A new regulation has been enacted that mandates specific information security practices for the protection of customer data. Which of the following is MOST useful for an IS auditor to review when auditing against the regulation?
An IS auditor noted a recent production incident in which a teller transaction system incorrectly charged fees to customers due to a defect from a recent release. Which of the following should be the auditor's NEXT step?
An organization requires the use of a key card to enter its data center. Recently, a control was implemented that requires biometric authentication for each employee. Which type of control has
been added?
A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:
Which of the following is the BEST recommendation to drive accountability for achieving the desired outcomes specified in a benefits realization plan for an IT project?
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Which of the following is the MOST appropriate responsibility of an IS auditor involved in a data center renovation project?
A global bank plans to use a cloud provider for backup of customer financial data. Which of the following should be the PRIMARY focus of this project?
Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?
During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?
Which of the following is the GREATEST benefit of adopting an Agile audit methodology?
Which of the following staff should an IS auditor interview FIRST to obtain a general overview of the various technologies used across different programs?
Which of the following BEST indicates to an IS auditor that an organization handles emergency changes appropriately and transparently?
Which of the following is the MOST appropriate testing approach when auditing a daily data flow between two systems via an automated interface to confirm that it is complete and accurate?
In an area susceptible to unexpected increases in electrical power, which of the following would MOST effectively protect the system?
Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?
From a risk management perspective, which of the following is the BEST approach when implementing a large and complex data center IT infrastructure?
An IS auditor is reviewing an organization that performs backups on local database servers every two weeks and does not have a formal policy to govern data backup and restoration procedures. Which of the following findings presents the GREATEST risk to the organization?
An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?
Which of the following provides the MOST useful information regarding an organization's risk appetite and tolerance?
A firewall between internal network segments improves security and reduces risk by:
Which of the following controls is BEST implemented through system configuration?
Network user accounts for temporary workers expire after 90 days.
Application user access is reviewed every 180 days for appropriateness.
Financial data in key reports is traced to source systems for completeness and accuracy.
An organization's IT risk assessment should include the identification of:
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
Which of the following would BEST help to ensure that an incident receives attention from appropriate personnel in a timely manner?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following
is the auditor’s BEST recommendation to prevent unauthorized access?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country.
What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted
application?
An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?
The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:
Which of the following are used in a firewall to protect the entity's internal resources?
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves
for care?
When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
An IS auditor evaluating the change management process must select a sample from the change log. What is the BEST way to the auditor to confirm the change log is complete?
Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?
Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?
An IS auditor conducts a review of a third-party vendor's reporting of key performance indicators (KPIs) Which of the following findings should be of MOST concern to the auditor?
Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?
When is it MOST important for an IS auditor to apply the concept of materiality in an audit?
Which of the following is the BEST approach for determining the overall IT risk appetite of an organization when business units use different methods for managing IT risks?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?
Which of the following management decisions presents the GREATEST risk associated with data leakage?
Which of the following analytical methods would be MOST useful when trying to identify groups with similar behavior or characteristics in a large population?
Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?
An IS auditor requests direct access to data required to perform audit procedures instead of asking management to provide the data Which of the following is the PRIMARY advantage of this approach?
When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?
When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?
Management has learned the implementation of a new IT system will not be completed on time and has requested an audit. Which of the following audit findings should be of GREATEST concern?
An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?
Which of the following would be the BEST criteria for monitoring an IT vendor's service levels?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:
Which of the following methods will BEST reduce the risk associated with the transition to a new system using
technologies that are not compatible with the old system?
When assessing a proposed project for the two-way replication of a customer database with a remote call center, the IS auditor should ensure that:
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's data conversion and infrastructure migration plan?
Which of the following is the MOST important responsibility of user departments associated with program changes?
Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?
Which of the following BEST protects evidence in a forensic investigation?
Which of the following is the BEST indicator for measuring performance of IT help desk function?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
Which of the following is MOST important to ensure when planning a black box penetration test?
