internet access
Correct Answer: C – To verify identity and enable encryption
Explanation: Certificates are used in PKI to validate identity and secure data
exchange.
Incorrect Answers:
A. Backup is unrelated.
B. Spam filtering is separate.
D. Speed is not impacted.

Question 1434
What is the BEST method to reduce risk from phishing emails?
A. Upgrading hard drives
B. Filtering suspicious messages before delivery
C. Using shared email accounts
D. Changing email server ports
Correct Answer: B – Filtering suspicious messages before delivery
Explanation: Email filters can block malicious content before it reaches users.
Incorrect Answers:
A. Hardware doesn’t help.
C. Shared accounts reduce accountability.
D. Port changes don’t stop phishing.

Question 1435
Which of the following is MOST effective in protecting web applications from
injection attacks?
A. Weekly vulnerability scans
B. Input validation and sanitization
C. Enforcing session timeouts
D. Using TLS encryption
Correct Answer: B – Input validation and sanitization
Explanation: Validating inputs prevents attackers from injecting malicious code.
Incorrect Answers:
A. Scans detect but don’t prevent.
C. Timeouts help session control.
D. TLS secures transport, not input handling.

Question 1436
Which of the following would BEST help detect insider threats?
A. Acceptable use policy
B. Web proxy caching
C. User behavior analytics (UBA)
D. Wireless encryption
Correct Answer: C – User behavior analytics (UBA)
Explanation: UBA detects abnormal behavior that may indicate insider risk.
Incorrect Answers:
A. Policies inform but don’t detect.
B. Caching improves performance, not monitoring.
D. Wireless encryption protects connections.

Question 1437
Which of the following is the PRIMARY objective of data classification?
A. To optimize network speed
B. To ensure appropriate data handling and protection
C. To comply with software licenses
D. To reduce power consumption
Correct Answer: B – To ensure appropriate data handling and
protection
Explanation: Classification guides how sensitive data should be managed and
secured.
Incorrect Answers:
A. Speed is not affected.
C. Licensing is unrelated.
D. Power usage is not influenced.

Question 1438
Which of the following would BEST prevent credential stuffing attacks?
A. Screen savers
B. Password reuse
C. CAPTCHA and rate limiting
D. Weekly system reboots
Correct Answer: C – CAPTCHA and rate limiting
Explanation: These controls help block automated login attempts with stolen
credentials.
Incorrect Answers:
A. Screen savers protect idle machines.
B. Reuse increases risk.
D. Reboots don’t block attacks.

Question 1439
Which of the following is MOST important to include in an incident response plan?
A. Employee bonus structure
B. Recovery point objectives
C. Chain of custody procedures
D. User interface wireframes
Correct Answer: C – Chain of custody procedures
Explanation: This ensures that evidence is handled properly during investigations.
Incorrect Answers:
A. Bonuses are unrelated.
B. RPOs relate to BCP/DRP.
D. UI design is not part of IR.

Question 1440
Which of the following would BEST prevent sensitive information from being printed
and left unattended?
A. Setting all printers to color mode
B. Using secure print release features
C. Encrypting network drives
D. Applying password policies
Correct Answer: B – Using secure print release features
Explanation: Print jobs are only released when the authorized user is present.
Incorrect Answers:
A. Color mode affects cost, not security.
C. Encryption protects digital storage.
D. Passwords protect logins, not printed docs.

Question 1441
What is the PRIMARY purpose of conducting a post-incident review?
A. To increase staff headcount
B. To reduce compliance reporting
C. To improve future response and identify lessons learned
D. To evaluate printer usage
Correct Answer: C – To improve future response and identify lessons
learned
Explanation: Reviews help refine plans and prevent similar incidents.
Incorrect Answers:
A. Headcount decisions are separate.
B. Compliance may benefit, but it's not the main goal.
D. Printer usage is irrelevant.

Question 1442
Which of the following would BEST support quick recovery from a ransomware
attack?
A. Offline, regularly tested backups
B. Email filtering
C. Disk defragmentation
D. Annual employee surveys
Correct Answer: A – Offline, regularly tested backups
Explanation: Offline backups are safe from encryption and can restore systems
quickly.
Incorrect Answers:
B. Email filters help prevent attacks, not recover.
C. Defrag is a performance tool.
D. Surveys are not relevant.

Question 1443
Which of the following is the PRIMARY risk of not encrypting sensitive data stored
on laptops?
A. High CPU usage
B. Increased update times
C. Unauthorized access if lost or stolen
D. User password fatigue
Correct Answer: C – Unauthorized access if lost or stolen
Explanation: Without encryption, data is exposed when physical devices are
compromised.
Incorrect Answers:
A. Encryption slightly affects performance but isn’t the risk.
B. Updates are unrelated.
D. Passwords are managed separately.

Question 1444
What is the PRIMARY objective of enforcing acceptable use policies?
A. To increase internet speed
B. To ensure responsible use of IT resources
C. To reduce energy consumption
D. To make users memorize IP addresses
Correct Answer: B – To ensure responsible use of IT resources
Explanation: Acceptable use policies define what users can and cannot do on
corporate systems.
Incorrect Answers:
A. Speed is not the goal.
C. Energy is a different concern.
D. IP memorization is irrelevant.

Question 1445
Which of the following BEST detects file tampering or unauthorized changes?
A. File integrity monitoring
B. Role-based access control
C. Password rotation
D. Data classification
Correct Answer: A – File integrity monitoring
Explanation: FIM tools alert on modifications to critical files.
Incorrect Answers:
B. RBAC limits access but doesn’t detect changes.
C. Password changes protect access, not file content.
D. Classification informs handling, not detection.

Question 1446
Which of the following BEST supports data confidentiality in cloud environments?
A. Hardware redundancy
B. Auto-scaling
C. Data encryption in transit and at rest
D. API versioning
Correct Answer: C – Data encryption in transit and at rest
Explanation: Encryption protects sensitive data from unauthorized access.
Incorrect Answers:
A. Redundancy supports availability.
B. Auto-scaling improves performance.
D. API versioning manages development.

Question 1447
Which of the following BEST ensures that patches are applied consistently across an
enterprise?
A. Manual installation by local admins
B. Scheduled weekly reboots
C. Centralized patch management system
D. User-initiated update approvals
Correct Answer: C – Centralized patch management system
Explanation: Centralization enforces uniform and timely deployment.
Incorrect Answers:
A. Manual installs are inconsistent.
B. Reboots don’t apply patches.
D. User approval introduces delays and gaps.

Question 1448
Which of the following BEST prevents unauthorized external access to internal
systems?
A. Web content filtering
B. Firewalls with properly configured rules
C. Data classification
D. Patch logging
Correct Answer: B – Firewalls with properly configured rules
Explanation: Firewalls enforce network boundaries and control access.
Incorrect Answers:
A. Filtering limits content, not access.
C. Classification affects handling, not access.
D. Logs track actions but don’t block.

Question 1449
What is the PRIMARY purpose of multifactor authentication (MFA)?
A. To log users into multiple systems
B. To speed up authentication
C. To provide additional security beyond passwords
D. To allow anonymous access
Correct Answer: C – To provide additional security beyond passwords
Explanation: MFA adds a second layer of authentication, reducing risk of
unauthorized access.
Incorrect Answers:
A. SSO provides that feature.
B. MFA may slow down login slightly.
D. Anonymous access is the opposite of secure.

Question 1450
Which of the following BEST ensures that removable media do not introduce
malware into an organization?
A. Defragmenting the drive
B. Using write-protection switches
C. Scanning media with antivirus before use
D. Formatting devices after each use
Correct Answer: C – Scanning media with antivirus before use
Explanation: Scanning helps detect and block malware before it enters the network.
Incorrect Answers:
A. Defragmenting improves performance, not security.
B. Write-protection prevents writing, not reading.
D. Formatting deletes files, not malware in firmware.

Question 1451
Which of the following BEST reduces the risk of unauthorized wireless network
access?
A. Enabling SSID broadcast
B. Using WEP encryption
C. Implementing WPA3 with strong authentication
D. Assigning static IP addresses
Correct Answer: C – Implementing WPA3 with strong authentication
Explanation: WPA3 is the most secure wireless encryption standard currently
available.
Incorrect Answers:
A. SSID broadcasting has no security benefit.
B. WEP is outdated and easily broken.
D. Static IPs don’t improve wireless security.

Question 1452
Which of the following BEST mitigates the risk of malware introduced through
email?
A. Implementing a URL shortening service
B. Disabling browser auto-fill
C. Using an email filter with attachment scanning
D. Archiving all incoming mail
Correct Answer: C – Using an email filter with attachment scanning
Explanation: Filtering and scanning attachments prevent malicious files from
reaching users.
Incorrect Answers:
A. URL shortening can mask malicious links.
B. Auto-fill is a browser setting, not email protection.
D. Archiving does not prevent threats.

Question 1453
Which of the following is the PRIMARY benefit of security patching?
A. Enhancing user interface design
B. Fixing known vulnerabilities
C. Improving hardware performance
D. Reducing employee training time
Correct Answer: B – Fixing known vulnerabilities
Explanation: Security patches address software flaws that can be exploited.
Incorrect Answers:
A. UI design is unrelated.
C. Patches affect software, not hardware.
D. Training is not impacted by patching.

Question 1454
Which of the following is the PRIMARY purpose of an intrusion detection system
(IDS)?
A. To block malicious traffic
B. To monitor and alert on suspicious activity
C. To encrypt sensitive data
D. To control user access
Correct Answer: B – To monitor and alert on suspicious activity
Explanation: IDS systems detect and alert on anomalies or known attack patterns.
Incorrect Answers:
A. Blocking is done by IPS, not IDS.
C. IDS does not encrypt.
D. Access is controlled by IAM tools.
Question 1455
What is the MOST effective way to ensure sensitive data is not accessed by
unauthorized personnel?
A. Logging all network traffic
B. Performing full system backups
C. Enforcing access control policies
D. Scheduling regular team meetings
Correct Answer: C – Enforcing access control policies
Explanation: Access controls restrict data access to authorized users only.
Incorrect Answers:
A. Logs help with detection but not prevention.
B. Backups are for recovery.
D. Meetings don’t enforce security.

Question 1456
Which of the following is MOST important for ensuring endpoint protection across
remote workers?
A. Mandating low-resolution video conferencing
B. Allowing users to disable antivirus
C. Centralized endpoint detection and response (EDR) tools
D. Requiring email archiving
Correct Answer: C – Centralized endpoint detection and response
(EDR) tools
Explanation: EDR allows consistent security monitoring and response for all
endpoints.
Incorrect Answers:
A. Video resolution doesn’t affect security.
B. Disabling antivirus increases risk.
D. Email archiving is not endpoint protection.

Question 1457
Which of the following would BEST help mitigate the risk of social engineering
attacks?
A. Multifactor authentication
B. VPN tunneling
C. Employee awareness training
D. Frequent data backups
Correct Answer: C – Employee awareness training
Explanation: Training helps users recognize and resist social engineering tactics.
Incorrect Answers:
A. MFA protects logins, not behavior.
B. VPNs secure connections.
D. Backups don’t prevent manipulation.

Question 1458
What is the PRIMARY reason to require logging of privileged user activities?
A. To optimize system performance
B. To reduce licensing costs
C. To ensure accountability and support forensic investigations
D. To provide user support
Correct Answer: C – To ensure accountability and support forensic
investigations
Explanation: Logging privileged activities allows tracking and investigation of
critical actions.
Incorrect Answers:
A. Logs don’t affect performance.
B. Licensing is unrelated.
D. Support is not the objective.

Question 1459
Which of the following BEST ensures that system backups are usable?
A. Encrypting all backup files
B. Archiving backups quarterly
C. Conducting regular backup restore tests
D. Reducing the number of backup locations
Correct Answer: C – Conducting regular backup restore tests
Explanation: Restore testing verifies that backups can be successfully recovered.
Incorrect Answers:
A. Encryption protects but doesn’t verify usability.
B. Archiving alone is insufficient.
D. Fewer locations may reduce redundancy.

Question 1460
Which of the following is the BEST control to reduce the risk of data loss when
employees use personal devices for work?
A. Increasing mobile data limits
B. Allowing SMS authentication
C. Implementing mobile device management (MDM)
D. Blocking public Wi-Fi usage
Correct Answer: C – Implementing mobile device management
(MDM)
Explanation: MDM enforces policies and allows data control on personal devices.
Incorrect Answers:
A. Data limits are unrelated.
B. SMS is a weak control.
D. Blocking Wi-Fi is impractical and not comprehensive.

Question 1461
Which of the following is MOST important when configuring cloud storage for
sensitive files?
A. Enabling public access
B. Disabling file compression
C. Applying encryption and access control
D. Increasing available bandwidth
Correct Answer: C – Applying encryption and access control
Explanation: These measures prevent unauthorized access and protect
confidentiality.
Incorrect Answers:
A. Public access increases risk.
B. Compression is unrelated to security.
D. Bandwidth affects speed, not safety.

Question 1462
What is the PRIMARY risk of allowing shared user accounts?
A. Increased password reset requests
B. Difficulty in assigning administrative rights
C. Inability to trace individual user actions
D. Slower software updates
Correct Answer: C – Inability to trace individual user actions
Explanation: Shared accounts eliminate accountability, making audits and forensics
difficult.
Incorrect Answers:
A. Resets are a minor concern.
B. Admin rights can still be assigned.
D. Updates are unaffected.

Question 1463
Which of the following is the PRIMARY benefit of a vulnerability management
program?
A. Reducing help desk workload
B. Improving marketing strategies
C. Identifying and remediating security weaknesses
D. Increasing employee morale
Correct Answer: C – Identifying and remediating security weaknesses
Explanation: These programs find flaws and guide fixes to reduce risk.
Incorrect Answers:
A. Help desk impact is indirect.
B. Marketing is unrelated.
D. Morale may improve, but it’s not the purpose.

Question 1464
Which of the following BEST supports the enforcement of security policies across all
users?
A. Password complexity
B. Security awareness training
C. Centralized group policy objects (GPOs)
D. Screen saver timers
Correct Answer: C – Centralized group policy objects (GPOs)
Explanation: GPOs allow administrators to enforce security settings across systems.
Incorrect Answers:
A. Complexity is one aspect only.
B. Training informs but doesn’t enforce.
D. Timers are a small part of policy.

Question 1465
What is the PRIMARY reason to implement a secure software development lifecycle
(SDLC)?
A. To improve marketing time
B. To reduce electricity costs
C. To integrate security into each phase of development
D. To increase file sizes
Correct Answer: C – To integrate security into each phase of
development
Explanation: Secure SDLC ensures security is built in, not added later.
Incorrect Answers:
A. Marketing is unrelated.
B. Energy savings aren’t the goal.
D. File size isn’t impacted.

Question 1466
Which of the following would BEST help limit the impact of a successful ransomware
attack?
A. Disk defragmentation
B. Uninterrupted power supply
C. Segmented network architecture
D. Enabling file sharing
Correct Answer: C – Segmented network architecture
Explanation: Segmentation can contain the spread of ransomware within isolated
zones.
Incorrect Answers:
A. Defragmentation is performance-related.
B. Power supply doesn’t affect malware.
D. Sharing can increase exposure.

Question 1467
Which of the following BEST detects unauthorized wireless access points?
A. SIEM dashboards
B. Site surveys and wireless scans
C. Web content filters
D. Log retention policies
Correct Answer: B – Site surveys and wireless scans
Explanation: These help identify rogue access points broadcasting in the area.
Incorrect Answers:
A. SIEM helps detect activity, not signals.
C. Filters monitor web access, not Wi-Fi.
D. Retention doesn’t detect threats.

Question 1468
What is the PRIMARY function of access control lists (ACLs) on firewalls?
A. Encrypting files
B. Controlling packet flow based on rules
C. Generating compliance reports
D. Balancing internet traffic
Correct Answer: B – Controlling packet flow based on rules
Explanation: ACLs allow or deny traffic based on IP, port, or protocol.
Incorrect Answers:
A. Encryption is a separate function.
C. Reports are a secondary feature.
D. Load balancing is handled differently.

Question 1469
Which of the following BEST protects against session hijacking?
A. Screen resolution management
B. Session timeout and re-authentication
C. Shared credentials
D. VPN bandwidth monitoring
Correct Answer: B – Session timeout and re-authentication
Explanation: These controls limit the window of opportunity for session hijacking.
Incorrect Answers:
A. Resolution settings don’t affect security.
C. Sharing credentials increases risk.
D. VPN monitoring doesn’t control sessions.

Question 1470
Which of the following is the BEST way to detect phishing websites?
A. Updating the operating system
B. Using browser-based anti-phishing filters
C. Enabling pop-ups
D. Typing long URLs manually
Correct Answer: B – Using browser-based anti-phishing filters
Explanation: These filters identify and block known phishing domains.
Incorrect Answers:
A. OS updates don’t identify phishing.
C. Pop-ups may host malicious content.
D. Manual typing may help, but isn’t scalable.

Question 1471
Which of the following BEST supports secure remote access for employees?
A. Screen resolution adjustment
B. Virtual Private Network (VPN) with multifactor authentication
C. Shared administrator accounts
D. Browser auto-fill
Correct Answer: B – Virtual Private Network (VPN) with multifactor
authentication
Explanation: A VPN encrypts connections, and MFA adds an extra layer of
identity verification.
Incorrect Answers:
A. Resolution settings have no effect on security.
C. Shared accounts reduce accountability.
D. Auto-fill may expose credentials.

Question 1472
Which of the following BEST ensures file integrity over time?
A. Disk defragmentation
B. Antivirus software
C. Checksum verification
D. Using long filenames
Correct Answer: C – Checksum verification
Explanation: Checksums detect changes by comparing file hashes.
Incorrect Answers:
A. Defragmentation affects performance, not integrity.
B. Antivirus detects malware, not file changes.
D. Filenames don’t ensure file contents remain unchanged.

Question 1473
Which of the following BEST protects sensitive information on a lost or stolen USB
drive?
A. Password-protected folders
B. Using proprietary file extensions
C. Full drive encryption
D. High-speed formatting
Correct Answer: C – Full drive encryption
Explanation: Encryption ensures data cannot be accessed without a key.
Incorrect Answers:
A. Folder passwords can be bypassed.
B. File extensions don’t protect content.
D. Formatting erases but doesn’t protect.

Question 1474
What is the PRIMARY reason to implement change control procedures?
A. To track employee behavior
B. To prevent unauthorized or untested modifications
C. To increase processing speed
D. To manage antivirus signatures
Correct Answer: B – To prevent unauthorized or untested
modifications
Explanation: Change control ensures that changes are reviewed, approved, and
properly tested.
Incorrect Answers:
A. Behavior is monitored via logging.
C. Performance is not the main reason.
D. Antivirus is handled separately.

Question 1475
Which of the following BEST reduces the risk of data interception in a public Wi-Fi
environment?
A. Using public DNS
B. Disabling screen savers
C. Connecting through a VPN
D. Installing more memory
Correct Answer: C – Connecting through a VPN
Explanation: A VPN encrypts traffic, protecting it from interception.
Incorrect Answers:
A. DNS choice doesn’t encrypt data.
B. Screen savers offer no network protection.
D. Memory upgrades don’t improve security.

Question 1476
Which of the following BEST ensures secure data disposal?
A. Deleting files
B. Formatting the drive
C. Using data-wiping or physical destruction methods
D. Compressing the files
Correct Answer: C – Using data-wiping or physical destruction
methods
Explanation: These methods ensure that data cannot be recovered.
Incorrect Answers:
A. Deletion only removes file pointers.
B. Formatting can leave data recoverable.
D. Compression does not erase data.

Question 1477
What is the PRIMARY function of a digital signature?
A. Data compression
B. Confirming identity and integrity of a message
C. Enhancing screen readability
D. Managing USB devices
Correct Answer: B – Confirming identity and integrity of a message
Explanation: Digital signatures verify sender identity and message tampering.
Incorrect Answers:
A. Compression is unrelated.
C. Screen readability is UI-related.
D. USB control is different.

Question 1478
Which of the following BEST ensures employees follow proper data handling
procedures?
A. Installing additional memory
B. Implementing user behavior analytics
C. Conducting regular security awareness training
D. Replacing all outdated printers
Correct Answer: C – Conducting regular security awareness training
Explanation: Training reinforces proper behavior and practices.
Incorrect Answers:
A. Memory is unrelated.
B. UBA detects issues but doesn't prevent them.
D. Printers are not directly related.

Question 1479
Which of the following is the PRIMARY purpose of a firewall?
A. Monitor employee attendance
B. Filter and control incoming and outgoing network traffic
C. Enhance audio quality
D. Archive log files
Correct Answer: B – Filter and control incoming and outgoing
network traffic
Explanation: Firewalls enforce network traffic policies.
Incorrect Answers:
A. HR tools manage attendance.
C. Audio quality is unrelated.
D. Logs are stored elsewhere.

Question 1480
Which of the following BEST ensures that only approved applications run on
organizational devices?
A. VPN tunneling
B. Application whitelisting
C. Network address translation
D. Disk cleanup scheduling
Correct Answer: B – Application whitelisting
Explanation: Whitelisting allows only pre-approved software to execute.
Incorrect Answers:
A. VPN secures communication.
C. NAT masks IPs.
D. Cleanup improves performance.

Question 1481
Which of the following is the PRIMARY purpose of data classification?
A. To determine file naming conventions
B. To establish handling and protection guidelines
C. To compress archived logs
D. To support system performance testing
Correct Answer: B – To establish handling and protection guidelines
Explanation: Classification defines how sensitive data should be treated.
Incorrect Answers:
A. Naming is administrative.
C. Compression is unrelated.
D. Performance testing is technical.

Question 1482
Which of the following would MOST likely indicate a successful phishing attempt?
A. Multiple failed login attempts
B. Receipt of a suspicious email
C. An employee providing login credentials through a fake site
D. Antivirus update failure
Correct Answer: C – An employee providing login credentials through
a fake site
Explanation: Providing credentials indicates a phishing compromise.
Incorrect Answers:
A. Failed logins are indicative, not definitive.
B. Receipt alone isn’t success.
D. AV updates are unrelated.

Question 1483
Which of the following BEST protects data in the event of a natural disaster?
A. Physical access controls
B. Password rotation policies
C. Offsite or cloud-based backups
D. File system defragmentation
Correct Answer: C – Offsite or cloud-based backups
Explanation: Offsite storage ensures data recovery even if local systems are
destroyed.
Incorrect Answers:
A. Access control protects from people, not disasters.
B. Passwords protect access, not data availability.
D. Defrag is for performance.

Question 1484
What is the PRIMARY risk of weak passwords?
A. Increased hardware failure
B. Unauthorized system access
C. Slower network performance
D. Increased power consumption
Correct Answer: B – Unauthorized system access
Explanation: Weak passwords are easy to guess or brute-force.
Incorrect Answers:
A, C, D: Not related to password strength.

Question 1485
Which of the following would BEST limit the damage caused by a compromised
administrative account?
A. Frequent password changes
B. Full-disk encryption
C. Role-based access control and privilege limitation
D. Use of long usernames
Correct Answer: C – Role-based access control and privilege limitation
Explanation: RBAC and least privilege reduce impact of a breach.
Incorrect Answers:
A. Frequency helps, but privilege control is more effective.
B. Encryption protects data, not account misuse.
D. Username length doesn’t stop abuse.

Question 1486
Which of the following is the PRIMARY function of a Security Information and
Event Management (SIEM) system?
A. Data backup
B. Log correlation and real-time alerting
C. Print job management
D. Disk optimization
Correct Answer: B – Log correlation and real-time alerting
Explanation: SIEM tools centralize security data and alert on anomalies.
Incorrect Answers:
A. Backups are separate.
C. Printing is unrelated.
D. Disk tools are different.

Question 1487
Which of the following BEST helps enforce secure password practices?
A. Monitoring internet activity
B. Disabling clipboard functions
C. Implementing a password policy with complexity and history rules
D. Encouraging password reuse
Correct Answer: C – Implementing a password policy with complexity
and history rules
Explanation: Policies define strong password requirements and prevent reuse.
Incorrect Answers:
A, B, D: Don’t enforce password strength.

Question 1488
Which of the following would MOST effectively prevent unauthorized software
installation?
A. Hardware firewalls
B. Software updates
C. Application whitelisting and removing admin privileges
D. Browser extensions
Correct Answer: C – Application whitelisting and removing admin
privileges
Explanation: These controls stop users from installing unauthorized apps.
Incorrect Answers:
A. Firewalls don’t restrict software installs.
B. Updates fix vulnerabilities.
D. Extensions don’t control installs.

Question 1489
Which of the following is the PRIMARY risk of not regularly updating antivirus
definitions?
A. Higher electricity usage
B. Inability to open email attachments
C. Exposure to new malware threats
D. Excessive log generation
Correct Answer: C – Exposure to new malware threats
Explanation: Without updates, new viruses can bypass detection.
Incorrect Answers:
A, B, D: Not directly related to virus signatures.

Question 1490
Which of the following BEST prevents sensitive data from being transmitted
unencrypted across a network?
A. Port filtering
B. Data loss prevention (DLP)
C. Reboot scheduling
D. Shared user accounts
Correct Answer: B – Data loss prevention (DLP)
Explanation: DLP monitors and blocks unencrypted sensitive data transfers.
Incorrect Answers:
A. Port filtering manages traffic flow.
C. Reboots don’t secure data.
D. Shared accounts are a separate risk.

