An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?
Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
Secure code reviews as part of a continuous deployment program are which type of control?
Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?
An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
What is MOST important to verify during an external assessment of network vulnerability?
Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
A proper audit trail of changes to server start-up procedures would include evidence of:
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
Which of the following should be an IS auditor's GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
Which of the following is the GREATEST concern associated with a high number of IT policy exceptions approved by management?
Which of the following is MOST important with regard to an application development acceptance test?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor's NEXT course of action?
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
Which of the following should be identified FIRST during the risk assessment process?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
When reviewing past results of a recurring annual audit, an IS auditor notes that findings may not have been reported and independence may not have been maintained. Which of the following is the auditor's BEST course of action?
Which of the following is the MOST important responsibility of data owners when implementing a data classification process?
An organization plans to replace its nightly batch processing backup to magnetic tape with real-time replication to a second data center. Which of the following is the GREATEST risk associated with this change?
A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?
Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
An IS auditor learns that an organization's business continuity plan (BCP) has not been updated in the last 18 months and that the organization recently closed a production plant. Which of the following is the auditor's BEST course of action?
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
When planning a follow-up, the IS auditor is informed by operational management that recent organizational changes have addressed the previously identified risk and implementing the action plan is no longer necessary. What should the auditor do NEXT?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Which of the following is the BEST point in time to conduct a post-implementation review?
Which of the following is MOST important to include in security awareness training?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization's patch management process?
An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.
Which of the following is the BEST course of action to address this issue?
During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility Which of the following is the IS auditor's BEST course of action?
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?
An IT strategic plan that BEST leverages IT in achieving organizational goals will include:
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?
The use of which of the following would BEST enhance a process improvement program?
Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?
Which of the following biometric access controls has the HIGHEST rate of false negatives?
Which of the following is the MOST significant risk when an application uses individual end-user accounts to access the underlying database?
Which of the following would BEST guide an IS auditor when determining an appropriate time to schedule the follow-up of agreed corrective actions for reported audit issues?
During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?
Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?
In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization's goals and strategic objectives?
An IS auditor should be MOST concerned if which of the following fire suppression systems is utilized to protect an asset storage closet?
A bank performed minor changes to the interest calculation computer program. Which of the following techniques would provide the STRONGEST evidence to determine whether the interest calculations are correct?
What is the PRIMARY reason for an organization to classify the data stored on its internal networks?
Which of the following BEST enables a benefits realization process for a system development project?
Which of the following should an IS auditor use when verifying a three-way match has occurred in an enterprise resource planning (ERR) system?
Which of the following is MOST critical to the success of an information security program?
Which of the following is MOST likely to be a project deliverable of an agile software development methodology?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
Which of the following features of a library control software package would protect against unauthorized updating of source code?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
Which of the following BEST helps to ensure data integrity across system interfaces?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
Which of the following is MOST critical for the effective implementation of IT governance?
Which of the following is MOST important when implementing a data classification program?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
Which of the following is the BEST reason to implement a data retention policy?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan?
Which of the following is the BEST source of information for examining the classification of new data?
Which of the following is a PRIMARY responsibility of an IT steering committee?
An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?
Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?
Which of the following is the BEST indication of effective IT investment management?
The charging method that effectively encourages the MOST efficient use of IS resources is:
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?
Which of the following should be done FIRST to minimize the risk of unstructured data?
An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
An IS auditor reviewing a job scheduling tool notices performance and reliability problems. Which of the following is MOST likely affecting the tool?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
During the planning stage of a compliance audit, an IS auditor discovers that a bank's inventory of compliance requirements does not include recent regulatory changes related to managing data risk. What should the auditor do FIRST?
Which of the following is me GREATE ST impact as a result of the ongoing deterioration of a detective control?
An IS auditor requests direct access to data required to perform audit procedures instead of asking management to provide the data Which of the following is the PRIMARY advantage of this approach?
When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?
An IS auditor finds that while an organization's IT strategy is heavily focused on research and development, the majority of protects n the IT portfolio focus on operations and maintenance. Which of the Mowing is the BEST recommendation?
The use of access control lists (ACLs) is the MOST effective method to mitigate security risk for routers because they: (Identify Correct answer and related explanation/references from CISA Certification - Information Systems Auditor official Manual or book)
Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
Which of the following is the BEST testing approach to facilitate rapid identification of application interface errors?
In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?
Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?
A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
Which of the following is the BEST reason for an IS auditor to emphasize to management the importance of using an IT governance framework?
Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?
An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor's BEST course of action?
Which of the following is the MOST important outcome of an information security program?
Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?
Which of the following should be restricted from a network administrator's privileges in an adequately segregated IT environment?
What would be an IS auditor's BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?
Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization's information cannot be accessed?