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
Which of the following components of a risk assessment is MOST helpful to management in determining the level of risk mitigation to apply?
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
Which of the following demonstrates the use of data analytics for a loan origination process?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
A proper audit trail of changes to server start-up procedures would include evidence of:
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
Secure code reviews as part of a continuous deployment program are which type of control?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
Which of the following should be an IS auditor's GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
Which of the following is MOST important with regard to an application development acceptance test?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
Which of the following MOST effectively minimizes downtime during system conversions?
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
Which of the following BEST indicates the effectiveness of an organization's risk management program?
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
Which of the following BEST helps to ensure data integrity across system interfaces?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following is MOST critical for the effective implementation of IT governance?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following is MOST important when implementing a data classification program?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following should be identified FIRST during the risk assessment process?
Which of the following is the MAIN responsibility of the IT steering committee?
An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
An organization's IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?
Which of the following provides the BEST evidence of the validity and integrity of logs in an organization's security information and event management (SIEM) system?
Which of the following areas of responsibility would cause the GREATEST segregation of duties conflict if the individual who performs the related tasks also has approval authority?
An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?
A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?
Which of the following is MOST important for the successful establishment of a security vulnerability management program?
Which type of attack poses the GREATEST risk to an organization's most sensitive data?
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
An IS auditor is verifying the adequacy of an organization's internal controls and is concerned about potential circumvention of regulations. Which of the following is the BEST sampling method to use?
Which of the following is MOST helpful for an IS auditor to review when evaluating an organizations business process that are supported by applications and IT systems?
An IS auditor reviewing a job scheduling tool notices performance and reliability problems. Which of the following is MOST likely affecting the tool?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
Which of the following is the MOST important control for virtualized environments?
Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?
During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?
Which of the following provides the MOST protection against emerging threats?
An organization relies on an external vendor that uses a cloud-based Software as a Service (SaaS) model to back up its data. Which of the following is the GREATEST risk to the organization related to data backup and retrieval?
Which of the following BEST supports the effectiveness of a compliance program?
Which of the following would BEST indicate the effectiveness of a security awareness training program?
Which of the following is MOST critical to the success of an information security program?
An IS auditor is reviewing an organization's business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
Which of the following should be done FIRST to minimize the risk of unstructured data?
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?
Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics
system?
Which of the following is the MOST important advantage of participating in beta testing of software products?
Retention periods and conditions for the destruction of personal data should be determined by the.
Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?
Which of the following is the MOST effective accuracy control for entry of a valid numeric part number?
During the review of a system disruption incident, an IS auditor notes that IT support staff were put in a position to make decisions beyond their level of authority.
Which of the following is the BEST recommendation to help prevent this situation in the future?
An organization is disposing of removable onsite media which contains sensitive information. Which of the following is the MOST effective method to prevent disclosure of sensitive data?
Which of the following is the BEST reason to implement a data retention policy?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
Which of the following would provide management with the MOST reasonable assurance that a new data warehouse will meet the needs of the
organization?
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
Which of the following BEST enables a benefits realization process for a system development project?
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
Which of the following is an IS auditor's BEST recommendation to mitigate the risk of eavesdropping
associated with an application programming interface (API) integration implementation?
An IS auditor learns that an organization's business continuity plan (BCP) has not been updated in the last 18 months and that the organization recently closed a production plant. Which of the following is the auditor's BEST course of action?
A global organization's policy states that all workstations must be scanned for malware each day. Which of the following would provide an IS auditor with the BEST evidence of continuous compliance with this policy?
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?
Which of the following is the PRIMARY benefit of a tabletop exercise for an incident response plan?
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
Which of the following criteria is MOST important for the successful delivery of benefits from an IT project?
An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor’s test data set to include?
