Try 10 focused Certified Public Accountant Information Systems and Controls (CPA ISC) questions on access, safeguards, privacy, confidentiality, incident response, and control objectives.
CPA means Certified Public Accountant. ISC means Information Systems and Controls. Use this focused page when your CPA ISC misses are about access, safeguards, confidentiality, privacy, incident response, vendor risk, or control objectives. Drill this topic before returning to mixed practice.
| Field | Detail |
|---|---|
| Exam route | CPA ISC |
| Issuer | American Institute of Certified Public Accountants (AICPA) |
| Topic area | Security, Confidentiality and Privacy |
| Blueprint weight | 40% |
| Page purpose | Control-objective practice for access, safeguards, confidentiality, privacy, incident response, and vendor risk |
This topic tests whether you can match risks to safeguards across security, confidentiality, and privacy objectives. Strong answers distinguish access control, encryption, monitoring, incident response, vendor risk, data retention, and privacy obligations.
Name the objective first: security, confidentiality, privacy, availability, processing integrity, or compliance. Then choose the control type that addresses the failure mode. The strongest answer will usually state both the risk and the control response.
Use this page to isolate Security, Confidentiality and Privacy for CPA ISC. Work through the 10 questions first, then review the explanations and return to mixed practice in Mastery Exam Prep.
| Pass | What to do | What to record |
|---|---|---|
| First attempt | Answer without checking the explanation first. | The fact, rule, calculation, or judgment point that controlled your answer. |
| Review | Read the explanation even when you were correct. | Why the best answer is stronger than the closest distractor. |
| Repair | Repeat only missed or uncertain items after a short break. | The pattern behind misses, not the answer letter. |
| Transfer | Return to mixed practice once the topic feels stable. | Whether the same skill holds up when the topic is no longer obvious. |
Blueprint context: 40% of the practice outline. A focused topic score can overstate readiness if you recognize the pattern too quickly, so use it as repair work before timed mixed sets.
These questions are original Mastery Exam Prep practice items aligned to this topic area. They are designed for self-assessment and are not official exam questions.
Topic: Security, Confidentiality and Privacy
A CPA is reviewing an alert from the user-access process for a terminated employee.
Based on these facts, what should be done next?
Best answer: C
What this tests: Security, Confidentiality and Privacy
Explanation: The access-removal control failed because the terminated employee’s accounts remained enabled beyond the required window. Since logs show no post-termination use and no data exposure, this is best classified as a control exception rather than a security incident or data breach. The next step is to assess whether the control failure affected other recent terminations.
Classification should follow the facts shown. An event is an observable occurrence, an incident involves actual or suspected compromise, a data breach involves unauthorized acquisition or disclosure of protected data, a control exception exists when a control does not operate as designed, and an operational issue affects processing or service without necessarily indicating control failure. Here, the key fact is that access was not removed within the policy’s 4-hour requirement. That means the deprovisioning control did not operate effectively. However, there were no logins, no data access, and no indication of disclosure, so the facts do not currently support classifying the matter as a security incident or data breach. The appropriate next step is to treat it as a control exception, remediate it, and determine whether similar exceptions occurred for other terminated users.
The deprovisioning control failed its required timing, but there is no evidence of unauthorized use or disclosure.
Topic: Security, Confidentiality and Privacy
During a walkthrough of an online retailer’s payment process, a CPA learns the following:\n- The checkout page is hosted by a third-party payment processor.\n- Customer service representatives can view only the last four digits of the card number in the order system.\n- A nightly exception log on the retailer’s server stores full primary account numbers (PANs) for declined transactions for 30 days.\n- Management says, “The processor is PCI compliant, so we do not have PCI DSS responsibilities."\n\nWhat should the CPA recommend be done next?
Best answer: D
What this tests: Security, Confidentiality and Privacy
Explanation: The retailer may still be in PCI DSS scope because its own server stores full PANs in exception logs. The next step is to identify and document where cardholder data exists in the merchant environment so responsibilities and needed controls can be evaluated.
PCI DSS applies when an entity stores, processes, or transmits cardholder data. Using a third-party processor for checkout can reduce scope, but it does not automatically eliminate the merchant’s responsibilities. Here, the key fact is that the retailer’s own server retains full PANs in nightly exception logs, which means cardholder data may still exist within the merchant environment. The proper next step is to map data flows and storage locations, confirm what payment-card data elements are retained, and determine the resulting PCI DSS scope. After scope is understood, the CPA can evaluate whether controls over retention, masking, encryption, restricted access, and monitoring are appropriate and whether the processor’s compliance documentation is relevant to the remaining merchant responsibilities.
PCI DSS scope depends on whether the merchant environment stores, processes, or transmits cardholder data, so the full PANs in the exception logs must be evaluated first.
Topic: Security, Confidentiality and Privacy
An online retailer detects 4,000 login attempts in one hour against its customer portal. Each attempt uses a different email address and password pair copied from a credential dump from an unrelated website. Accounts are compromised only when customers reused the same credentials on the retailer’s site. Which attack classification is most directly supported by these facts?
Best answer: C
What this tests: Security, Confidentiality and Privacy
Explanation: The incident describes attackers trying many stolen username-password combinations from another breach against a different site. That pattern is credential stuffing because success depends on users reusing the same credentials across systems.
Credential stuffing occurs when an attacker takes known username-password pairs, usually obtained from another data breach, and tests them on a different system. The key indicator is that the attacker is not guessing passwords from scratch; instead, the attacker is automating login attempts with previously exposed credentials and relying on password reuse. In this scenario, each attempt uses a different email and password pair from an unrelated breach dump, and compromises occur only when customers reused those exact credentials on the retailer’s portal. That is the defining fact pattern for credential stuffing. The classification is based on the source and pattern of the credentials being used, not merely on the high volume of login failures.
Using previously breached username-password pairs on a different site to exploit password reuse is credential stuffing.
Topic: Security, Confidentiality and Privacy
A CPA is evaluating security controls over a cloud-based cash disbursements system. The exhibit summarizes three controls currently in place.
| Control | Operation |
|---|---|
| MFA login | Users must complete multifactor authentication before they can sign in to the application. |
| Privileged-access monitoring | The security information and event management (SIEM) tool generates an alert to the security team whenever a user is added to the Payment Approver role. |
| Malware recovery | If malware is confirmed on a laptop used by a payment approver, IT reimages the device from a clean baseline and restores files from backup. |
Which conclusion is best supported by the exhibit?
Best answer: C
What this tests: Security, Confidentiality and Privacy
Explanation: The classifications depend on when the control acts and what it is designed to do. MFA acts before access is granted, so it is preventive; the SIEM alert identifies a potentially improper event, so it is detective; and reimaging plus backup restoration repairs the environment after malware is found, so it is corrective.
Preventive controls are designed to stop or reduce the likelihood of an unwanted event before it happens. Detective controls identify that an event or condition has occurred. Corrective controls respond after a problem is detected to contain damage, restore systems, or return data to a reliable state. In this scenario, multifactor authentication is a gate that must be satisfied before sign-in, so it is preventive. The SIEM alert does not block the privileged-role assignment; it notifies security that the event occurred, which makes it detective. Reimaging an infected device and restoring files from backup happen after malware is confirmed and are intended to recover operations, so they are corrective.
MFA blocks unauthorized access before entry, the SIEM alert identifies a role change after it occurs, and reimaging plus restoration remediates damage after an incident.
Topic: Security, Confidentiality and Privacy
A CPA is testing the incident response process for high-severity cybersecurity incidents.
Policy excerpt:
| Requirement | Standard |
|---|---|
| Escalation | Suspected unauthorized access involving confidential customer data must be escalated to the incident response manager within 1 hour of detection. |
| Containment | Containment must begin within 2 hours after escalation. |
| Communication | Legal/compliance must be notified when customer data may be affected. |
| Post-incident review | An after-action review must be completed within 5 business days after ticket closure. |
Evidence for Incident 24-017:
| Event | Date/Time |
|---|---|
| SIEM alert for bulk download of customer SSNs using a terminated employee’s credentials from a foreign IP | 4/3 08:05 |
| Analyst opened ticket and marked incident high severity | 4/3 08:20 |
| Incident response manager notified | 4/3 11:10 |
| Account disabled and active sessions terminated | 4/3 11:35 |
| Legal/compliance notified | 4/3 11:50 |
| Excess privileges removed and credentials rotated | 4/4 09:00 |
| Ticket closed | 4/18 16:00 |
| As of 4/30, no after-action review notes or action items are attached | — |
Which corrective action is the best response to the incident response deficiency evidenced here?
Best answer: C
What this tests: Security, Confidentiality and Privacy
Explanation: The incident was identified and documented quickly, and containment, communication, and remediation were recorded. However, escalation to the incident response manager missed the one-hour requirement, and no post-incident review was documented within the required timeframe. The best fix is to strengthen workflow controls around those two gaps.
When testing incident response, the question is not just whether actions occurred, but whether evidence shows they occurred on time and in accordance with policy. Here, the SIEM alert at 08:05 and high-severity ticket at 08:20 support timely identification. Containment at 11:35, legal/compliance notification at 11:50, and remediation on 4/4 show those stages were performed and documented. But the incident response manager was not notified until 11:10, which exceeds the one-hour escalation requirement measured from detection. Also, the ticket was closed on 4/18 and still had no after-action review by 4/30, so the post-incident review control failed. The best remediation is a ticketing workflow with SLA-based escalation monitoring and required, time-stamped after-action review completion within the policy window.
It directly addresses the unsupported one-hour escalation and the missing post-incident review evidenced in the incident record.
Topic: Security, Confidentiality and Privacy
A CPA is performing a walkthrough of an entity’s emergency privileged-access process.
Documented policy:
Observed walkthrough:
Which correction best aligns the observed process with the documented policy requirements?
Best answer: D
What this tests: Security, Confidentiality and Privacy
Explanation: The walkthrough shows the live process does not match policy in three places: approval timing, MFA timing, and access expiration. The best correction is to enforce those requirements within the access workflow so the process cannot bypass policy.
A walkthrough compares documented requirements with what actually happens in practice. Here, the observed procedure failed the policy because privileged access was granted before approval, used before MFA was enabled, and left active far beyond the 8-hour limit. The strongest remediation is a preventive control built into the provisioning or privileged-access workflow: no activation without an approved ticket, no first use without MFA, and automatic expiration after the authorized period. That directly aligns operations with policy and reduces reliance on manual follow-up. Detective reviews or extra notifications may provide oversight, but they do not correct the real-time control failure observed during the walkthrough.
This remediation directly fixes all observed deviations from policy by making approval, MFA, and timely removal preventive system requirements.
Topic: Security, Confidentiality and Privacy
A company’s data-handling standard and an incident ticket state:
Data-handling standard excerpt
Incident ticket
What is the best correction to the incident manager’s response?
Best answer: A
What this tests: Security, Confidentiality and Privacy
Explanation: The source excerpt controls the answer. The exposed files contain confidential data only, so this should be handled as a confidentiality/security incident unless later investigation finds the policy-defined personal information that would trigger the privacy workflow.
This item tests application of the provided source material, not broad recall that “customer data” always means a privacy breach. The company’s own standard defines personal information narrowly: a name paired with a specified sensitive element such as SSN, full financial account number, or similar data. The incident involved email addresses, customer IDs, masked account numbers, invoice amounts, and contract terms, and the stem states that no names or other listed personal-information elements were present. That means the current facts support a confidentiality incident because unauthorized disclosure occurred, but they do not yet meet the policy trigger for privacy officer notification. The proper correction is to reclassify the response accordingly while continuing containment, investigation, and evidence gathering.
The standard makes the decisive distinction: the exposed files contain confidential data, not the policy-defined personal information that triggers the privacy breach workflow.
