An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
Which of the following is the BEST data integrity check?
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
Which of the following should be done FIRST when planning a penetration test?
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
Which of the following is a social engineering attack method?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
To confirm integrity for a hashed message, the receiver should use:
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
Which of the following data would be used when performing a business impact analysis (BIA)?
An IT balanced scorecard is the MOST effective means of monitoring:
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
Secure code reviews as part of a continuous deployment program are which type of control?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
An organizations audit charier PRIMARILY:
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
Coding standards provide which of the following?
The decision to accept an IT control risk related to data quality should be the responsibility of the:
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
Which of the following is the MOST effective way for an organization to project against data loss?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
Which of the following BEST indicates the effectiveness of an organization's risk management program?
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
Which of the following is an audit reviewer's PRIMARY role with regard to evidence?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:
In reviewing the IT strategic plan, the IS auditor should consider whether it identifies the:
Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?
Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?
An organization has both an IT strategy committee and an IT steering committee. When reviewing the minutes of the IT steering committee, an IS auditor would expect to find that the
committee:
Which of the following would be an IS auditor's BEST recommendation to senior management when several IT initiatives are found to be misaligned with the organization's strategy?
Which of the following is MOST important when defining the IS audit scope?
To help determine whether a controls-reliant approach to auditing financial systems in a company should be used, which sequence of IS audit work is MOST appropriate?
An IS auditor is reviewing an artificial intelligence (Al) and expert system application. The system has produced several critical errors with severe impact. Which of the following should the IS auditor do NEXT to understand the cause of the errors?
Which of the following is the MOST effective way to evaluate the physical security of a data center?
Which of the following network communication protocols is used by network devices such as routers to send error messages and operational information indicating success or failure when communicating with another IP address?
Which of the following is MOST important when creating a forensic image of a hard drive?
Which of the following BEST enables an IS auditor to prioritize financial reporting spreadsheets for an end-user computing (EUC) audit?
An IS auditor finds that a recently deployed application has a number of developers with inappropriate update access left over from the testing environment. Which of the following would have BEST prevented the update access from being migrated?
What should be the PRIMARY focus during a review of a business process improvement project?
Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?
Audit frameworks can assist the IS audit function by:
Which of the following would be an IS auditor's BEST recommendation to senior management when several IT initiatives are found to be misaligned with the organization's strategy?
During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor's BEST course of action?
What is the PRIMARY reason to adopt a risk-based IS audit strategy?
Which of the following is MOST helpful for evaluating benefits realized by IT projects?
A small organization is experiencing rapid growth and plans to create a new information security policy. Which of the following is MOST relevant to creating the policy?
During an information security review, an IS auditor learns an organizational policy requires all employ-ees to attend information security training during the first week of each new year. What is
the auditor's BEST recommendation to ensure employees hired after January receive adequate guid-ance regarding security awareness?
Which of the following is the BEST way to foster continuous improvement of IS audit processes and practices?
Which of the following would BEST prevent an arbitrary application of a patch?
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
An organization requires the use of a key card to enter its data center. Recently, a control was implemented that requires biometric authentication for each employee.
Which type of control has been added?
An IS auditor learns that a business owner violated the organization's security policy by creating a web page with access to production data. The auditor's NEXT step should be to:
During which phase of the software development life cycle should an IS auditor be consulted to recommend security controls?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's incident response management program?
Which of the following is the PRIMARY objective of enterprise architecture (EA)?
A new regulation has been enacted that mandates specific information security practices for the protection of customer data. Which of the following is MOST useful for an IS auditor to review when auditing against the regulation?
Which of the following applications has the MOST inherent risk and should be prioritized during audit planning?
An IS auditor noted a recent production incident in which a teller transaction system incorrectly charged fees to customers due to a defect from a recent release. Which of the following should be the auditor's NEXT step?
Which of the following controls is BEST implemented through system configuration?
Network user accounts for temporary workers expire after 90 days.
Application user access is reviewed every 180 days for appropriateness.
Financial data in key reports is traced to source systems for completeness and accuracy.
An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?
Which of the following criteria is MOST important for the successful delivery of benefits from an IT project?
