For IndividualsFor Educators
ExpertMinds LogoExpertMinds
ExpertMinds

Ace your certifications with Practice Exams and AI assistance.

  • Browse Exams
  • For Educators
  • Blog
  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Support
  • AWS SAA Exam Prep
  • PMI PMP Exam Prep
  • CPA Exam Prep
  • GCP PCA Exam Prep

© 2026 TinyHive Labs. Company number 16262776.

    PracticeCPA®TopicsISC
    CPA®

    ISC

    410 questions across 5 exams

    Subtopics in this domain
    Area I: Information Systems
    146 questions
    Area II: Security
    176 questions
    Area III: SOC Engagements
    88 questions

    Exams covering this topic

    CPA ISC Practice ExamCPA ISC Practice Exam 2CPA ISC Practice Exam 3CPA ISC Practice Exam 4CPA ISC Practice Exam 5

    All questions (410)

    Q01Hard1 mark·CPA ISC Practice Exam

    A CPA is performing a risk assessment for a client that uses a public cloud provider for its core ERP system. The client utilizes an Infrastructure as a Service (IaaS) model. When defining the scope of the IT audit, which of the following components is the client's management primarily responsible for securing, rather than the cloud service provider?

    Worked answer available with free account
    View question →
    Q02Hard1 mark·CPA ISC Practice Exam

    During a walkthrough of a client's change management process, the auditor notes that developers have write access to the production environment to facilitate quick hotfixes. The client argues that a code review tool logs all changes. Which of the following represents the MOST significant risk associated with this configuration?

    Worked answer available with free account
    View question →
    Q03Hard1 mark·CPA ISC Practice Exam

    A service organization provides a real-time transaction processing platform. The service level agreement (SLA) guarantees a Recovery Point Objective (RPO) of 15 minutes. The auditor discovers that the organization performs full backups nightly at midnight and ships tapes to offsite storage daily. No other backup mechanisms are in place. What is the auditor's conclusion?

    Worked answer available with free account
    View question →
    Q04Hard1 mark·CPA ISC Practice Exam

    An auditor is reviewing a SQL query used by the finance team to generate a report of all sales transactions above $10,000 for the first quarter of 2024. The query is:<br/><br/>SELECT * FROM Sales<br/>WHERE Amount > 10000<br/>AND Date BETWEEN '2024-01-01' AND '2024-03-31'<br/><br/>Assuming the 'Amount' column includes cents and the 'Date' column is a standard date type, which potential issue should the auditor investigate regarding the completeness of this population?

    Worked answer available with free account
    View question →
    Q05Hard1 mark·CPA ISC Practice Exam

    A healthcare clearinghouse is preparing for a SOC 2® engagement. They utilize a private cloud deployment model hosted in their own data center. Which of the following statements accurately describes the auditor's responsibility regarding the infrastructure in this scenario?

    Worked answer available with free account
    View question →
    Q06Hard1 mark·CPA ISC Practice Exam

    An auditor is evaluating the design of a disaster recovery plan (DRP). The organization uses a 'differential' backup strategy during the week and a 'full' backup on weekends. If the system crashes on Thursday afternoon, which files are required to restore the system to the most recent state?

    Worked answer available with free account
    View question →
    Q07Medium1 mark·CPA ISC Practice Exam

    A company is implementing a new ERP system. The project team decides to run the old system and the new system simultaneously for two months, comparing the outputs of both systems before decommissioning the old one. Which implementation strategy is this?

    Worked answer available with free account
    View question →
    Q08Hard1 mark·CPA ISC Practice Exam

    Under the COSO Internal Control framework, which of the following is a critical risk associated with the use of blockchain technology in financial reporting that an auditor must evaluate?

    Worked answer available with free account
    View question →
    Q09Medium1 mark·CPA ISC Practice Exam

    An auditor is reviewing the data integration process between a CRM system and the General Ledger. The process uses an ETL (Extract, Transform, Load) tool. The auditor observes that the 'Transform' step includes logic to map 'State' codes (e.g., 'NY') to 'Region' IDs (e.g., '101'). Which control is MOST important to ensure data integrity during this step?

    Worked answer available with free account
    View question →
    Q10Hard1 mark·CPA ISC Practice Exam

    A company uses a 'Data Lake' architecture to store unstructured customer feedback logs alongside structured transaction data. When auditing the completeness of data retrieval for analysis, what is a primary challenge the auditor should anticipate compared to a traditional Data Warehouse?

    Worked answer available with free account
    View question →
    Q11Medium1 mark·CPA ISC Practice Exam

    Which of the following scenarios represents a violation of the 'Segregation of Duties' principle in the context of IT change management?

    Worked answer available with free account
    View question →
    Q12Easy1 mark·CPA ISC Practice Exam

    A service organization uses a 'hot site' for disaster recovery. Which of the following best describes the readiness of this facility?

    Worked answer available with free account
    View question →
    Q13Medium1 mark·CPA ISC Practice Exam

    An auditor is testing the 'completeness' of a data extraction from a legacy mainframe to a new cloud database. The auditor sums the 'TotalAccountValue' field in the source system and compares it to the sum in the destination system. This technique is known as:

    Worked answer available with free account
    View question →
    Q14Medium1 mark·CPA ISC Practice Exam

    A company uses a SaaS-based CRM. The auditor wants to verify that the company's data is backed up. The SaaS provider's contract states they perform daily backups. What is the MOST appropriate evidence for the auditor to request?

    Worked answer available with free account
    View question →
    Q15Easy1 mark·CPA ISC Practice Exam

    Which of the following is a 'preventive' control in the context of network security?

    Worked answer available with free account
    View question →
    Q16Hard1 mark·CPA ISC Practice Exam

    A covered entity under HIPAA uses a cloud service to store Patient Health Information (PHI). The cloud provider experiences a data breach where unencrypted PHI is exposed. Under the HIPAA Breach Notification Rule, which of the following actions is REQUIRED?

    Worked answer available with free account
    View question →
    Q17Medium1 mark·CPA ISC Practice Exam

    Under the General Data Protection Regulation (GDPR), a 'Data Controller' is defined as:

    Worked answer available with free account
    View question →
    Q18Hard1 mark·CPA ISC Practice Exam

    A retailer processes credit card transactions. According to PCI DSS Requirement 3 (Protect stored cardholder data), which of the following data elements is permitted to be stored after authorization, provided it is encrypted?

    Worked answer available with free account
    View question →
    Q19Medium1 mark·CPA ISC Practice Exam

    The NIST Cybersecurity Framework (CSF) organizes its Core into five concurrent and continuous functions. Which function includes activities to 'develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services'?

    Worked answer available with free account
    View question →
    Q20Hard1 mark·CPA ISC Practice Exam

    An organization is adopting the COBIT 2019 framework. Which of the following is NOT one of the six 'Governance System Principles' of COBIT 2019?

    Worked answer available with free account
    View question →
    Q21Easy1 mark·CPA ISC Practice Exam

    A penetration tester is hired to assess a company's external security. The tester sends a deceptive email to the HR department claiming to be an applicant, with a malicious attachment designed to harvest credentials. This type of attack is best classified as:

    Worked answer available with free account
    View question →
    Q22Medium1 mark·CPA ISC Practice Exam

    Which of the following authentication methods provides the highest level of security for remote access to a corporate network?

    Worked answer available with free account
    View question →
    Q23Medium1 mark·CPA ISC Practice Exam

    An auditor is reviewing the 'Least Privilege' implementation for a database. They find that the 'Reporting_User' role has 'DROP TABLE' permissions. Why is this a control deficiency?

    Worked answer available with free account
    View question →
    Q24Easy1 mark·CPA ISC Practice Exam

    Which of the following best describes the concept of 'Defense in Depth'?

    Worked answer available with free account
    View question →
    Q25Medium1 mark·CPA ISC Practice Exam

    A service organization is undergoing a SOC 2® engagement. The auditor observes that the organization uses a 'bastion host' or 'jump box' to access the production network. What is the primary security purpose of this component?

    Worked answer available with free account
    View question →
    Q26Medium1 mark·CPA ISC Practice Exam

    In the context of encryption, what is the primary difference between symmetric and asymmetric encryption?

    Worked answer available with free account
    View question →
    Q27Medium1 mark·CPA ISC Practice Exam

    A company wants to ensure that sensitive emails sent to external clients cannot be read by interceptors. They implement a solution where the sender uses the recipient's public key to encrypt the message. This ensures:

    Worked answer available with free account
    View question →
    Q28Medium1 mark·CPA ISC Practice Exam

    An auditor is reviewing the incident response plan of a financial institution. The plan states that in the event of a ransomware attack, the first step is to 'Pay the ransom immediately to restore operations.' How should the auditor evaluate this procedure?

    Worked answer available with free account
    View question →
    Q29Hard1 mark·CPA ISC Practice Exam

    Which of the following is a key requirement of the NIST Privacy Framework's 'Control' function?

    Worked answer available with free account
    View question →
    Q30Medium1 mark·CPA ISC Practice Exam

    A CPA is engaged to perform a SOC 1® engagement. Which of the following best describes the subject matter of this engagement?

    Worked answer available with free account
    View question →
    Q31Hard1 mark·CPA ISC Practice Exam

    A service organization's system description includes controls performed by a subservice organization (e.g., a data center). The service auditor decides to use the 'carve-out' method. What does this imply for the service auditor's report?

    Worked answer available with free account
    View question →
    Q32Medium1 mark·CPA ISC Practice Exam

    In a SOC 2® engagement, which of the following Trust Services Criteria is MANDATORY for every report?

    Worked answer available with free account
    View question →
    Q33Hard1 mark·CPA ISC Practice Exam

    A service auditor is issuing a SOC 2® Type II report. Testing identified that a key control for revoking terminated user access failed in 5 out of 25 instances sampled. The failure resulted in terminated employees retaining access for up to 2 weeks. What type of opinion should the auditor likely issue?

    Worked answer available with free account
    View question →
    Q34Medium1 mark·CPA ISC Practice Exam

    What is the primary difference between a SOC 2® Type I and a SOC 2® Type II report?

    Worked answer available with free account
    View question →
    Q35Medium1 mark·CPA ISC Practice Exam

    Which of the following is an example of a 'Complementary User Entity Control' (CUEC) that might be listed in a payroll service provider's SOC 1® report?

    Worked answer available with free account
    View question →
    Q36Hard1 mark·CPA ISC Practice Exam

    An auditor is testing a control that requires 'Quarterly access reviews'. The auditor selects a sample of one review from the year. Is this sample size appropriate?

    Worked answer available with free account
    View question →
    Q37Easy1 mark·CPA ISC Practice Exam

    Which of the following is a 'corrective' control?

    Worked answer available with free account
    View question →
    Q38Medium1 mark·CPA ISC Practice Exam

    A company uses a 'Platform as a Service' (PaaS) environment to develop and host its web application. The auditor asks for evidence of 'patch management'. Which response from the client is most appropriate regarding the underlying operating system?

    Worked answer available with free account
    View question →
    Q39Medium1 mark·CPA ISC Practice Exam

    An auditor is reviewing the logical access controls for a financial application. They notice that the 'Application Administrator' account is shared by three members of the IT support team. The password is stored in a password vault. What is the primary risk?

    Worked answer available with free account
    View question →
    Q40Hard1 mark·CPA ISC Practice Exam

    Which of the following SQL statements would an auditor use to identify duplicate invoice numbers in the 'Sales' table?

    Worked answer available with free account
    View question →
    Q41Easy1 mark·CPA ISC Practice Exam

    Under the CIS Controls (Center for Internet Security), Control 1 is 'Inventory and Control of Enterprise Assets'. Why is this considered the foundational control?

