A web proxy server for corporate connections to external resources reduces organizational risk by:
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
Which of the following should be the IS auditor ' s PRIMARY focus, when evaluating an organization ' s offsite storage facility?
In an annual audit cycle, the audit of an organization ' s IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster ' '
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
Which of the following is MOST important to include when developing a business continuity plan (BCP)?
Data is being transferred from an application database to a data warehouse. Some fields were not picked up in the extraction process and therefore were not transferred to the data warehouse. Which of the following is the GREATEST risk associated with this situation?
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Data centers that want to prevent unauthorized personnel from entering during a power outage should ensure external access doors:
Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?
Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization ' s business continuity plan (BCP)?
Some control activities have been found to be only partially compliant with the design of the control. Which of the following is an IS auditor’s PRIMARY course of action?
Which of the following non-audit activities may impair an IS auditor ' s independence and objectivity?
A hearth care organization utilizes Internet of Things (loT) devices to improve patient outcomes through real-time patient monitoring and advanced diagnostics. Which of the following would BEST assist in isolating these devices from corporate network traffic?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
Which of the following backup methods is MOST appropriate when storage space is limited?
Which of the following should be used to evaluate an IT development project before an investment is committed?
Which of the following should be an IS auditor ' s GREATEST concern when assessing an IT service configuration database?
Which of the following risks is BEST mitigated by implementing an automated three-way match?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
The process of applying a hash function to a message and obtaining and ciphering a digest refers to:
A new regulation has been enacted that mandates specific information security practices for the protection of customer data. Which of the following is MOST useful for an IS auditor to review when auditing against the regulation?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization ' s incident response management program?
Which of the following is the MOST important consideration when establishing operational log management?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
Which of the following performance management tools BEST helps an IS auditor evaluate the success of an organization’s IT strategy implementation and execution?
Which of the following would BEST indicate the effectiveness of a security awareness training program?
An IS auditor is reviewing an organization ' s primary router access control list. Which of the following should result in a finding?
Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the
associated risk?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
Which of the following would be an auditor ' s GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?
which of the following is a core functionality of a configuration and release management system?
A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?
Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?
Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?
Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?
Which of the following BEST Indicates that an incident management process is effective?
Which of the following provides the MOST assurance of the integrity of a firewall log?
During the development of a business case for a new application, the IS auditor should be PRIMARILY involved in the:
Which of the following network topologies will provide the GREATEST fault tolerance?
In which data loss prevention (DLP) deployment model is data inspection and policy enforcement performed at the organization ' s perimeter or gateway?
At the conclusion of an audit, but before issuing the final report, the auditor should:
When drafting a disaster recovery strategy, what should be the MOST important outcome of a business impact analysis (BIA)?
Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?
After areas have been appropriately scoped, what is the IS auditor ' s NEXT step in the selection for sampling?
A PRIMARY objective of risk management is to keep the total cost of risks below the:
Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor ' s BEST course of action?
Which of the following concerns is MOST effectively addressed by implementing an IT framework for alignment between IT and business objectives?
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
Which of the following is the MOST important consideration when relying on the work of the prior auditor?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization ' s website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
An IS auditor is evaluating the log management system for an organization with devices and systems in multiple geographic locations. Which of the following is MOST important for the auditor to verify?
Before the release of a new application into an organization’s production environment, which of the following should be in place to ensure that proper testing has occurred and rollback plans are in place?
An organization allows programmers to change production systems in emergency situations without seeking prior approval. Which of the following controls should an IS auditor consider MOST
important?
During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?
The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?
Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor ' s BEST action?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
Which of the following is the BEST method for converting system-generated log files into a format suitable for data analysis?
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization ' s job scheduling practices?
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
Which of the following approaches would present the GREATEST concern for the implementation of a quality assurance (QA) function?
Which of the following is the BEST indication to an IS auditor that management ' s post-implementation review was effective?
An organization has both an IT strategy committee and an IT steering committee. When reviewing the minutes of the IT steering committee, an IS auditor would expect to find that the
committee:
A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor ' s GREATEST concern?
An IS auditor learns of a new regulation which imposes penalties based on the number of individuals whose personally identifiable information (PII) is exposed by a security breach. What would be the BEST recommendation to help the organization limit the liability associated with a breach to its customer information database?
Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization ' s information cannot be accessed?
When processing speed is the highest priority, which cryptographic algorithm should be used to verify the integrity of a bit-for-bit copy from digital evidence?
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
Which of the following is necessary for effective risk management in IT governance?
Which of the following BEST enables an organization to standardize its IT infrastructure to align with business goals?
Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT-related customer service project?
Which of the following tasks would cause the GREATEST segregation of duties (SoD) concern if performed by the person who reconciles the organization ' s device inventory?
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization ' s objectives?
Which type of control has been established when an organization implements a security information and event management (SIEM) system?
An IS auditor is planning an audit of an organization ' s accounts payable processes. Which of the following controls is MOST important to assess in the audit?
Which of the following areas of responsibility would cause the GREATEST segregation of duties conflict if the individual who performs the related tasks also has approval authority?
A proper audit trail of changes to server start-up procedures would include evidence of:
An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be the GREATEST concern?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
An organization used robotic process automation (RPA) technology to develop software bots that extract data from various sources for input into a legacy financial application. Which of the following should be of GREATEST concern to an IS auditor when reviewing the software bot job scheduling and production process automation?
When an IS auditor needs to confirm that an organization is encrypting sensitive information at a database level, which of the following would provide the BEST assurance?
Which of the following is MOST helpful in identifying system performance constraints?
Which of the following technologies BEST assists in protection of digital evidence as part of forensic investigation acquisition?
Backup procedures for an organization ' s critical data are considered to be which type of control?
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?
An external IS auditor is reviewing the continuous monitoring system for a large bank and notes several potential issues. Which of the following would present the GREATEST concern regarding the reliability of the monitoring system?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
Which of the following should be of MOST concern to an IS auditor reviewing an organization ' s operational log management?
Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
Which of the following is the MOST likely root cause of shadow IT in an organization?
An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?
Which of the following is the PRIMARY reason to involve IS auditors in the software acquisition process?
An IS auditor has been tasked with analyzing an organization ' s capital expenditures against its repair and maintenance costs. Which of the following is the BEST reason to use a data analytics tool for this purpose?
Which of the following is the GREATEST risk related to the use of virtualized environments?
Which of the following groups is PRIMARILY accountable for establishing a culture that facilitates an effective and efficient internal control system?
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization ' s data loss prevention (DLP) controls?
Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program ' ?
What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?
Which of the following procedures for testing a disaster recovery plan (DRP) is MOST effective?
Which of the following job scheduling schemes for operating system updates is MOST likely to adequately balance protection of workstations with user requirements?
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
An information systems security officer ' s PRIMARY responsibility for business process applications is to:
Which of the following should be an IS auditor ' s GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?
Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor ' s NEXT course of action?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
Which of the following is the MOST important consideration when defining an operational log management strategy?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor ' s BEST course of action would be to determine if:
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor ' s BEST course of action?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
An organization relies on an external vendor that uses a cloud-based Software as a Service (SaaS) model to back up its data. Which of the following is the GREATEST risk to the organization related to data backup and retrieval?
An organization performs virtual machine (VM) replication instead of daily backups of its critical servers. Which of the following is MOST important to validate when evaluating the adequacy of recovery procedures?
An organization that has decided to approve the use of end-user computing (EUC) should FIRST ensure:
As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (B1A)?
An IS auditor finds that a number of key patches have not been applied in a timely manner due to re-source constraints. Which of the following is the GREATEST risk to the organization in this
situation?
An IS auditor finds that an organization ' s data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor ' s MAIN concern should be that:
Which of the following MUST be performed by senior audit leadership prior to starting an IS audit project?
Which of the following should be an IS auditor ' s GREATEST concern when a data owner assigns an incorrect classification level to data?
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
An organization is planning to implement a control self-assessment (CSA) program for selected business processes. Which of the following should be the role of the internal audit team for this program?
Which of the following is the GREATEST advantage of maintaining an internal IS audit function within an organization?
Which of the following would present the GREATEST risk within a release management process for a new application?
In a data center audit, an IS auditor finds that the humidity level is very low. The IS auditor would be MOST concerned because of an expected increase in:
Which of the following provides an IS auditor the BEST evidence that a third-party service provider ' s information security controls are effective?