While reviewing the effectiveness of an incident response program, an IS auditor notices a high number of reported incidents involving malware originating from removable media found by employees. Which of the following is the MOST appropriate recommendation to management?
In an annual audit cycle, the audit of an organization's IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
Which of the following BEST indicates that the effectiveness of an organization's security awareness program has improved?
In a review of the organization standards and guidelines for IT management, which of the following should be included in an IS development methodology?
Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?
Which of the following tasks would cause the GREATEST segregation of duties (SoD) concern if performed by the person who reconciles the organization's device inventory?
Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?
A steering committee established to oversee an organization's digital transformation program is MOSTlikely to be involved with which of the following activities?
At the end of each business day, a business-critical application generates a report of financial transac-tions greater than a certain value, and an employee
then checks these transactions for errors. What type of control is in place?
Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?
Following a merger, a review of an international organization determines the IT steering committee's decisions do not extend to regional offices as required in the consolidated IT operating model. Which of the following is the IS auditor's BEST recommendation?
An organization's information security policies should be developed PRIMARILY on the basis of:
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
In order for a firewall to effectively protect a network against external attacks, what fundamental practice must be followed?
Which of the following is the PRIMARY reason to involve IS auditors in the software acquisition process?
An IS auditor finds a user account where privileged access is not appropriate for the user’s role. Which of the following would provide the BEST evidence to determine whether the risk of this access has been exploited?
A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:
Which of the following is MOST important to the effectiveness of smoke detectors installed in a data processing facility?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
A mission-critical application utilizes a one-node database server. On multiple occasions, the database service has been stopped to perform routine patching, causing application outages. Which of the following should be the IS auditor’s GREATEST concern?
Which of the following cloud capabilities BEST enables an organization to meet unexpectedly high service demand?
An organization is establishing a steering committee for the implementation of a new enterprise resource planning (ERP) system that uses Agile project management methodology. What is the MOST important criterion for the makeup of this committee?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?
Which of the following is the BEST indication to an IS auditor that management's post-implementation review was effective?
When is it MOST important for an IS auditor to apply the concept of materiality in an audit?
An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application's operating system?
Which of the following is MOST helpful to an IS auditor when assessing the effectiveness of controls?
Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization's information cannot be accessed?
Which of the following is the BEST way to minimize sampling risk?
Which of the following provides the BEST assurance of data integrity after file transfers?
A computer forensic audit is MOST relevant in which of the following situations?
A firewall between internal network segments improves security and reduces risk by:
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?
Controls related to authorized modifications to production programs are BEST tested by:
Which of the following are used in a firewall to protect the entity's internal resources?
An IS auditor conducts a review of a third-party vendor's reporting of key performance indicators (KPIs) Which of the following findings should be of MOST concern to the auditor?
Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?
Which of the following should be of GREATEST concern to an IS auditor when auditing an organization's IT strategy development process?
An IS auditor is reviewing a data conversion project Which of the following is the auditor's BEST recommendation prior to go-live?
Which of the following concerns is MOST effectively addressed by implementing an IT framework for alignment between IT and business objectives?
When assessing the overall effectiveness of an organization's disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?
An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?
In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?
Which of the following is the MOST appropriate control to ensure integrity of online orders?
An IS auditor is reviewing a bank's service level agreement (SLA) with a third-party provider that hosts the bank's secondary data center, which of the following findings should be of GREATEST concern to the auditor?
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?
Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?
Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program'?
What would be an IS auditor's BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?
During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?
A characteristic of a digital signature is that it
Which of the following is the BEST indication of effective IT investment management?
Which of the following analytical methods would be MOST useful when trying to identify groups with similar behavior or characteristics in a large population?
The PRIMARY purpose of a configuration management system is to:
Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?
The use of which of the following is an inherent risk in the application container infrastructure?
An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?
Which of the following would protect the confidentiality of information sent in email messages?
A checksum is classified as which type of control?
During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor's BEST course of action?
A new system development project is running late against a critical implementation deadline Which of the following is the MOST important activity?
The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?
An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country.
What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted
application?
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization's objectives?
What is the PRIMARY purpose of performing a parallel run of a now system?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?
Which of the following should be the FIRST step when conducting an IT risk assessment?