Question 1491
Which of the following BEST helps reduce the risk of data breaches from lost mobile
devices?
A. Installing productivity apps
B. Using a mobile device management (MDM) solution with encryption enforcement
C. Disabling camera access
D. Restricting access to Wi-Fi
Correct Answer: B – Using a mobile device management (MDM)
solution with encryption enforcement
Explanation: MDM can enforce security policies like encryption and remote wipe.
Incorrect Answers:
A. Apps don’t secure data.
C. Cameras are not the threat.
D. Wi-Fi restriction is not sufficient.

Question 1492
What is the PRIMARY reason to implement automated log analysis?
A. Reduce storage costs
B. Improve internet speed
C. Detect anomalies and potential security incidents
D. Generate user passwords
Correct Answer: C – Detect anomalies and potential security incidents
Explanation: Automated tools help identify patterns that indicate malicious
activity.
Incorrect Answers:
A. Storage may increase.
B. Internet speed is unrelated.
D. Passwords are not generated from logs.

Question 1493
Which of the following BEST limits access to sensitive internal resources?
A. Shared credentials
B. Network address translation
C. Role-based access control (RBAC)
D. Open Wi-Fi policies
Correct Answer: C – Role-based access control (RBAC)
Explanation: RBAC ensures users can only access what they need.
Incorrect Answers:
A. Shared credentials increase risk.
B. NAT hides IPs but doesn’t control access.
D. Open Wi-Fi can expose resources.

Question 1494
Which of the following is MOST effective in detecting unauthorized system
configuration changes?
A. Disk cleanup utilities
B. File integrity monitoring
C. Antivirus scanning
D. Password complexity rules
Correct Answer: B – File integrity monitoring
Explanation: FIM alerts when protected system files are modified.
Incorrect Answers:
A. Cleanup tools don’t detect changes.
C. Antivirus focuses on malware.
D. Passwords protect access, not files.

Question 1495
Which of the following would BEST protect data in cloud storage from unauthorized
access?
A. DNS filtering
B. Complex file names
C. Strong encryption and access controls
D. Periodic password reuse
Correct Answer: C – Strong encryption and access controls
Explanation: These ensure only authorized users can access cloud data.
Incorrect Answers:
A. DNS affects browsing.
B. Names don’t secure content.
D. Reusing passwords increases risk.

Question 1496
Which of the following is the PRIMARY purpose of endpoint protection platforms
(EPP)?
A. Restricting application access
B. Monitoring power consumption
C. Detecting and responding to malware on end-user devices
D. Managing printer queues
Correct Answer: C – Detecting and responding to malware on end-
user devices
Explanation: EPP protects workstations and laptops from threats.
Incorrect Answers:
A. Access is part of broader IAM.
B. Power use isn’t a focus.
D. Printer management is unrelated.

Question 1497
Which of the following BEST describes defense in depth?
A. Using only one strong firewall
B. Encrypting all traffic on one layer
C. Applying multiple layers of security controls
D. Focusing only on user education
Correct Answer: C – Applying multiple layers of security controls
Explanation: Defense in depth protects by layering people, processes, and
technology.
Incorrect Answers:
A. One layer isn’t sufficient.
B. Encryption is one component.
D. Education is important but not comprehensive.

Question 1498
Which of the following would BEST prevent a ransomware attack from spreading?
A. Conducting exit interviews
B. Segmenting the network
C. Changing IP addresses
D. Sharing login credentials
Correct Answer: B – Segmenting the network
Explanation: Segmentation limits the ability of malware to move laterally.
Incorrect Answers:
A. Interviews don’t stop malware.
C. IP changes alone are not sufficient.
D. Sharing credentials increases risk.

Question 1499
Which of the following BEST protects against unauthorized database access?
A. Disabling screen savers
B. Using database activity monitoring tools
C. Increasing fan speed
D. Formatting the storage drive
Correct Answer: B – Using database activity monitoring tools
Explanation: These tools help detect abnormal and unauthorized queries.
Incorrect Answers:
A. Screen savers secure sessions, not databases.
C. Hardware cooling doesn’t secure data.
D. Formatting erases everything.

Question 1500
Which of the following is the MOST effective way to ensure only necessary network
services are running?
A. Running full disk encryption
B. Conducting regular service reviews and disabling unused ports/services
C. Using a password manager
D. Allowing all traffic by default
Correct Answer: B – Conducting regular service reviews and disabling
unused ports/services
Explanation: This minimizes attack surfaces and reduces unnecessary exposure.
Incorrect Answers:
A. Encryption protects data, not services.
C. Password managers help credentials, not services.
D. Default allow policies are insecure.

Question 1501
Which of the following BEST reduces the impact of credential theft?
A. Increasing bandwidth
B. Implementing multifactor authentication
C. Defragmenting the system drive
D. Resetting printers
Correct Answer: B – Implementing multifactor authentication
Explanation: MFA ensures that stolen credentials alone are not enough.
Incorrect Answers:
A. Bandwidth is unrelated.
C. Defrag affects performance.
D. Printer resets don’t help.

Question 1502
Which of the following is the PRIMARY goal of an access control policy?
A. To encrypt all stored data
B. To provide users with full system control
C. To limit access based on need and role
D. To track internet browsing history
Correct Answer: C – To limit access based on need and role
Explanation: Access should be restricted to what’s necessary.
Incorrect Answers:
A. Encryption is part of a data protection policy.
B. Full access increases risk.
D. Browsing history is unrelated.

Question 1503
Which of the following is MOST helpful in identifying abnormal outbound data
flows?
A. DNS blacklisting
B. Network behavior analysis
C. Application patching
D. Auto-login
Correct Answer: B – Network behavior analysis
Explanation: This detects deviations from normal patterns that might indicate
exfiltration.
Incorrect Answers:
A. DNS blocks domain access, not patterns.
C. Patching prevents exploits, not detects them.
D. Auto-login increases risk.

Question 1504
Which of the following would BEST help enforce separation of duties?
A. Shared credentials
B. System auto-updates
C. Role-based access control
D. Free Wi-Fi access
Correct Answer: C – Role-based access control
Explanation: RBAC assigns permissions based on roles, supporting operational
segregation.
Incorrect Answers:
A. Sharing credentials defeats the purpose.
B. Updates don’t segregate duties.
D. Wi-Fi access is irrelevant.

Question 1505
What is the PRIMARY reason to use secure coding practices?
A. To avoid lengthy documentation
B. To simplify UI design
C. To reduce vulnerabilities in applications
D. To improve graphics rendering
Correct Answer: C – To reduce vulnerabilities in applications
Explanation: Secure coding prevents flaws that attackers might exploit.
Incorrect Answers:
A, B, D: Not security-related.

Question 1506
Which of the following BEST ensures backups are not compromised by ransomware?
A. Storing backups in the same directory
B. Keeping backups on network shares
C. Maintaining offline and immutable backups
D. Using file compression
Correct Answer: C – Maintaining offline and immutable backups
Explanation: Offline, unchangeable backups are safe from ransomware encryption.
Incorrect Answers:
A, B: Network-accessible backups can be encrypted by ransomware.
D. Compression doesn’t stop malware.

Question 1507
What is the BEST indicator of a successful phishing awareness program?
A. Number of emails delivered
B. Number of employees using VPNs
C. Percentage of employees who report phishing attempts
D. Percentage of unread emails
Correct Answer: C – Percentage of employees who report phishing
attempts
Explanation: Reporting phishing shows users recognize and respond properly.
Incorrect Answers:
A. Delivery is not a success metric.
B. VPN use is unrelated.
D. Unread emails don’t indicate awareness.

Question 1508
Which of the following would MOST effectively prevent users from accessing
malicious websites?
A. Installing screen savers
B. Content filtering via DNS or proxy
C. Allowing all HTTPS traffic
D. Using removable media
Correct Answer: B – Content filtering via DNS or proxy
Explanation: Filtering controls access to known harmful sites.
Incorrect Answers:
A. Screen savers are not relevant.
C. Allowing all traffic increases risk.
D. Removable media is a separate risk.

Question 1509
Which of the following is MOST critical when securing application programming
interfaces (APIs)?
A. Using pop-ups for access
B. Removing all authentication
C. Implementing authentication, authorization, and rate limiting
D. Changing port numbers daily
Correct Answer: C – Implementing authentication, authorization, and
rate limiting
Explanation: These controls prevent misuse and overuse of APIs.
Incorrect Answers:
A. Pop-ups do not secure APIs.
B. No authentication is insecure.
D. Port changes are not effective alone.

Question 1510
Which of the following BEST supports secure software delivery?
A. Disabling email for developers
B. Posting links on social media
C. Signing code with digital certificates
D. Increasing download sizes
Correct Answer: C – Signing code with digital certificates
Explanation: Code signing confirms authenticity and integrity.
Incorrect Answers:
A. Email is useful.
B. Social media is not secure distribution.
D. Size does not ensure safety.

Question 1511
Which of the following BEST mitigates the risk of unauthorized access to sensitive
data during transmission?
A. File compression
B. Use of a secure protocol such as HTTPS
C. Data masking
D. Strong password policies
Correct Answer: B – Use of a secure protocol such as HTTPS
Explanation: HTTPS encrypts data in transit, ensuring confidentiality and
integrity.
Incorrect Answers:
A. Compression reduces size but doesn’t secure data.
C. Masking is for display, not transmission.
D. Passwords protect access, not transmission.

Question 1512
Which of the following is the MOST effective way to ensure that mobile devices used
by employees comply with organizational security policies?
A. Require daily reboots
B. Disable GPS features
C. Implement a mobile device management (MDM) solution
D. Block access to social media
Correct Answer: C – Implement a mobile device management (MDM)
solution
Explanation: MDM enforces security configurations, encryption, and app controls
on mobile devices.
Incorrect Answers:
A. Rebooting doesn’t enforce policy.
B. GPS is unrelated to policy enforcement.
D. Blocking sites doesn’t ensure full compliance.

Question 1513
Which of the following is the PRIMARY risk associated with weak change control
procedures?
A. Poor user interface design
B. Unauthorized and untested changes to production systems
C. High employee turnover
D. Slow internet speeds
Correct Answer: B – Unauthorized and untested changes to
production systems
Explanation: Inadequate change controls can lead to disruptions, vulnerabilities, or
compliance issues.
Incorrect Answers:
A, C, D: Not directly related to change control risk.

Question 1514
What is the PRIMARY purpose of implementing a data retention policy?
A. To reduce network traffic
B. To control the cost of mobile devices
C. To ensure compliance with regulatory and legal requirements
D. To increase system boot speed
Correct Answer: C – To ensure compliance with regulatory and legal
requirements
Explanation: Retention policies dictate how long data must be preserved to meet
legal obligations.
Incorrect Answers:
A. Traffic is not affected.
B. Device cost is irrelevant.
D. Boot speed is unrelated.

Question 1515
Which of the following BEST reduces the risk of unauthorized access through
unattended workstations?
A. Regular antivirus updates
B. Use of screensavers with password protection
C. Assigning strong usernames
D. Increasing desktop resolution
Correct Answer: B – Use of screensavers with password protection
Explanation: This prevents access when a user is away from their device.
Incorrect Answers:
A. AV protects against malware.
C. Usernames don’t block access.
D. Resolution has no effect.

Question 1516
What is the BEST control to detect unauthorized elevation of user privileges?
A. Automated system patching
B. Logging and monitoring of access rights changes
C. User interface restrictions
D. Disk cleanup utilities
Correct Answer: B – Logging and monitoring of access rights changes
Explanation: Logging privilege changes enables audit and detection of misuse.
Incorrect Answers:
A. Patching fixes vulnerabilities.
C. UI restrictions don’t detect.
D. Cleanup tools are unrelated.

Question 1517
Which of the following BEST reduces the likelihood of a successful brute-force attack
on user passwords?
A. Allowing password reuse
B. Setting short password expiration
C. Implementing account lockout after failed attempts
D. Using simple dictionary-based passwords
Correct Answer: C – Implementing account lockout after failed
attempts
Explanation: Lockouts limit repeated unauthorized login attempts.
Incorrect Answers:
A, D: These increase risk.
B. Expiration timing doesn’t prevent brute-force attempts.

Question 1518
Which of the following is MOST critical when evaluating the effectiveness of an
organization’s incident response capability?
A. Number of incidents in the past year
B. Number of employees trained
C. Average time to detect and contain incidents
D. Volume of internet traffic
Correct Answer: C – Average time to detect and contain incidents
Explanation: Speed of detection and containment is a key success factor in IR.
Incorrect Answers:
A. Frequency may vary.
B. Training helps but is not the metric.
D. Traffic volume is unrelated.

Question 1519
Which of the following is MOST effective in preventing unauthorized access to
physical server rooms?
A. Alarm systems
B. Electronic badge access with biometric verification
C. Video surveillance
D. Visitor sign-in sheets
Correct Answer: B – Electronic badge access with biometric
verification
Explanation: Combining electronic access and biometrics offers strong physical
access control.
Incorrect Answers:
A. Alarms detect but don’t restrict.
C. Surveillance is reactive.
D. Sign-in is for record-keeping.

Question 1520
Which of the following BEST supports the implementation of least privilege access?
A. Use of default administrator accounts
B. Assigning full access to all employees
C. Regular review of user permissions and role assignments
D. Creating shared accounts for teams
Correct Answer: C – Regular review of user permissions and role
assignments
Explanation: Reviews ensure that users have only the access necessary for their
roles.
Incorrect Answers:
A. Default admin use increases risk.
B. Full access violates least privilege.
D. Shared accounts reduce accountability.

Question 1521
Which of the following is MOST effective in ensuring software is securely developed?
A. Hiring junior developers
B. Limiting internet access
C. Incorporating security checkpoints throughout the software development lifecycle
(SDLC)
D. Using open-source development platforms
Correct Answer: C – Incorporating security checkpoints throughout
the software development lifecycle (SDLC)
Explanation: Secure SDLC ensures risks are addressed early and continuously.
Incorrect Answers:
A. Experience level doesn’t guarantee secure code.
B. Internet access is unrelated.
D. Open-source tools require their own scrutiny.

Question 1522
What is the PRIMARY purpose of risk assessment in an IT environment?
A. To estimate the cost of new systems
B. To identify and prioritize threats and vulnerabilities
C. To train help desk staff
D. To determine software popularity
Correct Answer: B – To identify and prioritize threats and
vulnerabilities
Explanation: Risk assessment guides security investments and decisions.
Incorrect Answers:
A. Cost estimation is part of budgeting.
C, D: Not related to risk analysis.
Question 1523
Which of the following BEST prevents sensitive printed documents from being
viewed by unauthorized individuals?
A. Installing color printers
B. Using networked storage
C. Requiring PIN-based secure printing
D. Upgrading RAM on printers
Correct Answer: C – Requiring PIN-based secure printing
Explanation: Secure print ensures the user must authenticate before printing.
Incorrect Answers:
A. Color has no security value.
B. Storage is digital.
D. RAM affects performance.

Question 1524
Which of the following BEST demonstrates management commitment to information
security?
A. Publishing software manuals
B. Assigning budget and resources for security initiatives
C. Allowing flexible working hours
D. Hiring social media consultants
Correct Answer: B – Assigning budget and resources for security
initiatives
Explanation: Budget and resource allocation show prioritization of security.
Incorrect Answers:
A, C, D: Not security focused.

Question 1525
What is the PRIMARY risk of allowing remote access to internal systems without
proper controls?
A. Slower connection speeds
B. Greater network congestion
C. Increased exposure to external threats
D. Inconsistent keyboard layouts
Correct Answer: C – Increased exposure to external threats
Explanation: Uncontrolled remote access creates new attack vectors.
Incorrect Answers:
A, B, D: Not core security risks.

Question 1526
Which of the following BEST reduces the likelihood of data leakage via cloud
services?
A. Allowing all users to upload documents
B. Using weak access control mechanisms
C. Implementing cloud access security broker (CASB) solutions
D. Enabling email forwarding
Correct Answer: C – Implementing cloud access security broker
(CASB) solutions
Explanation: CASBs provide visibility and control over cloud data usage.
Incorrect Answers:
A, B, D: Increase risk.

Question 1527
What is the MOST effective way to protect against known software vulnerabilities?
A. Changing default icons
B. Regularly applying vendor patches
C. Renaming the application
D. Rebooting daily
Correct Answer: B – Regularly applying vendor patches
Explanation: Patching addresses known weaknesses before exploitation.
Incorrect Answers:
A, C, D: Cosmetic or irrelevant actions.

Question 1528
Which of the following would BEST help detect insider threats in an organization?
A. Implementing biometric access controls
B. Monitoring user behavior for anomalies
C. Encrypting all external traffic
D. Updating all firewalls
Correct Answer: B – Monitoring user behavior for anomalies
Explanation: Behavioral monitoring detects suspicious activity by insiders.
Incorrect Answers:
A. Biometrics confirm identity.
C. Encryption secures traffic.
D. Firewalls protect perimeters.

Question 1529
What is the PRIMARY benefit of segregating development, testing, and production
environments?
A. To reduce licensing costs
B. To simplify change control
C. To prevent unauthorized or untested changes from affecting live systems
D. To allow faster deployments
Correct Answer: C – To prevent unauthorized or untested changes
from affecting live systems
Explanation: Environment separation helps protect system stability.
Incorrect Answers:
A, B, D: Secondary or unrelated.

Question 1530
Which of the following BEST ensures that system configurations are standardized
and secure?
A. Frequent reboots
B. Benchmarking against industry standards like CIS
C. Manual settings by each user
D. Rotating system wallpapers
Correct Answer: B – Benchmarking against industry standards like
CIS
Explanation: Benchmarking helps enforce best practice security baselines.
Incorrect Answers:
A, C, D: Not effective controls.

Question 1531
Which of the following is MOST effective in preventing malware from spreading
through email attachments?
A. Disabling internet access
B. Enabling automatic forwarding
C. Blocking executable attachments at the email gateway
D. Compressing email messages
Correct Answer: C – Blocking executable attachments at the email
gateway
Explanation: Blocking dangerous file types reduces the risk of malicious
attachments being delivered.
Incorrect Answers:
A. Disabling internet access is impractical.
B. Forwarding may propagate threats.
D. Compression doesn’t remove malware.

Question 1532
Which of the following BEST supports accountability in system administration
activities?
A. Shared administrator accounts
B. Individual user credentials with activity logging
C. Password expiration every 30 days
D. Weekly reboot schedules
Correct Answer: B – Individual user credentials with activity logging
Explanation: Individual credentials and logging ensure actions can be traced to
users.
Incorrect Answers:
A. Shared accounts eliminate traceability.
C. Expiration helps with password hygiene, not accountability.
D. Reboots are unrelated.

Question 1533
Which of the following is the PRIMARY purpose of conducting periodic vulnerability
scans?
A. To identify unpatched or misconfigured systems
B. To validate new software installations
C. To test end-user training effectiveness
D. To reduce employee workload
Correct Answer: A – To identify unpatched or misconfigured systems
Explanation: Scans help detect known weaknesses in infrastructure.
Incorrect Answers:
B. Scans don’t validate installations.
C. Training isn’t tested via scans.
D. Workload reduction isn’t the focus.

Question 1534
Which of the following BEST helps protect against unauthorized data access when
using third-party cloud services?
A. Ad-hoc password resets
B. Physical security controls
C. Strong encryption and service-level agreements (SLAs)
D. Unlimited file sharing
Correct Answer: C – Strong encryption and service-level agreements
(SLAs)
Explanation: Encryption ensures data confidentiality; SLAs define protection
obligations.
Incorrect Answers:
A. Password resets don’t enforce cloud security.
B. Physical controls are limited in cloud setups.
D. Unlimited sharing increases risk.
Question 1535
Which of the following BEST prevents unauthorized physical access to data center
infrastructure?
A. Screen timeout settings
B. Role-based logical access
C. Badge and biometric-controlled entry points
D. Uninterruptible power supplies
Correct Answer: C – Badge and biometric-controlled entry points
Explanation: Physical access controls are critical for protecting infrastructure.
Incorrect Answers:
A, B: These protect logical systems.
D. UPSs ensure uptime, not access control.

Question 1536
Which of the following is MOST effective in minimizing the impact of successful
phishing attacks?
A. Rebooting systems weekly
B. Implementing strong email filters and user training
C. Compressing files before sending
D. Allowing USB file transfers
Correct Answer: B – Implementing strong email filters and user
training
Explanation: Filters reduce exposure, and training empowers users to detect
phishing.
Incorrect Answers:
A, C, D: Not phishing-related defenses.

Question 1537
Which of the following BEST ensures the integrity of data transmitted between two
systems?
A. Secure FTP
B. RAID 1
C. Hash-based message authentication
D. Disk partitioning
Correct Answer: C – Hash-based message authentication
Explanation: Hashing validates data integrity by detecting unauthorized changes.
Incorrect Answers:
A. SFTP ensures secure transfer, not validation.
B. RAID supports redundancy.
D. Partitioning organizes disks, not protect integrity.
Question 1538
What is the PRIMARY benefit of implementing a centralized identity and access
management solution?
A. Improved download speeds
B. Simplified password requirements
C. Unified control over user permissions
D. Automated printer assignment
Correct Answer: C – Unified control over user permissions
Explanation: Centralized IAM ensures consistent user access management across
systems.
Incorrect Answers:
A, B, D: Not related to IAM goals.

Question 1539
Which of the following would BEST support continuity of operations during a
cyberattack?
A. Penetration testing
B. Encryption of archived logs
C. A well-documented and tested incident response plan
D. Changing default usernames
Correct Answer: C – A well-documented and tested incident response
plan
Explanation: A tested IR plan ensures efficient response and minimal disruption.
Incorrect Answers:
A. Testing prepares but doesn’t ensure continuity.
B. Archived logs don’t maintain operations.
D. Username changes are a minor control.

Question 1540
Which of the following BEST prevents the installation of unauthorized software on
organizational devices?
A. Application whitelisting
B. Weekly software updates
C. Strong encryption
D. Data compression tools
Correct Answer: A – Application whitelisting
Explanation: Whitelisting ensures only approved software can be installed or run.
Incorrect Answers:
B. Updates don’t prevent installs.
C. Encryption protects data, not app installs.
D. Compression tools are unrelated.
Question 1541
Which of the following is the PRIMARY benefit of multifactor authentication?
A. Increases network speed
B. Reduces help desk ticket volume
C. Adds a layer of security beyond passwords
D. Shortens login time
Correct Answer: C – Adds a layer of security beyond passwords
Explanation: MFA combines something you know, have, or are for stronger
authentication.
Incorrect Answers:
A, B, D: Not primary MFA benefits.

Question 1542
Which of the following BEST prevents unauthorized data access through removable
storage devices?
A. Cloud synchronization
B. Enabling autoplay
C. Disabling USB ports or using endpoint protection
D. Adjusting display brightness
Correct Answer: C – Disabling USB ports or using endpoint
protection
Explanation: Controlling USB access reduces risk of unauthorized data transfer.
Incorrect Answers:
A, B, D: Not relevant.

Question 1543
What is the PRIMARY objective of enforcing strong password policies?
A. Improve system boot times
B. Reduce the size of the authentication log
C. Make brute-force attacks more difficult
D. Allow easier file sharing
Correct Answer: C – Make brute-force attacks more difficult
Explanation: Strong passwords are harder to crack by automated means.
Incorrect Answers:
A, B, D: Not related to password strength.

Question 1544
Which of the following BEST helps detect suspicious activities on a network?
A. Disk encryption
B. Biometric login
C. Intrusion detection system (IDS)
D. Data classification
Correct Answer: C – Intrusion detection system (IDS)
Explanation: IDS monitors network traffic and alerts on unusual behavior.
Incorrect Answers:
A. Encryption protects data.
B. Biometrics secure access.
D. Classification informs handling.

Question 1545
Which of the following BEST helps ensure accountability in access to critical
systems?
A. Enabling anonymous login
B. Sharing administrator passwords
C. Using unique user IDs and auditing
D. Disabling audit logs
Correct Answer: C – Using unique user IDs and auditing
Explanation: Unique IDs tied to logs ensure traceability of actions.
Incorrect Answers:
A, B, D: All reduce accountability.

Question 1546
Which of the following BEST mitigates data exfiltration via cloud services?
A. Using weak authentication
B. Allowing unrestricted file uploads
C. Implementing cloud access security broker (CASB)
D. Providing unlimited storage
Correct Answer: C – Implementing cloud access security broker
(CASB)
Explanation: CASB monitors and controls cloud interactions.
Incorrect Answers:
A, B, D: These increase risk.

Question 1547
Which of the following BEST supports enforcement of least privilege across an
organization?
A. Disabling screen savers
B. Implementing role-based access control
C. Using default admin accounts
D. Allowing shared user sessions
Correct Answer: B – Implementing role-based access control
Explanation: RBAC limits access to only what's necessary for job functions.
Incorrect Answers:
A, C, D: These violate least privilege principles.

Question 1548
Which of the following is MOST effective for identifying unusual internal data
transfers?
A. Print job tracking
B. Data loss prevention (DLP) system
C. Local password caching
D. Wi-Fi signal boosting
Correct Answer: B – Data loss prevention (DLP) system
Explanation: DLP tools monitor and alert on suspicious data movement.
Incorrect Answers:
A, C, D: Not suitable for this purpose.

Question 1549
Which of the following is the PRIMARY benefit of file integrity monitoring (FIM)?
A. Reduces system load
B. Speeds up file transfers
C. Detects unauthorized changes to critical files
D. Compresses large files
Correct Answer: C – Detects unauthorized changes to critical files
Explanation: FIM tools track file changes for security and compliance.
Incorrect Answers:
A, B, D: Not relevant.

