Which of the following BEST demonstrates to senior management and the board that an audit function is compliant with standards and the code of ethics?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
Which of the following concerns is BEST addressed by securing production source libraries?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
Which of the following is the MOST important consideration for patching mission critical business application servers against known vulnerabilities?
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?
Which of the following is the PRIMARY basis on which audit objectives are established?
To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?
Which of the following MUST be completed as part of the annual audit planning process?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
What is the Most critical finding when reviewing an organization’s information security management?
A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization's privacy policy?
Which of the following is MOST important to consider when scheduling follow-up audits?
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed Which of the following is the MOST important requirement to include In the vendor contract to ensure continuity?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
Which of the following is the MOST important activity in the data classification process?
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
Which of the following BEST Indicates that an incident management process is effective?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
An IS auditor is evaluating the risk associated with moving from one database management system (DBMS) to another. Which of the following would be MOST helpful to ensure the integrity of the system throughout the change?
Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?
The GREATEST benefit of using a polo typing approach in software development is that it helps to:
An information systems security officer's PRIMARY responsibility for business process applications is to:
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed?
Email required for business purposes is being stored on employees' personal devices.
Which of the following is an IS auditor's BEST recommendation?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
Which of the following is the MOST important consideration for a contingency facility?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:
Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
Which of the following documents should specify roles and responsibilities within an IT audit organization?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?
Which of the following represents the HIGHEST level of maturity of an information security program?
Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?
Which of the following provides a new IS auditor with the MOST useful information to evaluate overall IT performance?
Which of the following is the BEST indicator for measuring performance of IT help desk function?
Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?
In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?
The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
Which of the following is MOST helpful to an IS auditor when assessing the effectiveness of controls?
Which of the following would be the BEST criteria for monitoring an IT vendor's service levels?
Which of the following is MOST important for an IS auditor to review when determining whether IT investments are providing value to tie business?
Which of the following is the BEST methodology to use for estimating the complexity of developing a large business application?
An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?
Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?
While evaluating the data classification process of an organization, an IS auditor's PRIMARY focus should be on whether:
As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:
Which of the following management decisions presents the GREATEST risk associated with data leakage?
An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?
in a post-implantation Nation review of a recently purchased system it is MOST important for the iS auditor to determine whether the:
Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?
A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?
Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?
When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
After delivering an audit report, the audit manager discovers that evidence was overlooked during the audit This evidence indicates that a procedural control may have failed and could contradict a conclusion of the audit Which of the following risks is MOST affected by this oversight?
A new system development project is running late against a critical implementation deadline Which of the following is the MOST important activity?
Which of the following methods will BEST reduce the risk associated with the transition to a new system using technologies that are not compatible with the old system?
Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?
Which of the following is MOST important for an IS auditor to verify when reviewing the use of an outsourcer for disposal of storage media?
Which of the following is the BEST indication that there are potential problems within an organization's IT service desk function?
A firewall between internal network segments improves security and reduces risk by:
Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?
With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?
Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?
Which of the following is the MOST appropriate indicator of change management effectiveness?
The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?
Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following
is the auditor’s BEST recommendation to prevent unauthorized access?
Which of the following is an IS auditor's BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?
An IS auditor conducts a review of a third-party vendor's reporting of key performance indicators (KPIs) Which of the following findings should be of MOST concern to the auditor?
An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?
An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
Due to advancements in technology and electronic records, an IS auditor has completed an engagement by email only. Which of the following did the IS auditor potentially compromise?
What should an IS auditor do FIRST when a follow-up audit reveals some management action plans have not been initiated?
Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?
Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls?
An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?
An IS auditor is reviewing a data conversion project Which of the following is the auditor's BEST recommendation prior to go-live?
Which of the following should be of GREATEST concern to an |$ auditor reviewing data conversion and migration during the implementation of a newapplication system?
Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?
Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?
When assessing the overall effectiveness of an organization's disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?
Which type of device sits on the perimeter of a corporate of home network, where it obtains a public IP address and then generates private IP addresses internally?
Which of the following should be the FIRST step to successfully implement a corporate data classification program?
An IS auditor is reviewing an organization's business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor's GREATEST concern?
Which of the following is the BEST disposal method for flash drives that previously stored confidential data?
Which of the following is the GREATEST advantage of utilizing guest operating systems m a virtual environment?
An IS auditor determines elevated administrator accounts for servers that are not properly checked out and then back in after each use. Which of the following is the MOST appropriate sampling technique to determine the scope of the problem?