An organization has engaged a third party to implement an application to perform business-critical calculations. Which of the following is the MOST important process to help ensure the application provides accurate calculations?
Which of the following controls is the BEST recommendation to prevent the skimming of debit or credit card data in point of sale (POS) systems?
Which of the following controls helps to ensure that data extraction queries run by the database administrator (DBA) are monitored?
Which of the following should be of MOST concern to an IS auditor reviewing an organization’s IT policies?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor ' s NEXT action1?
During the audit of an enterprise resource planning (ERP) system, an IS auditor found an applicationpatch was applied to the production environment. It is MOST
important for the IS auditor to verify approval from the:
An IS auditor is preparing for a review of controls associated with a manufacturing plant ' s implementation of industrial Internet of Things (loT) infrastructure Which of the following vulnerabilities would present the GREATEST security risk to the organization?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
A bank performed minor changes to the interest calculation computer program. Which of the following techniques would provide the STRONGEST evidence to determine whether the interest calculations are correct?
An IS auditor discovers that backups of critical systems are not being performed in accordance with the recovery point objective (RPO) established in the business continuity plan (BCP). What should the auditor do NEXT?
Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls?
An IS auditor finds that some employees are using public cloud-based AI tools. Which of the following presents the GREATEST concern?
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?
Which of the following is the BEST control to help ensure the completeness of outbound transactions?
An IS auditor is performing a follow-up audit for findings identified in an organization ' s user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?
Which of the following is the MOST effective method for ensuring the integrity of log data?
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
Which of the following MOST effectively reduces the probability of a brute force attack being successful?
Which of the following should an IS auditor use when verifying a three-way match has occurred in an enterprise resource planning (ERR) system?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
An IS auditor notes that not all security tests were completed for an online sales system recently promoted to production. Which of the following is the auditor ' s BEST course of action?
Which of the following presents the GREATEST risk to an organization ' s ability to manage quality control (QC) processes?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?
Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?
Which of the following should be of GREATEST concern to an |$ auditor reviewing data conversion and migration during the implementation of a newapplication system?
Which of the following BEST protects an organization ' s proprietary code during a joint-development activity involving a third party?
Which of the following is the MOST cost-effective way to determine the effectiveness of a business continuity plan (BCP)?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor ' s BEST course of action?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
Which of the following BEST demonstrates to senior management and the board that an audit function is compliant with standards and the code of ethics?
Which of the following is the BEST indication that there are potential problems within an organization ' s IT service desk function?
Which of the following controls is MOST important for ensuring the integrity of system interfaces?
When protecting the confidentiality of information assets, the MOST effective control practice is the:
Which of the following is MOST important to determine when conducting an audit Of an organization ' s data privacy practices?
Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?
Which of the following is the BEST point in time to conduct a post-implementation review?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Based on best practices, which types of accounts should be disabled for interactive login?
Which of the following is the BEST way to mitigate risk to an organization ' s network associated with devices permitted under a bring your own device (BYOD) policy?
Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor ' s BEST recommendation for the organization?
An IS auditor is reviewing an organization ' s business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor ' s GREATEST concern?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor ' s FIRST action should be to:
Which of the following is MOST useful when planning to audit an organization ' s compliance with cybersecurity regulations in foreign countries?
Which of the following BEST describes the process of creating a digital envelope?
When reviewing an organization’s enterprise architecture (EA), which of the following is an IS auditor MOST likely to find within the EA documentation?
An IS auditor has identified deficiencies within the organization ' s software development life cycle policies. Which of the following should be done NEXT?
Which of the following metrics is the BEST indicator of the performance of a web application
A web application is developed in-house by an organization. Which of the following would provide the BEST evidence to an IS auditor that the application is secure from external attack?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?
Which of the following BEST indicates an effective internal audit quality assurance and improvement program?
An IS auditor is reviewing the disaster recovery plan (DRP) of an organization with offices across multiple regions. Which of the following should be the auditor ' s PRIMARY focus?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
Which of the following is an example of a preventative control in an accounts payable system?
Which of the following is the MOST important outcome of an information security program?
Which of the following is the MOST important reason for an organization to automate data purging?