Question 1550
Which of the following BEST helps ensure security updates are applied organization-
wide?
A. Manual installation by end-users
B. Publishing update guides on intranet
C. Centralized patch management
D. Restarting systems monthly
Correct Answer: C – Centralized patch management
Explanation: Centralized tools ensure updates are applied consistently.
Incorrect Answers:
A. Manual updates are inconsistent.
B. Guides inform, not enforce.
D. Reboots don’t apply patches.
Question 1551
Which of the following is the PRIMARY objective of network access control (NAC)?
A. To increase bandwidth for mobile users
B. To ensure only compliant and authorized devices access the network
C. To filter social media content
D. To encrypt wireless signals
Correct Answer: B – To ensure only compliant and authorized devices
access the network
Explanation: NAC validates devices before allowing access, enforcing policy
compliance.
Incorrect Answers:
A. NAC does not manage bandwidth.
C. Content filtering is separate.
D. Encryption is handled at another layer.

Question 1552
Which of the following BEST ensures that backups can be restored successfully?
A. Encrypting the backup drive
B. Performing periodic restore tests
C. Copying backups to the same device
D. Compressing all backup files
Correct Answer: B – Performing periodic restore tests
Explanation: Restore testing confirms backup usability and readiness.
Incorrect Answers:
A. Encryption protects data but doesn’t verify it.
C. Same-device backups risk loss.
D. Compression saves space but doesn’t verify integrity.

Question 1553
What is the PRIMARY reason to restrict administrative privileges on end-user
machines?
A. To reduce help desk calls
B. To improve operating system performance
C. To prevent installation of unauthorized software
D. To allow easier file access
Correct Answer: C – To prevent installation of unauthorized software
Explanation: Admin rights allow actions that may introduce risk, such as installing
malware.
Incorrect Answers:
A. Help desk impact may increase.
B. Performance is not directly affected.
D. File access can be granted through proper channels.

Question 1554
Which of the following is MOST critical to include in a data breach response plan?
A. Printer configuration
B. Personal project deadlines
C. Communication and notification procedures
D. Team vacation schedules
Correct Answer: C – Communication and notification procedures
Explanation: Proper notification is required by regulations and is critical to
response coordination.
Incorrect Answers:
A, B, D: Not relevant to breach response.

Question 1555
Which of the following BEST helps prevent tailgating in secure office environments?
A. Access control logs
B. Security awareness training and physical security measures
C. Data encryption
D. Automatic login settings
Correct Answer: B – Security awareness training and physical security
measures
Explanation: Employee vigilance and physical controls help stop unauthorized
entry.
Incorrect Answers:
A. Logs track events after they occur.
C. Encryption protects data, not entry.
D. Auto-login increases physical security risk.

Question 1556
Which of the following BEST prevents phishing attacks from compromising
credentials?
A. Daily password resets
B. Multifactor authentication (MFA)
C. Biweekly system reboots
D. Disk partitioning
Correct Answer: B – Multifactor authentication (MFA)
Explanation: MFA makes stolen credentials alone insufficient for access.
Incorrect Answers:
A. Frequent resets are burdensome and ineffective.
C. Reboots don’t mitigate phishing.
D. Partitioning is unrelated.

Question 1557
Which of the following BEST helps reduce the impact of insider threats?
A. Using biometric login
B. Encrypting email messages
C. Implementing user behavior analytics (UBA)
D. Performing monthly backups
Correct Answer: C – Implementing user behavior analytics (UBA)
Explanation: UBA tools detect anomalies that may signal insider misuse.
Incorrect Answers:
A. Biometrics confirm identity but don’t monitor behavior.
B. Email encryption is for confidentiality.
D. Backups help recovery, not detection.

Question 1558
What is the PRIMARY objective of disaster recovery planning?
A. Prevent phishing attacks
B. Maintain employee morale
C. Resume critical business operations after disruption
D. Improve email delivery rates
Correct Answer: C – Resume critical business operations after
disruption
Explanation: DR planning ensures continuity after incidents like natural disasters
or attacks.
Incorrect Answers:
A. DR does not directly address phishing.
B. Morale is secondary.
D. Email is only one component.

Question 1559
Which of the following BEST prevents unauthorized changes to critical configuration
files?
A. Disk defragmentation
B. File integrity monitoring (FIM)
C. Antivirus updates
D. Shared administrator accounts
Correct Answer: B – File integrity monitoring (FIM)
Explanation: FIM alerts when sensitive files are altered.
Incorrect Answers:
A. Defrag is for performance.
C. Antivirus protects against malware.
D. Shared accounts reduce accountability.

Question 1560
Which of the following is the PRIMARY benefit of a centralized logging solution?
A. Increased boot speed
B. Faster file transfers
C. Improved correlation and analysis of security events
D. Automatic patch installation
Correct Answer: C – Improved correlation and analysis of security
events
Explanation: Central logs help identify and investigate suspicious activity across
systems.
Incorrect Answers:
A, B, D: Not primary logging benefits.

Question 1561
Which of the following BEST mitigates risks associated with remote access?
A. Allowing access to all systems
B. Using a secure VPN and access controls
C. Disabling antivirus software
D. Lowering firewall sensitivity
Correct Answer: B – Using a secure VPN and access controls
Explanation: VPN and access control help protect remote sessions.
Incorrect Answers:
A. Broad access increases risk.
C, D: Both reduce security.

Question 1562
Which of the following is MOST critical when assessing the effectiveness of an
organization’s patch management process?
A. Patch file size
B. Operating system version
C. Time taken to deploy patches
D. Number of network printers
Correct Answer: C – Time taken to deploy patches
Explanation: Timeliness determines exposure window to known vulnerabilities.
Incorrect Answers:
A, B, D: Not indicators of effectiveness.
Question 1563
Which of the following BEST reduces the risk of data loss due to accidental deletion?
A. Implementing strict firewall rules
B. Using cloud syncing
C. Performing regular automated backups
D. Updating BIOS firmware
Correct Answer: C – Performing regular automated backups
Explanation: Backups enable data recovery after accidental deletion.
Incorrect Answers:
A. Firewalls control access.
B. Syncing may replicate deletions.
D. BIOS updates are unrelated.

Question 1564
Which of the following is the PRIMARY purpose of a digital certificate?
A. Encrypting log files
B. Storing user credentials
C. Validating identity and ensuring secure communication
D. Speeding up application load times
Correct Answer: C – Validating identity and ensuring secure
communication
Explanation: Certificates support encryption and trust in digital communications.
Incorrect Answers:
A, B, D: Not core purposes.

Question 1565
Which of the following BEST helps prevent credential reuse across multiple
applications?
A. Rebooting after login
B. Installing updates
C. Enforcing single sign-on (SSO) and password policies
D. Switching keyboards monthly
Correct Answer: C – Enforcing single sign-on (SSO) and password
policies
Explanation: SSO reduces password count; policies enforce uniqueness and
complexity.
Incorrect Answers:
A, B, D: Ineffective controls for reuse.

Question 1566
Which of the following would BEST help detect unauthorized wireless devices in a
corporate environment?
A. Web proxy
B. Vulnerability scanner
C. Wireless site survey
D. Bandwidth monitor
Correct Answer: C – Wireless site survey
Explanation: Site surveys detect rogue access points and devices.
Incorrect Answers:
A, B, D: Don’t detect rogue Wi-Fi.

Question 1567
Which of the following is MOST effective in preventing browser-based attacks?
A. Installing additional toolbars
B. Disabling automatic updates
C. Keeping browsers patched and enabling security features
D. Maximizing screen resolution
Correct Answer: C – Keeping browsers patched and enabling security
features
Explanation: Up-to-date browsers reduce vulnerability to exploits.
Incorrect Answers:
A. Toolbars may be insecure.
B. Disabling updates increases risk.
D. Display settings don’t secure browsers.

Question 1568
What is the PRIMARY benefit of using encryption at rest?
A. Faster file access
B. Reduced data size
C. Protection of data stored on media from unauthorized access
D. Improved color rendering
Correct Answer: C – Protection of data stored on media from
unauthorized access
Explanation: Encryption prevents access without keys, even if storage is stolen.
Incorrect Answers:
A, B, D: Not encryption benefits.

Question 1569
Which of the following would BEST support investigation of an insider data breach?
A. Installing more RAM
B. Reviewing logs from data loss prevention tools
C. Sharing administrator accounts
D. Using cloud-based antivirus
Correct Answer: B – Reviewing logs from data loss prevention tools
Explanation: DLP logs provide detailed insight into sensitive data movements.
Incorrect Answers:
A. Memory upgrade doesn’t help.
C. Sharing accounts obscures actions.
D. AV is limited in scope.

Question 1570
Which of the following is the BEST reason to require unique user accounts for system
access?
A. Reduce IT support staff
B. Increase data compression
C. Enable accountability and traceability
D. Speed up software updates
Correct Answer: C – Enable accountability and traceability
Explanation: Unique accounts allow audit trails to identify responsible users.
Incorrect Answers:
A, B, D: Not relevant to account uniqueness.

Question 1571
Which of the following BEST mitigates the risk of a user downloading malicious files
from the internet?
A. Disabling keyboard shortcuts
B. Implementing a web proxy with content filtering
C. Reducing screen brightness
D. Updating the printer driver
Correct Answer: B – Implementing a web proxy with content filtering
Explanation: A proxy with filtering blocks access to known malicious websites and
downloads.
Incorrect Answers:
A, C, D: Not relevant to download protection.

Question 1572
What is the PRIMARY purpose of a business impact analysis (BIA)?
A. To forecast hardware requirements
B. To determine the impact of disruptions on business operations
C. To track employee attendance
D. To prioritize marketing campaigns
Correct Answer: B – To determine the impact of disruptions on
business operations
Explanation: BIA identifies critical processes and the consequences of their failure.
Incorrect Answers:
A, C, D: Not the focus of BIA.

Question 1573
Which of the following BEST ensures that employees understand their
responsibilities related to cybersecurity?
A. Publishing software manuals
B. Conducting regular security awareness training
C. Replacing old hardware
D. Installing font packs
Correct Answer: B – Conducting regular security awareness training
Explanation: Training keeps staff informed about security policies and practices.
Incorrect Answers:
A, C, D: Not related to employee responsibilities.

Question 1574
What is the PRIMARY purpose of implementing logging and monitoring controls?
A. To reduce application size
B. To ensure accurate data entry
C. To detect and investigate security incidents
D. To enhance system aesthetics
Correct Answer: C – To detect and investigate security incidents
Explanation: Logs help identify, analyze, and respond to threats and anomalies.
Incorrect Answers:
A, B, D: Not the function of logging.

Question 1575
Which of the following is the PRIMARY advantage of using a layered security
(defense-in-depth) strategy?
A. Increases system boot time
B. Reduces software licensing fees
C. Provides multiple barriers to slow or stop an attack
D. Minimizes battery consumption
Correct Answer: C – Provides multiple barriers to slow or stop an
attack
Explanation: Defense-in-depth compensates for failure at any single layer.
Incorrect Answers:
A, B, D: Not relevant to layered security.
Question 1576
Which of the following is MOST useful for identifying configuration deviations from a
known good state?
A. Keylogger
B. Configuration baseline comparison
C. Patch installer
D. Firewall update
Correct Answer: B – Configuration baseline comparison
Explanation: Baselines define acceptable configurations and highlight changes.
Incorrect Answers:
A. Keyloggers are malicious tools.
C. Patch installers update, not monitor.
D. Firewalls enforce network policies.

Question 1577
Which of the following BEST supports secure transmission of confidential data over
the internet?
A. Plain FTP
B. Telnet
C. HTTPS
D. HTTP
Correct Answer: C – HTTPS
Explanation: HTTPS encrypts web traffic, protecting data in transit.
Incorrect Answers:
A, B, D: These protocols are unencrypted and insecure.

Question 1578
What is the PRIMARY benefit of using intrusion prevention systems (IPS) in a
corporate network?
A. Faster DNS resolution
B. Preventing known malicious traffic in real-time
C. Logging printer usage
D. Managing shared drives
Correct Answer: B – Preventing known malicious traffic in real-time
Explanation: IPS actively blocks threats based on signature or behavior.
Incorrect Answers:
A, C, D: Not functions of IPS.

Question 1579
Which of the following would BEST ensure that users do not have more access than
necessary?
A. Enabling all system ports
B. Reviewing access rights periodically
C. Sharing credentials among team members
D. Using default passwords
Correct Answer: B – Reviewing access rights periodically
Explanation: Periodic reviews ensure adherence to the principle of least privilege.
Incorrect Answers:
A, C, D: These increase risk.

Question 1580
Which of the following BEST supports secure mobile device use in a bring-your-own-
device (BYOD) environment?
A. Upgrading office furniture
B. Disabling Wi-Fi
C. Replacing routers
D. Enforcing mobile device management (MDM) policies
Correct Answer: D – Enforcing mobile device management (MDM)
policies
Explanation: MDM allows enforcement of corporate security requirements on
personal devices.
Incorrect Answers:
A, B, C: Not effective BYOD controls.

Question 1581
Which of the following is MOST critical to ensuring availability of information
systems?
A. PowerPoint templates
B. Business continuity and disaster recovery planning
C. Cloud logo updates
D. Monthly team-building exercises
Correct Answer: B – Business continuity and disaster recovery
planning
Explanation: BCDR plans ensure systems are available after disruptions.
Incorrect Answers:
A, C, D: Not related to system availability.

Question 1582
Which of the following BEST mitigates the risk of man-in-the-middle (MITM)
attacks?
A. Using plain HTTP
B. Disabling SSL
C. Enforcing strong encryption protocols such as TLS
D. Typing longer URLs
Correct Answer: C – Enforcing strong encryption protocols such as
TLS
Explanation: TLS secures communication between endpoints and prevents MITM
interception.
Incorrect Answers:
A, B: Insecure protocols increase risk.
D: URL length does not prevent MITM.

Question 1583
Which of the following BEST supports non-repudiation in electronic transactions?
A. Antivirus signatures
B. Biometric login
C. Digital signatures
D. Disk cleanup tools
Correct Answer: C – Digital signatures
Explanation: Digital signatures prove the origin and integrity of a message.
Incorrect Answers:
A, B, D: Do not provide non-repudiation.

Question 1584
Which of the following is the PRIMARY reason to log user activity on critical
systems?
A. Increase disk space usage
B. Enable faster printing
C. Maintain accountability and support forensics
D. Simplify interface layout
Correct Answer: C – Maintain accountability and support forensics
Explanation: Logs trace actions and are essential for investigations.
Incorrect Answers:
A, B, D: Not the purpose of logging.

Question 1585
Which of the following BEST mitigates the risk of attackers exploiting unused open
ports?
A. Increasing network cable shielding
B. Disabling unnecessary services and ports
C. Adding disk compression
D. Using static wallpapers
Correct Answer: B – Disabling unnecessary services and ports
Explanation: Closed ports reduce exposure to network-based attacks.
Incorrect Answers:
A, C, D: Not effective in reducing port exposure.

Question 1586
Which of the following is MOST effective in ensuring employees adhere to acceptable
use policies?
A. Removing administrative privileges
B. Posting signs near printers
C. Conducting regular awareness training and policy acknowledgment
D. Adjusting chair heights
Correct Answer: C – Conducting regular awareness training and policy
acknowledgment
Explanation: Understanding and acknowledgment reinforce adherence.
Incorrect Answers:
A. Helps, but not the most effective alone.
B, D: Not related to policy compliance.

Question 1587
Which of the following BEST ensures data confidentiality during a remote file
transfer?
A. Using Telnet
B. Using Secure File Transfer Protocol (SFTP)
C. Emailing files without encryption
D. Posting files on public forums
Correct Answer: B – Using Secure File Transfer Protocol (SFTP)
Explanation: SFTP encrypts the data during transmission.
Incorrect Answers:
A, C, D: Expose data to interception.

Question 1588
What is the PRIMARY purpose of antivirus software?
A. Accelerating browser performance
B. Preventing and detecting malicious software
C. Reducing electricity costs
D. Encrypting USB drives
Correct Answer: B – Preventing and detecting malicious software
Explanation: Antivirus software identifies and removes known threats.
Incorrect Answers:
A, C, D: Not AV’s core purpose.
Question 1589
Which of the following BEST protects against accidental deletion of important
system files?
A. Using firewalls
B. File permissions and system restore points
C. Adjusting display resolution
D. Adding email disclaimers
Correct Answer: B – File permissions and system restore points
Explanation: Permissions restrict deletion; restore points enable recovery.
Incorrect Answers:
A, C, D: Not effective protections.

Question 1590
Which of the following is the MOST effective way to validate that patches are
applied correctly?
A. Ask system users
B. Enable default settings
C. Conduct vulnerability scans
D. Use screen recording tools
Correct Answer: C – Conduct vulnerability scans
Explanation: Scans confirm whether known vulnerabilities are still present.
Incorrect Answers:
A, B, D: Do not reliably confirm patch status.

Question 1591
An employee approaches an IS auditor and expresses concern about a critical security
issue in a newly installed application. Which of the following should the auditor do
FIRST?
A. Conduct a review of the application.
B. Recommend reverting to the previous application.
C. Disclose the concern to legal counsel.
D. Discuss the concern with audit management.
Correct Answer: D – Discuss the concern with audit management
Explanation: The auditor should first escalate the concern internally to ensure
proper investigation and response.
Incorrect Answers:
A. Review is necessary but must be authorized.
B. Reverting systems is not an auditor's decision.
C. Legal involvement comes later.
Question 1592
Data centers that want to prevent unauthorized personnel from entering during a
power outage should ensure external access doors:
A. have physical key backup.
B. are alarmed and monitored.
C. operate in fail-safe mode.
D. operate in fail-secure mode.
Correct Answer: D – operate in fail-secure mode
Explanation: Fail-secure locks stay locked when power is lost, maintaining physical
security.
Incorrect Answers:
A. Physical keys may be lost or copied.
B. Alarms notify but don’t prevent access.
C. Fail-safe mode unlocks, reducing security.

Question 1593
Which of the following practices associated with capacity planning provides the
GREATEST assurance that future incidents related to existing server performance
will be prevented?
A. Duplicating existing disk drive systems
B. Reviewing results from simulated high-demand stress test scenarios
C. Performing a root cause analysis for past incidents
D. Assuming SLAs will remain unchanged
Correct Answer: B – Reviewing results from simulated high-demand
stress test scenarios
Explanation: Simulations anticipate issues under heavy use, enabling preventive
action.
Incorrect Answers:
A. Redundancy helps availability, not planning.
C. RCA is reactive.
D. Assumptions may lead to gaps.

Question 1594
Which of the following is the BEST control to help detect input errors in the
customer account number field during accounts receivable transaction processing?
A. Checksum
B. Validity check
C. Limit check
D. Parity check
Correct Answer: A – Checksum
Explanation: A checksum validates the integrity of numerical data entries.
Incorrect Answers:
B. Validity checks confirm existence, not data integrity.
C. Limits apply to range.
D. Parity applies to bits, not fields.

Question 1595
If a recent release of a program has to be backed out of production, the
corresponding changes within the delta version of the code should be:
A. filed in production for future reference.
B. eliminated from the source code in production.
C. reinstalled when replacing the version back into production.
D. applied to the source code reflecting the production version.
Correct Answer: D – applied to the source code reflecting the
production version
Explanation: The source code should match what is currently in production.
Incorrect Answers:
A. Archiving alone doesn't resolve the issue.
B. Eliminating without alignment can cause inconsistencies.
C. Reinstallation may reintroduce defects.

Question 1596
Shortly after deployment, some key scenarios were not tested during UAT. What is
the GREATEST concern?
A. The system may have defects.
B. Business requirements may not be met.
C. Security risks were not assessed.
D. Users may need retraining.
Correct Answer: C – Security risks were not assessed
Explanation: Unassessed scenarios may include untested security vulnerabilities.
Incorrect Answers:
A, B. Valid but less severe than security concerns.
D. Not a risk to system integrity.

Question 1597
An IS auditor reviewing IT steering committee minutes expects to find discussion of:
A. Acquiring and assigning project resources.
B. Comparing risk and return of IT investments.
C. Reviewing strategic IT objective achievements.
D. Assessing IT’s contribution to business.
Correct Answer: A – Acquiring and assigning project resources
Explanation: Steering committees handle operational IT resource matters.
Incorrect Answers:
B–D: Strategic oversight roles, typically under IT strategy committee.

Question 1598
A business owner violated security policy by creating a webpage accessing production
data. What should the auditor do NEXT?
A. Escalate to senior management.
B. Assess the data's sensitivity.
C. Check if access controls exist.
D. Shut down the webpage.
Correct Answer: B – Assess the data's sensitivity
Explanation: The auditor must determine the risk before escalation.
Incorrect Answers:
A. Escalation requires context.
C. Checking controls comes after assessing risk.
D. Shutdown is not the auditor’s role.

Question 1599
When a computer is compromised, what should be done FIRST?
A. Disconnect it from the network.
B. Run anti-malware.
C. Power it down.
D. Copy the hard drive.
Correct Answer: A – Disconnect it from the network
Explanation: Isolation prevents spread and preserves evidence.
Incorrect Answers:
B. Scanning may destroy evidence.
C. Power loss could impact forensic analysis.
D. Copying comes after isolation.

Question 1600
In emergencies, programmers can change production without prior approval. Which
control is MOST important?
A. Programmer reports
B. Operator logs
C. Automated log of changes
D. Limit number of super users
Correct Answer: C – Automated log of changes
Explanation: Logging ensures accountability when bypassing approval.
Incorrect Answers:
A. Reports are manual and subjective.
B. Operator logs are limited.
D. Super user limits help but don’t track changes.

Question 1601
Why should an IS auditor meet with the auditee before reporting results to
management?
A. Recommend control improvements
B. Discuss next audit timing
C. Gain agreement on findings
D. Identify new issues
Correct Answer: C – Gain agreement on findings
Explanation: Agreement avoids disputes and ensures clarity.
Incorrect Answers:
A, B, D: Not the primary reason for pre-report meetings.

Question 1602
An IS auditor suspects fraud via a PC in Finance. Who should be notified FIRST?
A. Line management
B. Police
C. Audit management
D. Audit committee
Correct Answer: C – Audit management
Explanation: Follow escalation protocol; management directs next steps.
Incorrect Answers:
A, B, D: Escalation beyond audit is premature without management input.

Question 1603
How can an organization ensure archived digital data remains accessible long-term?
A. Migrate data to current technology
B. Emulate old software
C. Maintain old hardware
D. Back up archived data
Correct Answer: A – Migrate data to current technology
Explanation: Format obsolescence is addressed by regular migration.
Incorrect Answers:
B. Emulation helps but is not scalable.
C, D: Useful but not sufficient.

Question 1604
Which practice BEST avoids bias in vendor proposal reviews?
A. Procurement handles vendor contact
B. Sponsor is available to all vendors
C. In-house devs can’t submit proposals
D. Auditor assists in the review
Correct Answer: A – Procurement handles vendor contact
Explanation: Central contact prevents favoritism or undue influence.
Incorrect Answers:
B–D: Helpful, but A is most preventive.

Question 1605
If a data center is moved due to flooding risk, which risk response is used?
A. Risk elimination
B. Risk avoidance
C. Risk acceptance
D. Risk transfer
Correct Answer: B – Risk avoidance
Explanation: Moving the facility avoids the threat entirely.
Incorrect Answers:
A. Elimination is not always feasible.
C, D: Do not eliminate exposure.

Question 1606
When auditing a data center’s cooling system, what should be reviewed FIRST?
A. Environmental performance metrics
B. DRP test results
C. Data center location
D. Maintenance logs
Correct Answer: A – Environmental performance metrics
Explanation: These reflect system effectiveness and issues.
Incorrect Answers:
B–D: Supportive, but secondary.

Question 1607
What should be the PRIMARY focus when reviewing a business process
improvement (BPI) project?
A. New control costs
B. Monitoring plans
C. Project plan
D. Business impact
Correct Answer: D – Business impact
Explanation: BPI success is measured by its impact on business.
Incorrect Answers:
A–C: Process aspects, not impact.

Question 1608
What is MOST important during cloud database migration to preserve data
integrity?
A. Run app in parallel
B. Perform data validation checks
C. Enable cloud access control
D. Normalize legacy data
Correct Answer: B – Perform data validation checks
Explanation: Validation ensures accurate and complete migration.
Incorrect Answers:
A. Parallel running supports continuity.
C, D: Important but not primary for integrity.

Question 1609
What ensures file integrity in peer-to-peer file sharing?
A. Transfer through IDS
B. Encrypted packets
C. Message authentication code (MAC)
D. Use of a jump server
Correct Answer: C – Message authentication code (MAC)
Explanation: MAC confirms file has not been altered.
Incorrect Answers:
A. IDS monitors but doesn’t verify integrity.
B. Encryption secures transit, not integrity.
D. Jump servers control access, not integrity.

Question 1610
During post-implementation survey, what is of GREATEST concern?
A. No space for feedback
B. Results not shown to management
C. Survey missed scope of business case
D. Delay in survey issuance
Correct Answer: C – Survey missed scope of business case
Explanation: Surveys must assess whether business goals were achieved.
Incorrect Answers:
A, B, D: Administrative, not strategic concerns.
Question 1611
End users with read access to a central database can extract data to their desktops
for analysis and reporting to management. What should be the GREATEST concern
with this situation?
A. The gap between the time of data delivery and report preparation
B. The difference between the state of the current data and the downloaded data
C. Backup of reports on end users' desktops
D. The accuracy and completeness of reports
Correct Answer: D – The accuracy and completeness of reports
Explanation: Once data is downloaded locally, there's a risk of manipulation or
errors, which affects report accuracy.
Incorrect Answers:
A. Time gap is relevant but secondary.
B. Data consistency matters but is part of broader accuracy.
C. Backups don’t address accuracy.