When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider’s external audit report on service level management when the
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
Which of the following is the BEST approach for determining the overall IT risk appetite of an organization when business units use different methods for managing IT risks?
Which of the following is MOST important to consider when reviewing an organization's defined data backup and restoration procedures?
Which of the following is the BEST indicator for measuring performance of IT help desk function?
Which of the following is the MOST important responsibility of user departments associated with program changes?
What is the PRIMARY benefit of using one-time passwords?
Which of the following is the MOST appropriate indicator of change management effectiveness?
An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?
A disaster recovery plan (DRP) should include steps for:
Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
Which of the following concerns is BEST addressed by securing production source libraries?
Which of the following BEST Indicates that an incident management process is effective?
Upon completion of audit work, an IS auditor should:
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
Stress testing should ideally be earned out under a:
Which of the following business continuity activities prioritizes the recovery of critical functions?
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
Which of the following is the BEST reason for an organization to use clustering?
Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?
During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
Which of the following findings from an IT governance review should be of GREATEST concern?
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
Which of the following occurs during the issues management process for a system development project?
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
Which of the following is the MAIN purpose of an information security management system?
An information systems security officer's PRIMARY responsibility for business process applications is to:
Which of the following represents the HIGHEST level of maturity of an information security program?
IT disaster recovery time objectives (RTOs) should be based on the:
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
Which of the following is a social engineering attack method?
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?
Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?
Which of the following security risks can be reduced by a property configured network firewall?
Which of the following BEST enables the timely identification of risk exposure?
An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?
Which of the following is MOST important to consider when scheduling follow-up audits?
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
An IS auditor is reviewing security controls related to collaboration tools for a business unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?
What is the MAIN reason to use incremental backups?
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
Which of the following BEST facilitates strategic program management?
Which of the following is the MOST important consideration for a contingency facility?
Which of the following is the MOST effective control over visitor access to highly secured areas?
Which of the following is the MOST important advantage of participating in beta testing of software products?
What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?
A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?
Which of the following is MOST important to ensure when developing an effective security awareness program?
Which of the following is MOST important to include in security awareness training?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor's NEXT course of action?
Which of the following is the BEST point in time to conduct a post-implementation review?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?
Which of the following is the BEST sampling method to use when relatively few errors are expected to be found in a population?
Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization's disaster recovery plan (DRP)?
Which of the following would be an IS auditor's GREATEST concern when reviewing the organization's business continuity plan (BCP)?
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
An organization has shifted from a bottom-up approach to a top-down approach in the development of IT policies. This should result in:
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization's payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management
experience. What is the BEST course of action?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
Which of the following BEST supports the effectiveness of a compliance program?
Which of the following is an example of a preventive control for physical access?
An organization has an acceptable use policy in place, but users do not formally acknowledge the policy. Which of the following is the MOST significant risk from this finding?
During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?
Which of the following is MOST useful when planning to audit an organization's compliance with cybersecurity regulations in foreign countries?
Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?
Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data
classification in this project?
Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization's patch management process?
The record-locking option of a database management system (DBMS) serves to.
Which of the following is MOST critical to the success of an information security program?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?
An IS auditor reviewing a job scheduling tool notices performance and reliability problems. Which of the following is MOST likely affecting the tool?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change
management process?
During the review of a system disruption incident, an IS auditor notes that IT support staff were put in a position to make decisions beyond their level of authority.
Which of the following is the BEST recommendation to help prevent this situation in the future?
An IT strategic plan that BEST leverages IT in achieving organizational goals will include:
Which of the following is the MOST important control for virtualized environments?
Which of the following is the BEST indication of effective governance over IT infrastructure?
An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?
An organization has partnered with a third party to transport backup drives to an offsite storage facility. Which of the following is MOST important before sending the drives?
An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?
What is the PRIMARY reason for an organization to classify the data stored on its internal networks?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor's BEST course of action?
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?
Which of the following is the MOST important responsibility of data owners when implementing a data classification process?
Which of the following is the MOST effective accuracy control for entry of a valid numeric part number?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?
Which of the following backup schemes is the BEST option when storage media is limited?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
The PRIMARY objective of value delivery in reference to IT governance is to:
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following BEST describes an audit risk?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
Which of the following is a corrective control?