In the development of a new financial application, the IS auditor's FIRST involvement should be in the:
The PRIMARY purpose of requiring source code escrow in a contractual agreement is to:
As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (B1A)?
Which of the following is the MOST appropriate indicator of change management effectiveness?
Which of the following is MOST important for an IS auditor to verify when reviewing the use of an outsourcer for disposal of storage media?
An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?
An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?
When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
An organization has engaged a third party to implement an application to perform business-critical calculations. Which of the following is the MOST important process to help ensure the application provides accurate calculations?
Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization's configuration and release management process?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor's BEST course of action?
Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
Which of the following physical controls provides the GREATEST assurance that only authorized individuals can access a data center?
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?
A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?
Which of the following would be the GREATEST concern to an IS auditor when reviewing the outsourcing contract for an organization's cloud service provider?
In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
Which of the following is the BEST reason for an organization to use clustering?
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
Which of the following should an IS auditor consider FIRST when evaluating firewall rules?
Which of the following is MOST helpful for measuring benefits realization for a new system?
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?
Which of the following occurs during the issues management process for a system development project?
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed Which of the following is the MOST important requirement to include In the vendor contract to ensure continuity?
In an online application, which of the following would provide the MOST information about the transaction audit trail?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
Which of the following findings from an IT governance review should be of GREATEST concern?
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?
Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
Which of the following BEST Indicates that an incident management process is effective?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
An information systems security officer's PRIMARY responsibility for business process applications is to:
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
Which of the following is the GREATEST risk associated with storing customer data on a web server?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?
An IS auditor is reviewing a data conversion project Which of the following is the auditor's BEST recommendation prior to go-live?
Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
The implementation of an IT governance framework requires that the board of directors of an organization:
Which of the following provides the MOST useful information regarding an organization's risk appetite and tolerance?
In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?
An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?
Which of the following is the BEST reason to implement a data retention policy?
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls?
An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?
Which of the following would be an IS auditor's GREATEST concern when reviewing the organization's business continuity plan (BCP)?
An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor's NEXT course of action?
An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
During the audit of an enterprise resource planning (ERP) system, an IS auditor found an applicationpatch was applied to the production environment. It is MOST
important for the IS auditor to verify approval from the:
Which of the following poses the GREATEST potential concern for an organization that decides to consolidate mission-critical applications on a large server as part of IT capacity management?
Which of the following is the PRIMARY purpose of conducting a control self-assessment (CSA)?
Which of the following security measures is MOST important for protecting Internet of Things (IoT) devices from potential cyberattacks?
An IS auditor is conducting an IT governance audit and notices many initiatives are managed informally by isolated project managers. Which of the following recommendations would have the GREATEST impact on improving the maturity of the IT team?
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
Which of the following should be of GREATEST concern to an IS auditor assessing an organization's patch management program?
During the course of fieldwork, an internal IS auditor observes a critical vulnerability within a newly deployed application. What is the auditor's BEST course of action?
Which of the following controls is the BEST recommendation to prevent the skimming of debit or credit card data in point of sale (POS) systems?
If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:
Which of the following is MOST helpful for evaluating benefits realized by IT projects?
Which of the following is the MOST important reason for an IS auditor to examine the results of a post-incident review performed after a security incident?
Which of the following is the PRIMARY benefit of a tabletop exercise for an incident response plan?
Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change
management process?
Which of the following would be an auditor's GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?
Which of the following is MOST critical to the success of an information security program?
Which of the following is MOST useful when planning to audit an organization's compliance with cybersecurity regulations in foreign countries?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
Which of the following provides a new IS auditor with the MOST useful information to evaluate overall IT performance?
An IS auditor evaluating the change management process must select a sample from the change log. What is the BEST way to the auditor to confirm the change log is complete?
When assessing whether an organization's IT performance measures are comparable to other organizations in the same industry, which of the following would be MOST helpful to review?
Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization's security policy?
During an audit which of the following would be MOST helpful in establishing a baseline for measuring data quality?
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following is the MOST appropriate control to ensure integrity of online orders?
When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
Which of the following is MOST important for an IS auditor to review when determining whether IT investments are providing value to tie business?
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?
Which of the following is MOST effective for controlling visitor access to a data center?
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Which of the following would be an appropriate rote of internal audit in helping to establish an organization's privacy program?
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
Which of the following BEST enables the timely identification of risk exposure?
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
Which of the following is MOST important to consider when scheduling follow-up audits?
Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?
An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
Which of the following is necessary for effective risk management in IT governance?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
A firewall between internal network segments improves security and reduces risk by:
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
Which of the following represents the HIGHEST level of maturity of an information security program?
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
Which of the following is MOST important to ensure when planning a black box penetration test?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
Which of the following demonstrates the use of data analytics for a loan origination process?
