Which of the following must be in place before an IS auditor initiates audit follow-up activities?
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?
Which of the following techniques BEST mitigates the risk of pervasive network attacks?
A current project to develop IT-based solutions will need additional funding to meet changes in business requirements. Who is BEST suited to obtain this additional funding?
An organization's strategy to source certain IT functions from a Software as a Service (SaaS) provider should be approved by the:
Which of the following should be the PRIMARY consideration when incorporating user training and awareness into a data loss prevention (DLP) strategy?
One advantage of managing an entire collection of projects as a portfolio is that it highlights the need to:
An organization using a cloud provider for its online billing system requires the website to be accessible to customers at all times. What is the BEST way to verify the organization's business requirements are met?
Which of the following findings related to segregation of duties should be of GREATEST concern to an IS auditor?
Which of the following network communication protocols is used by network devices such as routers to send error messages and operational information indicating success or failure when communicating with another IP address?
Which of the following is the PRIMARY benefit of introducing business impact analyses (BIAs) to business resiliency strategies?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system. Which of the following is the IS
auditor's BEST recommendation?
Which of the following roles is PRIMARILY responsible for mitigating the risk of benefits not being realized in an IT project?
An IS auditor reviewing an organization’s IT systems finds that the organization frequently purchases systems that are incompatible with the technologies already in the organization. Which of the following is the MOST likely reason?
A white box testing method is applicable with which of the following testing processes?
An organization is permanently transitioning from onsite to fully remote business operations. When should the existing business impact analysis (BIA) be reviewed?
Which of the following is MOST important to the effectiveness of smoke detectors installed in a data processing facility?
An IS auditor discovers that a developer has used the same key to grant access to multiple applications making calls to an application programming interface (API). Which of the following is the BEST recommendation to address this situation?
An organization's payroll department recently implemented a new Software as a Service (SaaS) tool for payment processing. Which of the following audits is MOST appropriate for an IS auditor to validate that the new tool is configured as expected to meet performance requirements?
Which of the following is the PRIMARY purpose of a rollback plan for a system change?
An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated. Which of the following should be of
MOST concern?
As part of an audit response, an auditee has concerns with the recommendations and is hesitant to implement them. Which of the following is the BEST course of action for the IS auditor?
Which of the following is the GREATEST concern associated with IS risk-based auditing when audit resources are limited?
An IS auditor finds that irregularities have occurred and that auditee management has chosen to ignore them. If reporting to external authorities is required which of the following is the BEST action for the IS auditor to take?
Which of the following is the MOST important consideration when relying on the work of the prior auditor?
In an annual audit cycle, the audit of an organization's IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
An IS auditor wants to gain a better understanding of an organization’s selected IT operating system software. Which of the following would be MOST helpful to review?
An IS auditor is reviewing job scheduling software and notes instances of delayed processing time, unexpected job interruption, and out-of-sequence job execution. Which of the following should the auditor examine FIRST to help determine the reasons for these instances?
A review of an organization's enterprise architecture (EA) BEST enables an IS auditor to determine:
A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's mobile device policies and controls in its corporate environment?
Which of the following is MOST important for an IS auditor to determine when reviewing the design and implementation of controls?
A national bank recently migrated a large number of business-critical applications to the cloud. Which of the following is MOST important to ensuring the resiliency of the applications?
While conducting a follow-up on an asset management audit, the IS auditor finds paid invoices for IT devices not recorded in the organization's inventory. Which of the following is the auditor's BEST course of action?
The MOST important measure of the effectiveness of an organization's security program is the:
An IS auditor is reviewing an artificial intelligence (Al) and expert system application. The system has produced several critical errors with severe impact. Which of the following should the IS auditor do NEXT to understand the cause of the errors?
Which of the following BEST enables an organization to standardize its IT infrastructure to align with business goals?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
Which of the following BEST helps data loss prevention (DLP) tools detect movement of sensitive data m transit?
Which of the following is the PRIMARY advantage of using an automated security log monitoring tool over a manual review to monitor the use of privileged access?
Which of the following is the PRIMARY benefit of monitoring IT operational logs?
An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:
An IS auditor is reviewing the service management of an outsourced help desk. Which of the following is the BEST indicator of how effectively the service provider is performing this function?
Which of the following is the PRIMARY objective of enterprise architecture (EA)?
Which of the following can BEST reduce the impact of a long-term power failure?
Which of the following should be of MOST concern to an IS auditor reviewing an organization’s business impact analysis (BIA)?
Which of the following is the PRIMARY advantage of using an automated security log monitoring tool instead of conducting a manual review to monitor the use of privileged access?
The PRIMARY reason to assign data ownership for protection of data is to establish:
Which of the following responses to risk associated with separation of duties would incur the LOWEST initial cost?
Which of the following is the MOST significant risk to an organization migrating its onsite application servers to a public cloud service provider?
Which of the following is the BEST way to foster continuous improvement of IS audit processes and practices?
