ISC

Area I: Information Systems

146 questions across 5 exams

All questions (146)

Q01Hard1 mark·CPA ISC Practice Exam

A CPA is performing a risk assessment for a client that uses a public cloud provider for its core ERP system. The client utilizes an Infrastructure as a Service (IaaS) model. When defining the scope of the IT audit, which of the following components is the client's management primarily responsible for securing, rather than the cloud service provider?

Worked answer available with free account
View question →
Q02Hard1 mark·CPA ISC Practice Exam

During a walkthrough of a client's change management process, the auditor notes that developers have write access to the production environment to facilitate quick hotfixes. The client argues that a code review tool logs all changes. Which of the following represents the MOST significant risk associated with this configuration?

Worked answer available with free account
View question →
Q03Hard1 mark·CPA ISC Practice Exam

A service organization provides a real-time transaction processing platform. The service level agreement (SLA) guarantees a Recovery Point Objective (RPO) of 15 minutes. The auditor discovers that the organization performs full backups nightly at midnight and ships tapes to offsite storage daily. No other backup mechanisms are in place. What is the auditor's conclusion?

Worked answer available with free account
View question →
Q04Hard1 mark·CPA ISC Practice Exam

An auditor is reviewing a SQL query used by the finance team to generate a report of all sales transactions above $10,000 for the first quarter of 2024. The query is:<br/><br/>SELECT * FROM Sales<br/>WHERE Amount > 10000<br/>AND Date BETWEEN '2024-01-01' AND '2024-03-31'<br/><br/>Assuming the 'Amount' column includes cents and the 'Date' column is a standard date type, which potential issue should the auditor investigate regarding the completeness of this population?

Worked answer available with free account
View question →
Q05Hard1 mark·CPA ISC Practice Exam

A healthcare clearinghouse is preparing for a SOC 2® engagement. They utilize a private cloud deployment model hosted in their own data center. Which of the following statements accurately describes the auditor's responsibility regarding the infrastructure in this scenario?

Worked answer available with free account
View question →
Q06Hard1 mark·CPA ISC Practice Exam

An auditor is evaluating the design of a disaster recovery plan (DRP). The organization uses a 'differential' backup strategy during the week and a 'full' backup on weekends. If the system crashes on Thursday afternoon, which files are required to restore the system to the most recent state?

Worked answer available with free account
View question →
Q07Medium1 mark·CPA ISC Practice Exam

A company is implementing a new ERP system. The project team decides to run the old system and the new system simultaneously for two months, comparing the outputs of both systems before decommissioning the old one. Which implementation strategy is this?

Worked answer available with free account
View question →
Q08Hard1 mark·CPA ISC Practice Exam

Under the COSO Internal Control framework, which of the following is a critical risk associated with the use of blockchain technology in financial reporting that an auditor must evaluate?

Worked answer available with free account
View question →
Q09Medium1 mark·CPA ISC Practice Exam

An auditor is reviewing the data integration process between a CRM system and the General Ledger. The process uses an ETL (Extract, Transform, Load) tool. The auditor observes that the 'Transform' step includes logic to map 'State' codes (e.g., 'NY') to 'Region' IDs (e.g., '101'). Which control is MOST important to ensure data integrity during this step?

Worked answer available with free account
View question →
Q10Hard1 mark·CPA ISC Practice Exam

A company uses a 'Data Lake' architecture to store unstructured customer feedback logs alongside structured transaction data. When auditing the completeness of data retrieval for analysis, what is a primary challenge the auditor should anticipate compared to a traditional Data Warehouse?

Worked answer available with free account
View question →
Q11Medium1 mark·CPA ISC Practice Exam

Which of the following scenarios represents a violation of the 'Segregation of Duties' principle in the context of IT change management?

Worked answer available with free account
View question →
Q12Easy1 mark·CPA ISC Practice Exam

A service organization uses a 'hot site' for disaster recovery. Which of the following best describes the readiness of this facility?

