exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 64 discussion

Actual exam question from Isaca's CISA
Question #: 64
Topic #: 1
[All CISA Questions]

An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial draft of the audit report. Which of the following findings should be ranked as the HIGHEST risk?

  • A. Network penetration tests are not performed.
  • B. The network firewall policy has not been approved by the information security officer.
  • C. Network firewall rules have not been documented.
  • D. The network device inventory is incomplete.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
dan08
Highly Voted 10 months, 1 week ago
Selected Answer: D
An incomplete inventory hampers visibility and management. It can lead to unpatched devices, unauthorized access, and security blind spots. Remember that risk assessment considers both likelihood and impact. In this case, the incomplete inventory poses immediate operational and security risks.
upvoted 6 times
...
Rachy
Highly Voted 11 months, 4 weeks ago
Selected Answer: D
D is the accurate answer. Without a complete inventory of the network in an enterprise, you won’t be able to assess the risk. This is the highest risk then the B comes
upvoted 5 times
...
Greens
Most Recent 1 week, 2 days ago
Selected Answer: A
A. Network penetration tests are not performed – This poses the highest risk because penetration testing is a critical control for identifying exploitable vulnerabilities in a live network environment. Without it, the organization may be unaware of serious security flaws that could lead to unauthorized access, data breaches, or service disruption. This represents a direct threat to the organization's security posture. Comparisons: B. Firewall policy not approved by the information security officer – This is a governance/control issue, but it doesn't directly expose the network to threats like missing penetration tests do. C. Firewall rules not documented – This weakens change management and troubleshooting, but again, it is less risky than not actively testing for vulnerabilities. D. Incomplete network device inventory – Important for security and asset management, but this is a supporting control. The lack of penetration testing has a more immediate and severe impact on risk exposure.
upvoted 1 times
...
52cb16c
3 weeks, 3 days ago
Selected Answer: A
D is more of an operational risk than a short-term/immediate security threat Most risk is the A
upvoted 1 times
...
cisastudy567
3 months, 3 weeks ago
Selected Answer: D
The network device inventory is incomplete. Is a shadow IT.
upvoted 1 times
...
SayakSib
4 months, 1 week ago
Selected Answer: A
D. The network device inventory is incomplete is a concern, it is not as critical as the absence of penetration testing for the following reasons: A (No Network Penetration Tests): This is a direct security control failure, leaving the organization blind to vulnerabilities that attackers could exploit. Without penetration testing, serious issues like open ports, weak passwords, and unpatched systems may go undetected. Penetration testing actively validates the security posture, which is crucial for identifying real-world attack vectors. D (Incomplete Network Device Inventory): This is a secondary control failure, affecting asset management and risk visibility. While important, an inventory issue is less immediately exploitable than untested security vulnerabilities. Penetration testing can still uncover vulnerable devices, even if the inventory is incomplete.
upvoted 1 times
...
1Naa
6 months, 1 week ago
Selected Answer: B
The absence of a properly approved network firewall policy poses a significant risk because it indicates a lack of formal oversight, accountability, and governance. An unapproved policy may result in misconfigurations or improper firewall rules, which can compromise the entire security infrastructure, allowing potential attackers to exploit vulnerabilities and gain unauthorized access.
upvoted 1 times
...
a84n
8 months ago
Selected Answer: C
Answer: C While the other findings (network penetration tests not performed, firewall policy not approved by the information security officer, incomplete network device inventory) also represent potential risks to network security, the absence of documented firewall rules is particularly concerning due to its direct impact on the configuration and management of network security controls. Therefore, it should be ranked as the highest risk in the audit report.
upvoted 1 times
...
5b56aae
8 months, 1 week ago
Selected Answer: A
I'd pick A
upvoted 1 times
...
Swallows
8 months, 3 weeks ago
Selected Answer: A
The highest risk of a security attack on an organization is failure to conduct penetration testing.
upvoted 1 times
...
Tef_corp
9 months ago
By not performing penetration tests, the organization is leaving itself blind to potential security weaknesses that could be exploited by malicious actors. This represents a significant risk to the confidentiality, integrity, and availability of sensitive data.
upvoted 2 times
...
zzh52est
10 months ago
Selected Answer: A
this is immediate risk
upvoted 3 times
...
necoll007
1 year, 5 months ago
The perfect answer would have be B(approval by an info sec officer) but looking at the context of the question “fieldwork phase” has been completed, I think D would be a better option
upvoted 2 times
...
CISAGuate22
1 year, 6 months ago
B. The network firewall policy has not been approved by the information security officer. The fact that the network's firewall policy has not been approved by the information security officer indicates a lack of control and governance over the network's security settings. This can result in greater vulnerability to attacks and a greater likelihood of security breaches. The lack of approval of the firewall policy can indicate that the security rules have not been established properly and the established security standards are not being followed. This represents a significant risk to the integrity and confidentiality of network data. It is important to note that the risk classification may vary depending on the context and the specific circumstances of the audited organization. Therefore, it is recommended that the IS auditor perform a full evaluation of the findings and consider other relevant factors before finalizing the highest risk classification.
upvoted 2 times
...
TTH1019
1 year, 6 months ago
Selected Answer: B
The approval of the network firewall policy by the information security officer is crucial for ensuring that the organization's network security measures align with established standards, guidelines, and best practices. Without the approval of the information security officer, there is a higher risk of inadequate or ineffective firewall configurations, which can leave the network vulnerable to unauthorized access and potential security breaches.
upvoted 3 times
...
chun2k23
1 year, 7 months ago
Selected Answer: B
I think B is the right answer. what is the meaning of inventory of D?? firewall H/W, S/W
upvoted 2 times
...
007Georgeo
1 year, 7 months ago
Selected Answer: D
The answer is correct , the first is The network device inventory....without complete inventory we can't asses the risk
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...