Question 1612
An organization has established three IT processing environments: development, test,
and production. The MAJOR reason for separating the development and test
environments is to:
A. obtain segregation of duties between IT staff and end users.
B. protect the programs under development from unauthorized testing.
C. perform testing in a stable environment.
D. limit the users' access rights to the development environment.
Correct Answer: C – Perform testing in a stable environment
Explanation: Separation ensures test results are not affected by ongoing
development changes.
Incorrect Answers:
A. Segregation is achieved between development and production.
B. Testing needs isolation, not protection from testing.
D. Access control is broader than environment separation.

Question 1613
Which of the following provides the MOST useful information regarding an
organization's risk appetite and tolerance?
A. Risk profile
B. Audit reports
C. Gap analysis
D. Risk register
Correct Answer: A – Risk profile
Explanation: A risk profile outlines accepted risk levels, helping define appetite and
tolerance.
Incorrect Answers:
B, C, D: Inform risk management but don’t directly express risk appetite.

Question 1614
What is the MOST effective way to manage contractors' access to a data center?
A. Management approval of visitor access
B. Escort requirement for visitor access
C. Badge identification worn by visitors
D. Verification of visitor identification
Correct Answer: B – Escort requirement for visitor access
Explanation: Escorting ensures real-time oversight of contractors in sensitive areas.
Incorrect Answers:
A. Approval doesn’t ensure monitoring.
C, D: Help with identification but not control.

Question 1615
Which of the following is the PRIMARY benefit of using a SIEM tool to collate high
amounts of data collected across various security tools?
A. Reducing the number of false positive incidents
B. Reducing the number of isolated events noted as incidents
C. Correlating many isolated events to create a single source of record
D. Decreasing the effort needed to monitor security events
Correct Answer: C – Correlating many isolated events to create a
single source of record
Explanation: SIEM tools correlate logs to identify threats across systems.
Incorrect Answers:
A, B, D: Secondary benefits.

Question 1616
Which of the following should be the GREATEST concern to an IS auditor
performing an IT governance review?
A. IT and business goals are not well defined.
B. IT reports to the chief financial officer (CFO).
C. The IT steering committee does not capture meeting minutes.
D. IT security and IT operations are using two separate frameworks.
Correct Answer: A – IT and business goals are not well defined
Explanation: Clear alignment is foundational to effective IT governance.
Incorrect Answers:
B, C, D: Important, but not as critical.
Question 1617
Which of the following is the MOST effective way to evaluate the physical security of
a data center?
A. Review camera footage from the data center.
B. Perform a data center tour.
C. Review data center access logs.
D. Interview data center stakeholders.
Correct Answer: B – Perform a data center tour
Explanation: Direct observation reveals actual control effectiveness.
Incorrect Answers:
A, C, D: Provide evidence but not full visibility.

Question 1618
When is the MOST appropriate time to establish metrics for assessing the
effectiveness of an outsourced IT project?
A. During the acquisition phase
B. During the initiation phase
C. During the testing phase
D. During the configuration phase
Correct Answer: B – During the initiation phase
Explanation: Metrics must be defined early to track progress and performance.
Incorrect Answers:
A. Acquisition focuses on vendor selection.
C, D: Too late for metric definition.

Question 1619
Which of the following is the GREATEST concern related to an organization's data
classification processes?
A. Data classification is performed manually.
B. Data classification labels are inconsistent.
C. Data classification procedures are not formally documented.
D. Data is encrypted regardless of classification.
Correct Answer: C – Data classification procedures are not formally
documented
Explanation: Lack of formal procedures leads to inconsistency and enforcement
challenges.
Incorrect Answers:
A. Manual classification may be valid.
B. Inconsistency stems from lack of documentation.
D. Encryption is good but doesn’t replace classification.
Question 1620
Which of the following is MOST important when reviewing a service provider’s
contract for security provisions?
A. Inclusion of insurance requirements
B. Clearly defined audit rights and access
C. Provisions for automatic renewal
D. Penalty for late payment
Correct Answer: B – Clearly defined audit rights and access
Explanation: Audit rights allow verification of compliance with security
requirements.
Incorrect Answers:
A. Insurance supports recovery.
C, D: Financial terms, not security-related.

Question 1621
When reviewing a disaster recovery plan (DRP), the MOST important consideration
is that it:
A. is reviewed by internal auditors.
B. includes hardware upgrade schedules.
C. is aligned with the business continuity plan.
D. has a communications directory.
Correct Answer: C – Is aligned with the business continuity plan
Explanation: DRP supports continuity objectives and must align with BCP.
Incorrect Answers:
A. Review helps but doesn’t ensure alignment.
B. Upgrades are not DR-specific.
D. Directories assist but are secondary.

Question 1622
Which of the following BEST ensures sensitive information sent by email is
protected?
A. Using blind carbon copy (BCC)
B. Sending as compressed attachments
C. Encrypting email content and attachments
D. Requiring recipients to acknowledge
Correct Answer: C – Encrypting email content and attachments
Explanation: Encryption ensures confidentiality during transmission.
Incorrect Answers:
A. BCC hides recipients, not content.
B. Compression doesn’t secure.
D. Acknowledgment doesn’t protect content.
Question 1623
Which of the following is the MOST important reason for an organization to enforce
its information security policies?
A. To meet audit objectives
B. To protect the organization’s information assets
C. To simplify compliance with HR policies
D. To ensure user productivity
Correct Answer: B – To protect the organization’s information assets
Explanation: The core goal of security policies is to safeguard information.
Incorrect Answers:
A, C, D: Secondary benefits.

Question 1624
Which of the following controls would BEST mitigate the risk of a terminated
employee retaining access?
A. Performing regular role reviews
B. Reviewing access logs quarterly
C. Conducting exit interviews
D. Implementing automated account deactivation
Correct Answer: D – Implementing automated account deactivation
Explanation: Automated deactivation ensures timely removal of access.
Incorrect Answers:
A, B: Periodic reviews may miss immediate risks.
C. Interviews raise awareness but don’t enforce action.

Question 1625
Which of the following should the auditor do NEXT after discovering that controls in
a control self-assessment (CSA) were not adequately tested?
A. Provide guidance regarding control objectives to staff involved in the CSA.
B. Expand the scope of the next internal audit planned for the finance department.
C. Issue an audit report to the finance manager regarding the inadequate testing of
controls.
D. Perform additional testing to complement CSA activities in the finance
department.
Correct Answer: D – Perform additional testing to complement CSA
activities in the finance department
Explanation: Auditor must validate controls when CSA testing is inadequate.
Incorrect Answers:
A, B, C: Supportive but not the immediate next step.
Question 1626
An external attacker spoofing an internal IP address can BEST be detected by:
A. Comparing the source address to the DNS entry
B. Using static IP addresses for identification
C. Using a state table to compare message states
D. Comparing the source address to the entry interface
Correct Answer: D – Comparing the source address to the entry
interface
Explanation: Source address and interface mismatch reveals spoofing.
Incorrect Answers:
A, B, C: Less direct and effective.

Question 1627
In a data center using new technology, environmental controls remain unchanged.
What should the IS auditor do FIRST?
A. Test selected controls
B. Recommend changes to the maintenance schedule
C. Determine whether controls are active
D. Review equipment specifications
Correct Answer: C – Determine whether controls are active
Explanation: Confirming active controls is a priority before deeper evaluation.
Incorrect Answers:
A, B, D: Follow-up steps.

Question 1628
To evaluate the extent of administrator account misuse, which sampling technique is
BEST?
A. Haphazard sampling
B. Random sampling
C. Statistical sampling
D. Stratified sampling
Correct Answer: D – Stratified sampling
Explanation: Stratified sampling ensures coverage across different admin types.
Incorrect Answers:
A. Lacks structure.
B, C: May not target subgroups effectively.

Question 1629
What is MOST important to confirm during the design phase of a system
development project?
A. Data cleansing is defined
B. Audit has approved the design
C. Acceptance test criteria are developed
D. Coding standards are followed
Correct Answer: C – Acceptance test criteria are developed
Explanation: Test criteria ensure the system meets business needs.
Incorrect Answers:
A, B, D: Important, but not primary.

Question 1630
Which component of a business case BEST shows due diligence in vendor selection?
A. Management approval
B. Problem statement
C. Alternative solutions
D. Cost-benefit analysis
Correct Answer: D – Cost-benefit analysis
Explanation: Cost-benefit analysis shows evaluation of vendor value.
Incorrect Answers:
A, B, C: Necessary but not evidence of due diligence.

Question 1631
Which of the following should be done FIRST when auditing an IT portfolio
management process at a large organization?
A. Conduct walk-through meetings with IT project managers.
B. Calculate the IT portfolio return on investment (ROI).
C. Verify whether the IT project portfolio is kept up to date.
D. Confirm industry best practices for IT portfolio management are followed.
Correct Answer: C – Verify whether the IT project portfolio is kept
up to date
Explanation: Confirming the portfolio is current ensures relevance of the audit
findings.
Incorrect Answers:
A. Walk-throughs help but come later.
B. ROI requires current data.
D. Best practices may not reflect actual implementation.

Question 1632
Which of the following should an IS auditor do FIRST when determining whether
unauthorized changes have been made to production code?
A. Review access control permissions operating within the production program
libraries.
B. Examine the change control system records and trace them forward to object code
files.
C. Review change-approved designations established within the change control
system.
D. Examine object code to find instances of changes and trace them back to change
control records.
Correct Answer: D – Examine object code to find instances of changes
and trace them back to change control records
Explanation: Tracing actual changes back to records ensures unauthorized changes
are detected.
Incorrect Answers:
A–C: Useful, but less conclusive than code verification.

Question 1633
Which of the following SIEM issues should be of MOST concern to an IS auditor?
A. Log source times are not synchronized to a common time source.
B. The log sources include a wide range of technologies.
C. Some log sources use proprietary formats.
D. Some log sources generate high volumes of events.
Correct Answer: A – Log source times are not synchronized to a
common time source
Explanation: Without synchronized time, event correlation across systems is
unreliable.
Incorrect Answers:
B–D: May pose challenges but don’t compromise correlation directly.

Question 1634
Which of the following is a weakness in procedures for controlling migration of
changes to production libraries?
A. Allowing a synchronized release of executable and source code
B. Requiring only the programming project leader to review test results
C. Separating test and production programs in distinct libraries
D. Restricting access to production libraries to only operations personnel
Correct Answer: B – Requiring only the programming project leader
to review test results
Explanation: Single-person review lacks sufficient oversight and can allow errors.
Incorrect Answers:
A, C, D: These are standard and effective controls.

Question 1635
During the audit of an ERP system, a patch was applied in production. What is
MOST important for the IS auditor to verify?
A. Approval by the information security officer
B. Approval by the system administrator
C. Approval by the project manager
D. Approval by the information asset owner
Correct Answer: D – Approval by the information asset owner
Explanation: The asset owner is responsible for decisions affecting the system’s
integrity.
Incorrect Answers:
A–C: May be involved, but not primarily accountable.

Question 1636
An IS auditor finds no requirement for business cases in the SDLC. What is the
GREATEST concern?
A. Project costs exceed budget
B. Vendor selection criteria are poorly evaluated
C. Business impacts are not analyzed
D. Business resources are not optimally assigned
Correct Answer: C – Business impacts are not analyzed
Explanation: Business cases ensure alignment with organizational goals.
Incorrect Answers:
A, B, D: Secondary consequences.

Question 1637
Why should a network administration activity review occur daily instead of
quarterly?
A. To identify system changes
B. To detect unauthorized transactions
C. To identify failed login attempts
D. To detect network intrusions
Correct Answer: D – To detect network intrusions
Explanation: Daily reviews allow timely detection and response to threats.
Incorrect Answers:
A–C: Relevant but not primary for intrusion detection.

Question 1638
Employees repeatedly find malware-infected USBs. What should management do?
A. Restrict access to USB ports
B. Implement a removable media policy
C. Install another antivirus solution
D. Ensure antivirus is up to date
Correct Answer: B – Implement a removable media policy
Explanation: Policy defines acceptable use and preventive measures.
Incorrect Answers:
A. Restriction alone is not comprehensive.
C, D: Reactive, not preventive.

Question 1639
What is MOST important for smoke detector effectiveness in a data center?
A. Linked to wet pipe suppression
B. Linked to dry pipe suppression
C. Industry certification
D. Audible alarms when triggered
Correct Answer: D – Audible alarms when triggered
Explanation: Prompt alerting enables response before damage escalates.
Incorrect Answers:
A–C: Supporting but not most critical.

Question 1640
What is the MOST useful metric for senior management reviewing the project
portfolio?
A. Average delay of all projects
B. Total cost of IT projects
C. Number of high-priority projects
D. Alignment with strategic objectives
Correct Answer: D – Alignment with strategic objectives
Explanation: Strategic alignment reflects value to the business.
Incorrect Answers:
A–C: Informative but not strategic indicators.

Question 1641
Who is MOST responsible for defining acceptable levels of IT risk?
A. Board of directors
B. Steering committee
C. Chief risk officer
D. Executive management
Correct Answer: A – Board of directors
Explanation: The board sets the tone for risk management and oversight.
Incorrect Answers:
B–D: Implement and support, but don’t define.

Question 1642
Which metric BEST shows compliance with mandatory security training for new
hires?
A. % of new hires completing training
B. % of new hires reporting incidents
C. Number of policy-related terminations
D. Average training scores
Correct Answer: A – % of new hires completing training
Explanation: Completion is a direct measure of compliance.
Incorrect Answers:
B–D: Indirect or irrelevant.

Question 1643
In strategic IS planning, what should be reviewed FIRST?
A. Technology trends
B. Business continuity strategy
C. Business plan
D. Current IT environment
Correct Answer: C – Business plan
Explanation: The IS plan must support business goals.
Incorrect Answers:
A, B, D: Supporting data, but not the foundation.

Question 1644
Which tasks should be split among payroll staff to ensure SoD?
A. Approving payments and inputting salary rates
B. Approving vacation and reviewing time sheets
C. Viewing terminations and editing payroll
D. Adding/removing users from payroll system
Correct Answer: A – Approving payments and inputting salary rates
Explanation: These two combined create high fraud risk.
Incorrect Answers:
B–D: Sensitive, but A is most critical.

Question 1645
If an IT manager disagrees with a valid audit finding, what should the auditor do?
A. Remove the finding
B. Provide evidence and keep the finding
C. Modify the finding to include manager’s input
D. Exclude the manager from meetings
Correct Answer: B – Provide evidence and keep the finding
Explanation: Auditors must remain objective and support findings with evidence.
Incorrect Answers:
A, C, D: Compromise audit integrity or professionalism.

Question 1646
When is risk assessment MOST beneficial in SDLC?
A. Before development
B. At each life cycle stage
C. During business case
D. Before deployment
Correct Answer: B – At each life cycle stage
Explanation: Ongoing assessment ensures risk is addressed as it evolves.
Incorrect Answers:
A, C, D: Too limited.

Question 1647
How can an auditor BEST validate remediation of vulnerabilities?
A. Re-scan the systems
B. Interview scanning tool owners
C. Review patch documentation
D. Review change logs
Correct Answer: A – Re-scan the systems
Explanation: Re-scanning confirms that vulnerabilities no longer exist.
Incorrect Answers:
B–D: Indirect.

Question 1648
What is the MOST important consideration in disaster response?
A. Personnel safety
B. Asset protection
C. Revenue loss
D. Resource capacity
Correct Answer: A – Personnel safety
Explanation: Human life and safety are the highest priority.
Incorrect Answers:
B–D: Important but secondary.

Question 1649
A new internet connection to ERP increases what risk MOST?
A. Data quality reduction
B. Regulatory fines
C. Network slowness
D. Threat landscape expansion
Correct Answer: D – Threat landscape expansion
Explanation: Exposing ERP to the internet increases attack vectors.
Incorrect Answers:
A–C: Possible, but less direct.

Question 1650
If IT management accepts risk from unimplemented audit findings, what should the
auditor do?
A. Document noncompliance
B. Validate risk acceptance process
C. Update risk register
D. Check for compensating controls
Correct Answer: B – Validate risk acceptance process
Explanation: Ensure risk was accepted formally and with proper authority.
Incorrect Answers:
A, C, D: May follow, but B is first.

Question 1651
Which of the following provides the BEST assurance that vendor-supported software
remains up to date?
A. Software asset management
B. Version management
C. Licensing agreement and escrow
D. Release and patch management
Correct Answer: D – Release and patch management
Explanation: Release and patch management ensures updates are applied as soon
as they are available.
Incorrect Answers:
A. Asset management tracks ownership, not updates.
B. Version management monitors, not enforces updates.
C. Licensing doesn’t ensure updates.

Question 1652
Which of the following findings should be of GREATEST concern during an audit of
IT governance and management?
A. There is no chief information security officer (CISO) position.
B. The organization is not aligned with an international IT control standard.
C. There is no IT representation in business strategy committee meetings.
D. The IT strategy development process is not documented.
Correct Answer: A – There is no chief information security officer
(CISO) position
Explanation: A CISO is essential for defining and leading the information security
strategy.
Incorrect Answers:
B–D: Significant, but lack of a CISO is a governance gap.

Question 1653
An IS auditor detects the presence of known ransomware indicators. What should the
auditor do NEXT?
A. Research the type of ransomware to determine the associated risk.
B. Recommend a tool to remove the ransomware from the server.
C. Notify the parties responsible for the server.
D. Determine whether documented procedures exist for ransomware removal.
Correct Answer: C – Notify the parties responsible for the server
Explanation: Timely notification ensures appropriate containment and response.
Incorrect Answers:
A, B, D: May be necessary later but delay the response.

Question 1654
Which of the following would BEST enhance the capability of a web server to
accommodate a significant increase in web traffic?
A. Solid state drives
B. Virtualized environments
C. Additional network connections
D. Elastic cloud architecture
Correct Answer: D – Elastic cloud architecture
Explanation: Elasticity allows scaling resources automatically to meet demand.
Incorrect Answers:
A–C: Improve capacity but don’t auto-scale.

Question 1655
Which of the following attack types is MOST effectively addressed by an
organization's security awareness program?
A. Man-in-the-middle
B. Phishing
C. Structured query language (SQL) injection
D. Distributed denial of service (DDoS)
Correct Answer: B – Phishing
Explanation: Phishing exploits human behavior; awareness reduces risk.
Incorrect Answers:
A, C, D: Technical defenses are more appropriate.
Question 1656
What is the BEST way to identify unforeseen risk that may impact IT processes?
A. Review metrics and historical incident response reports.
B. Perform application control self-assessments (CSAs).
C. Assess IT policies and procedures.
D. Conduct a threat and vulnerability analysis.
Correct Answer: D – Conduct a threat and vulnerability analysis
Explanation: This identifies current and emerging risks beyond historical data.
Incorrect Answers:
A–C: Useful, but reactive or procedural.

Question 1657
Which of the following is the PRIMARY purpose of a rollback plan for a system
change?
A. To ensure a backup exists before implementing a change
B. To ensure testing can be re-performed if required
C. To ensure steps exist to remove the change if necessary
D. To ensure the system change is effective
Correct Answer: C – To ensure steps exist to remove the change if
necessary
Explanation: Rollback plans ensure changes can be reversed if needed.
Incorrect Answers:
A, B, D: Related, but not the core purpose.

Question 1658
A firewall has been installed on the company's web server. Which concern does the
firewall address?
A. Insider fraud
B. Unauthorized physical access
C. Internet-based threats
D. Power supply issues
Correct Answer: C – Internet-based threats
Explanation: Firewalls filter inbound/outbound network traffic to block malicious
access.
Incorrect Answers:
A, B, D: Firewalls don’t address these.

Question 1659
A new mobile device policy requires all devices to be encrypted. Which of the
following BEST supports compliance?
A. Conducting a device inventory
B. Installing a network firewall
C. Enabling full-disk encryption
D. Requiring antivirus software
Correct Answer: C – Enabling full-disk encryption
Explanation: Full-disk encryption protects data if the device is lost.
Incorrect Answers:
A, B, D: Helpful but don’t fulfill the encryption requirement.

Question 1660
What is the PRIMARY benefit of single sign-on (SSO)?
A. Lower licensing costs
B. Reduced risk of unauthorized access
C. Fewer password reset requests
D. Increased password complexity
Correct Answer: C – Fewer password reset requests
Explanation: SSO reduces the number of credentials users manage, lowering
support overhead.
Incorrect Answers:
A. Cost impact is minor.
B. Risk may increase if SSO is compromised.
D. Complexity depends on policy, not SSO.

Question 1661
Which of the following is MOST effective in detecting unauthorized wireless access
points?
A. Network intrusion detection systems (NIDS)
B. Wireless site surveys
C. Firewalls
D. IP blacklisting
Correct Answer: B – Wireless site surveys
Explanation: Site surveys identify rogue access points not visible to other tools.
Incorrect Answers:
A. NIDS monitors wired traffic.
C, D: Don’t address wireless visibility.

Question 1662
Which of the following is MOST important when evaluating business continuity plan
(BCP) testing procedures?
A. They are scheduled annually.
B. They include key business units.
C. They require executive approval.
D. They involve external auditors.
Correct Answer: B – They include key business units
Explanation: Effective BCP testing must reflect actual business priorities.
Incorrect Answers:
A–D: Procedural elements, not core effectiveness factors.

Question 1663
Which of the following is the PRIMARY purpose of a service level agreement (SLA)?
A. Ensure third-party compliance
B. Define penalties for poor service
C. Align service delivery with expectations
D. Enable automatic payments
Correct Answer: C – Align service delivery with expectations
Explanation: SLAs clarify roles, responsibilities, and service criteria.
Incorrect Answers:
A, B, D: Supportive but not primary.

Question 1664
What is the GREATEST concern with mobile device usage in BYOD environments?
A. Employee satisfaction
B. Data ownership
C. Malware infection
D. Application updates
Correct Answer: B – Data ownership
Explanation: Data on personal devices raises legal and security issues over
ownership and control.
Incorrect Answers:
A, C, D: Concerns, but not as impactful.

Question 1665
Which of the following is an IS audit requirement when evaluating assertions made
by management?
A. To ensure all risks have been addressed
B. To verify alignment with strategic goals
C. To form conclusions about each assertion
D. To assess whether the assertions comply with the law
Correct Answer: C – To form conclusions about each assertion
Explanation: Auditors must independently assess the truth and completeness of
claims.
Incorrect Answers:
A, B, D: Part of the broader evaluation, not the primary duty.

Question 1666
Which of the following is the MOST appropriate control to ensure the identity of an
email sender?
A. Automatic return receipt
B. Digital signature
C. Multi-factor authentication (MFA)
D. Transport Layer Security (TLS)
Correct Answer: B – Digital signature
Explanation: Digital signatures verify authenticity and message integrity.
Incorrect Answers:
A, C, D: Help with security, but not sender verification.

Question 1667
Which of the following provides the BEST estimate of the complexity associated with
a software development project for a web-based application?
A. Function point analysis
B. Value adjustment factor
C. Lines of code
D. Constructive cost model
Correct Answer: A – Function point analysis
Explanation: Function points measure software size based on functions provided.
Incorrect Answers:
B–D: Useful, but less effective in early complexity estimation.

Question 1668
When initiating an IT project, which of the following should be completed FIRST?
A. Request for proposal (RFP)
B. Feasibility study
C. IT resource plan
D. Milestone plan
Correct Answer: B – Feasibility study
Explanation: Feasibility assesses the viability before committing resources.
Incorrect Answers:
A, C, D: Depend on feasibility results.

Question 1669
Which of the following controls BEST mitigates the risk associated with password
compromise?
A. Passwords are stored in the cloud.
B. Passwords are unique for each application.
C. Passwords have format restrictions.
D. Passwords are masked.
Correct Answer: B – Passwords are unique for each application
Explanation: Unique passwords prevent compromise of multiple systems.
Incorrect Answers:
A, C, D: Improve protection, but uniqueness is most effective.

Question 1670
Which of the following findings would be of GREATEST concern when reviewing
project risk management practices?
A. Qualitative risk analyses have not been updated.
B. There are no formal milestone sign-offs.
C. Project management software is not being used.
D. Ongoing issues are not formally tracked.
Correct Answer: D – Ongoing issues are not formally tracked
Explanation: Lack of tracking prevents risk mitigation and response planning.
Incorrect Answers:
A–C: Operational, but not critical to risk response.

Question 1671
Which of the following BEST reduces sampling risk?
A. Increasing the risk appetite
B. Decreasing the sampling size
C. Using a statistical sampling method
D. Outsourcing the sampling process
Correct Answer: C – Using a statistical sampling method
Explanation: Statistical sampling ensures that the results are representative and
minimizes bias.
Incorrect Answers:
A. Adjusting risk appetite doesn't reduce sampling error.
B. Decreasing size increases risk.
D. Outsourcing doesn't guarantee sampling accuracy.

Question 1672
During preparation for an IS audit of an organization's IT security processes, which
of the following documents would BEST enable the IS auditor to understand the
ownership of specific operational tasks?
A. IT service delivery procedures
B. RACI chart
C. Security risk register
D. Documentation of non-functional requirements
Correct Answer: B – RACI chart
Explanation: RACI clearly defines roles and responsibilities for tasks.
Incorrect Answers:
A. Procedures outline tasks, not ownership.
C. Registers document risk, not roles.
D. Non-functional requirements focus on system behavior, not task ownership.