In a data center audit, an IS auditor finds that the humidity level is very low. The IS auditor would be MOST concerned because of an expected increase in:
The process of applying a hash function to a message and obtaining and ciphering a digest refers to:
Which of the following is the PRIMARY reason to involve IS auditors in the software acquisition process?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
IT management has accepted the risk associated with an IS auditor's finding due to the cost and complexity of the corrective actions. Which of the following should be the auditor's NEXT course of action?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
An organization is implementing a new system that supports a month-end business process. Which of the following implementation strategies would be MOST efficient to decrease business downtime?
An external attacker spoofing an internal Internet Protocol (IP) address can BEST be detected by which of the following?
Which of the following is the PRIMARY reason an IS auditor would recommend offsite backups although critical data is already on a redundant array of inexpensive disks (RAID)?
The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
Which of the following is the MOST important consideration when establishing operational log management?
Which of the following system redundancy configurations BEST improves system resiliency and reduces the possibility of a single cause of failure impacting system dependability?
Which of the following is an IS auditor’s BEST approach when low-risk anomalies have been identified?
Which of the following is the MOST significant risk to an organization migrating its onsite application servers to a public cloud service provider?
Which of the following should be the PRIMARY objective of conducting an audit follow-up of management action plans?
Which of the following should be an IS auditor's GREATEST concern when assessing an IT service configuration database?
An organization requires the use of a key card to enter its data center. Recently, a control was implemented that requires biometric authentication for each employee.
Which type of control has been added?
An IS auditor wants to verify alignment of the organization's business continuity plan (BCP) with the business strategy. Which of the following would be MOST helpful to review?
Which of the following should be of MOST concern to an IS auditor reviewing an organization’s business impact analysis (BIA)?
In an annual audit cycle, the audit of an organization's IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
Which of the following is MOST important to the effectiveness of smoke detectors installed in a data processing facility?
Which of the following is MOST important to review during the project initiation phase of developing and deploying a new application?
Which of the following BEST enables an IS auditor to combine and compare access control lists from various applications and devices?
Which of the following provides the BEST assurance that vendor-supported software remains up to date?
An IS auditor is assessing backup performance and observes that the system administrator manually initiates backups during unexpected peak usage. Which of the following is the auditor's BEST course of action?
An external audit firm was engaged to perform a validation and verification review for a systems implementation project. The IS auditor identifies that regression testing is not part of the project plan and was not performed by the systems implementation team. According to the team, the parallel testing being performed is sufficient, making regression testing unnecessary. What should be the auditor’s NEXT step?
An organization allows programmers to change production systems in emergency situations without seeking prior approval. Which of the following controls should an IS auditor consider MOST
important?
An IS auditor is reviewing an organization's system development life cycle (SDLC) Which of the following MUST be included in the review?
An IS auditor is evaluating the log management system for an organization with devices and systems in multiple geographic locations. Which of the following is MOST important for the auditor to verify?
An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?
Which of the following control measures is the MOST effective against unauthorized access of confidential information on stolen or lost laptops?
An IS auditor is tasked to review an organization's plan-do-check-act (PDCA) method for improving IT-related processes and wants to determine the accuracy of defined targets to be achieved. Which of the following steps in the PDCA process should the auditor PRIMARILY focus on in this situation?
Which of the following findings would be of GREATEST concern when auditing an organization's end-user computing (EUC)?
Which of the following is the GREATEST concern related to an organization's data classification processes?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
An IS auditor learns that a business owner violated the organization's security policy by creating a web page with access to production data. The auditor's NEXT step should be to:
During the forensic investigation of a cyberattack involving credit card data, which of the following is MOST important to ensure?
A steering committee established to oversee an organization's digital transformation program is MOSTlikely to be involved with which of the following activities?
Which of the following is MOST important for an IS auditor to assess during a post-implementation review of a newly modified IT application developed in-house?
An IS auditor wants to inspect recent events in a system to observe failed authentications and password changes. Which of the following is the MOST appropriate method to use for this purpose?
Which of the following is the PRIMARY benefit of effective implementation of appropriate data classification?
Which of the following should be of GREATEST concern to an IS auditor reviewing system interfaces used to transfer publicly available information?
Which of the following would an IS auditor find to be the GREATEST risk associated with the server room in a remote office location?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?
Which of the following findings related to segregation of duties should be of GREATEST concern to an IS auditor?
Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?
Based on best practices, which types of accounts should be disabled for interactive login?
When protecting the confidentiality of information assets, the MOST effective control practice is the:
An IS auditor has been asked to review the integrity of data transfer between two business-critical systems that have not been tested since implementation. Which of the following would provide the MOST useful information to plan an audit?
An IS auditor is assessing the adequacy of management's remediation action plan. Which of the following should be the MOST important consideration?