    Worked answer available with free account
    View question →
    Q42Medium1 mark·CPA ISC Practice Exam

    A company implements a 'Zero Trust' architecture. Which of the following principles is central to this model?

    Worked answer available with free account
    View question →
    Q43Medium1 mark·CPA ISC Practice Exam

    An auditor is examining the 'User Acceptance Testing' (UAT) phase of a software implementation. Who is the MOST appropriate party to sign off on UAT results?

    Worked answer available with free account
    View question →
    Q44Medium1 mark·CPA ISC Practice Exam

    A service organization provides a cloud-based data warehouse. A user entity auditor wants to know if the data in the warehouse is accurate and complete. Which Trust Services Criteria category is MOST relevant?

    Worked answer available with free account
    View question →
    Q45Easy1 mark·CPA ISC Practice Exam

    Which of the following is a characteristic of a 'hardened' operating system?

    Worked answer available with free account
    View question →
    Q46Medium1 mark·CPA ISC Practice Exam

    A company is subject to GDPR. They wish to use customer data for a new purpose (marketing) that was not disclosed when the data was originally collected. What must they typically do?

    Worked answer available with free account
    View question →
    Q47Medium1 mark·CPA ISC Practice Exam

    Which of the following is a 'detective' control for ensuring data integrity in a batch processing system?

    Worked answer available with free account
    View question →
    Q48Medium1 mark·CPA ISC Practice Exam

    An auditor is reviewing the 'Management's Assertion' in a SOC 2® report. Which of the following statements must be included in the assertion?

    Worked answer available with free account
    View question →
    Q49Medium1 mark·CPA ISC Practice Exam

    Which of the following is a primary benefit of using a 'Hybrid Cloud' deployment model?

    Worked answer available with free account
    View question →
    Q50Hard1 mark·CPA ISC Practice Exam

    An auditor is testing the 'Termination' process. They sample 10 employees who left the company. For one employee, the Active Directory account was disabled 3 days after their departure date. The policy states 'within 24 hours'. What is the auditor's next step?

    Worked answer available with free account
    View question →
    Q51Medium1 mark·CPA ISC Practice Exam

    What is the primary purpose of a 'Data Warehouse' compared to an operational database (OLTP)?

    Worked answer available with free account
    View question →
    Q52Hard1 mark·CPA ISC Practice Exam

    A company uses 'Tokenization' to protect credit card numbers. How does this differ from Encryption?

    Worked answer available with free account
    View question →
    Q53Easy1 mark·CPA ISC Practice Exam

    Which of the following is a 'physical' security control?

    Worked answer available with free account
    View question →
    Q54Medium1 mark·CPA ISC Practice Exam

    An auditor is reviewing the 'Change Management' process. They find a change ticket labeled 'Emergency Fix' that was deployed to production without prior testing. The policy allows this if retrospective approval is granted within 24 hours. What is the auditor's primary concern?

    Worked answer available with free account
    View question →
    Q55Hard1 mark·CPA ISC Practice Exam

    Which of the following is a requirement of the HIPAA Security Rule but NOT the Privacy Rule?

    Worked answer available with free account
    View question →
    Q56Hard1 mark·CPA ISC Practice Exam

    A service organization's management refuses to provide a written assertion for a SOC 2® engagement. What action must the auditor take?

    Worked answer available with free account
    View question →
    Q57Medium1 mark·CPA ISC Practice Exam

    Which of the following best describes 'Static Application Security Testing' (SAST)?

    Worked answer available with free account
    View question →
    Q58Hard1 mark·CPA ISC Practice Exam

    An auditor observes that a company uses 'Symmetric' encryption for transmitting large database backups across a public network. The key exchange is handled via a separate secure channel. Is this appropriate?

    Worked answer available with free account
    View question →
    Q59Medium1 mark·CPA ISC Practice Exam

    In the context of COBIT 2019, what is the purpose of the 'Goals Cascade'?

    Worked answer available with free account
    View question →
    Q60Medium1 mark·CPA ISC Practice Exam

    A company uses a 'Biometric' authentication system. The 'False Acceptance Rate' (FAR) is set to 0.01%. What does this mean?

    Worked answer available with free account
    View question →
    Q61Medium1 mark·CPA ISC Practice Exam

    An auditor is reviewing a 'Business Continuity Plan' (BCP). The plan relies on a 'Reciprocal Agreement' with a neighboring company. What is a major risk of this strategy?

    Worked answer available with free account
    View question →
    Q62Easy1 mark·CPA ISC Practice Exam

    Which of the following is a 'Logical' access control?

    Worked answer available with free account
    View question →
    Q63Medium1 mark·CPA ISC Practice Exam

    An auditor is reviewing the 'System Description' for a SOC 2® report. The description lists 'Google Cloud Platform' as a subservice organization. The auditor notes that the description does NOT include the specific controls performed by Google. This indicates:

    Worked answer available with free account
    View question →
    Q64Easy1 mark·CPA ISC Practice Exam

    Which of the following is a 'Risk Response' strategy where the organization decides to stop the activity that causes the risk?

    Worked answer available with free account
    View question →
    Q65Hard1 mark·CPA ISC Practice Exam

    An auditor is testing the 'Accuracy' of a report generated by an IT system. They trace a sample of items from the report back to the source documents (invoices). This test primarily provides evidence for:

    Worked answer available with free account
    View question →
    Q66Easy1 mark·CPA ISC Practice Exam

    Under the NIST Cybersecurity Framework, 'Recovery Planning' falls under which function?

    Worked answer available with free account
    View question →
    Q67Medium1 mark·CPA ISC Practice Exam

    A company stores customer passwords in a database. To protect them, they use a hashing algorithm. Which additional technique should be applied to prevent 'Rainbow Table' attacks?

    Worked answer available with free account
    View question →
    Q68Medium1 mark·CPA ISC Practice Exam

    An auditor is evaluating the 'Independence' of the personnel performing a SOC 2® engagement. Which of the following would impair independence?

    Worked answer available with free account
    View question →
    Q69Easy1 mark·CPA ISC Practice Exam

    Which of the following is a 'Social Engineering' technique where the attacker waits for an authorized user to pass through a secure door and then follows them inside?

    Worked answer available with free account
    View question →
    Q70Easy1 mark·CPA ISC Practice Exam

    A company uses a 'Waterfall' methodology for software development. Which of the following is a primary characteristic of this model?

    Worked answer available with free account
    View question →
    Q71Medium1 mark·CPA ISC Practice Exam

    An auditor is reviewing a SQL query that joins two tables: 'Customers' and 'Orders'. The query uses an 'INNER JOIN'. Which records will be included in the result?

    Worked answer available with free account
    View question →
    Q72Medium1 mark·CPA ISC Practice Exam

    A service organization has a control that states: 'Firewall rules are reviewed semi-annually.' The auditor tests this by requesting the minutes of the review meetings. The client provides minutes for a meeting in January and a meeting in July. Is this sufficient evidence for a Type II report covering Jan 1 to Dec 31?

    Worked answer available with free account
    View question →
    Q73Hard1 mark·CPA ISC Practice Exam

    Which of the following is a 'Substantive Procedure' in an IT audit context?

    Worked answer available with free account
    View question →
    Q74Easy1 mark·CPA ISC Practice Exam

    A company uses a 'Cold Site' for disaster recovery. What is the primary disadvantage of this approach?

    Worked answer available with free account
    View question →
    Q75Medium1 mark·CPA ISC Practice Exam

    Which of the following is a 'Corrective' control in the Change Management process?

    Worked answer available with free account
    View question →
    Q76Hard1 mark·CPA ISC Practice Exam

    An auditor is reviewing the 'System Description' and notices it mentions 'The system is protected by a firewall'. However, the firewall is managed by a third-party MSP (Managed Service Provider) and is not included in the scope of the report (carve-out). What is the impact on the user entity?

    Worked answer available with free account
    View question →
    Q77Medium1 mark·CPA ISC Practice Exam

    Which of the following is a 'Privacy' control (as opposed to Security) in a SOC 2® engagement?

    Worked answer available with free account
    View question →
    Q78Medium1 mark·CPA ISC Practice Exam

    A company uses a 'Public Key Infrastructure' (PKI). What is the role of the 'Certificate Authority' (CA)?

    Worked answer available with free account
    View question →
    Q79Easy1 mark·CPA ISC Practice Exam

    An auditor is reviewing the 'Incident Response' log. They see an entry: 'Server detected high CPU usage. Investigation showed it was a scheduled backup. Ticket closed.' Was this an 'Incident'?

    Worked answer available with free account
    View question →
    Q80Hard1 mark·CPA ISC Practice Exam

    Which of the following is a requirement of PCI DSS Requirement 11 (Regularly test security systems and processes)?

    Worked answer available with free account
    View question →
    Q81Medium1 mark·CPA ISC Practice Exam

    An auditor is reviewing the 'System Description' for a SOC 2® report. The description includes a flowchart of the order processing system. The auditor notices a step in the flowchart where 'Orders > $5000 require Manager Approval'. During the walkthrough, the auditor observes that the system actually requires approval for orders > $10,000. What is the auditor's conclusion?

    Worked answer available with free account
    View question →
    Q82Hard1 mark·CPA ISC Practice Exam

    Which of the following is the MOST effective method to prevent 'SQL Injection' attacks in a web application?

    Worked answer available with free account
    View question →
    Q01Medium1 mark·CPA ISC Practice Exam 2

    A service organization provides a cloud-based payroll platform where clients access the software via a web browser. The clients do not manage the underlying infrastructure, operating systems, or application capabilities. Which cloud service model is the service organization providing?

    Worked answer available with free account
    View question →
    Q02Hard1 mark·CPA ISC Practice Exam 2

    An auditor is reviewing the backup strategy for a financial institution that requires a Recovery Point Objective (RPO) of 15 minutes. The current strategy involves a daily full backup at midnight. Which conclusion should the auditor draw?

    Worked answer available with free account
    View question →
    Q03Medium1 mark·CPA ISC Practice Exam 2

    During a walkthrough of the change management process, an auditor observes that developers have write access to the production environment to deploy hotfixes quickly. Which principle does this violate?

    Worked answer available with free account
    View question →
    Q04Hard1 mark·CPA ISC Practice Exam 2

    An auditor is reviewing a SQL query used to generate a list of active customers for a marketing campaign. The query is:<br/>SELECT * FROM Customers WHERE Status = 'Active' OR LastOrderDate > '2023-01-01'.<br/>What is the potential issue with this query regarding data accuracy?

    Worked answer available with free account
    View question →
    Q05Medium1 mark·CPA ISC Practice Exam 2

    Which of the following entities is considered a 'Covered Entity' under the HIPAA Privacy Rule?

    Worked answer available with free account
    View question →
    Q06Medium1 mark·CPA ISC Practice Exam 2

    Under GDPR, which principle requires that personal data be adequate, relevant, and limited to what is necessary in relation to the purposes for which they are processed?

    Worked answer available with free account
    View question →
    Q07Medium1 mark·CPA ISC Practice Exam 2

    A service auditor is engaged to perform a SOC 2® examination. The client requests that the report focus solely on the security of the system and not on availability, processing integrity, confidentiality, or privacy. Is this permissible?

    Worked answer available with free account
    View question →
    Q08Medium1 mark·CPA ISC Practice Exam 2

    In a SOC 2® engagement, management asserts that they use a subservice organization for data center hosting. Management's description of the system excludes the controls performed by the data center. Which method of reporting is being used?

    Worked answer available with free account
    View question →
    Q09Hard1 mark·CPA ISC Practice Exam 2

    Which component of the COSO Internal Control framework is most directly related to the 'Governance and Culture' component of the COSO ERM framework when applied to cloud governance?