Question 1673
Which of the following roles is PRIMARILY responsible for mitigating the risk of
benefits not being realized in an IT project?
A. Chief risk officer (CRO)
B. Project sponsor
C. Project manager
D. Quality assurance (QA) manager
Correct Answer: B – Project sponsor
Explanation: The sponsor ensures alignment of project outcomes with business
benefits.
Incorrect Answers:
A. CRO handles enterprise risks.
C. PM manages execution, not benefits.
D. QA ensures quality, not benefit realization.

Question 1674
An IS auditor finds an emergency change request where an IT manager approved the
change, modified the code on the production platform, and resolved the ticket. Which
of the following should be the auditor's GREATEST concern?
A. There was no user acceptance testing (UAT) prior to making the change.
B. There was no follow-up approval from the business.
C. The IT manager performed the change.
D. The change did not go through the change advisory board.
Correct Answer: C – The IT manager performed the change
Explanation: A single individual handling approval and execution creates a
segregation of duties conflict.
Incorrect Answers:
A, B, D: Valid issues but secondary to SoD breach.

Question 1675
Which of the following can be used to implement dual-factor authentication?
A. A physical key and nondescript employee badge
B. An RFID card and proximity reader
C. A keypad access code and combination lock
D. A smart card and user-specific PIN
Correct Answer: D – A smart card and user-specific PIN
Explanation: Combines two different types—something you have and something
you know.
Incorrect Answers:
A–C: Often involve similar factor types.

Question 1676
When multiple IT projects must be run simultaneously for a DLP initiative, which of
the following should be introduced to BEST minimize associated risk?
A. Resource management
B. Portfolio management
C. Change management
D. Program management
Correct Answer: D – Program management
Explanation: Program management aligns related projects under a unified strategy.
Incorrect Answers:
A–C: Focused on specific domains, not integration.

Question 1677
An IS auditor is scheduled to conduct a follow-up but management postponed
implementation. What should be the auditor's NEXT course of action?
A. Defer the follow-up
B. Report to the audit committee
C. Assess the risk of delay
D. Proceed with the follow-up
Correct Answer: C – Assess the risk of delay
Explanation: Understanding impact helps decide whether escalation is necessary.
Incorrect Answers:
A–B: Premature without risk evaluation.
D. May waste resources.

Question 1678
What type of control is a secure code review as part of deployment?
A. Monitoring
B. Deterrent
C. Corrective
D. Detective
Correct Answer: D – Detective
Explanation: It identifies issues before deployment but after development.
Incorrect Answers:
A. Not a monitoring function.
B. Doesn’t discourage; it finds.
C. Doesn’t fix, just finds.

Question 1679
What is the MOST important privacy concern when using a cloud provider for
customer data?
A. Regulatory reporting of data transfers
B. Regulatory alignment of data privacy
C. Customer notification before data use
D. Monitoring using industry best practices
Correct Answer: B – Regulatory alignment of data privacy
Explanation: Data must be handled per applicable privacy laws.
Incorrect Answers:
A, C, D: May be required, but not the core obligation.

Question 1680
When auditing financial systems, which review sequence is MOST appropriate?
A. General IS controls → Application controls
B. Application controls → Business controls
C. Financial applications → Governance
D. Transactions → General ledger
Correct Answer: A – General IS controls → Application controls
Explanation: Application control effectiveness relies on underlying IS controls.
Incorrect Answers:
B–D: Out of audit logical sequence.

Question 1681
What is the GREATEST concern in change management?
A. No meeting minutes
B. No emergency requester list
C. Post-approval of changes
D. No change prioritization
Correct Answer: C – Post-approval of changes
Explanation: Bypassing approval before implementation undermines controls.
Incorrect Answers:
A, B, D: Administrative, not critical violations.
Question 1682
Why conduct tabletop exercises for incident response plans?
A. Align test scenarios
B. Prepare audit documentation
C. Identify process improvements
D. Confirm supporting technology
Correct Answer: C – Identify process improvements
Explanation: Exercises test response flow and uncover gaps.
Incorrect Answers:
A–B: Side benefits.
D. Testing tech isn't the primary goal.

Question 1683
Legacy system lacks new controls, but migration is planned. Auditor’s BEST action?
A. Close the finding
B. Schedule post-review
C. Reassess risk
D. Update audit report
Correct Answer: C – Reassess risk
Explanation: Auditor must evaluate risk posed during transition period.
Incorrect Answers:
A–B: Too passive.
D. Doesn’t address the risk itself.

Question 1684
Change without UAT is found. Auditor should:
A. Delay the audit
B. Document and explain the risk
C. Recommend rollback
D. Perform post-testing
Correct Answer: B – Document and explain the risk
Explanation: Auditor reports risks, not operational decisions.
Incorrect Answers:
A–C: Operational responses outside audit role.

Question 1685
Workaround documentation is critical to which of the following?
A. Business continuity plan (BCP)
B. Business impact analysis (BIA)
C. Incident management
D. Threat and risk assessment
Correct Answer: A – Business continuity plan (BCP)
Explanation: Workarounds help maintain operations during disaster.
Incorrect Answers:
B–D: Related but not central.

Question 1686
Which backup method helps MOST after ransomware?
A. Online sync
B. Incremental
C. Differential
D. Offline
Correct Answer: D – Offline
Explanation: Offline backups are immune to encryption or overwriting.
Incorrect Answers:
A–C: Can be compromised during the attack.

Question 1687
Best way to embed a data classification program?
A. Enforce encryption
B. Update policy often
C. Focus on high-priority data
D. Include in awareness training
Correct Answer: D – Include in awareness training
Explanation: Daily adoption requires user awareness and application.
Incorrect Answers:
A–C: Support implementation but not embedment.

Question 1688
Which procurement audit issue is MOST serious?
A. Procedures outdated
B. Post-expense approvals
C. New procurement manager
D. No payment thresholds
Correct Answer: B – Post-expense approvals
Explanation: Violates control over spending.
Incorrect Answers:
A, C, D: Administrative gaps.

Question 1689
In continuous monitoring audit, what’s MOST important?
A. Signed test docs
B. Dual control in workflows
C. Tool configuration
D. Monitoring resiliency
Correct Answer: C – Tool configuration
Explanation: Accuracy depends on correct tool setup.
Incorrect Answers:
A, B, D: Supporting concerns.

Question 1690
Disk usage >95%. What’s the biggest concern?
A. Availability
B. Consistency
C. Security
D. DoS
Correct Answer: A – Availability
Explanation: Lack of space can crash systems.
Incorrect Answers:
B–D: Secondary risks.

Question 1691
Which of the following backup types BEST enables an organization to recover data
following a ransomware attack?
A. Online data synchronization
B. Incremental backup
C. Differential backup
D. Offline backup
Correct Answer: D – Offline backup
Explanation: Offline backups are disconnected from the network, making them
immune to ransomware encryption.
Incorrect Answers:
A. Sync can propagate malware.
B, C. Still accessible to ransomware.

Question 1692
What would be the BEST way to incorporate a new data classification program into
daily operations?
A. Require and enforce encryption of confidential information.
B. Ensure the data classification policy is updated on a regular basis.
C. Ensure the organizational focus is on data classified as high priority.
D. Make data classification part of employee security awareness training.
Correct Answer: D – Make data classification part of employee
security awareness training
Explanation: Awareness fosters consistent and proper implementation by end users.
Incorrect Answers:
A–C: Are supporting activities, not integration mechanisms.

Question 1693
When auditing an organization's procurement process, which of the following
observations should be of MOST concern to an IS auditor?
A. Purchasing procedures and processes have not been updated during the past two
years.
B. Contracts can be approved after expenses have been incurred.
C. The procurement manager is new to the organization.
D. Thresholds for requesting and approving payments for purchase requests have not
been established.
Correct Answer: B – Contracts can be approved after expenses have
been incurred
Explanation: This violates control principles and allows unauthorized commitments.
Incorrect Answers:
A, C, D: Weaknesses but not as critical.

Question 1694
Which of the following is MOST important for an IS auditor to review during an
audit of an automated continuous monitoring process being used by the finance
department?
A. Management sign-off of test documentation
B. Dual control and approvals embedded in processes
C. Configuration of the monitoring tool
D. Resiliency of the monitoring service
Correct Answer: C – Configuration of the monitoring tool
Explanation: Accurate configuration ensures monitoring effectiveness and proper
alerting.
Incorrect Answers:
A, B, D: Supportive but not primary.

Question 1695
When reviewing hard disk utilization reports, an IS auditor observes that utilization
is routinely above 95%. Which of the following should be the GREATEST concern to
the IS auditor?
A. Availability
B. Consistency
C. Data security
D. Denial of service (DoS) attacks
Correct Answer: A – Availability
Explanation: High utilization can lead to system crashes or delays.
Incorrect Answers:
B–D: Secondary risks.

Question 1696
Which of the following is the MOST important consideration when designing a risk-
based incident response management program?
A. Monitoring recurring low-risk events
B. Minimizing false-positive and false-negative alerts
C. Testing and updating the incident response plan annually
D. Assigning roles and responsibilities
Correct Answer: D – Assigning roles and responsibilities
Explanation: Clear accountability enables effective and timely response.
Incorrect Answers:
A–C: Important but come after defining roles.

Question 1697
Which of the following conditions should be of GREATEST concern to an IS auditor
reviewing change management?
A. Vendors do not have access to apply changes to the QA environment.
B. The individual applying the changes is not responsible for approving the changes.
C. Change management documentation is not submitted prior to development.
D. The change management process does not include vendor-supplied changes.
Correct Answer: C – Change management documentation is not
submitted prior to development
Explanation: Proper documentation ensures traceability and compliance.
Incorrect Answers:
A, B, D: Lower impact on traceability and controls.

Question 1698
An IS auditor is tasked with reviewing an organization's purchase invoices to discover
fictitious entries that may have been created as part of a suspected fraud scheme.
Which of the following is the MOST effective data analysis technique for this
situation?
A. Benford’s law
B. Predictive analysis
C. Data mining
D. Regression analysis
Correct Answer: A – Benford’s law
Explanation: Benford’s law helps identify anomalies in numerical data patterns.
Incorrect Answers:
B–D: Useful but less targeted for detecting fraud anomalies.

Question 1699
Which of the following should be of GREATEST concern to an IS auditor conducting
an audit of an organization's data center?
A. The data center is in a high flood zone.
B. Employees working in the data center have not been trained in the use of fire
extinguishers.
C. The data center has a wet-pipe sprinkler system.
D. Fire extinguishers are missing in some zones.
Correct Answer: A – The data center is in a high flood zone
Explanation: Environmental threats like flooding can render the facility inoperable.
Incorrect Answers:
B–D: Important, but not as catastrophic in risk.

Question 1700
An IS auditor is reviewing a newly implemented system. Several critical errors with
severe impact have occurred. What should the auditor do NEXT to understand the
cause?
A. Review the decision-making logic built into the system.
B. Verify system adherence to corporate policy.
C. Understand the purpose and functionality of the system.
D. Interview the system owner.
Correct Answer: C – Understand the purpose and functionality of the
system
Explanation: Understanding the system helps frame any issue in context.
Incorrect Answers:
A, B, D: Steps to follow later.

Question 1701
An IS auditor is reviewing historical production change tickets. Which of the
following is the BEST indication of potential concerns with the change management
process?
A. A large number of canceled changes
B. A large number of emergency changes
C. A large number of rollback changes
D. A large number of high-impact changes
Correct Answer: C – A large number of rollback changes
Explanation: Frequent rollbacks indicate poor testing or improper change
validation.
Incorrect Answers:
A. Cancellations may not pose risk.
B. Emergencies may be valid but monitored.
D. High impact is a planning concern, not necessarily a failure.

Question 1702
An organization requires the use of a key card to enter its data center. Recently, a
control was implemented that requires biometric authentication for each employee.
Which type of control has been added?
A. Compensating
B. Corrective
C. Detective
D. Preventive
Correct Answer: D – Preventive
Explanation: Biometric authentication is a preventive control to stop unauthorized
access.
Incorrect Answers:
A. Compensating controls substitute primary ones.
B. Corrective acts after the fact.
C. Detective identifies, not prevents.

Question 1703
An IS auditor is reviewing documentation from a change that was applied to an
application. Which of the following findings would be the GREATEST concern?
A. Testing documentation is approved prior to completion of user acceptance testing
(UAT).
B. Testing documentation does not show manager approval.
C. Testing documentation is kept in hard copy format.
D. Testing documentation is dated three weeks before the system implementation
date.
Correct Answer: A – Testing documentation is approved prior to
completion of user acceptance testing (UAT)
Explanation: Approval before UAT completion may lead to undetected defects.
Incorrect Answers:
B–D: Issues but not as critical.

Question 1704
Which of the following provides an organization with the fastest resumption of
processing following a disk failure?
A. Batch replication
B. Direct backup to server
C. Mirroring
D. Warm site recovery
Correct Answer: C – Mirroring
Explanation: Mirroring creates real-time copies, enabling immediate recovery.
Incorrect Answers:
A–B. Slower than real-time.
D. Warm sites are for full system recovery, not disk failures.

Question 1705
Which of the following is the PRIMARY advantage of using an automated security
log monitoring tool instead of conducting a manual review to monitor the use of
privileged access?
A. Ease of log retrieval for audit purposes
B. Ease of storing and maintaining log file
C. Reduced costs associated with automating the review
D. Increased likelihood of detecting suspicious activity
Correct Answer: D – Increased likelihood of detecting suspicious
activity
Explanation: Automation improves detection of anomalies due to speed and
consistency.
Incorrect Answers:
A–C: Benefits, but not the primary advantage.

Question 1706
When verifying the effectiveness of an organization’s provisioning process, which
sampling technique is MOST appropriate to use?
A. Random sampling
B. Judgmental sampling
C. Stop-or-go sampling
D. Haphazard sampling
Correct Answer: A – Random sampling
Explanation: Random sampling avoids bias and ensures coverage.
Incorrect Answers:
B. Judgment-based and may not be representative.
C. Useful for compliance tests, less for process.
D. Lacks structure.

Question 1707
Which of the following should be of GREATEST concern to an IS auditor assessing
an organization's patch management program?
A. Patches for medium- and low-risk vulnerabilities are omitted.
B. Patches are deployed from multiple deployment servers.
C. There is no process in place to quarantine servers that have not been patched.
D. There is no process in place to scan the network to identify missing patches.
Correct Answer: D – There is no process in place to scan the network
to identify missing patches
Explanation: Without scans, missed patches pose serious risks.
Incorrect Answers:
A–C: Concerns but manageable with proper scanning.

Question 1708
An audit identified weak password controls in a database system. Which of the
following provides the BEST evidence that the audit finding has been remediated?
A. Observation of updated password settings with database administrators (DBAs)
B. Review of database administrator (DBA) procedures
C. Attestation from DBAs that password settings have been updated
D. Interviews with management about remediation completion
Correct Answer: A – Observation of updated password settings with
database administrators (DBAs)
Explanation: Direct observation is the strongest evidence of actual implementation.
Incorrect Answers:
B–D: Indirect or subjective evidence.

Question 1709
Which of the following is the BEST indicator that a third-party vendor adheres to
the controls required by the organization?
A. Certifications maintained by the vendor
B. Regular independent assessment of the vendor
C. Review of monthly performance reports submitted by the vendor
D. Substantive log file review of the vendor's system
Correct Answer: B – Regular independent assessment of the vendor
Explanation: Independent reviews provide objective assurance.
Incorrect Answers:
A. Certifications are not activity-specific.
C. Reports may be selective.
D. Logs are useful, but review lacks independence.

Question 1710
An IS auditor is evaluating the IT business planning process. Which of the following
should be of GREATEST concern to the auditor?
A. Several business cases are found to be based on a misdiagnosed problem.
B. End users are not involved in business case development.
C. Business case development is completed before strategic initiatives are finalized.
D. Business impact analysis (BIA) results are not included in the business case.
Correct Answer: A – Several business cases are found to be based on a
misdiagnosed problem
Explanation: Incorrect problem diagnosis undermines the value of the entire
planning process.
Incorrect Answers:
B–D: Important, but less fundamental than addressing the correct problem.

Question 1711
An IS auditor is reviewing the IT risk assessment process of an organization. Which
of the following would be the auditor’s PRIMARY concern?
A. The process does not consider IT asset classification.
B. Risk assessments are conducted twice a year.
C. The risk register is updated manually.
D. Controls are tested during each risk review.
Correct Answer: A – The process does not consider IT asset
classification
Explanation: Asset classification is essential for understanding the value and
priority of risks.
Incorrect Answers:
B. Semi-annual assessments may be sufficient.
C. Manual updates are acceptable with proper controls.
D. Control testing is a good practice.

Question 1712
Which of the following BEST mitigates the risk of data being leaked through instant
messaging applications?
A. Requiring strong authentication
B. Enabling antivirus scanning
C. Blocking file transfers through messaging apps
D. Limiting group chat size
Correct Answer: C – Blocking file transfers through messaging apps
Explanation: Prevents data from being shared outside approved channels.
Incorrect Answers:
A. Doesn’t address messaging risks.
B. AV doesn't prevent intentional sharing.
D. Group size doesn’t mitigate leaks.

Question 1713
Which of the following would be MOST useful in preventing brute-force attacks on
web applications?
A. Intrusion detection system (IDS)
B. Enforcing CAPTCHA after several failed login attempts
C. Implementing verbose error messages
D. Daily password changes
Correct Answer: B – Enforcing CAPTCHA after several failed login
attempts
Explanation: CAPTCHA blocks automated login attempts after failures.
Incorrect Answers:
A. IDS detects, doesn’t prevent.
C. Verbose errors can aid attackers.
D. Daily changes burden users unnecessarily.

Question 1714
Which of the following BEST ensures accountability of users for changes made in a
critical system?
A. Automatic logout after inactivity
B. Enforcing strong password policies
C. Logging individual user activity
D. Restricting shared access accounts
Correct Answer: C – Logging individual user activity
Explanation: Logs provide traceable records of actions.
Incorrect Answers:
A, B, D: Help security but not direct accountability.

Question 1715
An IS auditor is reviewing the results of a social engineering test. Which metric is
MOST relevant?
A. Number of emails sent
B. Number of users who clicked on phishing links
C. Number of active accounts
D. Number of antivirus alerts
Correct Answer: B – Number of users who clicked on phishing links
Explanation: This shows susceptibility to phishing.
Incorrect Answers:
A. Doesn’t indicate effectiveness.
C, D: Unrelated to the test.

Question 1716
What is the PRIMARY reason for logging unsuccessful login attempts?
A. To assess password policy effectiveness
B. To validate account creation processes
C. To detect possible brute-force attacks
D. To reduce help desk workload
Correct Answer: C – To detect possible brute-force attacks
Explanation: Multiple failures may indicate attack attempts.
Incorrect Answers:
A. Policy is tested differently.
B. Creation isn’t linked to failure logs.
D. Logging doesn’t reduce support calls.

Question 1717
What should be the PRIMARY focus of an IS auditor when evaluating the adequacy
of an IT disaster recovery test?
A. Test duration
B. Participation rate
C. Success criteria and test results
D. Cost of the test
Correct Answer: C – Success criteria and test results
Explanation: Determines if objectives were met and identifies gaps.
Incorrect Answers:
A–B: Useful metrics but not primary.
D. Cost matters, but effectiveness is key.

Question 1718
What is the BEST approach to ensure continued compliance with security policies by
third-party service providers?
A. Require security awareness training
B. Conduct regular audits
C. Establish clear SLAs
D. Require background checks
Correct Answer: B – Conduct regular audits
Explanation: Audits validate ongoing adherence to policies.
Incorrect Answers:
A, C, D: Useful controls, but don’t ensure compliance.

Question 1719
Which of the following would be the MOST effective method to restrict access to
confidential information in a shared environment?
A. Encrypting all files
B. Classifying data according to sensitivity
C. Implementing role-based access control (RBAC)
D. Applying disk quotas
Correct Answer: C – Implementing role-based access control (RBAC)
Explanation: RBAC limits access to only what a user needs.
Incorrect Answers:
A. Encryption protects but doesn’t limit access.
B. Classification helps labeling, not enforcement.
D. Disk quotas manage storage, not access.

Question 1720
An IS auditor reviewing IT governance should FIRST assess whether:
A. IT goals align with business objectives.
B. IT investments have generated ROI.
C. IT risks are documented.
D. IT projects are on schedule.
Correct Answer: A – IT goals align with business objectives
Explanation: Alignment ensures value delivery and strategic fit.
Incorrect Answers:
B–D: Important, but depend on strategic alignment.

Question 1721
Which of the following is MOST critical in determining the effectiveness of incident
response processes?
A. Number of resolved incidents
B. Root cause analysis documentation
C. Response time metrics
D. Frequency of incident occurrence
Correct Answer: C – Response time metrics
Explanation: Quick responses help minimize impact.
Incorrect Answers:
A, B, D: Support analysis but don’t measure response effectiveness directly.

Question 1722
Which of the following is MOST effective in preventing session hijacking?
A. Strong encryption
B. Session timeout and regeneration
C. Password complexity
D. URL masking
Correct Answer: B – Session timeout and regeneration
Explanation: Regenerating session IDs limits reuse by attackers.
Incorrect Answers:
A. Encrypts data but not session ID.
C. Protects login, not sessions.
D. Obscures URLs, not sessions.

Question 1723
Which of the following BEST mitigates the risk of unauthorized database queries?
A. Full database encryption
B. Activity logging
C. Role-based access controls
D. Data loss prevention tools
Correct Answer: C – Role-based access controls
Explanation: RBAC restricts access to only necessary queries.
Incorrect Answers:
A. Encrypts, but doesn’t limit queries.
B. Detects but doesn’t prevent.
D. Helps data control but isn’t granular.

Question 1724
A user is granted access to a system through an access request form. What should be
of GREATEST concern to an IS auditor?
A. The request form was paper-based.
B. The request did not have the immediate supervisor’s approval.
C. The access rights granted were excessive.
D. The form lacked a timestamp.
Correct Answer: C – The access rights granted were excessive
Explanation: Excessive rights violate the principle of least privilege.
Incorrect Answers:
A, B, D: Process issues but lower risk.

Question 1725
Which of the following should be the PRIMARY goal of security awareness training?
A. Enhance technical skills
B. Reduce incident response time
C. Improve compliance metrics
D. Promote secure behavior
Correct Answer: D – Promote secure behavior
Explanation: The goal is to shape employee behavior, reducing risk.
Incorrect Answers:
A. Not training’s purpose.
B. Indirect benefit.
C. Training alone doesn’t improve compliance metrics.
Question 1726
Which of the following metrics BEST measures the effectiveness of a vulnerability
management program?
A. Number of systems patched per week
B. Number of vulnerabilities found
C. Mean time to remediate (MTTR)
D. Number of critical systems scanned
Correct Answer: C – Mean time to remediate (MTTR)
Explanation: MTTR indicates how quickly vulnerabilities are resolved.
Incorrect Answers:
A, B, D: Informative but not direct measures of effectiveness.

Question 1727
Which of the following provides the BEST assurance that a critical patch was
properly applied to a production system?
A. Patch approval documentation
B. System vulnerability scan
C. Change management log
D. Email confirmation
Correct Answer: B – System vulnerability scan
Explanation: A scan verifies if the system is still vulnerable.
Incorrect Answers:
A, C, D: Support process tracking, not actual confirmation.

Question 1728
Which of the following is the GREATEST benefit of security event correlation?
A. Increased firewall throughput
B. Faster response to threats
C. Reduced storage costs
D. Improved user satisfaction
Correct Answer: B – Faster response to threats
Explanation: Correlating events enables quicker identification of attacks.
Incorrect Answers:
A, C, D: Indirect or unrelated benefits.

Question 1729
A user reports being unable to access a critical application. Which of the following
should be performed FIRST?
A. Escalate the issue to application developers
B. Log the issue in the ticketing system
C. Verify the issue by attempting access
D. Notify the security team
Correct Answer: C – Verify the issue by attempting access
Explanation: Verification avoids unnecessary escalation.
Incorrect Answers:
A–B: Steps after confirming the problem.
D. Security may not be relevant yet.

Question 1730
Which of the following should be reviewed FIRST when performing an audit of an
organization's mobile device policy?
A. Encryption methods used
B. Enforcement of screen locks
C. Business justification for the policy
D. Approved applications list
Correct Answer: C – Business justification for the policy
Explanation: Policy effectiveness begins with clear business alignment.
Incorrect Answers:
A, B, D: Operational details.

Question 1731
Emergency change control procedures MUST include which of the following
requirements?
A. Request that the help desk make the changes.
B. Ensure audit logs track emergency changes.
C. Use an emergency ID to move production programs into development.
D. Update production source libraries to reflect changes.
Correct Answer: B – Ensure audit logs track emergency changes
Explanation: Tracking emergency changes is critical for maintaining accountability
and enabling audit trails.
Incorrect Answers:
A. Help desk shouldn’t execute emergency changes.
C. Reverse flow of development is inappropriate.
D. Updating source libraries is a later step.

Question 1732
Which of the following is MOST important to consider when developing a business
continuity plan (BCP)?
A. Results of enterprise risk assessment
B. Results of annual tabletop exercises
C. Updated business impact analysis (BIA)
D. Executive buy-in of the plan
Correct Answer: C – Updated business impact analysis (BIA)
Explanation: The BIA determines critical business functions and recovery priorities.
Incorrect Answers:
A. Important but BIA takes precedence.
B. Tabletop exercises test the plan, not build it.
D. Buy-in is needed but not foundational.