Worked answer available with free account
View question →
Q13Medium1 mark·CPA ISC Practice Exam

An auditor is testing the 'completeness' of a data extraction from a legacy mainframe to a new cloud database. The auditor sums the 'TotalAccountValue' field in the source system and compares it to the sum in the destination system. This technique is known as:

Worked answer available with free account
View question →
Q14Medium1 mark·CPA ISC Practice Exam

A company uses a SaaS-based CRM. The auditor wants to verify that the company's data is backed up. The SaaS provider's contract states they perform daily backups. What is the MOST appropriate evidence for the auditor to request?

Worked answer available with free account
View question →
Q38Medium1 mark·CPA ISC Practice Exam

A company uses a 'Platform as a Service' (PaaS) environment to develop and host its web application. The auditor asks for evidence of 'patch management'. Which response from the client is most appropriate regarding the underlying operating system?

Worked answer available with free account
View question →
Q40Hard1 mark·CPA ISC Practice Exam

Which of the following SQL statements would an auditor use to identify duplicate invoice numbers in the 'Sales' table?

Worked answer available with free account
View question →
Q43Medium1 mark·CPA ISC Practice Exam

An auditor is examining the 'User Acceptance Testing' (UAT) phase of a software implementation. Who is the MOST appropriate party to sign off on UAT results?

Worked answer available with free account
View question →
Q45Easy1 mark·CPA ISC Practice Exam

Which of the following is a characteristic of a 'hardened' operating system?

Worked answer available with free account
View question →
Q47Medium1 mark·CPA ISC Practice Exam

Which of the following is a 'detective' control for ensuring data integrity in a batch processing system?

Worked answer available with free account
View question →
Q49Medium1 mark·CPA ISC Practice Exam

Which of the following is a primary benefit of using a 'Hybrid Cloud' deployment model?

Worked answer available with free account
View question →
Q51Medium1 mark·CPA ISC Practice Exam

What is the primary purpose of a 'Data Warehouse' compared to an operational database (OLTP)?

Worked answer available with free account
View question →
Q54Medium1 mark·CPA ISC Practice Exam

An auditor is reviewing the 'Change Management' process. They find a change ticket labeled 'Emergency Fix' that was deployed to production without prior testing. The policy allows this if retrospective approval is granted within 24 hours. What is the auditor's primary concern?

Worked answer available with free account
View question →
Q61Medium1 mark·CPA ISC Practice Exam

An auditor is reviewing a 'Business Continuity Plan' (BCP). The plan relies on a 'Reciprocal Agreement' with a neighboring company. What is a major risk of this strategy?

Worked answer available with free account
View question →
Q64Easy1 mark·CPA ISC Practice Exam

Which of the following is a 'Risk Response' strategy where the organization decides to stop the activity that causes the risk?

Worked answer available with free account
View question →
Q70Easy1 mark·CPA ISC Practice Exam

A company uses a 'Waterfall' methodology for software development. Which of the following is a primary characteristic of this model?

Worked answer available with free account
View question →
Q71Medium1 mark·CPA ISC Practice Exam

An auditor is reviewing a SQL query that joins two tables: 'Customers' and 'Orders'. The query uses an 'INNER JOIN'. Which records will be included in the result?

Worked answer available with free account
View question →
Q74Easy1 mark·CPA ISC Practice Exam

A company uses a 'Cold Site' for disaster recovery. What is the primary disadvantage of this approach?

Worked answer available with free account
View question →
Q75Medium1 mark·CPA ISC Practice Exam

Which of the following is a 'Corrective' control in the Change Management process?

Worked answer available with free account
View question →
Q01Medium1 mark·CPA ISC Practice Exam 2

A service organization provides a cloud-based payroll platform where clients access the software via a web browser. The clients do not manage the underlying infrastructure, operating systems, or application capabilities. Which cloud service model is the service organization providing?

