A small business unit is implementing a control self-assessment (CSA) program and leveraging the internal
audit function to test its internal controls annually. Which of the following is the MOST significant benefit of
this approach?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
Which of the following encryption methods offers the BEST wireless security?
Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time?
Which of the following is the MOST important success factor for implementing a data loss prevention (DLP) tool?
Providing security certification for a new system should include which of the following prior to the system's implementation?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following BEST indicates the effectiveness of an organization's risk management program?
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
Which of the following is the MOST cost-effective way to determine the effectiveness of a business continuity plan (BCP)?
An IS auditor has been tasked with analyzing an organization's capital expenditures against its repair and maintenance costs. Which of the following is the BEST reason to use a data analytics tool for this purpose?
Which of the following metrics is the BEST indicator of the performance of a web application?
Which of the following findings would be of GREATEST concern to an IS auditor reviewing firewall security for an organization's corporate network?
During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
Which of the following is the PRIMARY reason to involve IS auditors in the software acquisition process?
Which of the following is the MOST effective way for an organization to project against data loss?
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
Which type of control has been established when an organization implements a security information and event management (SIEM) system?
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's IT process performance reports over the last quarter?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
In reviewing the IT strategic plan, the IS auditor should consider whether it identifies the:
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
An IS auditor evaluating the change management process must select a sample from the change log. What is the BEST way to the auditor to confirm the change log is complete?
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
A proper audit trail of changes to server start-up procedures would include evidence of:
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
Which of the following is the BEST reason to implement a data retention policy?
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
Which of the following is necessary for effective risk management in IT governance?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
Which of the following BEST facilitates the legal process in the event of an incident?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
An IS auditor assessing the controls within a newly implemented call center would First
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
Which of the following is MOST critical for the effective implementation of IT governance?
During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?
The charging method that effectively encourages the MOST efficient use of IS resources is:
Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?
An IS auditor requests direct access to data required to perform audit procedures instead of asking management to provide the data Which of the following is the PRIMARY advantage of this approach?
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?
Which of the following is an IS auditor's BEST approach when prepanng to evaluate whether the IT strategy supports the organization's vision and mission?
Which of the following is MOST helpful to an IS auditor when assessing the effectiveness of controls?
An IS auditor is preparing a plan for audits to be carried out over a specified period. Which of the following activities should the IS auditor perform FIRST?
In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?
Which of the following should be an IS auditor's PRIMARY focus when evaluating the response process for cybercrimes?
Controls related to authorized modifications to production programs are BEST tested by:
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?
Which of the following metrics would BEST measure the agility of an organization's IT function?
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
Which of the following is the MOST important activity in the data classification process?
Which of the following BEST indicates that the effectiveness of an organization's security awareness program has improved?
Which of the following is the BEST approach to help organizations address risks associated with shadow IT?
Which of the following controls is MOST effective at preventing system failures when implementing a new web application?
Which of the following is the PRIMARY reason for using a digital signature?
Which of the following operational log management considerations is MOST important for an organization undergoing a digital transformation?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?
Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
Which of the following concerns is BEST addressed by securing production source libraries?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?
Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
Which of the following demonstrates the use of data analytics for a loan origination process?
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
The implementation of an IT governance framework requires that the board of directors of an organization:
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
Secure code reviews as part of a continuous deployment program are which type of control?
Which of the following data would be used when performing a business impact analysis (BIA)?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?
After delivering an audit report, the audit manager discovers that evidence was overlooked during the audit This evidence indicates that a procedural control may have failed and could contradict a conclusion of the audit Which of the following risks is MOST affected by this oversight?
An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?
Which of the following concerns is MOST effectively addressed by implementing an IT framework for alignment between IT and business objectives?
What would be an IS auditor's BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization's objectives?
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following
is the auditor’s BEST recommendation to prevent unauthorized access?
Which type of device sits on the perimeter of a corporate of home network, where it obtains a public IP address and then generates private IP addresses internally?
Which of the following provides the BEST assurance of data integrity after file transfers?
Which of the following is the BEST indication that there are potential problems within an organization's IT service desk function?
Due to advancements in technology and electronic records, an IS auditor has completed an engagement by email only. Which of the following did the IS auditor potentially compromise?
Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?
Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?
Which of the following should be the FIRST step when planning an IS audit of a third-party service provider that monitors network activities?
Which of the following is MOST important for an IS auditor to review when determining whether IT investments are providing value to tie business?
An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?
Which of the following is the BEST methodology to use for estimating the complexity of developing a large business application?
When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?
An organization has implemented a distributed security administration system to replace the previous centralized one. Which of the following presents the GREATEST potential concern?
Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?
Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?
A finance department has a multi-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger. and in year one, the system version upgrade will be applied. Which of the following should be the PRIMARY focus of the IS auditor reviewing the first year of the project?
An IS auditor is reviewing a data conversion project Which of the following is the auditor's BEST recommendation prior to go-live?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
In the development of a new financial application, the IS auditor's FIRST involvement should be in the:
Which of the following is me GREATE ST impact as a result of the ongoing deterioration of a detective control?