Question 1733
When establishing new integrations with a vendor, which of the following is an IS
auditor's BEST recommendation to management concerning data security?
A. Data interchange requests should require authentication and authorization checks.
B. Management should ensure data being shared is aligned with the acceptable use
policy.
C. Batch processing should be utilized during business hours to minimize disruptions.
D. Transaction logs should be monitored for completeness and accuracy.
Correct Answer: A – Data interchange requests should require
authentication and authorization checks
Explanation: Ensures only authorized systems and users initiate data exchanges.
Incorrect Answers:
B. Ensures usage policy but not security.
C. Focuses on timing, not security.
D. Monitoring supports, doesn’t prevent.

Question 1734
Which of the following is the BEST approach to minimize the risk of devices being
unavailable following a required firmware upgrade?
A. Deploy incrementally from a staging environment.
B. Manually deploy to each device.
C. Automatically deploy to all devices directly from the manufacturer.
D. Roll into a mass distribution deployment.
Correct Answer: A – Deploy incrementally from a staging environment
Explanation: Staging minimizes widespread failure by limiting initial exposure.
Incorrect Answers:
B. Not scalable.
C. Risky without testing.
D. High risk of systemic failure.

Question 1735
Which of the following is the GREATEST indication of scope creep in the
management of a software development project?
A. Several change requests have been authorized by the project steering committee.
B. Some requirements are untraceable to the approved business case.
C. Project budget exceeds the allocated cost.
D. Project delivery has been delayed by several months.
Correct Answer: B – Some requirements are untraceable to the
approved business case
Explanation: Unapproved additions indicate expansion beyond original scope.
Incorrect Answers:
A. Authorized changes may be planned.
C, D: May result from other causes.

Question 1736
Which of the following is MOST helpful to a project manager in mitigating risk
associated with frequent changes in project requirements?
A. Conducting post-implementation reviews
B. Monitoring changes in risk factors
C. Performing mid-term project reviews
D. Implementing formal reviews of changes
Correct Answer: D – Implementing formal reviews of changes
Explanation: Ensures structured evaluation before changes are implemented.
Incorrect Answers:
A. Happens too late.
B. Helps but lacks control mechanism.
C. Periodic reviews don’t control change.

Question 1737
Which of the following should be of GREATEST concern to an IS auditor assessing
the effectiveness of an organization's information security governance?
A. Risk assessments of information assets are not periodically performed.
B. There is no process to measure information security performance.
C. The information security policy is not reviewed by executive management.
D. The CISO reports to the CIO.
Correct Answer: A – Risk assessments of information assets are not
periodically performed
Explanation: Without assessments, the governance program lacks direction.
Incorrect Answers:
B, C, D: Important, but depend on risk insights.

Question 1738
Which of the following is the BEST way for an organization to ensure business
continuity for its e-commerce operations?
A. Use clustered server configurations
B. Implement encryption for sensitive data
C. Perform daily vulnerability scans
D. Maintain access logs
Correct Answer: A – Use clustered server configurations
Explanation: Clustering enables failover and minimizes downtime.
Incorrect Answers:
B. Supports confidentiality, not continuity.
C. Detection, not recovery.
D. Logging is passive.

Question 1739
Which of the following actions is the BEST example of strategic IT alignment?
A. Outsourcing software development to competent third parties
B. Developing a robust business case
C. Organizing the project portfolio according to business risk
D. Providing project status updates
Correct Answer: C – Organizing the project portfolio according to
business risk
Explanation: Aligns IT investments with risk priorities and strategic objectives.
Incorrect Answers:
A. Tactical decision.
B. Supports alignment, not execution.
D. Communicates progress, doesn’t align.

Question 1740
Of the following, who is accountable for ensuring the representation of major
stakeholders involved in a project?
A. Change control board
B. Steering committee
C. Project management office (PMO)
D. Project manager
Correct Answer: B – Steering committee
Explanation: Provides oversight and ensures proper stakeholder inclusion.
Incorrect Answers:
A. Manages changes, not stakeholder engagement.
C. Supports, not governs.
D. Executes, doesn’t oversee inclusion.

Question 1741
IS audit management reviewed the audit work done for a system implementation and
determined that the weaknesses responsible for a major issue were not in the audit
scope. Which type of audit risk was MOST likely overlooked when planning the
audit?
A. Statistical sampling risk
B. Detection risk
C. Control risk
D. Inherent risk
Correct Answer: B – Detection risk
Explanation: Detection risk is the risk that an auditor fails to detect a material
misstatement or issue, which often results from inadequate audit scope or procedures.
Incorrect Answers:
A. Sampling risk concerns the selection of items for testing, not scope.
C. Control risk relates to the failure of internal controls, not the audit process.
D. Inherent risk is tied to the nature of the item being audited.

Question 1742
Which of the following BEST enables an IS auditor to determine the effectiveness of
controls for an audit area?
A. Control self-assessment (CSA)
B. Prior audit results
C. Control implementation methods
D. SWOT analysis
Correct Answer: A – Control self-assessment (CSA)
Explanation: CSA involves management and staff in evaluating the effectiveness of
their own controls, providing insight into their functionality and awareness.
Incorrect Answers:
B. Historical audits may not reflect current effectiveness.
C. Implementation shows existence, not effectiveness.
D. SWOT is a strategic tool, not a control effectiveness evaluation.

Question 1743
An organization has implemented a policy to require minimum security control
baselines when configuring servers or systems. What control type has been
implemented?
A. Compensating
B. Directive
C. Preventive
D. Corrective
Correct Answer: C – Preventive
Explanation: Security baselines help prevent vulnerabilities by standardizing secure
configurations before deployment.
Incorrect Answers:
A. Compensating controls fill in where primary controls can't be implemented.
B. Directive controls guide or encourage compliance.
D. Corrective controls respond after an incident has occurred.

Question 1744
While conducting a follow-up on an asset management audit, the IS auditor finds
paid invoices for IT devices not recorded in the organization's inventory. What is the
auditor's BEST course of action?
A. Alert both audit and operations management about the discrepancy.
B. Ask the asset management staff where the devices are.
C. Make a note of the evidence to include it in the scope of a future audit.
D. Ignore the invoices since they are not part of the follow-up.
Correct Answer: A – Alert both audit and operations management
about the discrepancy
Explanation: Immediate escalation helps ensure the discrepancy is addressed and
controls are reviewed.
Incorrect Answers:
B. Inquiry is helpful but informal.
C. Deferring action may allow risk to continue.
D. Ignoring issues is not aligned with professional audit conduct.

Question 1745
Which of the following is an analytical review procedure for a payroll system?
A. Performing reasonableness tests by multiplying the number of employees by the
average wage rate
B. Performing penetration attempts on the payroll system
C. Evaluating the performance of the payroll system using benchmarking software
D. Testing hours reported on time sheets
Correct Answer: A – Performing reasonableness tests by multiplying
the number of employees by the average wage rate
Explanation: This is a typical analytical procedure that helps identify anomalies or
inconsistencies in payroll.
Incorrect Answers:
B. Penetration testing assesses security, not analytical accuracy.
C. Benchmarking is about performance, not financial reasonableness.
D. Time sheet testing is a substantive, not analytical, test.

Question 1746
During a financial accounting audit, an IS auditor finds that the IT general controls
are deficient. Which of the following is the MOST effective course of action to
complete the audit?
A. Conduct an IT risk assessment
B. Increase the substantive testing of the financial balances
C. Place greater reliance on the financial application controls
D. Place greater reliance on the framework of control
Correct Answer: B – Increase the substantive testing of the financial
balances
Explanation: If general controls are weak, more testing of the actual transactions
and balances compensates for the control deficiency.
Incorrect Answers:
A. Risk assessment won’t substitute for evidence.
C. Application controls are undermined if ITGCs are flawed.
D. A control framework alone doesn’t provide assurance.

Question 1747
IT disaster recovery time objectives (RTOs) should be based on the:
A. Mean time to restore (MTTR)
B. Maximum tolerable downtime (MTD)
C. System interdependencies
D. Maximum tolerable loss of data
Correct Answer: B – Maximum tolerable downtime (MTD)
Explanation: RTO must be shorter than or equal to the MTD to ensure business
continuity.
Incorrect Answers:
A. MTTR is measured after recovery, not for planning.
C. Interdependencies affect prioritization, not RTO definition.
D. Data loss pertains to RPO, not RTO.

Question 1748
During an audit of a mortgage processing application, an IS auditor identifies that
the application allows all users to export large quantities of sensitive customer data.
Which of the following is the BEST control for the auditor to recommend to mitigate
this risk?
A. Restrict download capability to authorized users
B. Require strong passwords for application login
C. Periodically recertify user access
D. Mask sensitive data within the application
Correct Answer: A – Restrict download capability to authorized users
Explanation: Limiting access to data export functions reduces the risk of data
leakage.
Incorrect Answers:
B. Passwords protect access, not functionality.
C. Recertification helps long-term, not real-time.
D. Masking affects visibility, not export.
Question 1749
Which of the following should be of MOST concern to an IS auditor reviewing data
backup procedures prior to a system migration?
A. Data backups are stored at a different site from the system's application servers
B. Incremental data backup jobs are paused during the migration
C. Data restoration procedures have never been utilized to restore the system’s
database
D. A full backup has not occurred within a week
Correct Answer: C – Data restoration procedures have never been
utilized to restore the system’s database
Explanation: Untested restoration processes may fail when needed most during
migration or disaster.
Incorrect Answers:
A. Offsite storage is good practice.
B. Pausing may be acceptable if planned.
D. May be acceptable depending on RPO.

Question 1750
What is the MOST effective way to detect installation of unauthorized software
packages by employees?
A. Communicating the policy to employees
B. Regular scanning of hard drives
C. Logging of activity on the network
D. Maintaining current antivirus software
Correct Answer: B – Regular scanning of hard drives
Explanation: Scanning directly identifies unauthorized installations on devices.
Incorrect Answers:
A. Education doesn’t ensure compliance.
C. Logs may miss local activity.
D. Antivirus is for threat detection, not compliance enforcement.

Question 1751
Which of the following should be done FIRST when creating a data protection
program?
A. Test logical access controls for effectiveness.
B. Perform classification based on standards.
C. Implement data loss prevention (DLP) controls.
D. Deploy intrusion detection systems (IDS).
Correct Answer: B – Perform classification based on standards
Explanation: Classification defines what data needs protection and guides all
subsequent controls.
Incorrect Answers:
A. Testing comes after classification.
C. DLP is effective only when classification is in place.
D. IDS is unrelated to data classification.

Question 1752
Which component of a service level agreement (SLA) provides the GREATEST
assurance that service provider production issues will be resolved promptly?
A. Right to audit the service provider upon request
B. Penalties for noncompliance
C. Documented processes for dispute resolution
D. Indemnity clause against liabilities
Correct Answer: B – Penalties for noncompliance
Explanation: Penalties incentivize timely resolution of issues.
Incorrect Answers:
A. Helpful, but doesn’t ensure action.
C. Dispute resolution is reactive.
D. Indemnity limits liability but not service performance.

Question 1753
Which of the following would BEST reduce operational risks if a third-party software
vendor goes out of business?
A. Software escrow agreements
B. SLAs in the contract
C. Evidence of vendor’s financial stability
D. Vendor support agreements
Correct Answer: A – Software escrow agreements
Explanation: Escrow ensures access to source code for continuity.
Incorrect Answers:
B–D: Address performance but not vendor continuity.

Question 1754
The PRIMARY role of an IS auditor in problem remediation is to:
A. present updated policies to management.
B. explain findings and provide general advice.
C. take ownership of issues and oversee remediation.
D. help management implement solutions.
Correct Answer: B – Explain findings and provide general advice
Explanation: Auditors advise, not manage, remediation.
Incorrect Answers:
A, C, D: Fall outside audit’s independent role.

Question 1755
For a high-risk finding with a long remediation timeline, how should the IS auditor
follow up?
A. Perform substantive testing until remediation is done.
B. Schedule review after projected fix date.
C. Continue auditing per schedule.
D. Regularly review remediation progress.
Correct Answer: D – Regularly review remediation progress
Explanation: Regular reviews ensure continued accountability.
Incorrect Answers:
A–C: Less efficient or not timely.

Question 1756
What’s MOST important to include in an RFP for acquiring a new application?
A. UAT plan
B. Vendor’s financial stability
C. Vendor KPIs
D. System development methodology
Correct Answer: A – UAT plan
Explanation: UAT ensures the system meets requirements before going live.
Incorrect Answers:
B–D: Relevant but secondary to UAT.

Question 1757
The PRIMARY goal of a follow-up audit is to:
A. determine if actions on recommendations are adequate.
B. check for risk profile changes.
C. confirm policy compliance.
D. assess recommendation appropriateness.
Correct Answer: A – Determine if actions on recommendations are
adequate
Explanation: Ensures issues are resolved effectively.
Incorrect Answers:
B–D: Supplementary goals.

Question 1758
Which testing BEST evaluates how applications function with others?
A. Integration testing
B. System testing
C. Final acceptance testing
D. Unit testing
Correct Answer: A – Integration testing
Explanation: It verifies interface compatibility between systems.
Incorrect Answers:
B. Broader than integration focus.
C. Confirms readiness, not integration.
D. Tests isolated components.

Question 1759
Which scenario MOST likely leads to audit risk?
A. Sampling may miss material error.
B. Hiring new auditors is delayed.
C. Audit files lost to ransomware.
D. Management disagrees with results.
Correct Answer: A – Sampling may miss material error
Explanation: Sampling error can cause inaccurate conclusions.
Incorrect Answers:
B–D: Operational concerns, not audit risk directly.

Question 1760
In a customer service project audit, what is MOST concerning?
A. Alert audit and ops teams about discrepancy.
B. Ask asset team about device status.
C. Project risk exceeds risk appetite.
D. Ignore invoice as it’s out of scope.
Correct Answer: C – Project risk exceeds risk appetite
Explanation: Indicates potential project failure or exposure.
Incorrect Answers:
A, B, D: Not addressing core risk.

Question 1761
GREATEST concern with emergency patching?
A. Temporary admin access needed.
B. Change record not assessed properly.
C. Changes are undocumented.
D. Patching done outside change window.
Correct Answer: B – Change record not assessed properly
Explanation: Unreviewed changes may bypass controls.
Incorrect Answers:
A, C, D: Concerning but less critical.

Question 1762
What is MOST helpful to determine test environment integrity?
A. Asset list
B. System logs
C. Segregation from production
D. IT team’s feedback
Correct Answer: C – Segregation from production
Explanation: Isolation avoids contamination or errors.
Incorrect Answers:
A, B, D: Supplement insight, not ensure separation.

Question 1763
An ERP implementation doesn’t complete access recertification. What’s the impact?
A. Inconsistent policy enforcement
B. Unauthorized access
C. Delayed project delivery
D. Policy review not completed
Correct Answer: B – Unauthorized access
Explanation: Old or improper access may persist.
Incorrect Answers:
A, C, D: Indirect concerns.

Question 1764
What’s the BEST way to mitigate poor service quality from third-party IT
providers?
A. Define performance metrics in SLAs
B. Require insurance from vendors
C. Include exit clauses
D. Request quarterly financials
Correct Answer: A – Define performance metrics in SLAs
Explanation: Clear metrics ensure enforceable expectations.
Incorrect Answers:
B–D: Supportive, not sufficient.

Question 1765
An audit identifies missing controls in data migration. What’s the BEST action?
A. Report to IT leadership
B. Reassess audit plan
C. Update control test scripts
D. Recommend migration halt
Correct Answer: A – Report to IT leadership
Explanation: Critical findings must be escalated.
Incorrect Answers:
B–D: Reactive or out of scope.

Question 1766
IT accepts audit risk due to correction cost. Auditor’s NEXT action?
A. Perform cost-benefit analysis
B. Document and inform audit committee
C. Report to regulators
D. Notify senior management
Correct Answer: B – Document and inform audit committee
Explanation: Governance must be aware of risk acceptance.
Incorrect Answers:
A. Auditor doesn’t perform cost analysis.
C–D: May be involved after escalation.

Question 1767
What BEST reduces network transmission failure risk?
A. Compression
B. Load balancing
C. Packet filtering
D. Diverse routing
Correct Answer: D – Diverse routing
Explanation: Alternate paths avoid single point of failure.
Incorrect Answers:
A–C: Support but don’t ensure availability.

Question 1768
To ensure data warehouse accuracy and completeness, what’s BEST?
A. Pre-selecting data to suit outcomes
B. Use only current-year data
C. Remove sensitive info
D. Standardize and cleanse data
Correct Answer: D – Standardize and cleanse data
Explanation: Ensures valid, usable information for decision-making.
Incorrect Answers:
A–C: Lead to bias or gaps.
Question 1769
What’s the GREATEST risk with remote server rooms?
A. No biometrics
B. Key lock instead of electronic
C. No temperature control
D. Room’s location is known
Correct Answer: C – No temperature control
Explanation: Overheating can cause downtime or hardware damage.
Incorrect Answers:
A, B, D: Important, but secondary.

Question 1770
Rack-mounted water-cooled systems lack leak detection. Auditor should:
A. Document as finding
B. Recommend removing system
C. Recommend leak detection monitoring
D. Notify data owner
Correct Answer: A – Document as finding
Explanation: The auditor must report policy violations.
Incorrect Answers:
B–D: May be advised later, but not first action.

Question 1771
Which of the following is MOST likely to be reduced when implementing optimal risk
management strategies?
A. Inherent risk
B. Residual risk
C. Sampling risk
D. Detection risk
Correct Answer: B – Residual risk
Explanation: Effective risk management reduces residual risk—the risk remaining
after controls are applied.
Incorrect Answers:
A. Inherent risk exists before controls.
C. Sampling is audit-specific.
D. Detection relates to audit processes.

Question 1772
A current project to develop IT-based solutions will need additional funding to meet
changes in business requirements. Who is BEST suited to obtain this additional
funding?
A. Board of directors
B. Project manager
C. Project sponsor
D. IT strategy committee
Correct Answer: C – Project sponsor
Explanation: The sponsor owns the business case and is accountable for funding.
Incorrect Answers:
A. Too senior for operational matters.
B. Executes but doesn’t secure funds.
D. Strategy committee advises, not executes.

Question 1773
During the implementation of an ERP system, an IS auditor is reviewing the results
of UAT. What should be the PRIMARY focus?
A. Business owner sign-off
B. Interface testing completeness
C. Error communication to users
D. System integration testing
Correct Answer: A – Business owner sign-off
Explanation: Final approval validates business process alignment.
Incorrect Answers:
B–D: Technical, but not business-critical.

Question 1774
Which of the following is of GREATEST concern in access control to the accounts
payable module?
A. Payment files stored on shared drives
B. Staff can update vendor bank accounts
C. Auditor has purchase order creation access
D. Delegation limits don’t match policy
Correct Answer: B – Staff can update vendor bank accounts
Explanation: This opens risk of fraud or errors.
Incorrect Answers:
A, C, D: Issues, but less critical.

Question 1775
Why involve IS auditors in the software acquisition process?
A. To check OS requirements
B. To review contract language
C. To validate PM processes
D. To evaluate controls for risks
Correct Answer: D – To evaluate controls for risks
Explanation: Auditors help ensure controls address common threats.
Incorrect Answers:
A–C: Useful, but not primary audit responsibility.

Question 1776
When reviewing IT governance, what is the MOST likely first step?
A. Define KPIs
B. Identify control frameworks
C. Examine audit committee minutes
D. Check business owner roles
Correct Answer: B – Identify control frameworks
Explanation: Frameworks define the scope and structure of governance.
Incorrect Answers:
A, C, D: Follow framework review.

Question 1777
A network analyst detects a brute-force attack on a server. What should be done
NEXT?
A. Root cause analysis
B. Write a report
C. Isolate the system
D. Trigger incident response
Correct Answer: D – Trigger incident response
Explanation: Immediate containment and mitigation are critical.
Incorrect Answers:
A–C: Important, but follow response activation.

Question 1778
How can organizations drive accountability in a benefits realization plan?
A. Document project interdependencies
B. Assign IT to deliver all benefits
C. Let PM manage all benefits
D. Assign responsibility with timelines
Correct Answer: D – Assign responsibility with timelines
Explanation: Clear ownership ensures tracking and delivery.
Incorrect Answers:
A–C: Supporting, not primary accountability actions.

Question 1779
What is the main role of a digital transformation steering committee?
A. Define PM responsibilities
B. Manage day-to-day operations
C. Provide strategic guidance
D. Handle project costs
Correct Answer: C – Provide strategic guidance
Explanation: Committees guide and ensure alignment with strategy.
Incorrect Answers:
A, B, D: Operational responsibilities.

Question 1780
When should lessons learned be collected in a project?
A. During design
B. During planning
C. After each phase
D. Throughout project
Correct Answer: D – Throughout project
Explanation: Continuous feedback improves delivery and future projects.
Incorrect Answers:
A–C: Too narrow or delayed.

Question 1781
What is MOST helpful in evaluating a DLP system’s design?
A. Manuals
B. Enterprise architecture
C. Breach history
D. Industry trends
Correct Answer: B – Enterprise architecture
Explanation: EA ensures DLP integrates effectively with existing systems.
Incorrect Answers:
A, C, D: Supportive but not architectural.

Question 1782
Which tool is MOST useful for defining IT portfolio strategy?
A. IT dashboards
B. Roadmap
C. Maturity model
D. Lifecycle cost-benefit
Correct Answer: D – Lifecycle cost-benefit
Explanation: Enables value-based portfolio decisions.
Incorrect Answers:
A–C: Inform but don’t determine strategy.
Question 1783
What BEST prevents IT projects being done without business collaboration?
A. Partner with business to evaluate projects
B. Eliminate redundant projects
C. Periodic ROI reviews
D. Prioritize by resource availability
Correct Answer: A – Partner with business to evaluate projects
Explanation: Ensures alignment from the start.
Incorrect Answers:
B–D: Process improvements, not prevention.

Question 1784
What is of GREATEST concern in a financial audit?
A. Backup roles not defined
B. System capacity untested
C. Report procedures not approved
D. Financial system is cloud-based
Correct Answer: C – Report procedures not approved
Explanation: May lead to inaccurate financial outputs.
Incorrect Answers:
A, B, D: Risks, but lower impact.

Question 1785
How should low-priority jobs be scheduled?
A. Avoid them
B. Include major functions
C. Give them optimal resources
D. Run when resources allow
Correct Answer: D – Run when resources allow
Explanation: Ensures core jobs aren’t delayed.
Incorrect Answers:
A–C: Misallocate focus or resources.

Question 1786
To reduce false positives in DLP alerts, what’s BEST?
A. Use default rules
B. Monitor-only mode
C. Reduce detection points
D. Fine-tune rules
Correct Answer: D – Fine-tune rules
Explanation: Customization reduces noise and improves accuracy.
Incorrect Answers:
A. Defaults are generic.
B. Monitor mode doesn’t prevent.
C. Lower detection reduces coverage.

Question 1787
What is an example of shadow IT?
A. Unapproved cloud tool use
B. Bank site on work device
C. Personal email to clients
D. Social media during work
Correct Answer: A – Unapproved cloud tool use
Explanation: Use of tools without IT’s consent is shadow IT.
Incorrect Answers:
B–D: Not shadow IT, but policy issues.

Question 1788
How to BEST measure effectiveness of security awareness?
A. Training satisfaction
B. Phishing simulation results
C. Staff evaluations
D. Help desk call analysis
Correct Answer: B – Phishing simulation results
Explanation: Tests real-world awareness and response.
Incorrect Answers:
A, C, D: Indirect measures.

Question 1789
Which recommendation is of GREATEST concern?
A. Disable logging for performance
B. Model on peer orgs
C. Give CRO business decisions
D. Eliminate KPIs
Correct Answer: A – Disable logging for performance
Explanation: Undermines accountability and security.
Incorrect Answers:
B–D: May be strategic errors, but not critical.

Question 1790
Which test detects impact of code changes in other modules?
A. Regression testing
B. Load testing
C. Stress testing
D. Unit testing
Correct Answer: A – Regression testing
Explanation: Validates new changes haven’t broken other functionality.
Incorrect Answers:
B–D: Focused on performance or individual units.

Question 1791
Which of the following is the BEST approach to validate whether a streaming site
can continue to provide service during a period of live streaming with an anticipated
high volume of viewers?
A. Fuzzing
B. Usability test
C. Fault grading
D. Load test
Correct Answer: D – Load test
Explanation: Load testing simulates high user volume and helps evaluate
performance.
Incorrect Answers:
A. Fuzzing tests input handling.
B. Usability tests don’t address capacity.
C. Fault grading is rarely used in this context.

Question 1792
When assessing the overall effectiveness of an organization’s disaster recovery
planning process, which of the following is MOST important for the IS auditor to
verify?
A. Management documents and distributes a copy of the plan to all personnel.
B. Management contracts with a third party for warm site services.
C. Management schedules an annual tabletop exercise.
D. Management reviews and updates the plan annually or as changes occur.
Correct Answer: D – Management reviews and updates the plan
annually or as changes occur
Explanation: Regular updates ensure the plan remains relevant.
Incorrect Answers:
A–C: Supportive but not sufficient alone.