    Worked answer available with free account
    View question →
    Q10Easy1 mark·CPA ISC Practice Exam 2

    An organization uses a 'defense-in-depth' strategy. Which of the following best represents this approach?

    Worked answer available with free account
    View question →
    Q11Medium1 mark·CPA ISC Practice Exam 2

    Which NIST Cybersecurity Framework (CSF) function includes the category 'Recovery Planning'?

    Worked answer available with free account
    View question →
    Q12Easy1 mark·CPA ISC Practice Exam 2

    A company processes credit card transactions. Which standard is MOST applicable to their environment?

    Worked answer available with free account
    View question →
    Q13Hard1 mark·CPA ISC Practice Exam 2

    An auditor is testing a control that states: 'All new employees must undergo background checks.' The auditor selects a sample of 25 new hires. 24 have documented background checks, but 1 file is missing the documentation. The HR manager states the check was done but the file was lost. What is the appropriate conclusion?

    Worked answer available with free account
    View question →
    Q14Medium1 mark·CPA ISC Practice Exam 2

    Which type of attack involves an attacker inserting malicious code into a website's input field to manipulate the backend database?

    Worked answer available with free account
    View question →
    Q15Medium1 mark·CPA ISC Practice Exam 2

    A company wants to ensure that if a disaster occurs, they can restore data to the state it was in no more than 1 hour ago. This requirement defines the:

    Worked answer available with free account
    View question →
    Q16Easy1 mark·CPA ISC Practice Exam 2

    Which of the following is a detective control?

    Worked answer available with free account
    View question →
    Q17Medium1 mark·CPA ISC Practice Exam 2

    In the context of CIS Controls, what is the primary purpose of 'Inventory and Control of Enterprise Assets' (Control 1)?

    Worked answer available with free account
    View question →
    Q18Hard1 mark·CPA ISC Practice Exam 2

    A service organization's management refuses to provide a written assertion for a SOC 2® engagement. What action should the service auditor take?

    Worked answer available with free account
    View question →
    Q19Medium1 mark·CPA ISC Practice Exam 2

    Which of the following is a key difference between SOC 1® and SOC 2® engagements?

    Worked answer available with free account
    View question →
    Q20Medium1 mark·CPA ISC Practice Exam 2

    An auditor observes that a company uses a 'test' environment that is an exact replica of the 'production' environment, including real customer data. What is the primary risk associated with this practice?

    Worked answer available with free account
    View question →
    Q21Easy1 mark·CPA ISC Practice Exam 2

    Which encryption method uses a pair of keys: a public key for encryption and a private key for decryption?

    Worked answer available with free account
    View question →
    Q22Medium1 mark·CPA ISC Practice Exam 2

    A company uses a 'Data Lake' architecture. Which characteristic best describes a Data Lake?

    Worked answer available with free account
    View question →
    Q23Medium1 mark·CPA ISC Practice Exam 2

    In a SOC 2® report, which opinion type is issued when the auditor concludes that controls were not suitably designed or operating effectively to achieve the control objectives?

    Worked answer available with free account
    View question →
    Q24Hard1 mark·CPA ISC Practice Exam 2

    Which NIST Special Publication provides a catalog of security and privacy controls for federal information systems?

    Worked answer available with free account
    View question →
    Q25Medium1 mark·CPA ISC Practice Exam 2

    An auditor is reviewing a flowchart of the 'Order-to-Cash' process. The flowchart shows that the 'Sales Department' approves credit limits for new customers. What is the control deficiency?

    Worked answer available with free account
    View question →
    Q26Medium1 mark·CPA ISC Practice Exam 2

    Which of the following best describes 'Tokenization'?

    Worked answer available with free account
    View question →
    Q27Medium1 mark·CPA ISC Practice Exam 2

    A healthcare provider stores patient records in a cloud database. Which HIPAA rule specifically governs the technical safeguards (like encryption and access control) for this electronic Protected Health Information (ePHI)?

    Worked answer available with free account
    View question →
    Q28Medium1 mark·CPA ISC Practice Exam 2

    What is the primary purpose of a 'Walkthrough' in an IT audit?

    Worked answer available with free account
    View question →
    Q29Medium1 mark·CPA ISC Practice Exam 2

    Which SQL command is used to remove a table and all its data permanently from the database?

    Worked answer available with free account
    View question →
    Q30Easy1 mark·CPA ISC Practice Exam 2

    A company uses a biometric scanner for server room access. This is an example of which authentication factor?

    Worked answer available with free account
    View question →
    Q31Hard1 mark·CPA ISC Practice Exam 2

    In the context of COBIT 2019, which of the following is a 'Governance Objective' rather than a 'Management Objective'?

    Worked answer available with free account
    View question →
    Q32Medium1 mark·CPA ISC Practice Exam 2

    A service organization provides a SOC 2® Type II report covering the period January 1 to December 31. A significant control failure occurred on December 28 and was corrected on January 2. How should this be reflected in the report?

    Worked answer available with free account
    View question →
    Q33Easy1 mark·CPA ISC Practice Exam 2

    Which of the following is a 'Corrective' control?

    Worked answer available with free account
    View question →
    Q34Medium1 mark·CPA ISC Practice Exam 2

    An auditor is evaluating the 'Processing Integrity' criterion in a SOC 2® engagement. Which of the following is a key requirement?

    Worked answer available with free account
    View question →
    Q35Easy1 mark·CPA ISC Practice Exam 2

    Which cloud deployment model involves infrastructure provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units)?

    Worked answer available with free account
    View question →
    Q36Medium1 mark·CPA ISC Practice Exam 2

    A company is subject to GDPR. A data breach occurs involving unencrypted personal data of 5,000 customers. Within what timeframe must the company generally notify the supervisory authority?

    Worked answer available with free account
    View question →
    Q37Medium1 mark·CPA ISC Practice Exam 2

    An auditor is reviewing the 'User Access Review' control. The policy states reviews happen quarterly. The auditor finds that for Q2, the review was signed off by the same person who has administrative rights to grant access. What is the risk?

    Worked answer available with free account
    View question →
    Q38Medium1 mark·CPA ISC Practice Exam 2

    What is the primary function of a 'Hypervisor' in a virtualized environment?

    Worked answer available with free account
    View question →
    Q39Easy1 mark·CPA ISC Practice Exam 2

    Which of the following SQL clauses is used to filter the results of a query based on a specific condition?

    Worked answer available with free account
    View question →
    Q40Medium1 mark·CPA ISC Practice Exam 2

    In a SOC 2® engagement, what are 'Complementary User Entity Controls' (CUECs)?

    Worked answer available with free account
    View question →
    Q41Medium1 mark·CPA ISC Practice Exam 2

    Which phase of the Cyber Kill Chain involves transmitting the weaponized code to the target environment (e.g., via email attachment)?

    Worked answer available with free account
    View question →
    Q42Medium1 mark·CPA ISC Practice Exam 2

    An auditor is testing the 'Logical Access' domain. They find that a terminated employee's account remained active for 3 weeks after departure. The policy requires removal within 24 hours. This is an example of:

    Worked answer available with free account
    View question →
    Q43Easy1 mark·CPA ISC Practice Exam 2

    Which of the following is a primary benefit of using a 'VPN' (Virtual Private Network) for remote employees?

    Worked answer available with free account
    View question →
    Q44Hard1 mark·CPA ISC Practice Exam 2

    A company uses 'Incremental' backups daily and a 'Full' backup on Sundays. If the system crashes on Thursday, what is required to restore the data?

    Worked answer available with free account
    View question →
    Q45Hard1 mark·CPA ISC Practice Exam 2

    Which NIST Privacy Framework function includes the category 'Data Processing Management'?

    Worked answer available with free account
    View question →
    Q46Medium1 mark·CPA ISC Practice Exam 2

    What is the primary difference between a 'Type I' and 'Type II' SOC report?

    Worked answer available with free account
    View question →
    Q47Medium1 mark·CPA ISC Practice Exam 2

    An auditor is reviewing a blockchain implementation used for supply chain tracking. Which risk is unique to the 'Immutability' feature of blockchain?

    Worked answer available with free account
    View question →
    Q48Medium1 mark·CPA ISC Practice Exam 2

    Which of the following is a 'Preventive' control?

    Worked answer available with free account
    View question →
    Q49Hard1 mark·CPA ISC Practice Exam 2

    Under the HIPAA Security Rule, 'Encryption' is classified as an 'Addressable' implementation specification. What does 'Addressable' mean?

    Worked answer available with free account
    View question →
    Q50Medium1 mark·CPA ISC Practice Exam 2

    An auditor is testing the 'Change Management' process. They select a sample of 30 changes. They find that 2 changes were deployed to production without the required 'User Acceptance Testing' (UAT) sign-off. The IT Manager explains these were 'Emergency Changes'. What should the auditor look for next?

    Worked answer available with free account
    View question →
    Q51Easy1 mark·CPA ISC Practice Exam 2

    Which of the following is a 'Social Engineering' attack?

    Worked answer available with free account
    View question →
    Q52Medium1 mark·CPA ISC Practice Exam 2

    A company uses 'Mirroring' for its database. What is the primary advantage of this approach?

    Worked answer available with free account
    View question →
    Q53Easy1 mark·CPA ISC Practice Exam 2

    Which SQL aggregate function is used to count the number of rows in a result set?

    Worked answer available with free account
    View question →
    Q54Easy1 mark·CPA ISC Practice Exam 2

    In a SOC 2® engagement, the 'System Description' is primarily the responsibility of:

    Worked answer available with free account
    View question →
    Q55Easy1 mark·CPA ISC Practice Exam 2

    Which of the following is a 'Physical' security control?

    Worked answer available with free account
    View question →
    Q56Medium1 mark·CPA ISC Practice Exam 2

    A company stores customer passwords in a database. To enhance security, they add a random string of characters to each password before hashing it. This technique is known as:

    Worked answer available with free account
    View question →
    Q57Easy1 mark·CPA ISC Practice Exam 2

    Which document in a SOC engagement outlines the auditor's opinion, the scope of the engagement, and the responsibilities of management and the auditor?

    Worked answer available with free account
    View question →
    Q58Easy1 mark·CPA ISC Practice Exam 2

    What is the primary purpose of a 'DDoS' (Distributed Denial of Service) attack?

    Worked answer available with free account
    View question →
    Q59Medium1 mark·CPA ISC Practice Exam 2

    An auditor is reviewing the 'Incident Response Plan'. Which phase should occur immediately after 'Containment'?

    Worked answer available with free account
    View question →
    Q60Easy1 mark·CPA ISC Practice Exam 2

    Which of the following is a 'Logical' access control?

    Worked answer available with free account
    View question →
    Q61Hard1 mark·CPA ISC Practice Exam 2

    A company uses 'Asynchronous Replication' to a disaster recovery site. What is the primary risk associated with this method?

    Worked answer available with free account
    View question →
    Q62Medium1 mark·CPA ISC Practice Exam 2

    Which GDPR right allows an individual to request that their personal data be sent to them or another controller in a structured, commonly used, and machine-readable format?

    Worked answer available with free account
    View question →
    Q63Medium1 mark·CPA ISC Practice Exam 2

    An auditor is testing the 'Completeness' of a data extraction from an ERP system. They compare the record count in the source system to the record count in the destination file. This is an example of:

    Worked answer available with free account
    View question →
    Q64Easy1 mark·CPA ISC Practice Exam 2

    Which of the following is a 'Unit Test' in software development?

    Worked answer available with free account
    View question →
    Q65Medium1 mark·CPA ISC Practice Exam 2

    A service organization uses a 'Bridge Letter' (Gap Letter). What is its purpose?