When assessing whether an organization's IT performance measures are comparable to other organizations in the same industry, which of the following would be MOST helpful to review?
Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?
Which of the following controls is BEST implemented through system configuration?
Network user accounts for temporary workers expire after 90 days.
Application user access is reviewed every 180 days for appropriateness.
Financial data in key reports is traced to source systems for completeness and accuracy.
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
Which of the following components of a risk assessment is MOST helpful to management in determining the level of risk mitigation to apply?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
Which of the following would be MOST useful when analyzing computer performance?
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
Which of the following provides the BEST evidence that a third-party service provider's information security controls
are effective?
Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD)
policy to help prevent data leakage?
What is the PRIMARY purpose of performing a parallel run of a now system?
Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program'?
A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?
Which of the following would be the BEST criteria for monitoring an IT vendor's service levels?
During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor's GREATEST concern with this situation?
Which of the following is MOST effective for controlling visitor access to a data center?
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?
An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following is the BEST indication of effective IT investment management?
An IS department is evaluated monthly on its cost-revenue ratio user satisfaction rate, and computer downtime This is BEST zed as an application of.
Which of the following is the MOST important Issue for an IS auditor to consider with regard to Voice-over IP (VoIP) communications?
During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?
Which of the following security risks can be reduced by a property configured network firewall?
In an online application which of the following would provide the MOST information about the transaction audit trail?
An IS auditor is reviewing security controls related to collaboration tools for a business unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
The GREATEST benefit of using a polo typing approach in software development is that it helps to:
An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?
Which of the following is MOST helpful for measuring benefits realization for a new system?
In a RAO model, which of the following roles must be assigned to only one individual?
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
An information systems security officer's PRIMARY responsibility for business process applications is to:
Which of the following BEST Indicates that an incident management process is effective?
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
Which of the following MUST be completed as part of the annual audit planning process?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?
A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor's GREATEST concern?
Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?
Which of the following is the MAIN purpose of an information security management system?
Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
Which of the following is MOST important to consider when scheduling follow-up audits?
An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
Which of the following findings from an IT governance review should be of GREATEST concern?
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
Which of the following represents the HIGHEST level of maturity of an information security program?
What is the Most critical finding when reviewing an organization’s information security management?
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
Which of the following documents should specify roles and responsibilities within an IT audit organization?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
Which of the following is MOST helpful in identifying system performance constraints?
During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor's BEST course of action?
When drafting a disaster recovery strategy, what should be the MOST important outcome of a business impact analysis (BIA)?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the
auditor's BEST recommendation to help prevent unauthorized access?
Which of the following is the STRONGEST indication of a mature risk management program?
Which of the following recommendations would BEST prevent the implementation of IT projects without collaborating with the business?
Which of the following is the GREATEST impact as a result of the ongoing deterioration of a detective control?
An external audit firm was engaged to perform a validation and verification review for a systems implementation project. The IS auditor identifies that regression testing is not part of the project plan and was not performed by the systems implementation team. According to the team, the parallel testing being performed is sufficient, making regression testing unnecessary. What should be the auditor’s NEXT step?
Which of the following is a PRIMARY function of an intrusion detection system (IDS)?
Which of the following is the BEST reason for software developers to use automated testing versus manual testing?
Which of the following should be of GREATEST concern to an IS auditor reviewing project documentation for a client relationship management (CRM) system migration project?
A steering committee established to oversee an organization's digital transformation program is MOSTlikely to be involved with which of the following activities?
When reviewing the disaster recovery strategy, IT management identified an application that requires a short recovery point objective (RPO). Which of the following data restoration strategies would BEST enable the organization to meet this objective?
Which of the following is the MOST important consideration when establishing operational log management?
An IS auditor determines elevated administrator accounts for servers that are not properly checked out and then back in after each use. Which of the following is the MOST appropriate sampling technique to determine the scope of the problem?
Which of the following is the GREATEST benefit of adopting an Agile audit methodology?
Which of the following criteria is MOST important for the successful delivery of benefits from an IT project?
Which of the following BEST enables an IS auditor to assess whether jobs were completed according to the job schedule?
Which of the following is MOST appropriate to review when determining if the work completed on an IT project is in alignment with budgeted costs?
An IS auditor is reviewing a decision to consolidate processing for multiple applications onto a single large server. Which of the following is the MOST significant impact from this decision?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
Which of the following is the GREATEST risk associated with hypervisors in virtual environments?
Which of the following is the MOST important consideration when implementing a Zero Trust strategy for mobile, wireless, and Internet of Things (IoT) devices?
Which of the following is the BEST approach to validate whether a streaming site can continue to provide service during a period of live streaming with an anticipated high volume of viewers?
Which of the following should be the PRIMARY consideration when incorporating user training and awareness into a data loss prevention (DLP) strategy?
Which of the following would be of GREATEST concern to an IS auditor reviewing the feasibility study for a new application system?
Which of the following BEST ensures that effective change management is in place in an IS environment?
Which of the following is the BEST review for an IS auditor to conduct when a vulnerability has been exploited by an employee?
Which of the following should be of MOST concern to an IS auditor reviewing an organization's operational log management?