Question 1793
A post-implementation audit has been completed for the deployment of a
sophisticated job scheduling tool. Which of the following observations would be of
GREATEST concern?
A. The IT team customized tool settings without seeking approval from the provider.
B. The overall project took longer to complete than planned.
C. The data encryption setting is not enabled in the scheduling tool.
D. The IT team accesses the scheduler admin panel via a generic account.
Correct Answer: D – The IT team accesses the scheduler admin panel
via a generic account
Explanation: Shared accounts eliminate accountability.
Incorrect Answers:
A–C: Concerns, but not as critical.

Question 1794
An IS auditor is reviewing desktop software profiles and notes that a user has
downloaded and installed several games that are not approved by the company.
Which of the following is the MOST significant risk that could result from this
situation?
A. Violation of user’s privacy
B. Potential for malware
C. Noncompliance with the acceptable use policy
D. Interoperability issues with company software
Correct Answer: B – Potential for malware
Explanation: Unauthorized software is a common malware vector.
Incorrect Answers:
A, C, D: Risks exist but with less severe consequences.

Question 1795
Which of the following is the MOST effective control when granting access to a
service provider for a cloud-based application?
A. Administrator access is provided for a limited period with an expiration date.
B. Access has been provided on a need-to-know basis.
C. User IDs are deleted when work is completed.
D. Access is provided to correspond with the service level agreement (SLA).
Correct Answer: A – Administrator access is provided for a limited
period with an expiration date
Explanation: Time-bound access limits exposure.
Incorrect Answers:
B–D: Relevant but don’t directly control exposure.

Question 1796
Which of the following can only be provided by asymmetric encryption?
A. Information privacy
B. Data availability
C. 256-bit key length
D. Nonrepudiation
Correct Answer: D – Nonrepudiation
Explanation: Only asymmetric encryption supports nonrepudiation via digital
signatures.
Incorrect Answers:
A–C: Not exclusive to asymmetric encryption.

Question 1797
Which of the following should be an IS auditor’s PRIMARY focus when auditing the
implementation of a new IT operations performance monitoring system?
A. Validating whether baselines have been established
B. Reviewing whether all changes have been implemented
C. Determining whether there is a process for annual review of the maintenance
manual
D. Confirming whether multi-factor authentication (MFA) is deployed as part of the
operational enhancements
Correct Answer: A – Validating whether baselines have been
established
Explanation: Baselines are essential to monitor deviations.
Incorrect Answers:
B–D: Important, but not primary for performance auditing.

Question 1798
Which of the following poses the GREATEST risk to the use of active RFID tags?
A. Phishing attacks
B. Session hijacking
C. Piggybacking
D. Eavesdropping
Correct Answer: D – Eavesdropping
Explanation: Active RFID transmissions can be intercepted.
Incorrect Answers:
A–C: Less relevant or less likely.

Question 1799
Which of the following is the MOST effective way to ensure adequate system
resources are available for high-priority activities?
A. System virtualization
B. Job scheduling
C. Zero Trust
D. Code optimization
Correct Answer: B – Job scheduling
Explanation: Prioritizes tasks and allocates resources efficiently.
Incorrect Answers:
A, C, D: Useful, but don’t guarantee availability for critical jobs.

Question 1800
An IS auditor is reviewing an organization’s cloud access security broker (CASB)
solution. Which of the following is MOST important for the auditor to verify?
A. Cloud services are classified.
B. Users are centrally managed.
C. Cloud processes are resilient.
D. Users are periodically recertified.
Correct Answer: A – Cloud services are classified
Explanation: Classification informs policy enforcement and security controls.
Incorrect Answers:
B–D: Supportive controls, not foundational.

Question 1801
Which of the following is the GREATEST risk of project dashboards being set
without sufficiently defined criteria?
A. Lack of alignment of project status reports
B. Inadequate decision-making and prioritization
C. Lack of project portfolio status oversight
D. Adverse findings from internal and external auditors
Correct Answer: B – Inadequate decision-making and prioritization
Explanation: Vague criteria hinder proper analysis and result in poor decisions.
Incorrect Answers:
A, C, D: Symptoms or results, not root causes.

Question 1802
A health care organization utilizes Internet of Things (IoT) devices to improve
patient outcomes through real-time patient monitoring and advanced diagnostics.
Which of the following would BEST assist in isolating these devices from corporate
network traffic?
A. Internal firewalls
B. Blockchain technology
C. Content filtering proxy
D. Zero Trust architecture
Correct Answer: A – Internal firewalls
Explanation: Segmenting traffic with firewalls limits exposure and risk.
Incorrect Answers:
B. Blockchain is for data integrity.
C. Filtering is not isolation.
D. Zero Trust is user-focused, not network-layer separation.

Question 1803
In a public key cryptographic system, which of the following is the PRIMARY
requirement to address the risk of man-in-the-middle attacks through spoofing?
A. Strong encryption algorithms
B. Kerberos authentication
C. Registration authority
D. Certificate authority (CA)
Correct Answer: D – Certificate authority (CA)
Explanation: CA validates identities, preventing spoofed certificates.
Incorrect Answers:
A. Algorithm strength doesn’t validate source.
B. Kerberos is not PKI-based.
C. RA supports, but CA issues the trust.

Question 1804
Which of the following is the PRIMARY benefit of operational log management?
A. It enhances user experience via predictive analysis.
B. It improves security with real-time monitoring of network data.
C. It organizes data to identify performance issues.
D. It supports data aggregation using unified storage.
Correct Answer: C – It organizes data to identify performance issues
Explanation: Operational logs help detect inefficiencies and trends.
Incorrect Answers:
A. User experience is a secondary benefit.
B. Security logs serve a different purpose.
D. Aggregation is a capability, not a benefit.

Question 1805
Which of the following system attack methods is executed by entering malicious code
into the search box of a vulnerable website, causing the server to reveal restricted
information?
A. Man-in-the-middle
B. Denial of service (DoS)
C. SQL injection
D. Cross-site scripting
Correct Answer: C – SQL injection
Explanation: SQL injection exploits input fields to manipulate database queries.
Incorrect Answers:
A. Involves interception.
B. Aims to disrupt services.
D. XSS affects users, not servers.

Question 1806
Which of the following is MOST important for an IS auditor to verify when
reviewing the planned use of Benford’s law as a data analytics technique to detect
fraud in a set of credit card transactions?
A. The transactions are in double integer format.
B. The transaction amounts are selected randomly without restriction.
C. The transaction analysis is limited to transactions within standard deviation.
D. The transactions are all in the same currency.
Correct Answer: D – The transactions are all in the same currency
Explanation: Currency consistency ensures numerical integrity for Benford’s
analysis.
Incorrect Answers:
A–C: Not core to Benford’s applicability.

Question 1807
An IS auditor has been asked to review the integrity of data transfer between two
business-critical systems that have not been tested since implementation. Which of
the following would provide the MOST useful information to plan an audit?
A. Quality assurance (QA) testing
B. System change logs
C. IT testing policies and procedures
D. Previous system interface testing records
Correct Answer: D – Previous system interface testing records
Explanation: Historical test records give insight into integration quality.
Incorrect Answers:
A, B, C: Useful, but less specific.

Question 1808
An IS auditor is reviewing an organization’s system development life cycle (SDLC).
Which of the following MUST be included in the review?
A. Ownership of the system quality management plan
B. Utilization of standards in the system development processes and procedures
C. Validation that system development processes adhere to quality standards
D. Definition of quality attributes to be associated with the system
Correct Answer: B – Utilization of standards in the system
development processes and procedures
Explanation: Standards ensure consistency and control.
Incorrect Answers:
A, C, D: Supplementary but not foundational.

Question 1809
A business application’s database is copied to a replication server within minutes.
Which of the following processes taking place during business hours will MOST
benefit from this architecture?
A. Rolling forward of transactions when a production server fails
B. Ad hoc batch reporting jobs from the replication server
C. Analysis of application performance degradation
D. Hardware replacement work involving databases
Correct Answer: B – Ad hoc batch reporting jobs from the replication
server
Explanation: Offloading reporting prevents production system impact.
Incorrect Answers:
A, C, D: Not primary beneficiaries.

Question 1810
A finance department has a two-year project to upgrade the ERP system hosting the
general ledger. In year one, the system version upgrade will be applied, and in year
two, business processes will be updated. What should be the PRIMARY focus of an
IS auditor reviewing year two?
A. Data migration
B. Sociability testing
C. User acceptance testing (UAT)
D. Initial user access provisioning
Correct Answer: C – User acceptance testing (UAT)
Explanation: UAT ensures process changes work as intended.
Incorrect Answers:
A. Migration relates to version upgrade.
B, D: Less critical than user validation.

Question 1811
Which of the following would be the GREATEST concern for an IS auditor
conducting a pre-implementation review of a data loss prevention (DLP) tool?
A. The tool is implemented in monitor mode rather than block mode.
B. Crawlers are used to discover sensitive data.
C. Deep packet inspection opens data packets in transit.
D. Encryption keys are not centrally managed.
Correct Answer: D – Encryption keys are not centrally managed
Explanation: Without centralized key management, data confidentiality and control
can be severely compromised.
Incorrect Answers:
A. Monitor mode is common in early stages.
B. Crawlers are standard for content discovery.
C. Packet inspection is expected in DLP tools.

Question 1812
Which of the following is the PRIMARY benefit of benchmarking an organization’s
software development life cycle practices against a capability maturity model?
A. Security requirements are added to software development processes.
B. Reliable products are guaranteed.
C. Programmers’ efficiency is improved.
D. Repeatable software development procedures are established.
Correct Answer: D – Repeatable software development procedures are
established
Explanation: Benchmarking helps achieve process maturity and consistency.
Incorrect Answers:
A. Security may improve but isn’t the primary benefit.
B. Reliability increases but is not guaranteed.
C. Efficiency is a secondary benefit.

Question 1813
Which type of testing is used to identify security vulnerabilities in source code in the
development environment?
A. Dynamic analysis security testing (DAST)
B. Interactive application security testing (IAST)
C. Static analysis security testing (SAST)
D. Runtime application self-protection (RASP)
Correct Answer: C – Static analysis security testing (SAST)
Explanation: SAST analyzes source code before execution, ideal for early detection.
Incorrect Answers:
A. DAST tests runtime applications.
B. IAST blends static and dynamic, typically later.
D. RASP operates during runtime.

Question 1814
An IS auditor evaluating the change management process must select a sample from
the change log. What is the BEST way for the auditor to confirm the change log is
complete?
A. Obtain management attestation of completeness.
B. Take the last change from the system and trace it back to the log.
C. Take an item from the log and trace it back to the system.
D. Interview change management personnel about completeness.
Correct Answer: B – Take the last change from the system and trace
it back to the log
Explanation: Backward tracing ensures log captures actual changes.
Incorrect Answers:
A. Attestation is insufficient evidence.
C. Forward tracing doesn’t confirm completeness.
D. Interviews provide context, not proof.

Question 1815
Which of the following is the PRIMARY benefit of monitoring IT operational logs?
A. Identifying configuration flaws in operating systems
B. Generating exception reports to assess security compliance
C. Detecting processing errors in a timely manner
D. Managing the usability and capacity of IT resources
Correct Answer: C – Detecting processing errors in a timely manner
Explanation: Timely error detection supports continuity and issue resolution.
Incorrect Answers:
A. Configuration flaws are discovered during assessments.
B. Security is a secondary focus.
D. Capacity is managed via other tools.

Question 1816
Which of the following is MOST useful to an IS auditor performing a review of access
controls for a document management system?
A. Information provided by the audit team lead on the authentication systems used
by the department
B. Policies and procedures for managing documents provided by department heads
C. Previous audit reports related to other departments’ use of the same system
D. A system-generated list of staff and their project assignments, roles, and
responsibilities
Correct Answer: D – A system-generated list of staff and their project
assignments, roles, and responsibilities
Explanation: Real-time role mapping provides direct evidence of access rights.
Incorrect Answers:
A–C: Supplementary, not definitive.
Question 1817
External audits have identified recurring exceptions in the user termination process,
despite similar internal audits having reported no exceptions in the past. Which of
the following is the IS auditor’s BEST course of action to improve the internal audit
process in the future?
A. Review user termination process changes.
B. Review the internal audit sampling methodology.
C. Review control self-assessment (CSA) results.
D. Include the user termination process in all upcoming audits.
Correct Answer: B – Review the internal audit sampling methodology
Explanation: A poor sample selection may overlook recurring issues.
Incorrect Answers:
A. Useful, but not audit process focused.
C. CSA won’t reveal audit flaws.
D. Inclusion doesn’t fix method.

Question 1818
Which of the following is the BEST metric to measure the quality of software
developed in an organization?
A. Amount of successfully migrated software changes
B. Reduction in the help desk budget
C. Number of defects discovered in production
D. Increase in quality assurance (QA) activities
Correct Answer: C – Number of defects discovered in production
Explanation: Fewer post-release defects indicate higher software quality.
Incorrect Answers:
A. Migration success doesn’t reflect quality.
B. Budget cuts may not indicate quality.
D. QA volume isn’t quality output.

Question 1819
An IS auditor is preparing for a review of controls associated with a manufacturing
plant’s implementation of industrial Internet of Things (IoT) infrastructure. Which of
the following vulnerabilities would present the GREATEST security risk to the
organization?
A. Insufficient physical security around the IoT devices for theft prevention
B. Use of open-source software components within the IoT devices
C. Constraints in IoT device firmware storage space for code upgrades
D. IoT devices that are not using wireless network connectivity
Correct Answer: A – Insufficient physical security around the IoT
devices for theft prevention
Explanation: Physical compromise can bypass all software controls.
Incorrect Answers:
B–D: Relevant, but lower severity.

Question 1820
When testing the accuracy of transaction data, which of the following situations
BEST justifies the use of a smaller sample size?
A. Proper separation of duties is in place.
B. The IS audit staff has a high level of experience
C. The data can be directly changed by users.
D. It is expected that the population is error-free.
Correct Answer: D – It is expected that the population is error-free
Explanation: Low error risk justifies smaller samples.
Incorrect Answers:
A. SoD helps but doesn’t guarantee accuracy.
B. Experience doesn’t reduce inherent data risks.
C. User editability increases—not reduces—sample needs.

Question 1821
An IS auditor reviewing an organization’s IT systems finds that the organization
frequently purchases systems that are incompatible with the technologies already in
the organization. Which of the following is the MOST likely reason?
A. Lack of enterprise architecture (EA)
B. Outdated enterprise resource planning (ERP) system
C. Ineffective risk management policy
D. Lack of a maturity model
Correct Answer: A – Lack of enterprise architecture (EA)
Explanation: Without an enterprise architecture, technology decisions are
uncoordinated, leading to incompatibility.
Incorrect Answers:
B. ERP relates to operations, not all IT investments.
C. Risk policy doesn’t drive tech selection.
D. Maturity models support improvement but don't ensure compatibility.

Question 1822
Which of the following staff should an IS auditor interview FIRST to obtain a
general overview of the various technologies used across different programs?
A. Technical architect
B. Program manager
C. Enterprise architect
D. Solution architect
Correct Answer: C – Enterprise architect
Explanation: Enterprise architects have a cross-functional view of IT systems and
business integration.
Incorrect Answers:
A. Technical architects are focused on implementation.
B. Program managers focus on timelines, not systems.
D. Solution architects focus on specific applications.

Question 1823
Which of the following controls helps to ensure that data extraction queries run by
the database administrator (DBA) are monitored?
A. Performing periodic access reviews
B. Storing logs of database access
C. Restricting access to DBA activities
D. Reviewing activity logs of the DBA
Correct Answer: D – Reviewing activity logs of the DBA
Explanation: Reviewing logs confirms whether DBAs are acting appropriately with
elevated access.
Incorrect Answers:
A. Access reviews assess who can access, not what they’ve done.
B. Logging alone is insufficient without review.
C. Restrictions help but don’t verify activity.

Question 1824
Which of the following is MOST critical to assess when evaluating the control design
of a highly integrated system?
A. Documentation of the user acceptance test (UAT)
B. Change control processes
C. User training plans
D. Test data retention policies
Correct Answer: B – Change control processes
Explanation: Integrated systems require strong change controls to prevent
unintended cascading effects.
Incorrect Answers:
A. UAT is verification, not design control.
C. Training is supportive, not a control.
D. Retention of test data is compliance-focused.

Question 1825
An IS auditor discovers that an organization has multiple definitions of key
performance indicators (KPIs) across departments. What is the BEST
recommendation?
A. Conduct a control self-assessment
B. Standardize definitions at the enterprise level
C. Outsource KPI reporting
D. Consolidate KPI dashboards
Correct Answer: B – Standardize definitions at the enterprise level
Explanation: Standard definitions ensure consistent measurement and
comparability across units.
Incorrect Answers:
A. CSAs don't fix inconsistency.
C. Outsourcing doesn’t ensure accuracy.
D. Dashboards are tools, not solutions.

Question 1826
Which of the following is the PRIMARY goal of adopting a formal IT strategy?
A. Increase automation of business functions
B. Align IT with business objectives
C. Minimize IT expenses
D. Ensure system performance
Correct Answer: B – Align IT with business objectives
Explanation: Strategic alignment ensures IT investments and initiatives support
business goals.
Incorrect Answers:
A. Automation is an outcome, not a goal.
C. Cost minimization is tactical.
D. Performance is operational, not strategic.

Question 1827
Which of the following would BEST ensure compliance with corporate policies
regarding cloud computing?
A. Mandating centralized approval of cloud services
B. Allowing departments to select their own cloud vendors
C. Permitting cloud usage without restrictions
D. Requiring users to undergo cloud training
Correct Answer: A – Mandating centralized approval of cloud services
Explanation: Centralized control ensures compliance with enterprise policy and
standards.
Incorrect Answers:
B. Leads to shadow IT.
C. No restrictions undermine policy.
D. Training supports but doesn’t enforce compliance.
Question 1828
Which of the following is the BEST example of using automation to reduce human
error in data processing?
A. Manual spreadsheet validation
B. Workflow approval reminders
C. Automated data entry validation
D. Staff training on data accuracy
Correct Answer: C – Automated data entry validation
Explanation: Automated validation reduces entry errors at the point of origin.
Incorrect Answers:
A. Manual steps increase risk.
B. Reminders don’t stop errors.
D. Training helps, but isn’t automated enforcement.

Question 1829
Which of the following is the PRIMARY purpose of a business impact analysis
(BIA)?
A. Determine potential data loss
B. Identify critical business functions
C. List potential system threats
D. Analyze downtime cost
Correct Answer: B – Identify critical business functions
Explanation: BIA’s goal is to identify processes that are essential for business
continuity.
Incorrect Answers:
A, C, D: These are components of a BIA but not its primary focus.

Question 1830
Which of the following is MOST important when reviewing database log settings?
A. Logs are archived monthly
B. Log access is restricted
C. Log size is set to maximum
D. Logs capture all database events
Correct Answer: D – Logs capture all database events
Explanation: Comprehensive logging is essential to support audits and
investigations.
Incorrect Answers:
A. Archiving supports storage but not completeness.
B. Restricting access supports integrity, not coverage.
C. Size matters, but complete logging is the priority.
Question 1831
Which of the following is MOST important to ensure the success of a digital
transformation project involving multiple business units?
A. Procurement of advanced technology platforms
B. Project sponsorship at the department level
C. Integration with existing IT infrastructure
D. A defined governance and ownership structure
Correct Answer: D – A defined governance and ownership structure
Explanation: Governance ensures clarity, accountability, and alignment among
stakeholders.
Incorrect Answers:
A. Technology alone doesn’t guarantee success.
B. Department-level sponsorship is insufficient.
C. Integration is important but not foundational.

Question 1832
Which of the following is MOST effective in preventing project fraud?
A. Rotating key personnel
B. Requiring project cost estimation
C. Establishing project KPIs
D. Performing external audits
Correct Answer: A – Rotating key personnel
Explanation: Job rotation reduces the opportunity for fraud by limiting long-term
control.
Incorrect Answers:
B. Estimation addresses planning, not fraud.
C. KPIs focus on performance, not integrity.
D. Audits detect issues; they do not prevent them.

Question 1833
A customer database was migrated to a new cloud-based system. What is the BEST
way for an IS auditor to verify that no data was lost?
A. Compare row counts before and after
B. Verify successful completion logs
C. Interview data owners
D. Review user access logs
Correct Answer: A – Compare row counts before and after
Explanation: Matching row counts confirms that all data was transferred.
Incorrect Answers:
B. Completion logs may not reflect silent data loss.
C. Subjective and unverifiable.
D. Not relevant to data loss.

Question 1834
Which of the following is MOST important for an IS auditor to consider when
planning an audit of data analytics procedures?
A. Programming language used in the analytics platform
B. Location of the data sources
C. Complexity of the data models
D. Integrity of the data used
Correct Answer: D – Integrity of the data used
Explanation: Poor-quality data undermines any analytics outputs.
Incorrect Answers:
A. Language does not affect audit scope directly.
B. Location matters, but not more than accuracy.
C. Model complexity is relevant, but secondary.

Question 1835
Which of the following would be the BEST control to ensure that system
configurations are regularly reviewed?
A. User access logs
B. Change advisory board approvals
C. Configuration audit logs
D. Periodic system performance reports
Correct Answer: C – Configuration audit logs
Explanation: These logs show actual configuration changes and are essential for
verification.
Incorrect Answers:
A. User access logs relate to access, not configurations.
B. CAB approvals relate to planning, not confirmation.
D. Performance reports don’t validate settings.

Question 1836
Which of the following is the PRIMARY role of a project sponsor in IT governance?
A. Design business case
B. Approve deliverables
C. Monitor project status
D. Ensure alignment with business strategy
Correct Answer: D – Ensure alignment with business strategy
Explanation: The sponsor champions strategic alignment of the project.
Incorrect Answers:
A–C: Involvement roles, but not governance-centric.

Question 1837
Which of the following is the GREATEST risk of implementing a bring your own
device (BYOD) program?
A. Increased device maintenance cost
B. Limited network scalability
C. Regulatory compliance violations
D. Difficulty tracking productivity
Correct Answer: C – Regulatory compliance violations
Explanation: BYOD increases risk of data exposure and mishandling.
Incorrect Answers:
A, B, D: Challenges, but not the most severe.

Question 1838
An IS auditor is reviewing a vendor’s SLA for cloud-based services. Which clause is
MOST critical to verify from a business continuity standpoint?
A. Ownership of data
B. Scheduled downtime
C. Maximum tolerable downtime (MTD)
D. Encryption requirements
Correct Answer: C – Maximum tolerable downtime (MTD)
Explanation: MTD ensures recovery objectives are met.
Incorrect Answers:
A. Ownership is a long-term concern.
B. Scheduled downtime is expected, not emergency-related.
D. Encryption supports security, not continuity.

Question 1839
Which of the following would be the GREATEST concern to an IS auditor reviewing
the configuration of an automated payroll system?
A. Salary amounts are editable by HR
B. Passwords are set to expire quarterly
C. Employees can print their pay slips
D. Payroll reports are exported to spreadsheets
Correct Answer: A – Salary amounts are editable by HR
Explanation: This presents a high risk for fraud or unauthorized adjustments.
Incorrect Answers:
B. Quarterly password changes are acceptable.
C. Pay slip access is expected.
D. Exports are manageable with controls.

Question 1840
A company decides to migrate its application servers to the cloud. Which of the
following should be the FIRST step from a security standpoint?
A. Review compliance requirements
B. Update incident response plan
C. Migrate encryption keys
D. Configure firewall rules
Correct Answer: A – Review compliance requirements
Explanation: Understanding regulatory and contractual obligations must precede
technical decisions.
Incorrect Answers:
B–D: Important, but follow from compliance knowledge.

Question 1841
What is the PRIMARY reason for an IS auditor to review data retention policies?
A. To reduce backup time
B. To support legal and regulatory requirements
C. To enforce encryption standards
D. To identify redundant data
Correct Answer: B – To support legal and regulatory requirements
Explanation: Compliance with laws and regulations is the primary purpose of data
retention.
Incorrect Answers:
A. A secondary benefit.
C. Encryption relates to data protection, not retention.
D. Data redundancy is a storage concern.

Question 1842
Which of the following would BEST help an IS auditor verify the accuracy of
inventory records in an IT asset management system?
A. Reviewing user access logs
B. Performing a physical inventory
C. Checking procurement records
D. Comparing maintenance schedules
Correct Answer: B – Performing a physical inventory
Explanation: Physical verification ensures records match actual assets.
Incorrect Answers:
A. Access logs don't confirm presence.
C. Purchases don't confirm existence.
D. Maintenance is unrelated to location or quantity.

Question 1843
An organization implements a new payroll system. Which of the following is MOST
important to verify after deployment?
A. The system interface is user-friendly
B. Calculations are consistent with previous periods
C. Regulatory compliance has been achieved
D. Reports are generated in real-time
Correct Answer: C – Regulatory compliance has been achieved
Explanation: Payroll systems must comply with tax and labor laws.
Incorrect Answers:
A. Usability affects efficiency, not compliance.
B. Accuracy is important but can vary with changes.
D. Real-time reporting is operational, not critical.

Question 1844
Which of the following roles is PRIMARILY responsible for ensuring that IT
resources are used efficiently to meet organizational goals?
A. Chief compliance officer
B. Data custodian
C. IT governance board
D. Internal auditor
Correct Answer: C – IT governance board
Explanation: They align IT strategy and resource use with business objectives.
Incorrect Answers:
A. Focuses on regulations.
B. Manages data assets, not strategy.
D. Reviews, but doesn’t oversee efficiency.