    Worked answer available with free account
    View question →
    Q66Medium1 mark·CPA ISC Practice Exam 2

    Which of the following is a key principle of 'Zero Trust' architecture?

    Worked answer available with free account
    View question →
    Q67Hard1 mark·CPA ISC Practice Exam 2

    An auditor is reviewing a database schema. They notice that the 'SocialSecurityNumber' column is indexed. What is the security risk?

    Worked answer available with free account
    View question →
    Q68Easy1 mark·CPA ISC Practice Exam 2

    Which COBIT 2019 component describes the rules, regulations, and policies that the enterprise must comply with?

    Worked answer available with free account
    View question →
    Q69Medium1 mark·CPA ISC Practice Exam 2

    A company uses a 'Cold Site' for disaster recovery. What is the main characteristic of a Cold Site?

    Worked answer available with free account
    View question →
    Q70Hard1 mark·CPA ISC Practice Exam 2

    Which of the following is an example of 'Inherent Risk' in a cloud environment?

    Worked answer available with free account
    View question →
    Q71Easy1 mark·CPA ISC Practice Exam 2

    What is the purpose of a 'Data Dictionary'?

    Worked answer available with free account
    View question →
    Q72Medium1 mark·CPA ISC Practice Exam 2

    An auditor is testing 'Logical Access'. They find a user with the role 'SuperAdmin'. This user is also the 'HR Manager'. What is the primary concern?

    Worked answer available with free account
    View question →
    Q73Medium1 mark·CPA ISC Practice Exam 2

    Which of the following is a requirement of the 'Privacy' Trust Services Criterion?

    Worked answer available with free account
    View question →
    Q74Easy1 mark·CPA ISC Practice Exam 2

    A company uses 'Ransomware' insurance. This is an example of which risk response strategy?

    Worked answer available with free account
    View question →
    Q75Medium1 mark·CPA ISC Practice Exam 2

    Which of the following is a 'Data Loss Prevention' (DLP) control?

    Worked answer available with free account
    View question →
    Q76Medium1 mark·CPA ISC Practice Exam 2

    An auditor is reviewing the 'System Development Life Cycle' (SDLC). Which phase should include the definition of security requirements?

    Worked answer available with free account
    View question →
    Q77Hard1 mark·CPA ISC Practice Exam 2

    Which of the following is a 'Symmetric' encryption algorithm?

    Worked answer available with free account
    View question →
    Q78Hard1 mark·CPA ISC Practice Exam 2

    In a SOC 2® engagement, if the service organization uses the 'Inclusive Method' for a subservice organization, what is the auditor's responsibility?

    Worked answer available with free account
    View question →
    Q79Easy1 mark·CPA ISC Practice Exam 2

    Which of the following is a 'Batch Processing' characteristic?

    Worked answer available with free account
    View question →
    Q80Medium1 mark·CPA ISC Practice Exam 2

    An auditor is reviewing the 'Termination' process. They find that while network access is revoked immediately, physical access cards are often collected weeks later. What is the risk?

    Worked answer available with free account
    View question →
    Q81Medium1 mark·CPA ISC Practice Exam 2

    Which of the following is a 'PaaS' (Platform as a Service) example?

    Worked answer available with free account
    View question →
    Q82Medium1 mark·CPA ISC Practice Exam 2

    An auditor finds that a company's 'Incident Response Plan' has not been tested or updated in 3 years. What is the primary recommendation?

    Worked answer available with free account
    View question →
    Q01Medium1 mark·CPA ISC Practice Exam 3

    A CPA is advising a client who is migrating their legacy on-premise ERP system to a cloud-based solution. The client wants to minimize their internal IT team's responsibility for managing the underlying operating system, middleware, and runtime environment, but they want to retain control over the deployed applications and configuration settings. Which cloud service model is MOST appropriate for this client?

    Worked answer available with free account
    View question →
    Q02Medium1 mark·CPA ISC Practice Exam 3

    During a review of a client's cloud governance structure, an auditor notes that the client uses a public cloud provider for customer-facing web applications but keeps sensitive financial data on a private on-premise server. The two environments are connected via an encrypted VPN. Which deployment model is this client utilizing?

    Worked answer available with free account
    View question →
    Q03Hard1 mark·CPA ISC Practice Exam 3

    An auditor is evaluating the 'Processing Integrity' principle for a financial institution's loan origination system. The auditor discovers that the system automatically rejects loan applications with incomplete data fields but does not generate an error log for these rejections. Which specific processing integrity risk does this control deficiency primarily exacerbate?

    Worked answer available with free account
    View question →
    Q04Hard1 mark·CPA ISC Practice Exam 3

    A company uses a batch processing system to update inventory records overnight. The 'Grandfather-Father-Son' backup rotation scheme is used. On Thursday morning, the 'Son' (Wednesday night's backup) is found to be corrupted. To restore the system to the most current state possible before the corruption, which tapes are required?

    Worked answer available with free account
    View question →
    Q05Medium1 mark·CPA ISC Practice Exam 3

    During a walkthrough of the change management process, an auditor observes that the 'Developer' role in the ERP system has access to 'Migrate to Production'. The IT Manager explains this is necessary for emergency fixes overnight when the Change Manager is unavailable. What is the auditor's BEST course of action?

    Worked answer available with free account
    View question →
    Q06Hard1 mark·CPA ISC Practice Exam 3

    An auditor is reviewing a SQL query used to extract 'Active Customers' for a marketing report. The query is:<br/><br/>SELECT CustomerID, Name FROM Customers WHERE Status = 'Active' OR Status = 'Pending' AND CreditLimit > 1000<br/><br/>The auditor suspects the logic is flawed because of operator precedence. Which customers will this query actually return?

    Worked answer available with free account
    View question →
    Q07Medium1 mark·CPA ISC Practice Exam 3

    A healthcare provider stores patient records in a data warehouse. To comply with HIPAA while allowing data analysts to study demographic trends, the organization replaces patient names with unique alphanumeric codes that can be mapped back to the original data only by the database administrator. This technique is known as:

    Worked answer available with free account
    View question →
    Q08Medium1 mark·CPA ISC Practice Exam 3

    Under the General Data Protection Regulation (GDPR), a data subject requests that a company transmit their personal data directly to another service provider. This request falls under which specific right?

    Worked answer available with free account
    View question →
    Q09Hard1 mark·CPA ISC Practice Exam 3

    A service organization is undergoing a SOC 2® Type II engagement. The auditor finds that for a sample of 25 new hires, 2 did not complete the required security awareness training within 30 days of hire as mandated by company policy. The control description states: 'All new hires complete security training within 30 days.' What is the MOST appropriate conclusion?

    Worked answer available with free account
    View question →
    Q10Medium1 mark·CPA ISC Practice Exam 3

    Which of the following scenarios BEST describes a 'Carve-out' method in a SOC 2® report involving a subservice organization?

    Worked answer available with free account
    View question →
    Q11Medium1 mark·CPA ISC Practice Exam 3

    An IT auditor is reviewing the 'Recovery Point Objective' (RPO) for a critical transaction database. Management has set the RPO at 1 hour. The current backup strategy involves a full backup every Sunday at midnight and incremental backups every night at midnight. Is this strategy adequate?

    Worked answer available with free account
    View question →
    Q12Medium1 mark·CPA ISC Practice Exam 3

    Which of the following NIST Cybersecurity Framework (CSF) functions is PRIMARILY associated with the implementation of safeguards to ensure delivery of critical infrastructure services, such as Access Control and Awareness Training?

    Worked answer available with free account
    View question →
    Q13Medium1 mark·CPA ISC Practice Exam 3

    A retailer processes credit card transactions. They have segmented their network so that the Cardholder Data Environment (CDE) is isolated from the corporate Wi-Fi network. According to PCI DSS, what is the primary benefit of this segmentation?

    Worked answer available with free account
    View question →
    Q14Medium1 mark·CPA ISC Practice Exam 3

    An organization uses a 'Defense in Depth' strategy. Which of the following represents a correct layering of controls from the perimeter inward?

    Worked answer available with free account
    View question →
    Q15Easy1 mark·CPA ISC Practice Exam 3

    A CPA is performing a SOC 2® engagement. The service organization uses a third-party data center for physical hosting. The service organization's management asserts that physical security is the responsibility of the data center and excludes it from their system description. Which reporting method is being used?

    Worked answer available with free account
    View question →
    Q16Medium1 mark·CPA ISC Practice Exam 3

    Which of the following is a 'Complementary User Entity Control' (CUEC) likely to be found in a payroll service provider's SOC 1® report?

    Worked answer available with free account
    View question →
    Q17Hard1 mark·CPA ISC Practice Exam 3

    In the context of COBIT 2019, which of the following best describes the distinction between Governance and Management?

    Worked answer available with free account
    View question →
    Q18Easy1 mark·CPA ISC Practice Exam 3

    An auditor is testing a control that requires 'Three-way matching' before a payment is authorized. Which three documents must match?

    Worked answer available with free account
    View question →
    Q19Medium1 mark·CPA ISC Practice Exam 3

    A company implements a 'Zero Trust' architecture. Which of the following principles is central to this approach?

    Worked answer available with free account
    View question →
    Q20Medium1 mark·CPA ISC Practice Exam 3

    An auditor is reviewing a SOC 2® report and notices the opinion is 'Qualified'. What does this indicate?

    Worked answer available with free account
    View question →
    Q21Easy1 mark·CPA ISC Practice Exam 3

    Which of the following is a primary responsibility of the 'Data Controller' under GDPR?

    Worked answer available with free account
    View question →
    Q22Medium1 mark·CPA ISC Practice Exam 3

    A company uses an 'Incremental' backup strategy. A full backup is performed on Sunday. Incremental backups are performed Monday through Saturday. If the system crashes on Thursday morning (before Thursday's backup), what is required to restore the system?

    Worked answer available with free account
    View question →
    Q23Easy1 mark·CPA ISC Practice Exam 3

    Which of the following SQL commands is used to remove a table and all its data permanently from the database?

    Worked answer available with free account
    View question →
    Q24Medium1 mark·CPA ISC Practice Exam 3

    An auditor is assessing the 'Availability' criteria for a cloud service provider. The provider claims 99.9% uptime. Which of the following metrics would be MOST useful to verify this claim?

    Worked answer available with free account
    View question →
    Q25Hard1 mark·CPA ISC Practice Exam 3

    A company is subject to HIPAA. An employee loses a company laptop containing unencrypted ePHI (electronic Protected Health Information). Under the HIPAA Breach Notification Rule, what is the immediate requirement if the breach affects more than 500 individuals?

    Worked answer available with free account
    View question →
    Q26Easy1 mark·CPA ISC Practice Exam 3

    Which of the following is a characteristic of a 'Symmetric' encryption algorithm?

    Worked answer available with free account
    View question →
    Q27Medium1 mark·CPA ISC Practice Exam 3

    An auditor observes that a company uses a 'Hot Site' for disaster recovery. What does this imply?

    Worked answer available with free account
    View question →
    Q28Easy1 mark·CPA ISC Practice Exam 3

    In a SOC 2® engagement, which Trust Services Criteria category is MANDATORY for every report?

    Worked answer available with free account
    View question →
    Q29Medium1 mark·CPA ISC Practice Exam 3

    A developer is writing a SQL query to combine customer data from the 'Sales' table and the 'Support' table. They want to see ALL customers from the 'Sales' table, and matching support tickets if they exist. If a customer has no support tickets, they should still appear in the list. Which JOIN type should be used?

    Worked answer available with free account
    View question →
    Q30Easy1 mark·CPA ISC Practice Exam 3

    Which of the following is an example of a 'Preventive' control?