During an information security review, an IS auditor learns an organizational policy requires all employ-ees to attend information security training during the first week of each new year. What is
the auditor's BEST recommendation to ensure employees hired after January receive adequate guid-ance regarding security awareness?
Which of the following is MOST important for an IS auditor to assess during a post-implementation review of a newly modified IT application developed in-house?
Which of the following is the MOST important regulatory consideration for an organization determining whether to use its customer data to train AI algorithms?
An IS auditor is planning a review of an organizations cybersecurity incident response maturity Which of the following methodologies would provide the MOST reliable conclusions?
During a follow-up audit, an IS auditor finds that some critical recommendations have not been addressed, as management has decided to accept the risk. Which of the following is the IS auditors BEST course of action?
An IS auditor finds a user account where privileged access is not appropriate for the user’s role. Which of the following would provide the BEST evidence to determine whether the risk of this access has been exploited?
Which of the following controls is BEST implemented through system configuration?
Network user accounts for temporary workers expire after 90 days.
Application user access is reviewed every 180 days for appropriateness.
Financial data in key reports is traced to source systems for completeness and accuracy.
If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:
Which of the following is the MOST important reason for an organization to automate data purging?
Which of the following MOST effectively reduces the probability of a brute force attack being successful?
Which of the following BEST enables an IS auditor to prioritize financial reporting spreadsheets for an end-user computing (EUC) audit?
Which of the following is an IS auditor's BEST recommendation for mitigating risk associated with inadvertent disclosure of sensitive information by employees?
Which of the following is the BEST approach to validate whether a streaming site can continue to provide service during a period of live streaming with an anticipated high volume of viewers?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
Which of the following technologies is BEST suited to fulfill a business requirement for nonrepudiation of business-to-business transactions with external parties without the need for a mutually trusted entity?
Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
Which of the following is MOST important to consider when scheduling follow-up audits?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
During an audit of a multinational bank's disposal process, an IS auditor notes several findings. Which of the following should be the auditor's GREATEST concern?
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
In an online application, which of the following would provide the MOST information about the transaction audit trail?
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?
What is the Most critical finding when reviewing an organization’s information security management?
Which of the following metrics would BEST measure the agility of an organization's IT function?
Which of the following business continuity activities prioritizes the recovery of critical functions?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
Which of the following is the MOST important activity in the data classification process?
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
Which of the following concerns is BEST addressed by securing production source libraries?
Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?
Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization's security policy?
A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?
Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
An IT strategic plan that BEST leverages IT in achieving organizational goals will include:
Which of the following should be the FIRST step when planning an IS audit of a third-party service provider that monitors network activities?
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
Which of the following is MOST likely to be a project deliverable of an agile software development methodology?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
Which of the following is the BEST performance indicator for the effectiveness of an incident management program?
in a post-implantation Nation review of a recently purchased system it is MOST important for the iS auditor to determine whether the:
During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
Which of the following BEST helps to ensure data integrity across system interfaces?
Which of the following is the MOST appropriate control to ensure integrity of online orders?
Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?
Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?
When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
Which of the following management decisions presents the GREATEST risk associated with data leakage?
Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following is necessary for effective risk management in IT governance?
Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization's privacy policy?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Which of the following BEST facilitates the legal process in the event of an incident?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;
Which of the following is the BEST reason to implement a data retention policy?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
Which of the following is MOST important when implementing a data classification program?
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
Which of the following backup schemes is the BEST option when storage media is limited?
Which of the following BEST supports the effectiveness of a compliance program?
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
Which of the following is the BEST way to ensure an organization's data classification policies are preserved during the process of data transformation?
An IS auditor has been tasked with auditing the inventory control process for a large organization that processes millions of data transactions. Which of the following is the BEST testing strategy to adopt?
Which of the following is MOST helpful for an IS auditor to review when evaluating an organizations business process that are supported by applications and IT systems?
Which of the following is the MOST important consideration for patching mission critical business application servers against known vulnerabilities?
Which of the following is MOST critical to the success of an information security program?
A national tax administration agency with a distributed network experiences service disruptions due to a large influx of traffic to a regional office near the end of each year. Which of the following would BEST enable the agency to improve the performance of its servers during the busy period?
Retention periods and conditions for the destruction of personal data should be determined by the.
Which of the following statements appearing in an organization's acceptable use policy BEST demonstrates alignment with data classification standards related to the protection of information assets?
Which of the following would be the GREATEST concern to an IS auditor when reviewing the outsourcing contract for an organization's cloud service provider?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
An organization has shifted from a bottom-up approach to a top-down approach in the development of IT policies. This should result in:
Which type of risk would MOST influence the selection of a sampling methodology?
Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls?
Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?
An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
Which of the following is the MOST important advantage of participating in beta testing of software products?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change
management process?
What is the PRIMARY reason for an organization to classify the data stored on its internal networks?
An IS auditor is reviewing an organization's business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
The use of which of the following would BEST enhance a process improvement program?