An IS auditor discovers that a developer has used the same key to grant access to multiple applications making calls to an application programming interface (API). Which of the following is the BEST recommendation to address this situation?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
The BEST way to provide assurance that a project is adhering to the project plan is to:
An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
Which of the following represents the HIGHEST level of maturity of an information security program?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
Which of the following MUST be completed as part of the annual audit planning process?
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?
The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?
Which of the following documents should specify roles and responsibilities within an IT audit organization?
Which of the following business continuity activities prioritizes the recovery of critical functions?
Which of the following BEST Indicates that an incident management process is effective?
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:
Which of the following occurs during the issues management process for a system development project?
Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization's privacy policy?
An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
In an online application which of the following would provide the MOST information about the transaction audit trail?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
During an audit of a multinational bank's disposal process, an IS auditor notes several findings. Which of the following should be the auditor's GREATEST concern?
An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?
An information systems security officer's PRIMARY responsibility for business process applications is to:
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?
What is the Most critical finding when reviewing an organization’s information security management?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
An IS auditor is reviewing security controls related to collaboration tools for a business unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
Which of the following is the MOST important success factor for implementing a data loss prevention (DLP) tool?
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
Data from a system of sensors located outside of a network is received by the open ports on a server. Which of the following is the BEST way to ensure the integrity of the data being collected from the sensor system?
Which of the following should be an IS auditor's GREATEST concern when assessing an IT service configuration database?
Which of the following audit procedures would provide the BEST assurance that an application program is functioning as designed?
Which of the following presents the GREATEST risk associated with end-user computing (EUC) applica-tions over financial reporting?
An IS auditor found that operations personnel failed to run a script contributing to year-end financial statements. Which of the following is the BEST recommendation?
Which of the following is the MOST important consideration when establishing operational log management?
Which of the following BEST indicates a need to review an organization's information security policy?
An IS auditor is assessing the adequacy of management's remediation action plan. Which of the following should be the MOST important consideration?
An organization has implemented a new data classification scheme and asks the IS auditor to evaluate its effectiveness. Which of the following would be of
GREATEST concern to the auditor?
An organization allows programmers to change production systems in emergency situations without seeking prior approval. Which of the following controls should an IS auditor consider MOST
important?
Which of the following should be of MOST concern to an IS auditor reviewing an organization's operational log management?
An IS auditor is reviewing a medical device that is attached to a patient’s body, which automatically takes and uploads measurements to a cloud server. Treatment may be updated based on the measurements. Which of the following should be the auditor's PRIMARY focus?
A network analyst is monitoring the network after hours and detects activity that appears to be a brute-force attempt to compromise a critical server. After reviewing the alerts to ensure their accuracy, what should be done NEXT?
The PRIMARY role of an IS auditor in the remediation of problems found during an audit engagement is to:
Which of the following findings related to segregation of duties should be of GREATEST concern to an IS auditor?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
An organization's information security policies should be developed PRIMARILY on the basis of:
Which of the following is the MOST effective way to detect as many abnormalities as possible during an IS audit?
An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:
When designing metrics for information security, the MOST important consideration is that the metrics:
In a review of the organization standards and guidelines for IT management, which of the following should be included in an IS development methodology?
Which of the following is the MOST important consideration when developing tabletop exercises within a cybersecurity incident response plan?
An organization has decided to build a data warehouse using source data from several disparate systems to support strategic decision-making.
Which of the following is the BEST way to ensure the accuracy and completeness of the data used to support business decisions?
Which of the following findings would be of GREATEST concern to an IS auditor reviewing the security architecture of an organization that has just implemented a Zero Trust solution?
Which of the following should be an IS auditor's PRIMARY focus when auditing the implementation of a new IT operations performance monitoring system?
A system performance dashboard indicates several application servers are reaching the defined threshold for maximum CPU allocation. Which of the following would be the IS auditor's BEST recommendation for the IT department?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the
firewall and:
A security review focused on data loss prevention (DLP) revealed the organization has no visibility to data stored in the cloud. What is the IS auditor's BEST recommendation to address this
issue?