    Worked answer available with free account
    View question →
    Q31Hard1 mark·CPA ISC Practice Exam 3

    An auditor is reviewing a client's compliance with the NIST Privacy Framework. The client has a process to 'notify individuals about how their data is collected and used'. This aligns with which Function of the NIST Privacy Framework?

    Worked answer available with free account
    View question →
    Q32Easy1 mark·CPA ISC Practice Exam 3

    A company uses a 'Phishing Simulation' to test employees. This is primarily a test of which security domain?

    Worked answer available with free account
    View question →
    Q33Medium1 mark·CPA ISC Practice Exam 3

    Which of the following describes a 'Logic Bomb'?

    Worked answer available with free account
    View question →
    Q34Medium1 mark·CPA ISC Practice Exam 3

    An auditor is reviewing the 'Change Management' process. They find that the 'Request for Change' (RFC) form does not require a back-out plan. Why is this a control deficiency?

    Worked answer available with free account
    View question →
    Q35Medium1 mark·CPA ISC Practice Exam 3

    A service organization provides a cloud-based accounting platform. They want to assure their customers that the system is available and confidential. However, they do not want to reveal the detailed results of their control testing to the general public. Which report is MOST appropriate?

    Worked answer available with free account
    View question →
    Q36Hard1 mark·CPA ISC Practice Exam 3

    Which of the following is a key requirement of the HIPAA Security Rule but NOT the Privacy Rule?

    Worked answer available with free account
    View question →
    Q37Medium1 mark·CPA ISC Practice Exam 3

    An auditor is reviewing a firewall configuration. They see a rule at the bottom of the Access Control List (ACL) that says 'DENY ALL'. What is this practice called?

    Worked answer available with free account
    View question →
    Q38Hard1 mark·CPA ISC Practice Exam 3

    Which of the following is a risk associated with using a 'Public Blockchain' for financial reporting?

    Worked answer available with free account
    View question →
    Q39Medium1 mark·CPA ISC Practice Exam 3

    A company wants to ensure that their web application can handle a sudden spike in traffic during Black Friday sales. They configure their cloud environment to automatically add more virtual servers when CPU usage exceeds 80%. This capability is known as:

    Worked answer available with free account
    View question →
    Q40Medium1 mark·CPA ISC Practice Exam 3

    An auditor is testing the 'Logical Access' controls for an ERP system. They select a sample of new employees and verify that their access rights were approved by a manager. This test is designed to validate which assertion?

    Worked answer available with free account
    View question →
    Q41Medium1 mark·CPA ISC Practice Exam 3

    Which of the following is a primary benefit of using a 'Data Lake' compared to a 'Data Warehouse'?

    Worked answer available with free account
    View question →
    Q42Hard1 mark·CPA ISC Practice Exam 3

    An organization discovers a vulnerability in their web server software. The vendor has released a patch, but the organization cannot apply it immediately due to compatibility issues with a legacy application. What is the BEST temporary course of action?

    Worked answer available with free account
    View question →
    Q43Easy1 mark·CPA ISC Practice Exam 3

    Which of the following statements accurately describes the 'Integrity' component of the CIA Triad?

    Worked answer available with free account
    View question →
    Q44Hard1 mark·CPA ISC Practice Exam 3

    A company is using the 'Inclusive Method' for a subservice organization in their SOC 2® report. What does this imply for the service auditor?

    Worked answer available with free account
    View question →
    Q45Medium1 mark·CPA ISC Practice Exam 3

    Which of the following is a 'Corrective' control?

    Worked answer available with free account
    View question →
    Q46Easy1 mark·CPA ISC Practice Exam 3

    An auditor is reviewing a database schema. They notice that the 'SocialSecurityNumber' column is stored in cleartext. Which control is missing?

    Worked answer available with free account
    View question →
    Q47Medium1 mark·CPA ISC Practice Exam 3

    What is the primary purpose of a 'Management Assertion' in a SOC engagement?

    Worked answer available with free account
    View question →
    Q48Easy1 mark·CPA ISC Practice Exam 3

    A company uses a biometric fingerprint scanner and a PIN code for server room access. What type of authentication is this?

    Worked answer available with free account
    View question →
    Q49Medium1 mark·CPA ISC Practice Exam 3

    Which CIS Control is typically prioritized as Control #1 because you cannot protect what you do not know you have?

    Worked answer available with free account
    View question →
    Q50Easy1 mark·CPA ISC Practice Exam 3

    An auditor is reviewing the 'Incident Response Plan'. The plan includes a step for 'Containment'. What is the primary goal of this phase?

    Worked answer available with free account
    View question →
    Q51Medium1 mark·CPA ISC Practice Exam 3

    A company uses a 'Cold Site' for disaster recovery. Which of the following is the primary disadvantage of this approach?

    Worked answer available with free account
    View question →
    Q52Easy1 mark·CPA ISC Practice Exam 3

    Which of the following attacks involves an attacker intercepting communication between two parties and relaying messages between them?

    Worked answer available with free account
    View question →
    Q53Medium1 mark·CPA ISC Practice Exam 3

    An auditor is reviewing the 'Segregation of Duties' (SoD) in the payroll process. Which two roles should be separated?

    Worked answer available with free account
    View question →
    Q54Hard1 mark·CPA ISC Practice Exam 3

    A company uses 'Asymmetric' encryption for secure email. If Alice wants to send a confidential email to Bob that only Bob can read, which key does she use to encrypt it?

    Worked answer available with free account
    View question →
    Q55Easy1 mark·CPA ISC Practice Exam 3

    Which of the following is a 'Detective' control?

    Worked answer available with free account
    View question →
    Q56Medium1 mark·CPA ISC Practice Exam 3

    An auditor is evaluating the 'Completeness' of data transfer from a legacy system to a new ERP. Which technique is MOST effective?

    Worked answer available with free account
    View question →
    Q57Medium1 mark·CPA ISC Practice Exam 3

    Under COBIT 2019, which component of the governance system describes the 'rules of the game'?

    Worked answer available with free account
    View question →
    Q58Easy1 mark·CPA ISC Practice Exam 3

    A company wants to implement a 'Least Privilege' model for its cloud storage buckets. What does this entail?

    Worked answer available with free account
    View question →
    Q59Medium1 mark·CPA ISC Practice Exam 3

    An auditor is reviewing a SOC 2® Type II report. The testing period covers January 1 to December 31. The auditor notices that a significant control failure occurred on December 28 and was not remediated by year-end. How should this be handled?

    Worked answer available with free account
    View question →
    Q60Easy1 mark·CPA ISC Practice Exam 3

    Which of the following is an example of 'SaaS' (Software as a Service)?

    Worked answer available with free account
    View question →
    Q61Medium1 mark·CPA ISC Practice Exam 3

    A company is designing a new data center. They install a 'Biometric Mantrap' at the entrance. What is the purpose of this control?

    Worked answer available with free account
    View question →
    Q62Medium1 mark·CPA ISC Practice Exam 3

    An auditor is reviewing a SQL query: `SELECT * FROM Employees WHERE Salary > 100000;`. What is the risk of using `SELECT *` in production code?

    Worked answer available with free account
    View question →
    Q63Medium1 mark·CPA ISC Practice Exam 3

    Which of the following is a 'Type 1' SOC report?

    Worked answer available with free account
    View question →
    Q64Medium1 mark·CPA ISC Practice Exam 3

    A company is implementing a 'Data Loss Prevention' (DLP) solution. Which of the following is a primary function of DLP?

    Worked answer available with free account
    View question →
    Q65Easy1 mark·CPA ISC Practice Exam 3

    Which of the following is a 'Physical' security control?

    Worked answer available with free account
    View question →
    Q66Medium1 mark·CPA ISC Practice Exam 3

    An auditor is reviewing the 'Change Management' logs and notices a change labeled 'Emergency Fix' that was deployed without prior testing in the staging environment. The policy allows this but requires 'Post-Implementation Review' within 24 hours. The auditor finds the review was completed 3 days later. What is the finding?

    Worked answer available with free account
    View question →
    Q67Easy1 mark·CPA ISC Practice Exam 3

    Which of the following is a characteristic of 'Ransomware'?

    Worked answer available with free account
    View question →
    Q68Easy1 mark·CPA ISC Practice Exam 3

    A company uses a 'VPN' (Virtual Private Network) for remote employees. What is the primary security function of the VPN?

    Worked answer available with free account
    View question →
    Q69Medium1 mark·CPA ISC Practice Exam 3

    In a relational database, what is a 'Foreign Key'?

    Worked answer available with free account
    View question →
    Q70Easy1 mark·CPA ISC Practice Exam 3

    An auditor is testing the 'Termination' process. They find that a terminated employee's Active Directory account was disabled 5 days after their departure. The policy states 'Immediate' (within 24 hours). What is the risk?

    Worked answer available with free account
    View question →
    Q71Medium1 mark·CPA ISC Practice Exam 3

    Which of the following is a requirement of the 'NIST SP 800-53' framework?

    Worked answer available with free account
    View question →
    Q72Medium1 mark·CPA ISC Practice Exam 3

    A company uses 'Input Validation' on its web forms. Which attack does this primarily prevent?

    Worked answer available with free account
    View question →
    Q73Easy1 mark·CPA ISC Practice Exam 3

    An auditor is assessing 'Independence' for a SOC engagement. Which of the following would impair independence?

    Worked answer available with free account
    View question →
    Q74Easy1 mark·CPA ISC Practice Exam 3

    What is the difference between 'Authentication' and 'Authorization'?

    Worked answer available with free account
    View question →
    Q75Hard1 mark·CPA ISC Practice Exam 3

    A company uses 'Containerization' (e.g., Docker) for its applications. From an auditor's perspective, what is a key difference between a Container and a Virtual Machine (VM)?

    Worked answer available with free account
    View question →
    Q76Medium1 mark·CPA ISC Practice Exam 3

    An auditor is reviewing the 'System Description' in a SOC 2® report. Which of the following MUST be included?

    Worked answer available with free account
    View question →
    Q77Medium1 mark·CPA ISC Practice Exam 3

    Which of the following is a 'Social Engineering' technique?

    Worked answer available with free account
    View question →
    Q78Easy1 mark·CPA ISC Practice Exam 3

    A company uses 'Role-Based Access Control' (RBAC). How are permissions assigned?

    Worked answer available with free account
    View question →
    Q79Medium1 mark·CPA ISC Practice Exam 3

    An auditor is reviewing the 'Business Continuity Plan' (BCP). Which of the following is a key component that determines the order in which business processes should be restored?

    Worked answer available with free account
    View question →
    Q80Medium1 mark·CPA ISC Practice Exam 3

    Which of the following is a 'Subsequent Event' in a SOC engagement?

    Worked answer available with free account
    View question →
    Q81Medium1 mark·CPA ISC Practice Exam 3

    A company uses 'Hashing' to store passwords. Why is this better than encryption?

    Worked answer available with free account
    View question →
    Q82Hard1 mark·CPA ISC Practice Exam 3

    An auditor is reviewing the 'System Boundaries' in a SOC 2® engagement. The client has excluded their 'Customer Support Chatbot' from the system description. The chatbot collects customer names and account numbers. Is this exclusion appropriate?

    Worked answer available with free account
    View question →
    Q01Hard1 mark·CPA ISC Practice Exam 4

    A CPA is advising a client who is migrating their legacy on-premise ERP system to a cloud environment. The client wants to minimize their responsibility for managing the underlying operating system, middleware, and runtime environment, but wants to retain control over the deployed applications and configuration settings. Which cloud service model is most appropriate for this client?