Worked answer available with free account
View question →

An auditor is reviewing the backup strategy for a financial institution that requires a Recovery Point Objective (RPO) of 15 minutes. The current strategy involves a daily full backup at midnight. Which conclusion should the auditor draw?

Worked answer available with free account
View question →
Q03Medium1 mark·CPA ISC Practice Exam 2

During a walkthrough of the change management process, an auditor observes that developers have write access to the production environment to deploy hotfixes quickly. Which principle does this violate?

Worked answer available with free account
View question →

An auditor is reviewing a SQL query used to generate a list of active customers for a marketing campaign. The query is:<br/>SELECT * FROM Customers WHERE Status = 'Active' OR LastOrderDate > '2023-01-01'.<br/>What is the potential issue with this query regarding data accuracy?

Worked answer available with free account
View question →

Which component of the COSO Internal Control framework is most directly related to the 'Governance and Culture' component of the COSO ERM framework when applied to cloud governance?

Worked answer available with free account
View question →
Q15Medium1 mark·CPA ISC Practice Exam 2

A company wants to ensure that if a disaster occurs, they can restore data to the state it was in no more than 1 hour ago. This requirement defines the:

Worked answer available with free account
View question →
Q20Medium1 mark·CPA ISC Practice Exam 2

An auditor observes that a company uses a 'test' environment that is an exact replica of the 'production' environment, including real customer data. What is the primary risk associated with this practice?

Worked answer available with free account
View question →
Q22Medium1 mark·CPA ISC Practice Exam 2

A company uses a 'Data Lake' architecture. Which characteristic best describes a Data Lake?

Worked answer available with free account
View question →
Q25Medium1 mark·CPA ISC Practice Exam 2

An auditor is reviewing a flowchart of the 'Order-to-Cash' process. The flowchart shows that the 'Sales Department' approves credit limits for new customers. What is the control deficiency?

Worked answer available with free account
View question →
Q29Medium1 mark·CPA ISC Practice Exam 2

Which SQL command is used to remove a table and all its data permanently from the database?

Worked answer available with free account
View question →

Which cloud deployment model involves infrastructure provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units)?

Worked answer available with free account
View question →
Q38Medium1 mark·CPA ISC Practice Exam 2

What is the primary function of a 'Hypervisor' in a virtualized environment?

Worked answer available with free account
View question →

Which of the following SQL clauses is used to filter the results of a query based on a specific condition?

Worked answer available with free account
View question →

A company uses 'Incremental' backups daily and a 'Full' backup on Sundays. If the system crashes on Thursday, what is required to restore the data?

Worked answer available with free account
View question →
Q47Medium1 mark·CPA ISC Practice Exam 2

An auditor is reviewing a blockchain implementation used for supply chain tracking. Which risk is unique to the 'Immutability' feature of blockchain?

Worked answer available with free account
View question →
Q50Medium1 mark·CPA ISC Practice Exam 2

An auditor is testing the 'Change Management' process. They select a sample of 30 changes. They find that 2 changes were deployed to production without the required 'User Acceptance Testing' (UAT) sign-off. The IT Manager explains these were 'Emergency Changes'. What should the auditor look for next?

Worked answer available with free account
View question →
Q52Medium1 mark·CPA ISC Practice Exam 2

A company uses 'Mirroring' for its database. What is the primary advantage of this approach?

Worked answer available with free account
View question →

Which SQL aggregate function is used to count the number of rows in a result set?

Worked answer available with free account
View question →

A company uses 'Asynchronous Replication' to a disaster recovery site. What is the primary risk associated with this method?

Worked answer available with free account
View question →
Q63Medium1 mark·CPA ISC Practice Exam 2

An auditor is testing the 'Completeness' of a data extraction from an ERP system. They compare the record count in the source system to the record count in the destination file. This is an example of:

Worked answer available with free account
View question →

Which of the following is a 'Unit Test' in software development?

Worked answer available with free account
View question →

An auditor is reviewing a database schema. They notice that the 'SocialSecurityNumber' column is indexed. What is the security risk?