An IS auditor determines that the vendor ' s deliverables do not include the source code for a newly acquired product. To address this issue, which of the following should the auditor recommend be included in the contract?
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
An organization ' s security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:
A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
Which of the following is the PRIMARY purpose of a business impact analysts (BIA) in an organization ' s overall risk management strategy?
Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?
A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?
Which type of threat can utilize a large group of automated social media accounts to steal data, send spam, or launch distributed denial of service (DDoS) attacks?
Which of the following would be the BEST process for continuous auditing to a large financial Institution?
An external audit firm was engaged to perform a validation and verification review for a systems implementation project. The IS auditor identifies that regression testing is not part of the project plan and was not performed by the systems implementation team. According to the team, the parallel testing being performed is sufficient, making regression testing unnecessary. What should be the auditor’s NEXT step?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following
is the auditor’s BEST recommendation to prevent unauthorized access?
An IS auditor is reviewing the security of a web-based customer relationship management (CRM) system that is directly accessed by customers via the Internet, which of the following should be a concern for the auditor?
Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization ' s goals?
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor ' s NEXT step should be to:
Which of the following is the BEST reason for an organization to use clustering?
For security awareness training to be MOST effective, management should ensure the training:
An IS auditor is verifying the adequacy of an organization ' s internal controls and is concerned about potential circumvention of regulations. Which of the following is the BEST sampling method to use?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
Which type of risk would MOST influence the selection of a sampling methodology?
How does the emergence of quantum computing impact traditional data encryption methods?
Which of the following findings from a network security review presents the GREATEST risk to the organization?
To protect the organization from malware transmitted by physical media, IT administrators have disabled USB access for storage devices. Which of the following BEST describes this type of control?
Which of the following provides the BEST assurance of data integrity after file transfers?
Which of the following would be a result of utilizing a top-down maturity model process?
Which of the following should be of GREATEST concern to an IS auditor assessing an organization ' s patch management program?
An organization ' s senior management thinks current security controls may be excessive and requests an IS auditor ' s advice on how to assess the adequacy of current measures. What is the auditor ' s BEST recommendation to management?
In a public key cryptographic system, which of the following is the PRIMARY requirement to address the risk of man-in-the-middle attacks through spoofing?
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
Which of the following technologies is BEST suited to fulfill a business requirement for nonrepudiation of business-to-business transactions with external parties without the need for a mutually trusted entity?
Which of the following protocols should be used when transferring data via the internet?
Visitors to a data center are required to present an ID and pre-approved documents. Which type of control has been implemented?
Which of the following provides the BEST evidence that system requirements are met when evaluating a project before implementation?
Which of the following is the PRIMARY benefit of benchmarking an organization ' s software development lifecycle practices against a capability maturity model?
Which of the following is MOST important to review during the project initiation phase of developing and deploying a new application?
Which of the following is MOST important to consider when defining disaster recovery strategies?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?
An IS auditor is reviewing the system development practices of an organization that is about to move from a Waterfall to an Agile approach. Which of the following is MOST important for the auditor to focus on as a result of this move?
Which of the following is the MOST important advantage of participating in beta testing of software products?
Which of the following BEST indicates that the effectiveness of an organization ' s security awareness program has improved?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
The use of access control lists (ACLs) is the MOST effective method to mitigate security risk for routers because they: (Identify Correct answer and related explanation/references from CISA Certification - Information Systems Auditor official Manual or book)
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
Which of the following IT service monitoring tools is MOST effective in identifying abnormal system events?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization ' s RACI chart. Which of the following roles within the chart would provide this information?
Which of the following recommendations would BEST prevent the implementation of IT projects without collaborating with the business?
Which of the following is the MOST important Issue for an IS auditor to consider with regard to Voice-over IP (VoIP) communications?
A sample for testing must include the 80 largest client balances and a random sample of the rest. What should the IS auditor recommend?
Which of the following is the PRIMARY benefit of monitoring IT operational logs?
Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
Which of the following is the BEST indicator of the effectiveness of an organization ' s incident response program?
Which of the following is the MOST effective way to ensure adequate system resources are available for high-priority activities?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
Which of the following is the PRIMARY benefit of introducing business impact analyses (BIAs) to business resiliency strategies?