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
In an area susceptible to unexpected increases in electrical power, which of the following would MOST effectively protect the system?
During an IS audit of a data center, it was found that programmers are allowed to make emergency fixes to operational programs. Which of the following should be the IS auditor's PRIMARY recommendation?
Which of the following criteria is MOST important for the successful delivery of benefits from an IT project?
In a public key cryptographic system, which of the following is the PRIMARY requirement to address the risk of man-in-the-middle attacks through spoofing?
The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
An organization is implementing a data loss prevention (DLP) system in response to a new regulatory requirement Reviewing. which of the following would be MOST helpful in evaluating the system's design?
What should be the PRIMARY focus during a review of a business process improvement project?
Which of the following is the MOST efficient way to identify fraudulent activity on a set of transactions?
Which of the following protocols should be used when transferring data via the internet?
An organization recently migrated Us data warehouse from a legacy system to a different architecture in the cloud. Which of the following should be of GREATEST concern to the IS auditor reviewing the new data architecture?
Who should be the FIRST to evaluate an audit report prior to issuing it to the project steering committee?
If concurrent update transactions to an account are not processed properly, which of the following will be affected?
Which of the following BEST ensures that effective change management is in place in an IS environment?
Which of the following BEST enables an IS auditor to confirm the batch processing to post transactions from an input source is successful?
Management has requested a post-implementation review of a newly implemented purchasing package to determine the extent that business requirements are being met. Which of the following
is MOST likely to be assessed?
Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time?
Which of the following is the BEST way to determine the adequacy of controls for detecting inappropriate network activity in an organization?
Which of the following is the PRIMARY benefit of effective implementation of appropriate data classification?
An IS auditor is evaluating the log management system for an organization with devices and systems in multiple geographic locations. Which of the following is MOST important for the auditor to verify?
Of the following who should be responsible for cataloging and inventorying robotic process automation (RPA) processes?
A startup organization wants to develop a data loss prevention (DLP) program. The FIRST step should be to implement:
An IS auditor is reviewing an organizations release management practices and observes inconsistent and inaccurate estimation of the size and complexity of business application development projects. Which of the following should the auditor recommend to address this issue?
Which of the following findings would be of GREATEST concern when auditing an organization's end-user computing (EUC)?
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following is the PRIMARY purpose of a rollback plan for a system change?
Which of the following BEST enables an IS auditor to assess whether jobs were completed according to the job schedule?
Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?
Which of the following would an IS auditor find to be the GREATEST risk associated with the server room in a remote office location?
When reviewing whether IT investments are meeting business objectives, which of the following evaluations would be MOST useful?
An organization offers an e-commerce platform that allows consumer-to-consumer transactions. The platform now uses blockchain technology to ensure the parties are unable to deny the transactions. Which of the following attributes BEST describes the risk element that this technology is addressing?
While reviewing the effectiveness of an incident response program, an IS auditor notices a high number of reported incidents involving malware originating from removable media found by employees. Which of the following is the MOST appropriate recommendation to management?
How is nonrepudiation supported within a public key infrastructure (PKI) environment?
Which of the following BEST indicates a need to review an organization's information security policy?
Which of the following should an IS auditor do FIRST when auditing a robotics process automation (RPA) implementation?
An IS auditor found that operations personnel failed to run a script contributing to year-end financial statements. Which of the following is the BEST recommendation?
Which of the following is the BEST way to foster continuous improvement of IS audit processes and practices?
An IS auditor determines elevated administrator accounts for servers that are not properly checked out and then back in after each use. Which of the following is the MOST appropriate sampling technique to determine the scope of the problem?
Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?
An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization’s enterprise architecture (EA) program?
An organization is modernizing its technology policy framework to demonstrate compliance with external industry standards. Which of the following would be MOST useful to an IS auditor for validating the outcome?
Which of the following is the MOST important consideration to facilitate prosecution of a perpetrator after a cybercrime?
Which of the following system attack methods is executed by entering malicious code into the search box of a vulnerable website, causing the server to reveal restricted information?
The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
Which of the following is the MAIN objective of enterprise architecture (EA) governance?
An organization establishes capacity utilization thresholds and monitors for instances when thresholds are exceeded. Which of the following is BEST supported by this activity?
A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:
Which of the following controls is BEST implemented through system configuration?
Network user accounts for temporary workers expire after 90 days.
Application user access is reviewed every 180 days for appropriateness.
Financial data in key reports is traced to source systems for completeness and accuracy.
An organization produces control reports with a desktop application that accesses data in the central production database. Which of the following would give an IS auditor concern about the reliability of these reports?
Which of the following applications has the MOST inherent risk and should be prioritized during audit planning?
Which of the following presents the GREATEST risk to an organization's ability to manage quality control (QC) processes?