Worked answer available with free account
View question →
Q69Medium1 mark·CPA ISC Practice Exam 2

A company uses a 'Cold Site' for disaster recovery. What is the main characteristic of a Cold Site?

Worked answer available with free account
View question →

Which of the following is an example of 'Inherent Risk' in a cloud environment?

Worked answer available with free account
View question →

What is the purpose of a 'Data Dictionary'?

Worked answer available with free account
View question →
Q76Medium1 mark·CPA ISC Practice Exam 2

An auditor is reviewing the 'System Development Life Cycle' (SDLC). Which phase should include the definition of security requirements?

Worked answer available with free account
View question →

Which of the following is a 'Batch Processing' characteristic?

Worked answer available with free account
View question →
Q81Medium1 mark·CPA ISC Practice Exam 2

Which of the following is a 'PaaS' (Platform as a Service) example?

Worked answer available with free account
View question →
Q01Medium1 mark·CPA ISC Practice Exam 3

A CPA is advising a client who is migrating their legacy on-premise ERP system to a cloud-based solution. The client wants to minimize their internal IT team's responsibility for managing the underlying operating system, middleware, and runtime environment, but they want to retain control over the deployed applications and configuration settings. Which cloud service model is MOST appropriate for this client?

Worked answer available with free account
View question →
Q02Medium1 mark·CPA ISC Practice Exam 3

During a review of a client's cloud governance structure, an auditor notes that the client uses a public cloud provider for customer-facing web applications but keeps sensitive financial data on a private on-premise server. The two environments are connected via an encrypted VPN. Which deployment model is this client utilizing?

Worked answer available with free account
View question →

An auditor is evaluating the 'Processing Integrity' principle for a financial institution's loan origination system. The auditor discovers that the system automatically rejects loan applications with incomplete data fields but does not generate an error log for these rejections. Which specific processing integrity risk does this control deficiency primarily exacerbate?

Worked answer available with free account
View question →

A company uses a batch processing system to update inventory records overnight. The 'Grandfather-Father-Son' backup rotation scheme is used. On Thursday morning, the 'Son' (Wednesday night's backup) is found to be corrupted. To restore the system to the most current state possible before the corruption, which tapes are required?

Worked answer available with free account
View question →
Q05Medium1 mark·CPA ISC Practice Exam 3

During a walkthrough of the change management process, an auditor observes that the 'Developer' role in the ERP system has access to 'Migrate to Production'. The IT Manager explains this is necessary for emergency fixes overnight when the Change Manager is unavailable. What is the auditor's BEST course of action?

Worked answer available with free account
View question →

An auditor is reviewing a SQL query used to extract 'Active Customers' for a marketing report. The query is:<br/><br/>SELECT CustomerID, Name FROM Customers WHERE Status = 'Active' OR Status = 'Pending' AND CreditLimit > 1000<br/><br/>The auditor suspects the logic is flawed because of operator precedence. Which customers will this query actually return?

Worked answer available with free account
View question →
Q11Medium1 mark·CPA ISC Practice Exam 3

An IT auditor is reviewing the 'Recovery Point Objective' (RPO) for a critical transaction database. Management has set the RPO at 1 hour. The current backup strategy involves a full backup every Sunday at midnight and incremental backups every night at midnight. Is this strategy adequate?

Worked answer available with free account
View question →

An auditor is testing a control that requires 'Three-way matching' before a payment is authorized. Which three documents must match?

Worked answer available with free account
View question →
Q22Medium1 mark·CPA ISC Practice Exam 3

A company uses an 'Incremental' backup strategy. A full backup is performed on Sunday. Incremental backups are performed Monday through Saturday. If the system crashes on Thursday morning (before Thursday's backup), what is required to restore the system?

Worked answer available with free account
View question →

Which of the following SQL commands is used to remove a table and all its data permanently from the database?