    Worked answer available with free account
    View question →
    Q02Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing the Service Level Agreement (SLA) for a client using a public cloud provider. The client handles highly sensitive healthcare data. The auditor notes that the cloud provider stores data in a multi-tenant environment. Which specific risk is MOST heightened in this deployment model compared to a private cloud?

    Worked answer available with free account
    View question →
    Q03Hard1 mark·CPA ISC Practice Exam 4

    A company uses an Infrastructure as a Service (IaaS) model. During an IT audit, the auditor discovers that the operating system of the virtual machines has not been patched for critical vulnerabilities. Under the shared responsibility model, who is responsible for this control failure?

    Worked answer available with free account
    View question →
    Q04Hard1 mark·CPA ISC Practice Exam 4

    An organization is implementing the COSO Enterprise Risk Management (ERM) framework to govern its migration to the cloud. Which of the following actions best aligns with the 'Governance and Culture' component of COSO ERM in this context?

    Worked answer available with free account
    View question →
    Q05Hard1 mark·CPA ISC Practice Exam 4

    During a walkthrough of an order-to-cash process, the auditor observes that the sales manager can both authorize credit limits for new customers and approve sales orders exceeding those limits. The documented process flow states these functions should be separated. Which type of deficiency has the auditor identified?

    Worked answer available with free account
    View question →
    Q06Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing the backup strategy for a financial transaction system with a Recovery Point Objective (RPO) of 1 hour. The current strategy involves a full backup every Sunday at midnight and differential backups every night at midnight. Is this strategy adequate?

    Worked answer available with free account
    View question →
    Q07Hard1 mark·CPA ISC Practice Exam 4

    A developer at a software company has access to write code in the development environment and also has administrative access to promote that code directly to the production environment. Which specific IT general control (ITGC) principle is violated?

    Worked answer available with free account
    View question →
    Q08Hard1 mark·CPA ISC Practice Exam 4

    An auditor is examining a SQL query used to generate a report of all sales transactions for the fiscal year 2024. The query is:<br/>SELECT * FROM Sales WHERE SaleDate > '2024-01-01' AND SaleDate < '2024-12-31'.<br/>What is the potential issue with this query regarding data completeness?

    Worked answer available with free account
    View question →
    Q09Hard1 mark·CPA ISC Practice Exam 4

    A healthcare provider stores patient records in a cloud database. To comply with HIPAA, they must ensure that even if the database storage media is stolen, the data remains unreadable. Which control is MOST appropriate to address this specific risk?

    Worked answer available with free account
    View question →
    Q10Hard1 mark·CPA ISC Practice Exam 4

    Under the General Data Protection Regulation (GDPR), a data subject requests that a company delete all their personal data. The company refuses because the data is required to be retained by tax laws. Which GDPR principle allows the company to refuse this request?

    Worked answer available with free account
    View question →
    Q11Hard1 mark·CPA ISC Practice Exam 4

    An auditor is evaluating a company's compliance with PCI DSS Requirement 3 (Protect stored cardholder data). The auditor finds that the Primary Account Number (PAN) is displayed in full on the customer service representative's screen. Which specific control is missing?

    Worked answer available with free account
    View question →
    Q12Hard1 mark·CPA ISC Practice Exam 4

    Which component of the NIST Cybersecurity Framework (CSF) focuses on developing and implementing the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event?

    Worked answer available with free account
    View question →
    Q13Hard1 mark·CPA ISC Practice Exam 4

    A service organization is preparing for a SOC 2® engagement. They have identified a risk that unauthorized changes to the production database could result in data integrity issues. Which of the following is a 'preventive' control addressing this risk?

    Worked answer available with free account
    View question →
    Q14Hard1 mark·CPA ISC Practice Exam 4

    During a SOC 2® Type II engagement, the auditor discovers that for a sample of 25 new hires, 2 did not complete the required security awareness training within 30 days of hire as mandated by company policy. What is the most appropriate next step for the auditor?

    Worked answer available with free account
    View question →
    Q15Hard1 mark·CPA ISC Practice Exam 4

    A service organization uses the 'Carve-out' method for a subservice organization that provides data center hosting. In the SOC 2® report, how are the controls of the data center presented?

    Worked answer available with free account
    View question →
    Q16Hard1 mark·CPA ISC Practice Exam 4

    Which of the following best describes the primary purpose of a SOC 3® report compared to a SOC 2® report?

    Worked answer available with free account
    View question →
    Q17Hard1 mark·CPA ISC Practice Exam 4

    An attacker sends an email to the HR department with an attachment named 'Payroll_Update.exe' that looks like a PDF icon. When clicked, it installs software that logs keystrokes. Which stage of the cyber-attack lifecycle does the 'clicking of the attachment' represent?

    Worked answer available with free account
    View question →
    Q18Hard1 mark·CPA ISC Practice Exam 4

    A company implements a 'Zero Trust' architecture. Which of the following principles is central to this approach?

    Worked answer available with free account
    View question →
    Q19Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing a company's disaster recovery plan (DRP). The company uses a 'Hot Site' for recovery. Which characteristic best describes a Hot Site?

    Worked answer available with free account
    View question →
    Q20Hard1 mark·CPA ISC Practice Exam 4

    Which of the following SQL statements would be most useful for an auditor attempting to identify duplicate invoice numbers in a table named 'Invoices'?

    Worked answer available with free account
    View question →
    Q21Hard1 mark·CPA ISC Practice Exam 4

    A company uses a blockchain ledger to record supply chain transactions. An auditor is assessing the risk of '51% attacks'. What is the primary implication of a successful 51% attack on a blockchain?

    Worked answer available with free account
    View question →
    Q22Hard1 mark·CPA ISC Practice Exam 4

    Which of the following is a key principle of the COBIT 2019 governance framework?

    Worked answer available with free account
    View question →
    Q23Hard1 mark·CPA ISC Practice Exam 4

    An auditor is testing the 'Processing Integrity' criteria for a payroll system. They find that the system accepts negative values for 'Hours Worked'. Which type of application control is missing?

    Worked answer available with free account
    View question →
    Q24Hard1 mark·CPA ISC Practice Exam 4

    A company is subject to HIPAA. An employee loses a company laptop containing unencrypted ePHI (electronic Protected Health Information) of 600 patients. Under the HIPAA Breach Notification Rule, which of the following actions is REQUIRED?

    Worked answer available with free account
    View question →
    Q25Hard1 mark·CPA ISC Practice Exam 4

    In the context of a SOC 2® engagement, what is the definition of a 'deviation'?

    Worked answer available with free account
    View question →
    Q26Hard1 mark·CPA ISC Practice Exam 4

    Which of the following best describes the 'Integrity' component of the CIA Triad in information security?

    Worked answer available with free account
    View question →
    Q27Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing the 'System Description' for a SOC 2® report. Which of the following is a REQUIRED element of the system description?

    Worked answer available with free account
    View question →
    Q28Hard1 mark·CPA ISC Practice Exam 4

    A company uses a 'Data Lake' architecture. What is a primary characteristic of a Data Lake compared to a Data Warehouse?

    Worked answer available with free account
    View question →
    Q29Hard1 mark·CPA ISC Practice Exam 4

    Which of the following authentication methods is considered 'Something you are'?

    Worked answer available with free account
    View question →
    Q30Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing the 'Change Management' process. They observe that emergency changes are allowed to bypass the standard testing phase to restore service quickly. What is the compensating control that MUST be in place for this process to be acceptable?

    Worked answer available with free account
    View question →
    Q31Hard1 mark·CPA ISC Practice Exam 4

    A service organization provides payroll processing services. They outsource the printing and mailing of checks to a third-party vendor. In the context of the service organization's SOC 1® report, what is the printing vendor considered?

    Worked answer available with free account
    View question →
    Q32Hard1 mark·CPA ISC Practice Exam 4

    Which CIS Control focuses on 'Inventory and Control of Enterprise Assets'?

    Worked answer available with free account
    View question →
    Q33Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing a SQL query that joins two tables: 'Customers' and 'Orders'. The goal is to list ALL customers, including those who have not placed any orders. Which JOIN type should be used?

    Worked answer available with free account
    View question →
    Q34Hard1 mark·CPA ISC Practice Exam 4

    A company is designing a new data center. They install a 'mantrap' at the entrance to the server room. Which type of control is this?

    Worked answer available with free account
    View question →
    Q35Hard1 mark·CPA ISC Practice Exam 4

    In the context of NIST SP 800-53, what does the term 'Control Baseline' refer to?

    Worked answer available with free account
    View question →
    Q36Hard1 mark·CPA ISC Practice Exam 4

    An auditor is testing a client's firewall configuration. They notice a rule that allows 'Any' source IP to access the database port (1433) directly from the internet. Which security principle is violated?

    Worked answer available with free account
    View question →
    Q37Hard1 mark·CPA ISC Practice Exam 4

    A company is using a 'SaaS' CRM application. The auditor wants to verify that the SaaS provider backs up the data. Since the auditor cannot physically visit the SaaS provider, what is the most appropriate evidence to obtain?

    Worked answer available with free account
    View question →
    Q38Hard1 mark·CPA ISC Practice Exam 4

    Which of the following scenarios describes a 'Phishing' attack?

    Worked answer available with free account
    View question →
    Q39Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing the 'Logical Access' controls. They find that user accounts are not disabled immediately upon termination of employment. This control deficiency primarily increases the risk of:

    Worked answer available with free account
    View question →
    Q40Hard1 mark·CPA ISC Practice Exam 4

    What is the primary purpose of a 'VPN' (Virtual Private Network) for remote employees?

    Worked answer available with free account
    View question →
    Q41Hard1 mark·CPA ISC Practice Exam 4

    A company wants to ensure that their cloud provider cannot access their sensitive data, even if the provider is subpoenaed. Which control achieves this?

    Worked answer available with free account
    View question →
    Q42Hard1 mark·CPA ISC Practice Exam 4

    In a SOC 2® engagement, which of the following is a 'Trust Services Criterion' related to Privacy?

    Worked answer available with free account
    View question →
    Q43Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing the 'Incident Response Plan'. Which phase of incident response involves removing the threat from the environment (e.g., deleting malware, disabling breached accounts)?

    Worked answer available with free account
    View question →
    Q44Hard1 mark·CPA ISC Practice Exam 4

    Which of the following is an example of a 'Detective' control?

    Worked answer available with free account
    View question →
    Q45Hard1 mark·CPA ISC Practice Exam 4

    A company processes credit card payments. Which standard MUST they comply with?

    Worked answer available with free account
    View question →
    Q46Hard1 mark·CPA ISC Practice Exam 4

    An auditor is assessing the 'Availability' criteria in a SOC 2® engagement. The client claims to have high availability. Which metric best measures the percentage of time the system is operational?

    Worked answer available with free account
    View question →
    Q47Hard1 mark·CPA ISC Practice Exam 4

    Which of the following is a 'Corrective' control?

    Worked answer available with free account
    View question →
    Q48Hard1 mark·CPA ISC Practice Exam 4

    A company uses 'Asymmetric Encryption' for secure email. If User A wants to send a confidential message to User B, which key should User A use to encrypt the message?

    Worked answer available with free account
    View question →
    Q49Hard1 mark·CPA ISC Practice Exam 4

    What is the primary difference between a SOC 2® Type I and a SOC 2® Type II report?

    Worked answer available with free account
    View question →
    Q50Hard1 mark·CPA ISC Practice Exam 4

    An auditor observes that a company uses 'Hashing' to store passwords. Why is hashing preferred over encryption for password storage?

    Worked answer available with free account
    View question →
    Q51Hard1 mark·CPA ISC Practice Exam 4

    Which of the following is a 'Management Assertion' required in a SOC 2® report?

    Worked answer available with free account
    View question →
    Q52Hard1 mark·CPA ISC Practice Exam 4

    A company uses a 'Hybrid Cloud' model. Which of the following best describes this architecture?

