CISA Certified Information Systems Auditor – Question2668

Which of the following is the MOST critical step prior to performing a network penetration test?

A.
Informing management of the potential risk involved with penetration testing
B. Identifying a scanning tool for use in identifying vulnerabilities
C. Communicating the location of the penetration test targets to management
D. Reviewing the results of previous penetration tests

Correct Answer: A

CISA Certified Information Systems Auditor – Question2667

Due to the small size of the payroll department, an organization is unable to segregate the employee setup and payroll processing functions. Which of the following would be the BEST compensating control for the lack of segregation of duties?

A.
An independent payroll disbursement review is conducted.
B. The system is configured to require secondary approval for changes to the employee master file.
C. A review is conducted to verify that terminated employees are removed from the employee master file.
D. A payroll variance report is reviewed for anomalies every pay period.

Correct Answer: D

CISA Certified Information Systems Auditor – Question2666

Privileged account access is required to start an ad hoc batch job. Which of the following would MOST effectively detect unauthorized job execution?

A.
Requiring manual approval by an authorized user
B. Executing the job through two-factor authentication
C. Introducing job execution request procedures
D. Reconciling user activity logs against authorizations

Correct Answer: B

CISA Certified Information Systems Auditor – Question2665

A user of a telephone banking system has forgotten his personal identification number (PIN). After the user has been authenticated, the BEST method of issuing a new PIN is to have:

A.
the user enter a new PIN twice.
B. banking personnel verbally assign a new PIN.
C. a randomly generated PIN communicated by banking personnel.
D. banking personnel assign the user a new PIN via email.

Correct Answer: A

CISA Certified Information Systems Auditor – Question2661

Which of the following is the PRIMARY purpose of documenting and approving an information security policy?

A.
To communicate management’s intent for securing the organization’s information assets
B. To mitigate the organization’s information security risk to an acceptable level
C. To ensure awareness of disciplinary procedures for security breaches by authorized users
D. To determine the best approach for implementing information security within the organization

Correct Answer: A