Which of the following would be an auditor's GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
Which of the following would be a result of utilizing a top-down maturity model process?
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization's patch management process?
A global organization's policy states that all workstations must be scanned for malware each day. Which of the following would provide an IS auditor with the BEST evidence of continuous compliance with this policy?
Which of the following is the MOST effective accuracy control for entry of a valid numeric part number?
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor's GREATEST concern?
The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
Which of the following is the MOST important reason for an IS auditor to examine the results of a post-incident review performed after a security incident?
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?
During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?
What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?
An IS auditor reviewing incident response management processes notices that resolution times for reoccurring incidents have not shown improvement. Which of the following is the auditor's BEST recommendation?
A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?
Which of the following BEST enables a benefits realization process for a system development project?
The BEST way to provide assurance that a project is adhering to the project plan is to:
Which of the following is MOST useful when planning to audit an organization's compliance with cybersecurity regulations in foreign countries?
An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?
Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?
An IS auditor is reviewing security controls related to collaboration tools for a business unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?
During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility Which of the following is the IS auditor's BEST course of action?
An IS auditor learns that an organization's business continuity plan (BCP) has not been updated in the last 18 months and that the organization recently closed a production plant. Which of the following is the auditor's BEST course of action?
Which of the following provides the GREATEST assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively?
Which of the following is the BEST indication of effective governance over IT infrastructure?
Which of the following provides the BEST assurance of data integrity after file transfers?
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
Which of the following is the MOST important consideration for a contingency facility?
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
Which of the following is the PRIMARY role of key performance indicators (KPIs) in supporting business process effectiveness?
Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
An IS auditor requests direct access to data required to perform audit procedures instead of asking management to provide the data Which of the following is the PRIMARY advantage of this approach?
An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?
During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor's BEST course of action?
Which of the following is the BEST indication of effective IT investment management?
Which of the following is the MOST important responsibility of data owners when implementing a data classification process?
An IS auditor is verifying the adequacy of an organization's internal controls and is concerned about potential circumvention of regulations. Which of the following is the BEST sampling method to use?
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor's NEXT course of action?
The BEST way to evaluate the effectiveness of a newly developed application is to:
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?
To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization's objectives?
An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?
In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
Which of the following is the MOST important prerequisite for implementing a data loss prevention (DLP) tool?
Which of the following would minimize the risk of losing transactions as a result of a disaster?
Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor's BEST course of action?
Which of the following BEST indicates the effectiveness of an organization's risk management program?
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Which of the following is the MOST effective way for an organization to project against data loss?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
The decision to accept an IT control risk related to data quality should be the responsibility of the:
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
Which of the following data would be used when performing a business impact analysis (BIA)?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
Which of the following is MOST important with regard to an application development acceptance test?
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
Which of the following is an audit reviewer's PRIMARY role with regard to evidence?
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
The implementation of an IT governance framework requires that the board of directors of an organization:
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
An IS auditor conducts a review of a third-party vendor's reporting of key performance indicators (KPIs) Which of the following findings should be of MOST concern to the auditor?
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?
An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?
Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization's configuration and release management process?
The use of control totals satisfies which of the following control objectives?
Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?
An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS
Controls related to authorized modifications to production programs are BEST tested by:
An IS auditor is reviewing a data conversion project Which of the following is the auditor's BEST recommendation prior to go-live?
An IS auditor evaluating the change management process must select a sample from the change log. What is the BEST way to the auditor to confirm the change log is complete?
An IS auditor Is renewing the deployment of a new automated system Which of the following findings presents the MOST significant risk?
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?
Which of the following provides the MOST assurance of the integrity of a firewall log?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
Which of the following should be restricted from a network administrator's privileges in an adequately segregated IT environment?
As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
Which of the following is the MOST appropriate indicator of change management effectiveness?
A bank has a combination of corporate customer accounts (higher monetary value) and small business accounts (lower monetary value) as part of online banking. Which of the following is the BEST sampling approach for an IS auditor to use for these accounts?
When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider’s external audit report on service level management when the
Which of the following is the BEST source of information for examining the classification of new data?
The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following is MOST important for an IS auditor to verify when reviewing the use of an outsourcer for disposal of storage media?
An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application's operating system?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?
An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be the GREATEST concern?
Which of the following technologies has the SMALLEST maximum range for data transmission between devices?
Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program'?
Which of the following is the MOST effective control to mitigate against the risk of inappropriate activity by employees?
Which of the following is the MOST important responsibility of user departments associated with program changes?
Which of the following is the BEST method to delete sensitive information from storage media that will be reused?
Which of the following concerns is MOST effectively addressed by implementing an IT framework for alignment between IT and business objectives?
During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor's GREATEST concern with this situation?
In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?
A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
A firewall between internal network segments improves security and reduces risk by:
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
A new system development project is running late against a critical implementation deadline Which of the following is the MOST important activity?
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
A proper audit trail of changes to server start-up procedures would include evidence of:
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?
An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?
Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?