Worked answer available with free account
View question →
Q24Medium1 mark·CPA ISC Practice Exam 3

An auditor is assessing the 'Availability' criteria for a cloud service provider. The provider claims 99.9% uptime. Which of the following metrics would be MOST useful to verify this claim?

Worked answer available with free account
View question →
Q27Medium1 mark·CPA ISC Practice Exam 3

An auditor observes that a company uses a 'Hot Site' for disaster recovery. What does this imply?

Worked answer available with free account
View question →
Q29Medium1 mark·CPA ISC Practice Exam 3

A developer is writing a SQL query to combine customer data from the 'Sales' table and the 'Support' table. They want to see ALL customers from the 'Sales' table, and matching support tickets if they exist. If a customer has no support tickets, they should still appear in the list. Which JOIN type should be used?

Worked answer available with free account
View question →
Q34Medium1 mark·CPA ISC Practice Exam 3

An auditor is reviewing the 'Change Management' process. They find that the 'Request for Change' (RFC) form does not require a back-out plan. Why is this a control deficiency?

Worked answer available with free account
View question →

Which of the following is a risk associated with using a 'Public Blockchain' for financial reporting?

Worked answer available with free account
View question →
Q39Medium1 mark·CPA ISC Practice Exam 3

A company wants to ensure that their web application can handle a sudden spike in traffic during Black Friday sales. They configure their cloud environment to automatically add more virtual servers when CPU usage exceeds 80%. This capability is known as:

Worked answer available with free account
View question →
Q41Medium1 mark·CPA ISC Practice Exam 3

Which of the following is a primary benefit of using a 'Data Lake' compared to a 'Data Warehouse'?

Worked answer available with free account
View question →
Q51Medium1 mark·CPA ISC Practice Exam 3

A company uses a 'Cold Site' for disaster recovery. Which of the following is the primary disadvantage of this approach?

Worked answer available with free account
View question →
Q53Medium1 mark·CPA ISC Practice Exam 3

An auditor is reviewing the 'Segregation of Duties' (SoD) in the payroll process. Which two roles should be separated?

Worked answer available with free account
View question →
Q56Medium1 mark·CPA ISC Practice Exam 3

An auditor is evaluating the 'Completeness' of data transfer from a legacy system to a new ERP. Which technique is MOST effective?

Worked answer available with free account
View question →

Which of the following is an example of 'SaaS' (Software as a Service)?

Worked answer available with free account
View question →
Q62Medium1 mark·CPA ISC Practice Exam 3

An auditor is reviewing a SQL query: `SELECT * FROM Employees WHERE Salary > 100000;`. What is the risk of using `SELECT *` in production code?

Worked answer available with free account
View question →

Which of the following is a 'Physical' security control?

Worked answer available with free account
View question →
Q66Medium1 mark·CPA ISC Practice Exam 3

An auditor is reviewing the 'Change Management' logs and notices a change labeled 'Emergency Fix' that was deployed without prior testing in the staging environment. The policy allows this but requires 'Post-Implementation Review' within 24 hours. The auditor finds the review was completed 3 days later. What is the finding?

Worked answer available with free account
View question →
Q69Medium1 mark·CPA ISC Practice Exam 3

In a relational database, what is a 'Foreign Key'?

Worked answer available with free account
View question →

A company uses 'Containerization' (e.g., Docker) for its applications. From an auditor's perspective, what is a key difference between a Container and a Virtual Machine (VM)?

Worked answer available with free account
View question →
Q79Medium1 mark·CPA ISC Practice Exam 3

An auditor is reviewing the 'Business Continuity Plan' (BCP). Which of the following is a key component that determines the order in which business processes should be restored?

Worked answer available with free account
View question →

A CPA is advising a client who is migrating their legacy on-premise ERP system to a cloud environment. The client wants to minimize their responsibility for managing the underlying operating system, middleware, and runtime environment, but wants to retain control over the deployed applications and configuration settings. Which cloud service model is most appropriate for this client?