Which of the following should be the PRIMARY focus for any network design that deploys a Zero Trust architecture?
The PRIMARY purpose of a vulnerability assessment in a cybersecurity program is to:
An IS auditor is asked to review an organization ' s technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system. Which of the following is the IS
auditor ' s BEST recommendation?
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
When reviewing an organization ' s information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
Which of the following should be an IS auditor ' s PRIMARY focus when developing a risk-based IS audit program?
Which of the following is the BEST source of information to determine the required level of data protection on a file server?
Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?
Management has requested a post-implementation review of a newly implemented purchasing package to determine the extent that business requirements are being met. Which of the following
is MOST likely to be assessed?
Which of the following provides the BEST evidence that all elements of a business continuity plan (BCP) are operating effectively?
Which of the following is MOST useful for determining the strategy for IT portfolio management?
The BEST way to evaluate the effectiveness of a newly developed application is to:
Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?
Which of the following is the MOST important course of action to ensure a cloud access security broker (CASB) effectively detects and responds to threats?
An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
Which of the following is the BEST indicator for measuring performance of IT help desk function?
An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor’s test data set to include?
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
Which of the following MOST effectively enables consistency across high-volume software changes ' ?
Which of the following is MOST important to consider when determining the usefulness of audit evidence?
Which of the following is MOST important when implementing a data classification program?
Which of the following would BEST assist an IS auditor in understanding the inputs and outputs of a microservice-oriented application?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following key performance indicators (KPIs) provides stakeholders with the MOST useful information about whether information security risk is being managed?
An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor’s independence?
Which of the following BEST enables an organization to determine the effectiveness of its information security awareness program?
Which of the following methods would MOST effectively provide positive authentication for physical access?
Which of the following should an IS auditor recommend be done FIRST when an organization is made aware of a new regulation that is likely to impact IT security requirements?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Secure code reviews as part of a continuous deployment program are which type of control?
Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
What should be the PRIMARY focus during a review of a business process improvement project?
Who should be the FIRST to evaluate an audit report prior to issuing it to the project steering committee?
Which of the following should an organization do to anticipate the effects of a disaster?
A national tax administration agency with a distributed network experiences service disruptions due to a large influx of traffic to a regional office near the end of each year. Which of the following would BEST enable the agency to improve the performance of its servers during the busy period?
Which of the following is the PRIMARY function of an internal IS auditor when the organization acquires a new IT system to support its business strategy?
Providing security certification for a new system should include which of the following prior to the system ' s implementation?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
Which of the following is the PRIMARY purpose of conducting a control self-assessment (CSA)?
A startup organization wants to develop a data loss prevention (DLP) program. The FIRST step should be to implement:
Which of the following is the PRIMARY objective of enterprise architecture (EA)?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization ' s privacy policy?
Which of the following findings should be an IS auditor’s GREATEST concern when reviewing a project to migrate confidential data backups to a cloud-based solution?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?
Which of the following is the BEST reason to implement a data retention policy?
An IS auditor notes that the previous year ' s disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
An organization is implementing a new system that supports a month-end business process. Which of the following implementation strategies would be MOST efficient to decrease business downtime?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system ' s edit routine?
Which of the following is the PRIMARY reason an IS auditor should recommend that management create an IT risk register?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
A business application ' s database is copied to a replication server within minutes. Which of the following processes taking place during business hours will MOST benefit from this architecture?
Which of the following is MOST important to consider when developing a service level agreement (SLAP)?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization ' s data conversion andinfrastructure migration plan?
Retention periods and conditions for the destruction of personal data should be determined by the.
Which of the following would be an IS auditor ' s GREATEST concern when reviewing the organization ' s business continuity plan (BCP)?
Which of the following security risks can be reduced by a property configured network firewall?
Which of the following should be identified FIRST during the risk assessment process?
Which of the following should be the GREATEST concern for an IS auditor performing a post-implementation review for a major system upgrade?
An IS auditor learns that an organization ' s business continuity plan (BCP) has not been updated in the last 18 months and that the organization recently closed a production plant. Which of the following is the auditor ' s BEST course of action?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
An IS auditor has been asked to review the integrity of data transfer between two business-critical systems that have not been tested since implementation. Which of the following would provide the MOST useful information to plan an audit?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
When assessing the overall effectiveness of an organization ' s disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
Which of the following provides re BEST evidence that outsourced provider services are being properly managed?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
Which of the following is the BEST performance indicator for the effectiveness of an incident management program?
Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?
Which of the following activities should be separated in an organization’s incident management processes?
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
Which of the following is the MOST appropriate testing approach when auditing a daily data flow between two systems via an automated interface to confirm that it is complete and accurate?
How would an IS auditor BEST determine the effectiveness of a security awareness program?
Which of the following is MOST likely to be a project deliverable of an agile software development methodology?
During an IS audit of a data center, it was found that programmers are allowed to make emergency fixes to operational programs. Which of the following should be the IS auditor ' s PRIMARY recommendation?
During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?
An organization ' s IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?
Which of the following is the BEST evidence that an organization ' s IT strategy is aligned lo its business objectives?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?
While reviewing transactions, an IS auditor discovers inconsistencies in a relational database. Which of the following would be the auditor ' s BEST recommendation?
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
Reviewing which of the following would provide the BEST indication that a project is progressing as planned?
Which type of testing is used to identify security vulnerabilities in source code in the development environment?
Which of the following public key infrastructure (PKI) elements provides detailed descriptions for dealing with a compromised private key?
Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics
system?
During a review of an organization ' s IT capacity management process, an IS auditor should be MOST concerned if capacity planning:
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
An IS auditor is performing a follow-up audit and notes that some critical deficiencies have not been addressed. The auditor ' s BEST course of action is to:
Which of the following is MOST important to consider when reviewing an organization ' s defined data backup and restoration procedures?
In an organization ' s feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
Management receives information indicating a high level of risk associated with potential flooding near the organization ' s data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
What is the PRIMARY reason for an organization to classify the data stored on its internal networks?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization ' s firewall?
A new system development project is running late against a critical implementation deadline. Which of the following is the MOST important activity?
Which of the following is the BEST way to foster continuous improvement of IS audit processes and practices?
Which of the following controls BEST provides confidentiality and nonrepudiation for an online business looking for digital payment data security?
Which type of security testing is MOST efficient for finding hidden errors in software and facilitating source code optimization?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization’s enterprise architecture (EA) program?
An IS auditor is reviewing a client ' s outsourced payroll system to assess whether the financial audit team can rely on the application. Which of the following findings would be the auditor ' s
GREATEST concern?
When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
Which of the following will invalidate the authenticity of digital evidence in a forensic investigation?
Which of the following is the BEST reason for software developers to use automated testing versus manual testing?
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
Which of the following BEST helps data loss prevention (DLP) tools detect movement of sensitive data m transit?
Which of the following is the MOST appropriate indicator of change management effectiveness?
An IS auditor has been asked to review the quality of data in a general ledger system. Which of the following would provide the auditor with the MOST meaningful results?
An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?
Which of the following helps to ensure the integrity of data for a system interface?
Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
What should an IS auditor do FIRST when a follow-up audit reveals some management action plans have not been initiated?
Which of the following network communication protocols is used by network devices such as routers to send error messages and operational information indicating success or failure when communicating with another IP address?
An IS auditor is asked to provide feedback on the systems options analysis for a new project. The BEST course of action for the IS auditor would be to:
Which of the following documents should define roles and responsibilities within an IT audit organization?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
Which of the following is the PRIMARY reason that asset classification is vital to an information security program?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
Which of the following should be an IS auditor ' s GREATEST concern when reviewing an organization ' s security controls for policy compliance?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank ' s customers. Which of the following controls is MOST important for the auditor to confirm is in place?
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department ' s objectives have been met?
In a large organization, IT deadlines on important projects have been missed because IT resources are not prioritized properly. Which of the following is the BEST recommendation to address this problem?
Which of the following is the BEST control to mitigate attacks that redirect internet traffic to an unauthorized website?
Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?
An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?
Which of the following responsibilities associated with a disaster recovery plan (DRP) can be outsourced to a Disaster Recovery as a Service (DRaaS) provider?
An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?
Which of the following should be of GREATEST concern to an IS auditor when using data analytics?
Which of the following BEST helps to ensure data integrity across system interfaces?