CISA Exam QuestionsBrowse all questions from this exam

CISA Exam - Question 58


An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be the GREATEST concern?

Show Answer
Correct Answer: D

When evaluating access controls for a shared customer relationship management (CRM) system, the greatest concern would be that the security baseline is not consistently applied. The security baseline encompasses a broad range of security controls and configurations that must be enforced to protect the system. Without it, the system may be vulnerable to numerous risks, including unauthorized access, data breaches, and other security incidents. While audit logging, single sign-on, and complex passwords are important, they are specific controls that fall under the broader category of a security baseline.

Discussion

12 comments
Sign in to comment
saado9
Mar 7, 2023

D. Security baseline is not consistently applied.

Peter_CISA
Mar 27, 2023

I think D includes A Does anyone have any great suggestions?

RachyOption: A
Jan 25, 2024

The greatest concern here is A, If audit login is not enabled , how are we going to trace and maintain customer management

Gingingin
Jun 29, 2023

I choose A instead of D. Since a "security baseline" is too general, not specify on any objectives.

meelaanOption: D
Sep 18, 2023

D includes A

choboanon
Sep 15, 2024

It includes A but D is too broad. The question is asking about access controls which you need an audit log for.

Delta67
Mar 19, 2023

A, it is important to have audit trail with regards to all customer interactions to maintain and address improve CR through CRM;customer relationship management

hoho
Jun 18, 2023

Agree on D, it should be more appropriate for CRM system

SwallowsOption: A
Apr 6, 2024

The biggest concern for IS auditors evaluating access controls in CRM systems is that audit logs are not valid.

5b56aaeOption: D
Apr 20, 2024

Security is the most important issue

a84nOption: A
Apr 25, 2024

Answer: A

Pumeza
Nov 6, 2024

A. Audit logging is not enabled.

JZ1710Option: A
Feb 27, 2025

Without logging, organizations cannot detect unauthorized access, insider threats, or security incidents.