exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 430 discussion

Actual exam question from Isaca's CISA
Question #: 430
Topic #: 1
[All CISA Questions]

Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls?

  • A. The information security policy does not include mobile device provisions.
  • B. The information security policy is not frequently reviewed.
  • C. The information security policy has not been approved by the chief audit executive (CAE).
  • D. The information security policy has not been approved by the policy owner.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
roxannebadenhorst
2 months, 1 week ago
Selected Answer: A
The greatest concern for an IS auditor when reviewing information security controls would be the absence of mobile device provisions in the information security policy, especially in today’s increasingly mobile and remote work environments. Here’s why: Mobile device risks: Mobile devices, such as smartphones, tablets, and laptops, represent significant security risks because they are more susceptible to being lost, stolen, or hacked. These devices can access sensitive company data and, if not properly secured, can introduce vulnerabilities. Having provisions for managing the security of mobile devices is crucial to maintaining the integrity of an organization’s information security framework. Security control gaps: If the policy does not address mobile devices, it could create a significant gap in the organization's security posture, leaving critical data exposed. This omission could lead to breaches, unauthorized access, or data loss.
upvoted 1 times
...
Swallows
8 months ago
Selected Answer: D
While the frequency of reviewing the information security policy (option B) is important for ensuring its relevance and alignment with evolving threats and organizational changes, it is secondary to the fundamental issue of having the policy approved by the appropriate authority (option D).
upvoted 1 times
...
a84n
10 months, 1 week ago
Selected Answer: D
Answer D it's important for the IS auditor to ensure that the information security policy has been approved by the appropriate senior management authority, whoever that may be in the organization.
upvoted 1 times
...
Eric0223
2 years, 1 month ago
i woudl take C if this role indeed existed in org. policy owners equals to CAE
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago