Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?
What is the Most critical finding when reviewing an organization’s information security management?
Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
Which of the following BEST Indicates that an incident management process is effective?
Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
Which of the following concerns is BEST addressed by securing production source libraries?
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
In a RAO model, which of the following roles must be assigned to only one individual?
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
Which of the following is the MAIN purpose of an information security management system?
Capacity management enables organizations to:
Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
Which of the following business continuity activities prioritizes the recovery of critical functions?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?
Which of the following is MOST important to consider when scheduling follow-up audits?
An IS auditor is evaluating the risk associated with moving from one database management system (DBMS) to another. Which of the following would be MOST helpful to ensure the integrity of the system throughout the change?
In an online application, which of the following would provide the MOST information about the transaction audit trail?
Providing security certification for a new system should include which of the following prior to the system's implementation?
IT disaster recovery time objectives (RTOs) should be based on the:
Which of the following BEST enables the timely identification of risk exposure?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?
An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:
An IS auditor is reviewing security controls related to collaboration tools for a business unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?
Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
Which of the following is the MOST important activity in the data classification process?
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
While auditing a small organization's data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?
Which of the following is a detective control?
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
Which of the following findings from an IT governance review should be of GREATEST concern?
Which of the following are BEST suited for continuous auditing?
Which of the following metrics would BEST measure the agility of an organization's IT function?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?
Which of the following is the BEST reason for an organization to use clustering?
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following BEST facilitates the legal process in the event of an incident?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
Which of the following is MOST important when planning a network audit?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
The PRIMARY objective of value delivery in reference to IT governance is to:
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
An IS auditor assessing the controls within a newly implemented call center would First
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
Which of the following BEST describes an audit risk?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
Which of the following BEST helps to ensure data integrity across system interfaces?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?
What is the BEST control to address SQL injection vulnerabilities?
Which of the following should be done FIRST when planning a penetration test?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Cross-site scripting (XSS) attacks are BEST prevented through:
Which of the following is an audit reviewer's PRIMARY role with regard to evidence?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization's goals?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Which of the following BEST guards against the risk of attack by hackers?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
Which of the following is MOST important with regard to an application development acceptance test?
Which of the following is the MOST effective way for an organization to project against data loss?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
Which of the following would be a result of utilizing a top-down maturity model process?
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
Which of the following is a social engineering attack method?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
Which of the following is the BEST data integrity check?
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?
The implementation of an IT governance framework requires that the board of directors of an organization:
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?
Which of the following BEST indicates the effectiveness of an organization's risk management program?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
Which of the following demonstrates the use of data analytics for a loan origination process?
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
To confirm integrity for a hashed message, the receiver should use:
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
External audits have identified recurring exceptions in the user termination process, despite similar internal audits having reported no exceptions in the past. Which of the following is the IS auditor's BEST course of action to improve the internal audit process in the future?
When auditing the adequacy of a cooling system for a data center, which of the following is MOST important for the IS auditor to review?
Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?
Which of the following is MOST important for an IS auditor to assess during a post-implementation review of a newly modified IT application developed in-house?
Which of the following is an IS auditor's BEST recommendation for mitigating risk associated with inadvertent disclosure of sensitive information by employees?
The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:
Which of the following responses to risk associated with separation of duties would incur the LOWEST initial cost?
An IS auditor is reviewing desktop software profiles and notes that a user has downloaded and installed several games that are not approved by the company. Which of the following is the MOST significant risk that could result from this situation?
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following BEST enables an IS auditor to assess whether jobs were completed according to the job schedule?
Which of the following is the MOST appropriate responsibility of an IS auditor involved in a data center renovation project?
Which of the following is MOST important to the effectiveness of smoke detectors installed in a data processing facility?
An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor’s test data set to include?
Which of the following is MOST important when creating a forensic image of a hard drive?
Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?
Which of the following controls BEST provides confidentiality and nonrepudiation for an online business looking for digital payment data security?
When planning a review of IT governance, an IS auditor is MOST likely to:
Which of the following poses the GREATEST risk to the use of active RFID tags?
Which of the following is the MOST effective way to detect as many abnormalities as possible during an IS audit?
A global bank plans to use a cloud provider for backup of customer financial data. Which of the following should be the PRIMARY focus of this project?
How would an IS auditor BEST determine the effectiveness of a security awareness program?
In which phase of the audit life cycle process should an IS auditor initially discuss observations with management?
A web application is developed in-house by an organization. Which of the following would provide the BEST evidence to an IS auditor that the application is secure from external attack?
An IS auditor is reviewing a machine learning model that predicts the likelihood that a user will watch a certain movie. Which of the following would be of GREATEST concern to the auditor?
Which of the following BEST indicates that the effectiveness of an organization's security awareness program has improved?
Which of the following is MOST helpful for understanding an organization’s key driver to modernize application platforms?
Who is accountable for an organization's enterprise risk management (ERM) program?
Audit frameworks can assist the IS audit function by:
Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?
Which of the following observations regarding change management should be considered the MOST serious risk by an IS auditor?
Effective separation of duties in an online environment can BEST be achieved by utilizing:
A network analyst is monitoring the network after hours and detects activity that appears to be a brute-force attempt to compromise a critical server. After reviewing the alerts to ensure their accuracy, what should be done NEXT?
Which of the following is the MOST important course of action to ensure a cloud access security broker (CASB) effectively detects and responds to threats?
Which of the following is the MOST important consideration when implementing a Zero Trust strategy for mobile, wireless, and Internet of Things (IoT) devices?
An organization is establishing a steering committee for the implementation of a new enterprise resource planning (ERP) system that uses Agile project management methodology. What is the MOST important criterion for the makeup of this committee?
Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?
An organization is implementing a new system that supports a month-end business process. Which of the following implementation strategies would be MOST efficient to decrease business downtime?
Which of the following BEST indicates that an incident management process is effective?
Who is responsible for defining data access permissions?
Which of the following is the PRIMARY benefit of monitoring IT operational logs?
A small organization is experiencing rapid growth and plans to create a new information security policy. Which of the following is MOST relevant to creating the policy?
When reviewing whether IT investments are meeting business objectives, which of the following evaluations would be MOST useful?
How does a continuous integration/continuous development (CI/CD) process help to reduce software failure risk?
Which of the following is the MOST important consideration of any disaster response plan?
Which of the following BEST helps data loss prevention (DLP) tools detect movement of sensitive data m transit?
Which of the following issues identified during a formal review of an organization's information security policies presents the GREATEST potential risk to the organization?
Which of the following features would BEST address risk associated with data at rest when evaluating a data loss prevention (DLP) solution?
Which of the following is the BEST method for converting system-generated log files into a format suitable for data analysis?
An organization wants to use virtual desktops to deliver corporate applications to its end users. Which of the following should an IS auditor recommend to prevent domain name system (DNS) poisoning in their cloud environment?
Which of the following is the MOST effective control when granting access to a service provider for a ctoud-6ased application?
Which of the following presents the GREATEST risk associated with end-user computing (EUC) applica-tions over financial reporting?
During a follow-up engagement, an IS auditor confirms evidence of a problem that was not an issue in the original audit. Which of the following is the auditor's BEST course of action?
Which of the following BEST enables an IS auditor to confirm the batch processing to post transactions from an input source is successful?
When reviewing the disaster recovery strategy, IT management identified an application that requires a short recovery point objective (RPO). Which of the following data restoration strategies would BEST enable the organization to meet this objective?
During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor's BEST course of action?
Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?
Which of the following is found in an audit charter?
Which of the following audit procedures would provide the BEST assurance that an application program is functioning as designed?
Which of the following controls is MOST effective at preventing system failures when implementing a new web application?
Which of the following documents should define roles and responsibilities within an IT audit organization?
Which of the following BEST mitigates the risk associated with the deployment of a new production system?
Which of the following protocols should be used when transferring data via the internet?
Which of the following poses the GREATEST risk to an organization related to system interfaces?
Which of the following is a PRIMARY function of an intrusion detection system (IDS)?
Which of the following is the BEST way to ensure email confidentiality in transit?
An organization wants to classify database tables according to its data classification scheme From an IS auditor's perspective the tables should be classified based on the:
Which of the following should be the GREATEST concern for an IS auditor reviewing recent disaster recovery operations?
Which of the following is the MOST efficient control to reduce the risk associated with a systems administrator having network administrator responsibilities?
An organization has shifted from a bottom-up approach to a top-down approach in the development of IT policies. This should result in:
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
An organization is disposing of removable onsite media which contains sensitive information. Which of the following is the MOST effective method to prevent disclosure of sensitive data?
Which of the following should be the FIRST step in a data migration project?
When reviewing a business case for a proposed implementation of a third-party system, which of the following should be an IS auditor's GREATEST concern?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor's BEST course of action?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?
In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
Which type of attack targets security vulnerabilities in web applications to gain access to data sets?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?
Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?
Which of the following provides the BEST evidence of the validity and integrity of logs in an organization's security information and event management (SIEM) system?
Which of the following is the MOST important consideration for a contingency facility?
Which type of attack poses the GREATEST risk to an organization's most sensitive data?
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
Which of the following BEST contributes to the quality of an audit of a business-critical application?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?
Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?
Which of the following is the MOST significant risk when an application uses individual end-user accounts to access the underlying database?
Which of the following should an IS auditor use when verifying a three-way match has occurred in an enterprise resource planning (ERR) system?
An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?
To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?
A bank wants to outsource a system to a cloud provider residing in another country. Which of the following would be the MOST appropriate IS audit recommendation?
IT governance should be driven by:
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
When planning a follow-up, the IS auditor is informed by operational management that recent organizational changes have addressed the previously identified risk and implementing the action plan is no longer necessary. What should the auditor do NEXT?
The PRIMARY purpose of an incident response plan is to:
An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?
Which of the following is the PRIMARY basis on which audit objectives are established?
An IS auditor learns that an organization's business continuity plan (BCP) has not been updated in the last 18 months and that the organization recently closed a production plant. Which of the following is the auditor's BEST course of action?
Which of the following should be done FIRST to minimize the risk of unstructured data?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality
within the organization. Which of the following should be recommended as the PRIMARY factor to
determine system criticality?
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?
The BEST way to provide assurance that a project is adhering to the project plan is to:
Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
The PRIMARY objective of a control self-assessment (CSA) is to:
Which of the following is the MOST important control for virtualized environments?
Which of the following is the BEST reason to implement a data retention policy?
A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?
An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?
An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?
A global organization's policy states that all workstations must be scanned for malware each day. Which of the following would provide an IS auditor with the BEST evidence of continuous compliance with this policy?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?
A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization's goals and strategic objectives?
An IS auditor reviewing a job scheduling tool notices performance and reliability problems. Which of the following is MOST likely affecting the tool?
An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?
Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:
An IS auditor is verifying the adequacy of an organization's internal controls and is concerned about potential circumvention of regulations. Which of the following is the BEST sampling method to use?
Which of the following is the MOST effective control over visitor access to highly secured areas?
The following findings are the result of an IS auditor's post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?
What is the FIRST step when creating a data classification program?
Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?
Which of the following is MOST helpful for an IS auditor to review when evaluating an organizations business process that are supported by applications and IT systems?
An organization's IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
Which of the following would minimize the risk of losing transactions as a result of a disaster?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?
An IS auditor is reviewing a data conversion project Which of the following is the auditor's BEST recommendation prior to go-live?
Which of the following is an IS auditor's BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?
Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?
An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor's NEXT action1?
An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS
Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program'?
An IS auditor Is renewing the deployment of a new automated system Which of the following findings presents the MOST significant risk?
Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?
A web proxy server for corporate connections to external resources reduces organizational risk by:
Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?
Capacity management tools are PRIMARILY used to ensure that:
A database administrator (DBA) should be prevented from having end user responsibilities:
Which of the following should be an IS auditor's PRIMARY focus when evaluating the response process for cybercrimes?
Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves
for care?
Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?
An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:
An organization's IT risk assessment should include the identification of:
Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?
Which of the following analytical methods would be MOST useful when trying to identify groups with similar behavior or characteristics in a large population?
Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
A computer forensic audit is MOST relevant in which of the following situations?
Which of the following is the MOST appropriate indicator of change management effectiveness?
Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?
Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Which of the following is MOST effective for controlling visitor access to a data center?
Which of the following provides the BEST evidence that a third-party service provider's information security controls
are effective?
The FIRST step in auditing a data communication system is to determine:
A finance department has a multi-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger. and in year one, the system version upgrade will be applied. Which of the following should be the PRIMARY focus of the IS auditor reviewing the first year of the project?
Which of the following methods will BEST reduce the risk associated with the transition to a new system using technologies that are not compatible with the old system?
Which of the following is the MOST important responsibility of user departments associated with program changes?
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''
Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?
Which of the following would be the BEST criteria for monitoring an IT vendor's service levels?
Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?
Controls related to authorized modifications to production programs are BEST tested by:
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?
Which of the following provides the MOST assurance of the integrity of a firewall log?
Which of the following provides a new IS auditor with the MOST useful information to evaluate overall IT performance?
In the development of a new financial application, the IS auditor's FIRST involvement should be in the:
Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization's configuration and release management process?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following is the BEST testing approach to facilitate rapid identification of application interface errors?
Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?
During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?
Which of the following would BEST help to ensure that an incident receives attention from appropriate personnel in a timely manner?
Which of the following can only be provided by asymmetric encryption?
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?
Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?
Management has learned the implementation of a new IT system will not be completed on time and has requested an audit. Which of the following audit findings should be of GREATEST concern?
Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?
Which of the following concerns is MOST effectively addressed by implementing an IT framework for alignment between IT and business objectives?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
What is the MOST effective way to detect installation of unauthorized software packages by employees?
Which of the following provides the BEST assurance of data integrity after file transfers?
When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?
Which of the following is the BEST way to detect unauthorized copies of licensed software on systems?