Worked answer available with free account
View question →

An auditor is reviewing the Service Level Agreement (SLA) for a client using a public cloud provider. The client handles highly sensitive healthcare data. The auditor notes that the cloud provider stores data in a multi-tenant environment. Which specific risk is MOST heightened in this deployment model compared to a private cloud?

Worked answer available with free account
View question →

A company uses an Infrastructure as a Service (IaaS) model. During an IT audit, the auditor discovers that the operating system of the virtual machines has not been patched for critical vulnerabilities. Under the shared responsibility model, who is responsible for this control failure?

Worked answer available with free account
View question →

An organization is implementing the COSO Enterprise Risk Management (ERM) framework to govern its migration to the cloud. Which of the following actions best aligns with the 'Governance and Culture' component of COSO ERM in this context?

Worked answer available with free account
View question →

During a walkthrough of an order-to-cash process, the auditor observes that the sales manager can both authorize credit limits for new customers and approve sales orders exceeding those limits. The documented process flow states these functions should be separated. Which type of deficiency has the auditor identified?

Worked answer available with free account
View question →

An auditor is reviewing the backup strategy for a financial transaction system with a Recovery Point Objective (RPO) of 1 hour. The current strategy involves a full backup every Sunday at midnight and differential backups every night at midnight. Is this strategy adequate?

Worked answer available with free account
View question →

A developer at a software company has access to write code in the development environment and also has administrative access to promote that code directly to the production environment. Which specific IT general control (ITGC) principle is violated?

Worked answer available with free account
View question →

An auditor is examining a SQL query used to generate a report of all sales transactions for the fiscal year 2024. The query is:<br/>SELECT * FROM Sales WHERE SaleDate > '2024-01-01' AND SaleDate < '2024-12-31'.<br/>What is the potential issue with this query regarding data completeness?

Worked answer available with free account
View question →

An auditor is reviewing a company's disaster recovery plan (DRP). The company uses a 'Hot Site' for recovery. Which characteristic best describes a Hot Site?

Worked answer available with free account
View question →

Which of the following SQL statements would be most useful for an auditor attempting to identify duplicate invoice numbers in a table named 'Invoices'?

Worked answer available with free account
View question →

A company uses a blockchain ledger to record supply chain transactions. An auditor is assessing the risk of '51% attacks'. What is the primary implication of a successful 51% attack on a blockchain?

Worked answer available with free account
View question →

An auditor is testing the 'Processing Integrity' criteria for a payroll system. They find that the system accepts negative values for 'Hours Worked'. Which type of application control is missing?

Worked answer available with free account
View question →

A company uses a 'Data Lake' architecture. What is a primary characteristic of a Data Lake compared to a Data Warehouse?

Worked answer available with free account
View question →

An auditor is reviewing the 'Change Management' process. They observe that emergency changes are allowed to bypass the standard testing phase to restore service quickly. What is the compensating control that MUST be in place for this process to be acceptable?

Worked answer available with free account
View question →

An auditor is reviewing a SQL query that joins two tables: 'Customers' and 'Orders'. The goal is to list ALL customers, including those who have not placed any orders. Which JOIN type should be used?

Worked answer available with free account
View question →

A company is designing a new data center. They install a 'mantrap' at the entrance to the server room. Which type of control is this?

Worked answer available with free account
View question →

An auditor is reviewing the 'Logical Access' controls. They find that user accounts are not disabled immediately upon termination of employment. This control deficiency primarily increases the risk of:

Worked answer available with free account
View question →

An auditor is assessing the 'Availability' criteria in a SOC 2® engagement. The client claims to have high availability. Which metric best measures the percentage of time the system is operational?

Worked answer available with free account
View question →

Which of the following is a 'Corrective' control?

Worked answer available with free account
View question →

A company uses a 'Hybrid Cloud' model. Which of the following best describes this architecture?

Worked answer available with free account
View question →

An auditor is reviewing the 'Change Management' logs and notices a change labeled 'Standard Change'. How does a Standard Change typically differ from a Normal Change?

