An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
Correct Answer: A
The IS auditor's primary concern when an organization has recently implemented a Voice-over IP (VoIP) communication system is a single point of failure for both voice and data communications. VoIP is a technology that allows voice communication over IP networks such as the internet. VoIP can offer benefits such as lower costs, higher flexibility, and better integration with other applications. However, VoIP also introduces risks such as dependency on network availability, performance, and security. If both voice and data communications share the same network infrastructure and devices, then a single point of failure can affect both services simultaneously and cause significant disruption to business operations. Therefore, the IS auditor should evaluate the availability and redundancy of the network components and devices that support VoIP communication. The other options are not as critical as a single point of failure for both voice and data communications, as they do not pose a direct threat to business continuity. References: CISA Review Manual, 27th Edition, page 385
CISA Exam Question 7
When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?
Correct Answer: C
The finding that should be of most concern to an IS auditor when evaluating information security governance within an organization is that the data center manager has final sign-off on security projects. This indicates a lack of segregation of duties and a potential conflict of interest between the operational and security roles. The data center manager may have access to sensitive information or systems that should be protected by security controls, or may influence or override security decisions that are not in the best interest of the organization. This finding also suggests that there is no clear accountability or authority for information security governance at a higher level, such as senior management or board of directors. The other findings are not as concerning as this one, although they may indicate some areas for improvement or monitoring. References: * ISACA, CISA Review Manual, 27th Edition, chapter 5, section 5.11 * ISACA, IT Governance Using COBIT and Val IT: Student Booklet - 2nd Edition4
CISA Exam Question 8
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
Correct Answer: D
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of last-mile circuit protection. Last-mile circuit protection is a type of telecommunications continuity that ensures the availability and redundancy of the final segment of the network that connects the end-user to the service provider. The local communications loop, also known as the local loop or subscriber line, is the physical link between the customer premises and the nearest central office or point of presence of the service provider. By having multiple Internet connections from different providers or technologies, such as cable, DSL, fiber, wireless, or satellite, the recovery facilities can avoid losing connectivity in case one of the connections fails or is disrupted by a disaster5. References: * 9: Last Mile Redundancy - How to Ensure Business Continuity - Multapplied Networks
CISA Exam Question 9
Which of the following is the MOST important consideration to facilitate prosecution of a perpetrator after a cybercrime?
Correct Answer: B
Comprehensive and Detailed Step-by-Step Explanation: Forensic evidence must be legally admissible, unaltered, and properly collected to support prosecution. * Option A (Incorrect):While an IDS helpsdetectcybercrime, it does not ensure evidence collection or legal admissibility. * Option B (Correct):Theprofessional collection of unaltered evidencefollows forensic standards, includingchain of custody, ensuring that the evidence is admissible in court. This is the most critical factor in prosecuting cybercriminals. * Option C (Incorrect):Internal legal reporting is necessary but does not directly impactevidence preservation, which is key for legal action. * Option D (Incorrect):Law enforcement involvement is important, but withoutproperly collected evidence, prosecution is unlikely to succeed. Reference:ISACA CISA Review Manual -Domain 5: Protection of Information Assets- Covers forensic investigation, evidence collection, and chain of custody principles.
CISA Exam Question 10
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?