Which of the following is the MOST significant risk to an organization migrating its onsite application servers to a public cloud service provider?
Which of the following BEST addresses the availability of an online store?
Which of the following is the MOST likely root cause of shadow IT in an organization?
Which of the following is the PRIMARY advantage of using an automated security log monitoring tool instead of conducting a manual review to monitor the use of privileged access?
Which of the following is the BEST control to help ensure that security requirements are considered throughout the life cycle of an agile software development project?
An organization wants to use virtual desktops to deliver corporate applications to its end users. Which of the following should an IS auditor recommend to prevent domain name system (DNS) poisoning in their cloud environment?
Which of the following is the MOST effective way to ensure adequate system resources are available for high-priority activities?
An IS auditor is reviewing the service management of an outsourced help desk. Which of the following is the BEST indicator of how effectively the service provider is performing this function?
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
An IS auditor learns that a business owner violated the organization's security policy by creating a web page with access to production data. The auditor's NEXT step should be to:
Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?
Management has decided to accept a risk in response to a draft audit recommendation. Which of the following should be the IS auditor’s NEXT course of action?
An IS auditor noted a recent production incident in which a teller transaction system incorrectly charged fees to customers due to a defect from a recent release. Which of the following should be the auditor's NEXT step?
Which of the following BEST supports an organization's objective of restricting the use of removable storage devices by users?
Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?
When reviewing hard disk utilization reports, an IS auditor observes that utilization is routinely above 95%. Which of the following should be the GREATEST concern to the IS auditor?
An IS auditor is reviewing a data conversion project. Which of the following is the auditor's BEST recommendation prior to go-live?
Which of the following is the PRIMARY advantage of using an automated security log monitoring tool over a manual review to monitor the use of privileged access?
Which of the following is the BEST recommendation by an IS auditor to prevent unauthorized access to Internet of Things (loT) devices'?
Which of the following would be MOST helpful to an IS auditor performing a risk assessment of an application programming interface (API) that feeds credit scores from a well-known commercial credit agency into an organizational system?
In a large organization, IT deadlines on important projects have been missed because IT resources are not prioritized properly. Which of the following is the BEST recommendation to address this problem?
Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?
Which type of attack targets security vulnerabilities in web applications to gain access to data sets?
Which of the following is the PRIMARY basis on which audit objectives are established?
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?
Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?
Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data
classification in this project?
Which of the following is MOST important to include in security awareness training?
Which of the following helps to ensure the integrity of data for a system interface?
Which of the following is the MOST important consideration for patching mission critical business application servers against known vulnerabilities?
An organization plans to replace its nightly batch processing backup to magnetic tape with real-time replication to a second data center. Which of the following is the GREATEST risk associated with this change?
Which of the following is MOST useful when planning to audit an organization's compliance with cybersecurity regulations in foreign countries?
When planning a follow-up, the IS auditor is informed by operational management that recent organizational changes have addressed the previously identified risk and implementing the action plan is no longer necessary. What should the auditor do NEXT?
Which of the following is the BEST way to ensure an organization's data classification policies are preserved during the process of data transformation?
An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?
Which of the following is MOST critical to the success of an information security program?
During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?
An IS auditor is verifying the adequacy of an organization's internal controls and is concerned about potential circumvention of regulations. Which of the following is the BEST sampling method to use?
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?
An IS auditor should be MOST concerned if which of the following fire suppression systems is utilized to protect an asset storage closet?
An organization considering the outsourcing of a business application should FIRST:
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
Which of the following areas of responsibility would cause the GREATEST segregation of duties conflict if the individual who performs the related tasks also has approval authority?
A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?
Which of the following is the BEST way for an IS auditor to assess the design of an automated application control?
Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?
Which of the following provides the MOST protection against emerging threats?
Which of the following is the MOST important reason for an IS auditor to examine the results of a post-incident review performed after a security incident?
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?
The record-locking option of a database management system (DBMS) serves to.
Which of the following is the MAIN responsibility of the IT steering committee?
Which of the following BEST enables an organization to improve the effectiveness of its incident response team?
Which of the following would BEST indicate the effectiveness of a security awareness training program?
Which of the following metrics is the BEST indicator of the performance of a web application
Which of the following is the BEST point in time to conduct a post-implementation review?
An organization has an acceptable use policy in place, but users do not formally acknowledge the policy. Which of the following is the MOST significant risk from this finding?
A global organization's policy states that all workstations must be scanned for malware each day. Which of the following would provide an IS auditor with the BEST evidence of continuous compliance with this policy?
Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?
Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?
Which of the following is MOST critical to the success of an information security program?
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
Which type of attack poses the GREATEST risk to an organization's most sensitive data?
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?
When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?
An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor's NEXT course of action?
Which of the following should be given GREATEST consideration when implementing the use of an open-source product?
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor's BEST course of action?
The BEST way to provide assurance that a project is adhering to the project plan is to:
An IS auditor reviewing incident response management processes notices that resolution times for reoccurring incidents have not shown improvement. Which of the following is the auditor's BEST recommendation?
Which of the following should an IS auditor use when verifying a three-way match has occurred in an enterprise resource planning (ERR) system?
An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?