Which of the following provides the BEST evidence of effective IT portfolio managements?
The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:
A white box testing method is applicable with which of the following testing processes?
An IS auditor is reviewing an organization's incident management processes. Which of the following observations should be the auditor's GREATEST concern?
In order for a firewall to effectively protect a network against external attacks, what fundamental practice must be followed?
An organization is planning to implement a control self-assessment (CSA) program tor selected business processes Which of the following should be the role of the internal audit team for this program?
Which of the following is the MOST important consideration when implementing a Zero Trust strategy for mobile, wireless, and Internet of Things (IoT) devices?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
Which of the following is the BEST reason to implement a data retention policy?
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following is MOST important when implementing a data classification program?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following BEST facilitates the legal process in the event of an incident?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
Which of the following backup schemes is the BEST option when storage media is limited?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
Which of the following is MOST critical for the effective implementation of IT governance?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Which of the following would be a result of utilizing a top-down maturity model process?
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
Which of the following components of a risk assessment is MOST helpful to management in determining the level of risk mitigation to apply?
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
Which of the following data would be used when performing a business impact analysis (BIA)?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
Which of the following is MOST important to consider when reviewing an organization's defined data backup and restoration procedures?
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
The implementation of an IT governance framework requires that the board of directors of an organization:
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Which of the following MOST effectively minimizes downtime during system conversions?
Which of the following is the GREATEST concern associated with a high number of IT policy exceptions approved by management?
Which of the following is an audit reviewer's PRIMARY role with regard to evidence?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality
within the organization. Which of the following should be recommended as the PRIMARY factor to
determine system criticality?
An organization has partnered with a third party to transport backup drives to an offsite storage facility. Which of the following is MOST important before sending the drives?
A bank performed minor changes to the interest calculation computer program. Which of the following techniques would provide the STRONGEST evidence to determine whether the interest calculations are correct?
Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?
During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)
agreement. What should the auditor do NEXT?
Which of the following provides the BE ST method for maintaining the security of corporate applications pushed to employee-owned mobile devices?
When planning an internal penetration test, which of the following is the MOST important step prior to finalizing the scope of testing?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
Which of the following should be identified FIRST during the risk assessment process?
Retention periods and conditions for the destruction of personal data should be determined by the.
A small IT department has embraced DevOps, which allows members of this group to deploy code to production and maintain some development access to automate releases. Which of the following is the MOST effective control?
Which of the following statements appearing in an organization's acceptable use policy BEST demonstrates alignment with data classification standards related to the protection of information assets?
Which of the following provides the GREATEST assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively?
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
In an online application, which of the following would provide the MOST information about the transaction audit trail?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:
Which of the following is an example of a preventative control in an accounts payable system?
A global organization's policy states that all workstations must be scanned for malware each day. Which of the following would provide an IS auditor with the BEST evidence of continuous compliance with this policy?
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
Which of the following should be an IS auditor's PRIMARY focus when evaluating the response process for cybercrimes?
Which of the following should be of GREATEST concern to an IS auditor when auditing an organization's IT strategy development process?
An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?
An organization establishes capacity utilization thresholds and monitors for instances when thresholds are exceeded. Which of the following is BEST supported by this activity?
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
Which of the following should be done FIRST to minimize the risk of unstructured data?
Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?
Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:
Which of the following is the MOST effective control over visitor access to highly secured areas?
The BEST way to provide assurance that a project is adhering to the project plan is to:
Which of the following would be the GREATEST concern to an IS auditor when reviewing the outsourcing contract for an organization's cloud service provider?
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor's BEST course of action?
Which of the following is an example of a preventive control for physical access?
Which of the following is MOST important to include in security awareness training?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?
When developing customer-facing IT applications, in which stage of the system development life cycle (SDLC) is it MOST beneficial to consider data privacy principles?
Which of the following is the MOST important advantage of participating in beta testing of software products?
Which of the following BEST supports the effectiveness of a compliance program?
An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.
Which of the following is the BEST course of action to address this issue?
Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics
system?
An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?
An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?
During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
Which of the following is the MOST important consideration when establishing vulnerability scanning on critical IT infrastructure?
An organization considering the outsourcing of a business application should FIRST:
What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?
Which of the following controls is MOST important for ensuring the integrity of system interfaces?
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
Which of the following is MOST critical to the success of an information security program?
Which of the following is the MOST important responsibility of data owners when implementing a data classification process?
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility Which of the following is the IS auditor's BEST course of action?
In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?
Which of the following would provide management with the MOST reasonable assurance that a new data warehouse will meet the needs of the
organization?
Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?