Topic: Security, Confidentiality and Privacy
A company uses a role-based purchasing application. Buyers are authorized to create purchase orders, but only purchasing managers are authorized to approve them. During access testing, the CPA finds that the application’s access control list grants the “Approve PO” permission to the entire Purchasing group, which includes buyers. What is the best correction?
Best answer: A
What this tests: Security, Confidentiality and Privacy
Explanation: The issue is improper authorization, not weak authentication or physical access. The best fix is to change the application’s ACL so the approval function is assigned only to the purchasing manager role, consistent with least privilege.
Authorization controls determine what an authenticated user is allowed to do. In a role-based access model, permissions should be assigned to roles that match job responsibilities and enforced through an access control list or similar permission structure. Here, buyers should create purchase orders, while purchasing managers should approve them. Because the ACL gives approval rights to the broader Purchasing group, buyers have excessive privileges. The correct remediation is to revise the ACL so only the purchasing manager role can use the approval function. Restricting login hours is an account restriction that may reduce exposure but does not remove the improper approval right. Badge access is a physical barrier, and multifactor authentication strengthens identity verification, but neither corrects the application’s authorization design error.
The weakness is an overly broad authorization rule, so the ACL should be limited to the role that is actually authorized to approve purchase orders.
Topic: Security, Confidentiality and Privacy
An accounts payable employee reports that her workstation suddenly began opening command windows, making repeated outbound connections to an unfamiliar IP address, and attempting to modify files on a shared drive. The security team confirms the activity started 5 minutes ago and is currently limited to that workstation. What should the company do next to best mitigate the current risk?
Best answer: C
What this tests: Security, Confidentiality and Privacy
Explanation: The workstation is showing active malicious behavior, so the first priority is containment. Quarantining the device immediately reduces the chance of lateral movement or further damage, while log review, patching, and segmentation are more appropriate after the immediate threat is contained.
When a single device is actively compromised, quarantine is the best immediate corrective action. Isolating the affected workstation from the network can stop continued communication with malicious external hosts and reduce the risk of spreading to shared drives or other internal systems. Log analysis is useful for understanding scope and timeline, but it does not itself contain the attack. Patching is a preventive measure that helps close vulnerabilities for future protection, yet it does not stop a device already exhibiting malicious behavior. Segmentation is also a preventive architecture control that can limit future lateral movement, but it is not the fastest next step for a known infected endpoint. Given these facts, immediate quarantine best mitigates the current risk.
Immediate quarantine is the fastest way to contain an active compromise and prevent further spread or file modification.
Topic: Security, Confidentiality and Privacy
A CPA reviewing confidentiality controls over vendor ACH payments obtains the following:
How should this inconsistency be characterized?
Best answer: A
What this tests: Security, Confidentiality and Privacy
Explanation: The best conclusion is an operating deviation from the stated confidentiality procedure. The source material requires in-application review and prohibits exports, but the observed process routinely exports full bank data to a broader-access shared folder. That means the control is not operating as described.
When source materials conflict with observed procedures, the observed procedure is stronger evidence of how the control actually operates. Here, the documented confidentiality procedure is clear: full account data must stay within the encrypted treasury application, and exception review must occur there without exporting full numbers. The walkthrough shows staff bypassing that process for convenience and placing sensitive data in a shared folder with broader access. That is best characterized as an operating deviation affecting confidentiality. It is not primarily a design deficiency, because the documented design already addresses the risk. It is also not a confirmed security incident, because the facts do not show unauthorized access, misuse, or disclosure beyond the treasury group. The issue is excess exposure of sensitive data through noncompliance with the stated procedure.
The written procedure addresses the risk, but the observed daily export to a broader-access shared folder shows the confidentiality control is not operating as described.
Use the CPA ISC Practice Test page for the full practice route, mixed-topic practice, timed mock exams, and explanations.
Read the CPA ISC guide on CPAExamsMastery.com, then return to Mastery Exam Prep for timed practice.