Worked answer available with free account
View question →

An auditor is reviewing the 'System Development Life Cycle' (SDLC). In which phase should security requirements be defined?

Worked answer available with free account
View question →

An auditor is testing a control that requires 'Three-Way Matching' for accounts payable. What three documents must match?

Worked answer available with free account
View question →

A company uses 'Ransomware' protection. Which backup strategy is most effective against ransomware that encrypts connected drives?

Worked answer available with free account
View question →

An auditor is testing 'Logical Access'. They find that the 'Administrator' group contains 15 users, including 5 who left the company years ago. This violates which principle?

Worked answer available with free account
View question →

Which of the following describes a 'Cold Site' for disaster recovery?

Worked answer available with free account
View question →

An auditor is reviewing a 'Batch Processing' job that runs overnight. The job log shows 'Error: Input file footer count does not match record count'. Which control detected this?

Worked answer available with free account
View question →

What is the primary function of a 'Circuit Breaker' pattern in modern microservices architecture (though not explicitly detailed in the blueprint, the concept relates to Availability)?

Worked answer available with free account
View question →

Which SQL command is used to remove a table and all its data permanently from the database?

Worked answer available with free account
View question →

Which of the following is a 'Technical' (Logical) control?

Worked answer available with free account
View question →

A company uses 'Containerization' (e.g., Docker) for its applications. What is a key security benefit of containers compared to traditional virtual machines?

Worked answer available with free account
View question →

An auditor is reviewing the 'Business Continuity Plan' (BCP). What is the primary goal of BCP?

Worked answer available with free account
View question →

An auditor is reviewing the 'Risk Assessment' component of COSO. Which of the following is a prerequisite for risk assessment?

Worked answer available with free account
View question →
Q01Medium1 mark·CPA ISC Practice Exam 5

A service organization provides a cloud-based payroll processing application to its user entities. The user entities access the software via a web browser, but the service organization manages the underlying infrastructure, operating system, and application updates. Which cloud service model is the service organization providing?

Worked answer available with free account
View question →

An auditor is reviewing the shared responsibility model for a client using an Infrastructure as a Service (IaaS) provider. Which of the following responsibilities typically remains with the client (user entity) rather than the cloud provider?

Worked answer available with free account
View question →
Q03Medium1 mark·CPA ISC Practice Exam 5

A financial institution requires a cloud deployment model that offers the highest level of control and isolation for its sensitive data, even if it requires higher costs and maintenance. Which deployment model is most appropriate?

Worked answer available with free account
View question →
Q04Medium1 mark·CPA ISC Practice Exam 5

During an IT audit, you observe that a company uses a 'Hybrid Cloud' architecture. Which scenario best describes this architecture?

Worked answer available with free account
View question →

Which component of IT architecture is primarily responsible for translating domain names (like www.aicpa.org) into IP addresses that computers use to communicate?

Worked answer available with free account
View question →
Q06Medium1 mark·CPA ISC Practice Exam 5

In the context of COSO Enterprise Risk Management, which principle is most relevant when an organization evaluates the risks associated with migrating its core financial system to the cloud?

Worked answer available with free account
View question →

An auditor is reviewing the 'Order-to-Cash' process. The documented flowchart indicates that a credit check is performed automatically by the system before a sales order is approved. However, during a walkthrough, the auditor observes a sales representative manually overriding the credit hold to expedite a shipment for a VIP client. What is the primary concern?

Worked answer available with free account
View question →

A company uses a private blockchain to record supply chain transactions. Which of the following is a unique risk associated with blockchain technology that an auditor should consider regarding financial reporting?

Worked answer available with free account
View question →
Q09Medium1 mark·CPA ISC Practice Exam 5

An auditor is testing processing integrity controls for a payroll system. The auditor inputs a test transaction with an employee working 400 hours in a single week. The system accepts the input and processes the check. Which type of control is likely missing or ineffective?

