An IS auditor is planning a review of an organizations robotic process automation (RPA) technology. Which of the following MUST be included in the audit work plan?
Which of the following user actions poses the GREATEST risk for inadvertently introducing malware into a local network?
Which of the following is PRIMARILY used in blockchain technology to create a distributed immutable ledger?
Which of the following is an IS auditor's BEST recommendation after identifying that HR staff create new employees in the payroll system as well as process payroll due to limited staffing?
The GREATEST concern for an IS auditor reviewing vulnerability assessments by the auditee would be if the assessments are:
Comprehensive and Detailed Step-by-Step Explanation:
Conducting vulnerability assessments only once per year, right before an audit, creates a false sense of security and leaves systems exposed between assessments.
Annual Testing Before Audit (Correct Answer -- A)
Risks undetected vulnerabilities for extended periods.
Example: A company only tests security before a compliance audit, allowing zero-day threats to persist for months.
Internal Team Conducting Assessments (Incorrect -- B)
Not ideal, but regular assessments are more critical.
Focusing on Critical Systems (Incorrect -- C)
Not perfect, but better than no testing at all.
Using Open-Source Tools (Incorrect -- D)
Open-source tools can be effective if properly configured.
References:
ISACA CISA Review Manual
NIST 800-115 (Technical Guide to Security Testing)
Nan
1 months agoHelene
2 months agoStephane
3 months agoNu
3 months agoDanilo
4 months agoCathrine
5 months agoDanilo
5 months agoTamala
5 months agoRoyce
6 months agoJade
6 months agoJennie
6 months agoEric
6 months agoTheron
6 months agoJaime
7 months agoLorenza
7 months agoStaci
7 months agoMoon
7 months agoFelicidad
8 months agoSheridan
8 months agoAmmie
8 months agoTijuana
9 months agoMireya
10 months agoDoug
10 months agoSamuel
10 months agoStefany
10 months agoSharee
12 months ago