    Worked answer available with free account
    View question →
    Q53Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing the 'Change Management' logs and notices a change labeled 'Standard Change'. How does a Standard Change typically differ from a Normal Change?

    Worked answer available with free account
    View question →
    Q54Hard1 mark·CPA ISC Practice Exam 4

    Which of the following is a 'Physical' threat to information systems?

    Worked answer available with free account
    View question →
    Q55Hard1 mark·CPA ISC Practice Exam 4

    A company implements 'Data Loss Prevention' (DLP) software. Which of the following actions would the DLP system most likely block?

    Worked answer available with free account
    View question →
    Q56Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing the 'System Development Life Cycle' (SDLC). In which phase should security requirements be defined?

    Worked answer available with free account
    View question →
    Q57Hard1 mark·CPA ISC Practice Exam 4

    Which of the following is a 'Nation-State' threat actor most likely to target?

    Worked answer available with free account
    View question →
    Q58Hard1 mark·CPA ISC Practice Exam 4

    An auditor is testing a control that requires 'Three-Way Matching' for accounts payable. What three documents must match?

    Worked answer available with free account
    View question →
    Q59Hard1 mark·CPA ISC Practice Exam 4

    Under GDPR, which role determines the 'purposes and means' of processing personal data?

    Worked answer available with free account
    View question →
    Q60Hard1 mark·CPA ISC Practice Exam 4

    A company uses 'Tokenization' for credit card numbers. What is the primary benefit of tokenization over encryption for the merchant?

    Worked answer available with free account
    View question →
    Q61Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing the 'System Boundaries' in a SOC 2® engagement. Which of the following should be included in the system boundary definition?

    Worked answer available with free account
    View question →
    Q62Hard1 mark·CPA ISC Practice Exam 4

    Which of the following is a 'Risk Response' strategy where the company decides to stop the activity that causes the risk?

    Worked answer available with free account
    View question →
    Q63Hard1 mark·CPA ISC Practice Exam 4

    A company uses 'Ransomware' protection. Which backup strategy is most effective against ransomware that encrypts connected drives?

    Worked answer available with free account
    View question →
    Q64Hard1 mark·CPA ISC Practice Exam 4

    An auditor is testing 'Logical Access'. They find that the 'Administrator' group contains 15 users, including 5 who left the company years ago. This violates which principle?

    Worked answer available with free account
    View question →
    Q65Hard1 mark·CPA ISC Practice Exam 4

    Which of the following describes a 'Cold Site' for disaster recovery?

    Worked answer available with free account
    View question →
    Q66Hard1 mark·CPA ISC Practice Exam 4

    In a SOC 2® report, if the service auditor identifies a material weakness in the design of controls, what type of opinion should be issued?

    Worked answer available with free account
    View question →
    Q67Hard1 mark·CPA ISC Practice Exam 4

    Which NIST framework is specifically designed to help organizations manage privacy risks?

    Worked answer available with free account
    View question →
    Q68Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing a 'Batch Processing' job that runs overnight. The job log shows 'Error: Input file footer count does not match record count'. Which control detected this?

    Worked answer available with free account
    View question →
    Q69Hard1 mark·CPA ISC Practice Exam 4

    What is the primary function of a 'Circuit Breaker' pattern in modern microservices architecture (though not explicitly detailed in the blueprint, the concept relates to Availability)?

    Worked answer available with free account
    View question →
    Q70Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing the 'Complementary User Entity Controls' (CUECs) in a SOC 2® report. Who is responsible for implementing these controls?

    Worked answer available with free account
    View question →
    Q71Hard1 mark·CPA ISC Practice Exam 4

    Which SQL command is used to remove a table and all its data permanently from the database?

    Worked answer available with free account
    View question →
    Q72Hard1 mark·CPA ISC Practice Exam 4

    A company uses 'Symmetric Encryption'. Which of the following is a major challenge associated with this method?

    Worked answer available with free account
    View question →
    Q73Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing the 'Incident Response' logs. They see a 'False Positive'. What does this mean?

    Worked answer available with free account
    View question →
    Q74Hard1 mark·CPA ISC Practice Exam 4

    Which of the following is a 'Preventive' control for 'SQL Injection'?

    Worked answer available with free account
    View question →
    Q75Hard1 mark·CPA ISC Practice Exam 4

    A service organization's management refuses to provide a written assertion for a SOC 2® engagement. What should the service auditor do?

    Worked answer available with free account
    View question →
    Q76Hard1 mark·CPA ISC Practice Exam 4

    Which of the following is an example of 'Social Engineering'?

    Worked answer available with free account
    View question →
    Q77Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing the 'Data Retention Policy'. The policy states that customer data is deleted after 7 years. However, the auditor finds backups containing 10-year-old data. This is a violation of which GDPR principle?

    Worked answer available with free account
    View question →
    Q78Hard1 mark·CPA ISC Practice Exam 4

    Which of the following is a 'Technical' (Logical) control?

    Worked answer available with free account
    View question →
    Q79Hard1 mark·CPA ISC Practice Exam 4

    A company uses 'Containerization' (e.g., Docker) for its applications. What is a key security benefit of containers compared to traditional virtual machines?

    Worked answer available with free account
    View question →
    Q80Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing the 'Business Continuity Plan' (BCP). What is the primary goal of BCP?

    Worked answer available with free account
    View question →
    Q81Hard1 mark·CPA ISC Practice Exam 4

    Which of the following is a 'Subsequent Event' in a SOC 2® engagement?

    Worked answer available with free account
    View question →
    Q82Hard1 mark·CPA ISC Practice Exam 4

    An auditor is reviewing the 'Risk Assessment' component of COSO. Which of the following is a prerequisite for risk assessment?

    Worked answer available with free account
    View question →
    Q01Medium1 mark·CPA ISC Practice Exam 5

    A service organization provides a cloud-based payroll processing application to its user entities. The user entities access the software via a web browser, but the service organization manages the underlying infrastructure, operating system, and application updates. Which cloud service model is the service organization providing?

    Worked answer available with free account
    View question →
    Q02Hard1 mark·CPA ISC Practice Exam 5

    An auditor is reviewing the shared responsibility model for a client using an Infrastructure as a Service (IaaS) provider. Which of the following responsibilities typically remains with the client (user entity) rather than the cloud provider?

    Worked answer available with free account
    View question →
    Q03Medium1 mark·CPA ISC Practice Exam 5

    A financial institution requires a cloud deployment model that offers the highest level of control and isolation for its sensitive data, even if it requires higher costs and maintenance. Which deployment model is most appropriate?

    Worked answer available with free account
    View question →
    Q04Medium1 mark·CPA ISC Practice Exam 5

    During an IT audit, you observe that a company uses a 'Hybrid Cloud' architecture. Which scenario best describes this architecture?

    Worked answer available with free account
    View question →
    Q05Easy1 mark·CPA ISC Practice Exam 5

    Which component of IT architecture is primarily responsible for translating domain names (like www.aicpa.org) into IP addresses that computers use to communicate?

    Worked answer available with free account
    View question →
    Q06Medium1 mark·CPA ISC Practice Exam 5

    In the context of COSO Enterprise Risk Management, which principle is most relevant when an organization evaluates the risks associated with migrating its core financial system to the cloud?

    Worked answer available with free account
    View question →
    Q07Hard1 mark·CPA ISC Practice Exam 5

    An auditor is reviewing the 'Order-to-Cash' process. The documented flowchart indicates that a credit check is performed automatically by the system before a sales order is approved. However, during a walkthrough, the auditor observes a sales representative manually overriding the credit hold to expedite a shipment for a VIP client. What is the primary concern?

    Worked answer available with free account
    View question →
    Q08Hard1 mark·CPA ISC Practice Exam 5

    A company uses a private blockchain to record supply chain transactions. Which of the following is a unique risk associated with blockchain technology that an auditor should consider regarding financial reporting?

    Worked answer available with free account
    View question →
    Q09Medium1 mark·CPA ISC Practice Exam 5

    An auditor is testing processing integrity controls for a payroll system. The auditor inputs a test transaction with an employee working 400 hours in a single week. The system accepts the input and processes the check. Which type of control is likely missing or ineffective?

    Worked answer available with free account
    View question →
    Q10Medium1 mark·CPA ISC Practice Exam 5

    Which of the following best describes the 'Three-Way Match' control in a procurement process?

    Worked answer available with free account
    View question →
    Q11Hard1 mark·CPA ISC Practice Exam 5

    A company is implementing an ERP system. Which of the following represents a 'Segregation of Duties' conflict that should be flagged during the design phase?

    Worked answer available with free account
    View question →
    Q12Medium1 mark·CPA ISC Practice Exam 5

    In a batch processing system for utility billing, which control would best detect if a transaction file was processed twice by accident?

    Worked answer available with free account
    View question →
    Q13Hard1 mark·CPA ISC Practice Exam 5

    A company has a Recovery Point Objective (RPO) of 4 hours. They currently perform a full backup every Sunday at midnight and incremental backups every night at midnight. Is this backup strategy adequate to meet the RPO?

    Worked answer available with free account
    View question →
    Q14Easy1 mark·CPA ISC Practice Exam 5

    Which disaster recovery site option provides the fastest recovery time (lowest RTO) but incurs the highest cost?

    Worked answer available with free account
    View question →
    Q15Medium1 mark·CPA ISC Practice Exam 5

    A database administrator implements 'disk mirroring' (RAID 1). Which availability risk does this primarily mitigate?

    Worked answer available with free account
    View question →
    Q16Medium1 mark·CPA ISC Practice Exam 5

    What is the primary difference between a Differential Backup and an Incremental Backup?

    Worked answer available with free account
    View question →
    Q17Easy1 mark·CPA ISC Practice Exam 5

    During a SOC 2 engagement, you observe that the organization tests its Disaster Recovery Plan (DRP) annually using a 'Tabletop Exercise'. What does this involve?

    Worked answer available with free account
    View question →
    Q18Medium1 mark·CPA ISC Practice Exam 5

    Which of the following metrics would be most critical to review when assessing the effectiveness of an organization's Business Continuity Plan regarding revenue loss?

    Worked answer available with free account
    View question →
    Q19Medium1 mark·CPA ISC Practice Exam 5

    An auditor observes that a developer has 'write' access to the production environment to fix urgent bugs. The developer also writes the code in the development environment. What is the primary risk?

    Worked answer available with free account
    View question →
    Q20Easy1 mark·CPA ISC Practice Exam 5

    In a formal change management process, which testing stage is performed by the end-users to verify the system meets business requirements?

    Worked answer available with free account
    View question →
    Q21Hard1 mark·CPA ISC Practice Exam 5

    A company uses a 'Continuous Integration/Continuous Deployment' (CI/CD) pipeline. An auditor notes that code is automatically deployed to production after passing automated tests. What is the most appropriate compensating control to look for?

    Worked answer available with free account
    View question →
    Q22Easy1 mark·CPA ISC Practice Exam 5

    Which document should be updated immediately following an emergency change to the production system?

    Worked answer available with free account
    View question →
    Q23Hard1 mark·CPA ISC Practice Exam 5

    An auditor is reviewing a population of changes. They select a sample of changes and trace them back to the Change Request tickets. What assertion is the auditor primarily testing?

    Worked answer available with free account
    View question →
    Q24Medium1 mark·CPA ISC Practice Exam 5

    Which environment is used to combine individual software modules and test their interaction before UAT?

    Worked answer available with free account
    View question →
    Q25Easy1 mark·CPA ISC Practice Exam 5

    An auditor wants to extract all customers from the 'Sales' table who live in 'NY' and spent more than $1,000. Which SQL clause is required to filter the data?