Worked answer available with free account
View question →
Q10Medium1 mark·CPA ISC Practice Exam 5

Which of the following best describes the 'Three-Way Match' control in a procurement process?

Worked answer available with free account
View question →

A company is implementing an ERP system. Which of the following represents a 'Segregation of Duties' conflict that should be flagged during the design phase?

Worked answer available with free account
View question →
Q12Medium1 mark·CPA ISC Practice Exam 5

In a batch processing system for utility billing, which control would best detect if a transaction file was processed twice by accident?

Worked answer available with free account
View question →

A company has a Recovery Point Objective (RPO) of 4 hours. They currently perform a full backup every Sunday at midnight and incremental backups every night at midnight. Is this backup strategy adequate to meet the RPO?

Worked answer available with free account
View question →

Which disaster recovery site option provides the fastest recovery time (lowest RTO) but incurs the highest cost?

Worked answer available with free account
View question →
Q15Medium1 mark·CPA ISC Practice Exam 5

A database administrator implements 'disk mirroring' (RAID 1). Which availability risk does this primarily mitigate?

Worked answer available with free account
View question →
Q16Medium1 mark·CPA ISC Practice Exam 5

What is the primary difference between a Differential Backup and an Incremental Backup?

Worked answer available with free account
View question →

During a SOC 2 engagement, you observe that the organization tests its Disaster Recovery Plan (DRP) annually using a 'Tabletop Exercise'. What does this involve?

Worked answer available with free account
View question →
Q18Medium1 mark·CPA ISC Practice Exam 5

Which of the following metrics would be most critical to review when assessing the effectiveness of an organization's Business Continuity Plan regarding revenue loss?

Worked answer available with free account
View question →
Q19Medium1 mark·CPA ISC Practice Exam 5

An auditor observes that a developer has 'write' access to the production environment to fix urgent bugs. The developer also writes the code in the development environment. What is the primary risk?

Worked answer available with free account
View question →

In a formal change management process, which testing stage is performed by the end-users to verify the system meets business requirements?

Worked answer available with free account
View question →

A company uses a 'Continuous Integration/Continuous Deployment' (CI/CD) pipeline. An auditor notes that code is automatically deployed to production after passing automated tests. What is the most appropriate compensating control to look for?

Worked answer available with free account
View question →

Which document should be updated immediately following an emergency change to the production system?

Worked answer available with free account
View question →

An auditor is reviewing a population of changes. They select a sample of changes and trace them back to the Change Request tickets. What assertion is the auditor primarily testing?

Worked answer available with free account
View question →
Q24Medium1 mark·CPA ISC Practice Exam 5

Which environment is used to combine individual software modules and test their interaction before UAT?

Worked answer available with free account
View question →

An auditor wants to extract all customers from the 'Sales' table who live in 'NY' and spent more than $1,000. Which SQL clause is required to filter the data?

Worked answer available with free account
View question →

Review the following SQL query:<br/>SELECT CustomerID, SUM(OrderAmount)<br/>FROM Orders<br/>GROUP BY CustomerID<br/>HAVING SUM(OrderAmount) > 10000;<br/><br/>What is the purpose of this query?

Worked answer available with free account
View question →
Q27Medium1 mark·CPA ISC Practice Exam 5

Which data storage concept refers to a vast pool of raw, undefined data (structured and unstructured) stored for future purpose?

Worked answer available with free account
View question →

In the ETL (Extract, Transform, Load) process, at which stage is data cleaned, deduplicated, and converted into a consistent format?

Worked answer available with free account
View question →
Q29Medium1 mark·CPA ISC Practice Exam 5

An auditor is validating the completeness of a data migration from a legacy system to a new ERP. Which procedure is most effective?

Worked answer available with free account
View question →
Q30Medium1 mark·CPA ISC Practice Exam 5

Which SQL command is used to combine rows from two or more tables based on a related column between them?

Worked answer available with free account
View question →

Practice these questions with detailed guidance

Full answers, grading, and explanations on why each answer is correct.