Question 1845
When evaluating the adequacy of an incident response process, which of the following
is MOST important?
A. Frequency of testing the plan
B. Number of incidents logged
C. Time to update the incident report
D. Existence of a log archive
Correct Answer: A – Frequency of testing the plan
Explanation: Regular testing ensures the plan remains effective and up-to-date.
Incorrect Answers:
B. Logging tracks events, not preparedness.
C. Documentation is procedural.
D. Archives help investigations but not response capability.

Question 1846
Which of the following controls BEST mitigates the risk of unauthorized changes to
production data?
A. Logging all database queries
B. Separation of duties between developers and DBAs
C. Daily database backups
D. Intrusion detection systems (IDS)
Correct Answer: B – Separation of duties between developers and
DBAs
Explanation: Proper SoD prevents unauthorized access and changes.
Incorrect Answers:
A. Logging detects, not prevents.
C. Backups aid recovery, not control.
D. IDS detects network issues, not data changes.

Question 1847
Which of the following is the PRIMARY benefit of using multifactor authentication
(MFA)?
A. Reduces account lockouts
B. Simplifies password management
C. Enhances identity verification
D. Speeds up login processes
Correct Answer: C – Enhances identity verification
Explanation: MFA ensures a stronger authentication process by combining factors.
Incorrect Answers:
A. MFA can increase lockouts.
B. It may complicate management.
D. It may slow down logins.

Question 1848
Which of the following should be reviewed FIRST when auditing an organization's
change management process?
A. Backup and recovery process
B. User satisfaction surveys
C. Change approval workflow
D. Training materials
Correct Answer: C – Change approval workflow
Explanation: Ensures only authorized changes proceed.
Incorrect Answers:
A. Relevant, but secondary.
B. Not directly related to control.
D. Supports, but doesn’t control change.

Question 1849
An IS auditor is reviewing a database with sensitive customer data. Which of the
following techniques BEST protects this data during testing?
A. Compression
B. Tokenization
C. Encryption
D. Masking
Correct Answer: D – Masking
Explanation: Masking hides sensitive values for safe testing.
Incorrect Answers:
A. Compression reduces size, not exposure.
B. Tokenization secures data but is used for limited use cases.
C. Encryption protects at rest, not for test visibility.

Question 1850
Which of the following BEST ensures that IT goals align with business goals?
A. IT risk assessments
B. IT project portfolios
C. Balanced scorecards
D. SLA performance metrics
Correct Answer: C – Balanced scorecards
Explanation: Scorecards link IT performance with business objectives.
Incorrect Answers:
A. Assessments evaluate risks, not alignment.
B. Portfolios reflect investments, not goals.
D. SLAs measure service, not alignment.

Question 1851
Which of the following is the BEST method to verify the effectiveness of database
access control mechanisms?
A. Review of the data dictionary
B. Analysis of audit logs
C. Review of user roles and permissions
D. Review of backup and recovery procedures
Correct Answer: B – Analysis of audit logs
Explanation: Audit logs show who accessed what, when, and how — the best way
to verify control enforcement.
Incorrect Answers:
A. Data dictionary explains structure, not control effectiveness.
C. Roles show intended access, not actual usage.
D. Backup processes are for recovery, not access validation.

Question 1852
Which of the following would BEST help prevent the use of insecure APIs by
developers?
A. Developer code reviews
B. Web application firewalls
C. Secure development training
D. Network segmentation
Correct Answer: C – Secure development training
Explanation: Training helps developers avoid using or writing insecure APIs from
the start.
Incorrect Answers:
A. Reviews detect, not prevent.
B. WAFs block exploits, not development behavior.
D. Segmentation helps protect, not prevent creation.

Question 1853
What is the PRIMARY risk when a business allows users to approve their own
transactions in a financial system?
A. Reduced segregation of duties
B. Increased training requirements
C. Delays in transaction processing
D. Lack of managerial oversight
Correct Answer: A – Reduced segregation of duties
Explanation: Self-approval breaks fundamental control principles, increasing fraud
risk.
Incorrect Answers:
B–D: Issues may arise but are not primary risks.

Question 1854
Which of the following is the BEST control to prevent unauthorized access to data
on lost or stolen laptops?
A. BIOS password
B. Remote wipe capability
C. Full disk encryption
D. File-level permissions
Correct Answer: C – Full disk encryption
Explanation: Encryption renders data unreadable even if the physical device is lost.
Incorrect Answers:
A. BIOS passwords are bypassable.
B. Remote wipe only works if device is connected.
D. File-level control is weaker than disk-level.

Question 1855
Which of the following should be the FIRST step when implementing an enterprise
risk management (ERM) framework?
A. Identify risk owners
B. Conduct a risk assessment
C. Obtain executive sponsorship
D. Define key risk indicators
Correct Answer: C – Obtain executive sponsorship
Explanation: Executive buy-in ensures the authority and resources needed to
implement ERM.
Incorrect Answers:
A–B. Come after sponsorship.
D. KRIs follow assessment.

Question 1856
An IS auditor is reviewing a newly implemented single sign-on (SSO) solution. Which
of the following should be of MOST concern?
A. Integration with multiple applications
B. Use of multifactor authentication
C. Lack of session timeout policies
D. Centralized authentication server
Correct Answer: C – Lack of session timeout policies
Explanation: Without session timeouts, SSO sessions may remain open, increasing
unauthorized access risk.
Incorrect Answers:
A, B, D: Not concerns — they support secure access.

Question 1857
Which of the following BEST helps ensure that audit findings are addressed?
A. Assigning action items to responsible parties
B. Reporting findings to senior management
C. Performing surprise audits
D. Repeating the audit within 6 months
Correct Answer: A – Assigning action items to responsible parties
Explanation: Responsibility ensures accountability for closing findings.
Incorrect Answers:
B. Reporting informs but doesn’t enforce.
C. Surprise audits detect, not enforce.
D. Follow-ups confirm, not ensure, resolution.

Question 1858
An organization uses a third-party SaaS provider for customer billing. Which of the
following is MOST important to include in the contract?
A. Encryption methods used
B. Uptime statistics
C. Data ownership clause
D. Staff training requirements
Correct Answer: C – Data ownership clause
Explanation: Ownership ensures legal rights to retrieve, manage, and control data.
Incorrect Answers:
A. Technical detail, not legal control.
B. Important, but not foundational.
D. Training is operational, not contractual priority.

Question 1859
Which of the following is the PRIMARY reason to include a rollback plan during a
major system update?
A. To improve user confidence in the process
B. To ensure business continuity
C. To meet audit requirements
D. To simplify change documentation
Correct Answer: B – To ensure business continuity
Explanation: Rollback provides a path to restore operations if the update fails.
Incorrect Answers:
A. Confidence is a benefit, not the main reason.
C. Audits may require it, but continuity is key.
D. Documentation is a lesser consideration.

Question 1860
Which of the following is the BEST method for ensuring accountability for sensitive
actions in a production environment?
A. Password expiration
B. Audit logging
C. Multifactor authentication
D. Role-based access control
Correct Answer: B – Audit logging
Explanation: Logs create a traceable record of who did what and when.
Incorrect Answers:
A, C, D: Important but do not show action history.

Question 1861
Which of the following would BEST help ensure the effectiveness of a cybersecurity
awareness training program?
A. Requiring annual training attendance
B. Monitoring completion of e-learning modules
C. Tracking phishing test failure rates
D. Conducting quarterly security newsletters
Correct Answer: C – Tracking phishing test failure rates
Explanation: This provides a measurable indicator of whether employees are
applying what they’ve learned.
Incorrect Answers:
A. Attendance doesn’t reflect understanding.
B. Completion is a passive measure.
D. Newsletters support awareness but lack impact measurement.

Question 1862
An IS auditor is reviewing a newly implemented cloud application. Which of the
following is the MOST important to verify?
A. The application is accessible globally
B. Users can change their own passwords
C. Security roles are assigned based on least privilege
D. Passwords are a minimum of eight characters
Correct Answer: C – Security roles are assigned based on least
privilege
Explanation: Least privilege minimizes risk by limiting user access strictly to what
is necessary.
Incorrect Answers:
A. Accessibility isn’t a security concern.
B. Self-service is convenience, not control.
D. Minimum length is basic but not the most critical.

Question 1863
Which of the following is the MOST important factor when assessing the
effectiveness of a firewall rule set?
A. The number of rules
B. The frequency of rule reviews
C. Alignment with security policy
D. Use of automated rule generation
Correct Answer: C – Alignment with security policy
Explanation: The rules must support and enforce the organization’s defined
policies.
Incorrect Answers:
A. Fewer rules don’t ensure effectiveness.
B. Reviews matter, but alignment is key.
D. Automation aids efficiency, not effectiveness.

Question 1864
Which of the following is the BEST reason for documenting business continuity plan
(BCP) testing results?
A. To demonstrate compliance with standards
B. To improve future test scenarios
C. To measure team response times
D. To validate data center infrastructure
Correct Answer: B – To improve future test scenarios
Explanation: Documentation provides insights into what worked and what didn’t,
enabling better preparation.
Incorrect Answers:
A. Compliance is a byproduct, not the core reason.
C. Response times are one metric, not the goal.
D. Infrastructure is not the primary scope of BCP tests.

Question 1865
Which of the following is the PRIMARY benefit of using audit analytics tools during
fieldwork?
A. Improving client relationship
B. Automating report generation
C. Identifying patterns and anomalies
D. Reducing documentation workload
Correct Answer: C – Identifying patterns and anomalies
Explanation: Analytics tools enhance the auditor’s ability to detect irregularities in
large datasets.
Incorrect Answers:
A. Relationship building is indirect.
B. Reporting is a separate function.
D. Documentation still requires context.
Question 1866
Which of the following is the MOST appropriate control to prevent unauthorized
external access to a company’s internal database?
A. Two-factor authentication
B. Network segmentation
C. Application whitelisting
D. Host-based intrusion detection system
Correct Answer: B – Network segmentation
Explanation: It limits exposure by isolating sensitive resources from external
networks.
Incorrect Answers:
A. Helpful for users but not structural protection.
C. Whitelisting controls execution, not access.
D. IDS detects, not prevents.

Question 1867
An IS auditor is reviewing an incident response process and notices that lessons
learned are rarely documented. What is the GREATEST impact of this?
A. Delays in incident containment
B. Lack of audit trail
C. Repetition of similar incidents
D. Poor public relations
Correct Answer: C – Repetition of similar incidents
Explanation: Without learning from past issues, organizations are likely to repeat
them.
Incorrect Answers:
A. Containment depends on initial response.
B. Audit trails can still exist.
D. Reputation is indirectly affected.

Question 1868
Which of the following would BEST support the early detection of policy violations
related to data usage?
A. Regular internal audits
B. Employee performance reviews
C. Data loss prevention (DLP) tools
D. Manual log review
Correct Answer: C – Data loss prevention (DLP) tools
Explanation: DLP tools automatically monitor and flag suspicious data activity.
Incorrect Answers:
A. Audits are periodic and may miss active violations.
B. Reviews focus on behavior, not policy compliance.
D. Manual log reviews are slow and error-prone.

Question 1869
Which of the following is MOST important when evaluating a cloud provider’s
backup capabilities?
A. Use of blockchain storage
B. Location of data centers
C. Frequency and testability of backups
D. Number of customers served
Correct Answer: C – Frequency and testability of backups
Explanation: Regular, testable backups ensure that data can be recovered
effectively.
Incorrect Answers:
A. Blockchain is unrelated to typical cloud backups.
B. Location matters for legal reasons, not capability.
D. Customer base does not reflect performance.

Question 1870
Which of the following is MOST important when selecting key performance
indicators (KPIs) for an IT audit function?
A. KPIs should align with industry benchmarks
B. KPIs should be derived from auditor performance
C. KPIs should reflect the audit function’s strategic objectives
D. KPIs should focus on audit coverage volume
Correct Answer: C – KPIs should reflect the audit function’s strategic
objectives
Explanation: KPIs must support long-term goals and align with the department’s
mission.
Incorrect Answers:
A. Benchmarks support alignment, not definition.
B. Performance is part of, not the core of KPI selection.
D. Volume doesn’t ensure quality or relevance.

Question 1871
Which of the following would BEST help ensure the success of a system development
project with geographically dispersed teams?
A. Adoption of an agile methodology
B. Use of video conferencing tools
C. Weekly status reporting
D. Clearly defined communication protocols
Correct Answer: D – Clearly defined communication protocols
Explanation: Effective communication is essential when teams are remote, avoiding
misunderstandings and delays.
Incorrect Answers:
A. Agile helps development but doesn’t guarantee communication clarity.
B. Tools are enablers, not solutions.
C. Reports are outputs, not drivers of clarity.

Question 1872
What is the PRIMARY purpose of a post-implementation review?
A. To audit financial cost of the project
B. To assess whether benefits have been realized
C. To report to management on system performance
D. To evaluate the system’s code efficiency
Correct Answer: B – To assess whether benefits have been realized
Explanation: Post-implementation reviews check if objectives were achieved and
lessons can be learned.
Incorrect Answers:
A. Financials are only one aspect.
C. System performance may be part of the review.
D. Code efficiency is not the primary goal.

Question 1873
Which of the following would be the MOST significant concern in a data
classification program?
A. Data owners not participating
B. Lack of a data retention policy
C. Use of outdated classification labels
D. Overclassification of public data
Correct Answer: A – Data owners not participating
Explanation: Owners are responsible for assigning appropriate classifications;
without them, the program lacks authority.
Incorrect Answers:
B. Retention is related, but secondary.
C. Outdated labels are an issue, but less severe.
D. Overclassification affects usability but not foundational integrity.

Question 1874
An IS auditor is reviewing user access provisioning. Which of the following is MOST
important to verify?
A. Management has approved all access requests
B. Users have access to more than one system
C. The system is integrated with HR
D. IT staff are excluded from provisioning
Correct Answer: A – Management has approved all access requests
Explanation: Approval ensures legitimacy and accountability in access control.
Incorrect Answers:
B. Multiple access isn’t a risk alone.
C. Integration helps automation, not control.
D. IT involvement isn’t inherently risky.

Question 1875
Which of the following is the PRIMARY purpose of an information security strategy?
A. Improve operational efficiency
B. Enforce regulatory compliance
C. Align IT security with business goals
D. Reduce costs related to cyber insurance
Correct Answer: C – Align IT security with business goals
Explanation: Strategic alignment ensures that security investments support
organizational priorities.
Incorrect Answers:
A, B, D: Secondary outcomes, not the strategic intent.

Question 1876
Which of the following is the MOST significant risk of adopting open-source software
in critical systems?
A. Lack of vendor support
B. High licensing cost
C. Integration challenges
D. Weak password policies
Correct Answer: A – Lack of vendor support
Explanation: Open-source tools may not have official support, making issue
resolution harder.
Incorrect Answers:
B. Licensing is typically lower, not higher.
C. Integration is manageable with planning.
D. Password policies depend on configuration, not software origin.

Question 1877
Which of the following BEST ensures that terminated employees no longer have
system access?
A. Performing periodic reviews of user accounts
B. Integrating system access with HR processes
C. Disabling all dormant accounts
D. Implementing password expiration policies
Correct Answer: B – Integrating system access with HR processes
Explanation: Automation ensures timely and accurate removal upon termination.
Incorrect Answers:
A. Reviews may miss real-time changes.
C. Dormancy does not equal employment status.
D. Password expiration doesn’t revoke access.

Question 1878
An IS auditor finds that a critical server lacks an alternate power source. What
should be the auditor’s MOST appropriate recommendation?
A. Replace the server with a newer model
B. Install a generator with automatic failover
C. Ensure daily backups are taken
D. Improve HVAC redundancy
Correct Answer: B – Install a generator with automatic failover
Explanation: A generator provides continuity during outages for critical systems.
Incorrect Answers:
A. Hardware isn’t the issue.
C. Backups protect data, not uptime.
D. HVAC isn’t directly relevant.

Question 1879
Which of the following BEST ensures that IT risk management is embedded in
corporate governance?
A. Use of a risk register
B. Risk awareness training
C. Board-level risk oversight
D. Internal audit assessments
Correct Answer: C – Board-level risk oversight
Explanation: Governance integration requires top-level accountability.
Incorrect Answers:
A. Registers track, not embed.
B. Training supports culture, not governance.
D. Audits assess, not govern.

Question 1880
What is the MOST appropriate control to protect sensitive information in email
communication?
A. Use of digital signatures
B. Use of strong passwords
C. Encryption of email content
D. Limiting email recipients
Correct Answer: C – Encryption of email content
Explanation: Encryption ensures confidentiality during transmission.
Incorrect Answers:
A. Signatures ensure authenticity, not confidentiality.
B. Passwords protect access, not data in transit.
D. Limiting recipients helps, but does not secure content.

Question 1881
Which of the following would be the BEST control to detect unauthorized changes in
production programs?
A. User acceptance testing logs
B. Audit logs of program changes
C. Application performance reports
D. Backup and recovery logs
Correct Answer: B – Audit logs of program changes
Explanation: Audit logs provide a record of changes and are essential for detecting
unauthorized modifications.
Incorrect Answers:
A. UAT logs verify functionality, not unauthorized changes.
C. Performance reports don’t show unauthorized access.
D. Backups support recovery, not change detection.

Question 1882
Which of the following is the BEST way to ensure data owners are complying with
data protection policies?
A. Annual security awareness training
B. Periodic compliance audits
C. Use of data loss prevention tools
D. Management attestation
Correct Answer: B – Periodic compliance audits
Explanation: Audits validate actual practices against policy requirements.
Incorrect Answers:
A. Training educates but doesn’t verify.
C. Tools help, but don’t confirm owner actions.
D. Attestation is self-reported, not verified.

Question 1883
Which of the following provides the GREATEST assurance that changes made to a
system were appropriately authorized?
A. Logging and monitoring
B. Signed change request forms
C. Access control logs
D. Change control board approvals
Correct Answer: D – Change control board approvals
Explanation: Formal board review ensures that changes are reviewed and approved.
Incorrect Answers:
A. Logging tracks, but doesn’t validate approvals.
B. Signatures help, but may not represent thorough review.
C. Logs don’t indicate business approval.

Question 1884
Which of the following is the PRIMARY benefit of rotating duties among operations
staff?
A. Improving efficiency
B. Enhancing teamwork
C. Preventing fraud
D. Reducing training costs
Correct Answer: C – Preventing fraud
Explanation: Rotation disrupts long-term control that can facilitate fraud.
Incorrect Answers:
A. Efficiency may be affected.
B. Teamwork may benefit but isn’t the goal.
D. Rotation often increases training costs.

Question 1885
An IS auditor is evaluating controls over an organization's help desk. Which of the
following is of MOST concern?
A. Tickets are not categorized by severity
B. Users can reset their own passwords
C. Call wait times are long
D. There is no tracking of recurring issues
Correct Answer: B – Users can reset their own passwords
Explanation: Self-reset without controls can lead to unauthorized access.
Incorrect Answers:
A, C, D: Affect service, not security.

Question 1886
Which of the following BEST helps ensure audit evidence collected is reliable?
A. It is obtained from independent sources
B. It is signed by the auditee
C. It is documented in management reports
D. It is backed by audit software
Correct Answer: A – It is obtained from independent sources
Explanation: Independent sources reduce the risk of bias or tampering.
Incorrect Answers:
B. Signatures confirm receipt, not truth.
C. Reports may be biased.
D. Software supports evidence but doesn’t confirm it.

Question 1887
Which of the following is the MOST appropriate way to assess whether controls in a
cloud environment meet compliance requirements?
A. Review audit reports from the cloud provider
B. Interview cloud service provider staff
C. Review user access logs
D. Request uptime statistics
Correct Answer: A – Review audit reports from the cloud provider
Explanation: SOC and other audit reports provide third-party assurance.
Incorrect Answers:
B. Interviews are informal.
C. Logs are limited in scope.
D. Uptime does not reflect compliance.

Question 1888
An IS auditor discovers that encryption keys are stored on the same server as the
encrypted data. What is the GREATEST risk?
A. Increased storage requirements
B. Delay in key retrieval
C. Unauthorized data access
D. Poor encryption performance
Correct Answer: C – Unauthorized data access
Explanation: If attackers gain server access, they can decrypt data.
Incorrect Answers:
A, B, D: Less critical than exposure.

Question 1889
Which of the following should be the FIRST step when evaluating a third-party
provider’s ability to maintain data confidentiality?
A. Conduct a penetration test
B. Review incident response times
C. Review the provider’s data protection policy
D. Interview their IT personnel
Correct Answer: C – Review the provider’s data protection policy
Explanation: Policies outline commitments and controls for confidentiality.
Incorrect Answers:
A. Testing comes after policy review.
B. Incident response relates to availability.
D. Interviews provide context, not assurance.

Question 1890
Which of the following is the PRIMARY reason for maintaining a test environment
separate from production?
A. Reduce hardware costs
B. Improve application performance
C. Prevent unauthorized data manipulation
D. Facilitate faster software deployment
Correct Answer: C – Prevent unauthorized data manipulation
Explanation: Segregation protects production data integrity.
Incorrect Answers:
A. Separation increases costs.
B. Performance isn’t a main reason.
D. Deployment speed isn’t the priority.

Question 1891
Which of the following BEST helps ensure the security of a wireless access point
(WAP) in a corporate network?
A. Implementing MAC address filtering
B. Using network address translation
C. Configuring WPA3 encryption
D. Disabling the SSID broadcast
Correct Answer: C – Configuring WPA3 encryption
Explanation: WPA3 provides strong encryption and authentication, enhancing
wireless security.
Incorrect Answers:
A. MAC filtering can be spoofed.
B. NAT hides IPs but does not encrypt.
D. Hiding SSID is ineffective as a standalone control.

Question 1892
Which of the following is MOST important when selecting an automated tool for log
management in a large organization?
A. Cost of implementation
B. Availability of technical support
C. Ability to correlate data from multiple sources
D. Frequency of software updates
Correct Answer: C – Ability to correlate data from multiple sources
Explanation: Correlation enables detection of patterns and anomalies across
systems.
Incorrect Answers:
A. Cost is a consideration but not the top priority.
B. Support helps operations, not detection.
D. Updates are important but secondary to functionality.

Question 1893
Which of the following BEST validates the completeness of access rights for a
terminated employee?
A. Reviewing system audit logs
B. Verifying revocation in access control lists
C. Confirming with human resources
D. Comparing user access to job role matrix
Correct Answer: B – Verifying revocation in access control lists
Explanation: Direct review of access control ensures rights are revoked.
Incorrect Answers:
A. Logs show activity, not access status.
C. HR informs timing, not control state.
D. Job matrices relate to assignments, not termination.

Question 1894
An IS auditor is reviewing the password management process. Which of the following
is the MOST effective way to ensure passwords are not easily guessable?
A. Passwords must include special characters
B. Enforce regular password changes
C. Disallow reuse of the last 10 passwords
D. Implement minimum password entropy rules
Correct Answer: D – Implement minimum password entropy rules
Explanation: Entropy measures complexity and unpredictability, ensuring stronger
passwords.
Incorrect Answers:
A–C: Helpful but don’t directly address password strength mathematically.

Question 1895
Which of the following is the MOST critical aspect to review when assessing the
effectiveness of change control procedures?
A. User communication process
B. Documentation of emergency changes
C. Number of changes made
D. Developer satisfaction with the process
Correct Answer: B – Documentation of emergency changes
Explanation: Emergency changes bypass normal controls and pose high risk.
Incorrect Answers:
A. Communication supports change, not controls.
C. Quantity doesn’t indicate control strength.
D. Developer satisfaction doesn’t reflect effectiveness.

Question 1896
Which of the following is MOST useful for tracking the maturity of an organization’s
information security program over time?
A. Security training attendance rates
B. Number of open audit issues
C. Benchmarking against a maturity model
D. Percentage of systems with antivirus installed
Correct Answer: C – Benchmarking against a maturity model
Explanation: Maturity models provide structured levels for comparison and growth
tracking.
Incorrect Answers:
A, B, D: Indicators of activity, not program maturity.

Question 1897
What is the GREATEST risk of maintaining user access rights based on job titles
rather than actual job responsibilities?
A. Frequent changes to access profiles
B. Overlapping responsibilities among users
C. Excessive access privileges
D. Increased administrative workload
Correct Answer: C – Excessive access privileges
Explanation: Titles may not reflect the specific access required, leading to
overprovisioning.
Incorrect Answers:
A, B, D: Possible issues but less impactful.

Question 1898
Which of the following is MOST important when using data analytics to detect
potential fraud?
A. High-performance computing
B. Automated reporting tools
C. Defined fraud risk indicators
D. Real-time dashboards
Correct Answer: C – Defined fraud risk indicators
Explanation: Without clear indicators, analytics cannot target suspicious patterns.
Incorrect Answers:
A, B, D: Support tools, not fraud criteria.

Question 1899
Which of the following BEST indicates that a backup process is reliable?
A. Full backups are performed weekly
B. Incremental backups are scheduled nightly
C. Backup completion is reported daily
D. Backups are periodically tested for restoration
Correct Answer: D – Backups are periodically tested for restoration
Explanation: Only testing confirms backups are usable and reliable.
Incorrect Answers:
A–C: Address frequency and reporting, not success.

Question 1900
Which of the following is the PRIMARY reason to use a centralized logging solution
in an enterprise environment?
A. To improve compliance reporting
B. To reduce disk usage on servers
C. To simplify event correlation and monitoring
D. To ensure encryption of log files
Correct Answer: C – To simplify event correlation and monitoring
Explanation: Centralization enables cross-system visibility and pattern detection.
Incorrect Answers:
A. Reporting is a benefit, not the main reason.
B. Disk savings is incidental.
D. Encryption is supported but not the primary goal.

You might also like