    Worked answer available with free account
    View question →
    Q26Hard1 mark·CPA ISC Practice Exam 5

    Review the following SQL query:<br/>SELECT CustomerID, SUM(OrderAmount)<br/>FROM Orders<br/>GROUP BY CustomerID<br/>HAVING SUM(OrderAmount) > 10000;<br/><br/>What is the purpose of this query?

    Worked answer available with free account
    View question →
    Q27Medium1 mark·CPA ISC Practice Exam 5

    Which data storage concept refers to a vast pool of raw, undefined data (structured and unstructured) stored for future purpose?

    Worked answer available with free account
    View question →
    Q28Easy1 mark·CPA ISC Practice Exam 5

    In the ETL (Extract, Transform, Load) process, at which stage is data cleaned, deduplicated, and converted into a consistent format?

    Worked answer available with free account
    View question →
    Q29Medium1 mark·CPA ISC Practice Exam 5

    An auditor is validating the completeness of a data migration from a legacy system to a new ERP. Which procedure is most effective?

    Worked answer available with free account
    View question →
    Q30Medium1 mark·CPA ISC Practice Exam 5

    Which SQL command is used to combine rows from two or more tables based on a related column between them?

    Worked answer available with free account
    View question →
    Q31Medium1 mark·CPA ISC Practice Exam 5

    Under the HIPAA Security Rule, which of the following is a 'Covered Entity'?

    Worked answer available with free account
    View question →
    Q32Easy1 mark·CPA ISC Practice Exam 5

    A European customer requests that a US-based company delete all their personal data. Under GDPR, this is known as:

    Worked answer available with free account
    View question →
    Q33Hard1 mark·CPA ISC Practice Exam 5

    Which PCI DSS requirement falls under the goal of 'Protect Cardholder Data'?

    Worked answer available with free account
    View question →
    Q34Medium1 mark·CPA ISC Practice Exam 5

    The NIST Cybersecurity Framework (CSF) is organized into five core functions. Which function involves developing and implementing the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event?

    Worked answer available with free account
    View question →
    Q35Hard1 mark·CPA ISC Practice Exam 5

    Which component of COBIT 2019 describes the 'Governance System'?

    Worked answer available with free account
    View question →
    Q36Medium1 mark·CPA ISC Practice Exam 5

    According to the CIS Controls v8, what is Control 1 (the most foundational control)?

    Worked answer available with free account
    View question →
    Q37Medium1 mark·CPA ISC Practice Exam 5

    NIST Special Publication 800-53 is primarily designed for:

    Worked answer available with free account
    View question →
    Q38Hard1 mark·CPA ISC Practice Exam 5

    Which part of the NIST Privacy Framework helps organizations determine their current privacy posture and their target state?

    Worked answer available with free account
    View question →
    Q39Easy1 mark·CPA ISC Practice Exam 5

    An employee receives an email appearing to be from the CEO asking for an urgent wire transfer. The email address is slightly misspelled. This is an example of:

    Worked answer available with free account
    View question →
    Q40Medium1 mark·CPA ISC Practice Exam 5

    A web application allows users to input text into a comment field. A malicious user enters a script that executes in the browsers of other users viewing the comment. This is known as:

    Worked answer available with free account
    View question →
    Q41Medium1 mark·CPA ISC Practice Exam 5

    Which stage of the 'Cyber Kill Chain' involves the attacker installing a backdoor or remote access trojan (RAT) to maintain access?

    Worked answer available with free account
    View question →
    Q42Easy1 mark·CPA ISC Practice Exam 5

    What is the primary purpose of a Distributed Denial of Service (DDoS) attack?

    Worked answer available with free account
    View question →
    Q43Medium1 mark·CPA ISC Practice Exam 5

    Which of the following is a characteristic of an 'Advanced Persistent Threat' (APT)?

    Worked answer available with free account
    View question →
    Q44Medium1 mark·CPA ISC Practice Exam 5

    An organization implements a 'Zero Trust' architecture. Which principle is central to this approach?

    Worked answer available with free account
    View question →
    Q45Easy1 mark·CPA ISC Practice Exam 5

    Which authentication factor is represented by a fingerprint scan?

    Worked answer available with free account
    View question →
    Q46Medium1 mark·CPA ISC Practice Exam 5

    A network administrator separates the Finance department's network traffic from the Engineering department's traffic using VLANs. This is an example of:

    Worked answer available with free account
    View question →
    Q47Medium1 mark·CPA ISC Practice Exam 5

    Which security device is primarily designed to detect and block malicious traffic patterns or signatures in real-time?

    Worked answer available with free account
    View question →
    Q48Easy1 mark·CPA ISC Practice Exam 5

    In an Identity and Access Management (IAM) system, 'Role-Based Access Control' (RBAC) assigns permissions based on:

    Worked answer available with free account
    View question →
    Q49Medium1 mark·CPA ISC Practice Exam 5

    Which cryptographic concept ensures that a message has not been altered in transit?

    Worked answer available with free account
    View question →
    Q50Medium1 mark·CPA ISC Practice Exam 5

    An auditor is reviewing the results of a penetration test. The report identifies a 'Critical' vulnerability involving an unpatched server exposed to the internet. What is the auditor's most appropriate next step?

    Worked answer available with free account
    View question →
    Q51Medium1 mark·CPA ISC Practice Exam 5

    What is the primary difference between Vulnerability Scanning and Penetration Testing?

    Worked answer available with free account
    View question →
    Q52Easy1 mark·CPA ISC Practice Exam 5

    During a security walkthrough, an auditor notices that employees are writing passwords on sticky notes attached to their monitors. Which control is failing?

    Worked answer available with free account
    View question →
    Q53Easy1 mark·CPA ISC Practice Exam 5

    Which type of security test involves the tester having full knowledge of the system (network diagrams, source code, IP addresses) beforehand?

    Worked answer available with free account
    View question →
    Q54Medium1 mark·CPA ISC Practice Exam 5

    A company replaces sensitive credit card numbers in their database with a random string of characters that has no mathematical relationship to the original number. The mapping is stored in a secure vault. This technique is called:

    Worked answer available with free account
    View question →
    Q55Medium1 mark·CPA ISC Practice Exam 5

    Which encryption type uses a public key to encrypt and a private key to decrypt?

    Worked answer available with free account
    View question →
    Q56Medium1 mark·CPA ISC Practice Exam 5

    Data Loss Prevention (DLP) tools are primarily designed to:

    Worked answer available with free account
    View question →
    Q57Hard1 mark·CPA ISC Practice Exam 5

    What is the difference between Confidentiality and Privacy?

    Worked answer available with free account
    View question →
    Q58Easy1 mark·CPA ISC Practice Exam 5

    Which phase of the data lifecycle involves securely removing data when it is no longer needed?

    Worked answer available with free account
    View question →
    Q59Medium1 mark·CPA ISC Practice Exam 5

    In Incident Response, what is the primary goal of the 'Containment' phase?

    Worked answer available with free account
    View question →
    Q60Easy1 mark·CPA ISC Practice Exam 5

    A company purchases cyber insurance. Which risk management strategy is this?

    Worked answer available with free account
    View question →
    Q61Medium1 mark·CPA ISC Practice Exam 5

    What is the difference between an 'Event' and an 'Incident' in cybersecurity?

    Worked answer available with free account
    View question →
    Q62Medium1 mark·CPA ISC Practice Exam 5

    After a ransomware attack is resolved, the team holds a 'Lessons Learned' meeting. What is the primary output of this meeting?

    Worked answer available with free account
    View question →
    Q63Medium1 mark·CPA ISC Practice Exam 5

    A service organization's clients need assurance regarding the controls over financial reporting. Which SOC report is most appropriate?

    Worked answer available with free account
    View question →
    Q64Hard1 mark·CPA ISC Practice Exam 5

    Which of the following is NOT one of the five Trust Services Criteria categories used in SOC 2 engagements?

    Worked answer available with free account
    View question →
    Q65Medium1 mark·CPA ISC Practice Exam 5

    A service organization wants a report to display on their website for potential customers to prove they are secure. The report should not contain sensitive technical details. Which report should they choose?

    Worked answer available with free account
    View question →
    Q66Medium1 mark·CPA ISC Practice Exam 5

    What is the primary difference between a Type I and a Type II SOC report?

    Worked answer available with free account
    View question →
    Q67Medium1 mark·CPA ISC Practice Exam 5

    In a SOC 2 engagement, which criteria is MANDATORY for every report?

    Worked answer available with free account
    View question →
    Q68Hard1 mark·CPA ISC Practice Exam 5

    A service organization uses a subservice organization for data center hosting. The service organization's auditor decides to use the 'Carve-Out' method. What does this mean for the report?

    Worked answer available with free account
    View question →
    Q69Hard1 mark·CPA ISC Practice Exam 5

    When using the 'Inclusive' method for a subservice organization, what is the service auditor's responsibility?

    Worked answer available with free account
    View question →
    Q70Medium1 mark·CPA ISC Practice Exam 5

    What are 'Complementary User Entity Controls' (CUECs)?

    Worked answer available with free account
    View question →
    Q71Hard1 mark·CPA ISC Practice Exam 5

    In planning a SOC 2 engagement, the auditor must assess 'Materiality'. How is materiality typically viewed in a SOC 2 compared to a financial audit?

    Worked answer available with free account
    View question →
    Q72Medium1 mark·CPA ISC Practice Exam 5

    Which section of a SOC 2 report contains the Management's Assertion?

    Worked answer available with free account
    View question →
    Q73Hard1 mark·CPA ISC Practice Exam 5

    During a SOC 2 Type II engagement, an auditor finds that a daily backup failed 3 times out of 365 days. The backups were successfully retried the next day. How should the auditor handle this?

    Worked answer available with free account
    View question →
    Q74Medium1 mark·CPA ISC Practice Exam 5

    Which testing procedure provides the highest level of assurance for operating effectiveness?

    Worked answer available with free account
    View question →
    Q75Easy1 mark·CPA ISC Practice Exam 5

    An auditor is testing a control that states 'All new hires must undergo a background check'. The auditor selects a sample of 25 new hires and finds 2 missing background checks. What is the deviation rate?

    Worked answer available with free account
    View question →
    Q76Medium1 mark·CPA ISC Practice Exam 5

    In a SOC engagement, what is the purpose of the 'System Description'?

    Worked answer available with free account
    View question →
    Q77Hard1 mark·CPA ISC Practice Exam 5

    If an auditor discovers a 'Subsequent Event' (after the period end but before the report date) that significantly affects the system's security, what should they do?

    Worked answer available with free account
    View question →
    Q78Medium1 mark·CPA ISC Practice Exam 5

    Which opinion type is issued when the system description is fairly presented and controls are effective, EXCEPT for one or more significant deficiencies?

    Worked answer available with free account
    View question →
    Q79Medium1 mark·CPA ISC Practice Exam 5

    What constitutes an 'Adverse Opinion' in a SOC report?

    Worked answer available with free account
    View question →
    Q80Easy1 mark·CPA ISC Practice Exam 5

    In a SOC 2 report, where would a user find the auditor's detailed tests and the results of those tests?

    Worked answer available with free account
    View question →
    Q81Hard1 mark·CPA ISC Practice Exam 5

    A service organization refuses to provide a written assertion (Section II). What must the auditor do?

    Worked answer available with free account
    View question →
    Q82Medium1 mark·CPA ISC Practice Exam 5

    Which of the following statements is TRUE regarding the use of a SOC 2 report?

    Worked answer available with free account
    View question →

    Practice these questions with detailed guidance

    Full answers, grading, and explanations on why each answer is correct.

    Sign up freeBrowse exams