During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
Correct Answer: A
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be most concerned with the allocation of resources during an emergency. A reciprocal disaster recovery agreement is an arrangement by which one organization agrees to use another's resources in the event of a business continuity event or incident. The IS auditor would need to ensure that both parties have clearly defined their roles and responsibilities, their resource requirements, their priority levels, their communication channels, and their escalation procedures in case of a disaster. The IS auditor would also need to verify that both parties have tested their agreement and have updated it regularly to reflect any changes in their business environments. The frequency of system testing is not as critical as the allocation of resources during an emergency, because system testing can be performed periodically or on demand, while resource allocation is a dynamic and complex process that requires careful planning and coordination. The differences in IS policies and procedures are not as critical as the allocation of resources during an emergency, because both parties can agree on common standards and protocols for their disaster recovery operations, or they can adapt their policies and procedures to suit each other's needs. The maintenance of hardware and software compatibility is not as critical as the allocation of resources during an emergency, because both parties can use compatible or interoperable systems, or they can use virtualization or cloud computing technologies to overcome any compatibility issues. References: ISACACISA Review Manual 27th Edition, page 281
CISA Exam Question 352
Which of the following is the MOST important course of action to ensure a cloud access security broker (CASB) effectively detects and responds to threats?
Correct Answer: A
Comprehensive and Detailed Step-by-Step Explanation: ACloud Access Security Broker (CASB)ensuresvisibility, compliance, and securityof cloud applications, andmonitoring data movementis the key to detecting threats. * Option A (Correct):Monitoring data movementallows organizations todetect and preventunauthorized access, data exfiltration, and cloud-based threats. * Option B (Incorrect):Along-term contractdoes not inherentlyimprove security monitoring. * Option C (Incorrect):Reviewing policies helps withgovernance, but it does notactively detect threats. * Option D (Incorrect):Firewallsprotectnetwork perimeters, while CASBs focus oncloud security, making this anineffective measurefor CASB threat detection. Reference:ISACA CISA Review Manual -Domain 5: Protection of Information Assets- CoversCASB, cloud security, and threat detection best practices.
CISA Exam Question 353
Which of the following is a key component that should be included in Enterprise Architecture (EA) documentation?
Correct Answer: C
Comprehensive and Detailed In-Depth Explanation:Enterprise Architecture (EA) documentation primarily includes strategic and operational blueprints outlining the evolution of IT infrastructure to align with business goals. Roadmaps showing the evolution from current state to future state (C) are essential for understanding how the organization's IT environment will change over time to support business strategy. Other options: * Contact information for key resources (A) is more of an operational or administrative document rather than an EA component. * Detailed encryption standards (B) would typically be found in security policies or system-specific documentation rather than in EA documentation. * Protocols used to communicate between systems (D) are typically documented within network or system architecture diagrams rather than high-level EA documentation. Reference: ISACA CISA Review Manual, IT Governance and Management of IT
CISA Exam Question 354
Which of the following findings related to segregation of duties should be of GREATEST concern to an IS auditor?
Correct Answer: D
CISA Exam Question 355
Which of the following would be the GREATEST concern during a financial statement audit?