An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?
Which of following is MOST important to determine when conducting a post-implementation review?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?
Which of the following is the MOST effective way for an organization to project against data loss?
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
The implementation of an IT governance framework requires that the board of directors of an organization:
A proper audit trail of changes to server start-up procedures would include evidence of:
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
An IS auditor has been asked to review the quality of data in a general ledger system. Which of the following would provide the auditor with the MOST meaningful results?
Following an IT audit, management has decided to accept the risk highlighted in the audit report. Which of the following would provide the MOST assurance to the IS auditor that management
is adequately balancing the needs of the business with the need to manage risk?
Which of the following should be the IS auditor's PRIMARY focus when evaluating an organizations offsite storage facility?
Which of the following would be of GREATEST concern to an IS auditor reviewing the resiliency of an organizational network that has two internet connections?
Which of the following poses the GREATEST risk to an organization related to system interfaces?
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor's NEXT course of action?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
Which of the following BEST indicates the effectiveness of an organization's risk management program?
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
During an information security review, an IS auditor learns an organizational policy requires all employ-ees to attend information security training during the first week of each new year. What is
the auditor's BEST recommendation to ensure employees hired after January receive adequate guid-ance regarding security awareness?
An organization has both an IT strategy committee and an IT steering committee. When reviewing the minutes of the IT steering committee, an IS auditor would expect to find that the
committee:
Which of the following should be of GREATEST concern for an IS auditor when reviewing user account policies?
Which of the following is the MOST important course of action to ensure a cloud access security broker (CASB) effectively detects and responds to threats?
Which of the following encryption methods offers the BEST wireless security?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
An IS auditor has been asked to review the integrity of data transfer between two business-critical systems that have not been tested since implementation. Which of the following would provide the MOST useful information to plan an audit?
Which of the following would be MOST important to include in an IS audit report?
Which of the following is the MOST efficient control to reduce the risk associated with a systems administrator having network administrator responsibilities?
Which of the following tasks would cause the GREATEST segregation of duties (SoD) concern if performed by the person who reconciles the organization's device inventory?
Which of the following should be of GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
An IS auditor is preparing for a review of controls associated with a manufacturing plant's implementation of industrial Internet of Things (loT) infrastructure Which of the following vulnerabilities would present the GREATEST security risk to the organization?
What should an IS auditor ensure when a financial organization intends to utilize production data in the testing environment?
A small organization is experiencing rapid growth and plans to create a new information security policy. Which of the following is MOST relevant to creating the policy?
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
An IS auditor assessing the controls within a newly implemented call center would First
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
Which of the following is MOST important when implementing a data classification program?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?
Which of the following BEST facilitates the legal process in the event of an incident?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
An IS auditor is reviewing an organization's risk management program. Which of the following should be the PRIMARY driver of the enterprise IT risk appetite?
Which of the following is an IS auditor’s BEST recommendation after identifying that HR staff create new employees in the payroll system as well as process payroll due to limited staffing?
Which of the following is the BEST disposal method for flash drives that previously stored confidential data?
An IS auditor is reviewing a network diagram. Which of the following would be the BEST location for placement of a firewall?
which of the following is a core functionality of a configuration and release management system?
An organization that has decided to approve the use of end-user computing (EUC) should FIRST ensure:
A global bank plans to use a cloud provider for backup of customer financial data. Which of the following should be the PRIMARY focus of this project?
Which of the following recommendations would BEST prevent the implementation of IT projects without collaborating with the business?
Which of the following is MOST important for an IS auditor to assess during a post-implementation review of a newly modified IT application developed in-house?
Which of the following is the BEST way to ensure a vendor complies with system security requirements?
Which of the following is the BEST way to ensure email confidentiality in transit?
External audits have identified recurring exceptions in the user termination process, despite similar internal audits having reported no exceptions in the past. Which of the following is the IS auditor's BEST course of action to improve the internal audit process in the future?
Which of the following MOST effectively minimizes downtime during system conversions?
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
Which of the following data would be used when performing a business impact analysis (BIA)?
Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization's configuration and release management process?
Data is being transferred from an application database to a data warehouse. Some fields were not picked up in the extraction process and therefore were not transferred to the data warehouse. Which of the following is the GREATEST risk associated with this situation?
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
An IS auditor finds that the cost of developing an application is now projected to significantly exceed the budget. Which of the following is the GREATEST risk to communicate to senior management?
Which of the following would be the GREATEST concern during a financial statement audit?
In a data center audit, an IS auditor finds that the humidity level is very low. The IS auditor would be MOST concerned because of an expected increase in:
Which of the following BEST indicates a need to review an organization's information security policy?
Which of the following is PRIMARILY used in blockchain technology to create a distributed immutable ledger?
Which of the following is the BEST reason to implement a data retention policy?
Which of the following backup schemes is the BEST option when storage media is limited?
Which of the following would be MOST useful when analyzing computer performance?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?
When planning a review of IT governance, an IS auditor is MOST likely to:
Which of the following is MOST important for an IS auditor to verify when evaluating tne upgrade of an organization's enterprise resource planning (ERP) application?
Who is accountable for an organization's enterprise risk management (ERM) program?
An organization is ready to implement a new IT solution consisting of multiple modules. The last module updates the processed data into the database. Which of the following findings should be of MOST concern to the IS auditor?
An IS auditor found that operations personnel failed to run a script contributing to year-end financial statements. Which of the following is the BEST recommendation?
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
Which of the following is MOST appropriate to review when determining if the work completed on an IT project is in alignment with budgeted costs?
An IS auditor is reviewing a machine learning model that predicts the likelihood that a user will watch a certain movie. Which of the following would be of GREATEST concern to the auditor?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's mobile device policies and controls in its corporate environment?
An organization has implemented a new data classification scheme and asks the IS auditor to evaluate its effectiveness. Which of the following would be of
GREATEST concern to the auditor?
What should be an IS auditor's PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?
While reviewing the effectiveness of an incident response program, an IS auditor notices a high number of reported incidents involving malware originating from removable media found by employees. Which of the following is the MOST appropriate recommendation to management?
Which of the following measures BEST mitigates the risk of data exfiltration during a cyberattack?
An IS auditor is reviewing documentation from a change that was applied to an application. Which of the following findings would be the GREATEST concern?
Which of the following is an IS auditor's BEST course of action when the auditee indicates that a corrective action plan for a high-risk finding will take longer than expected?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor's BEST course of action?
Which of the following MOST effectively detects transposition and transcription errors?
An organization establishes capacity utilization thresholds and monitors for instances when thresholds are exceeded. Which of the following is BEST supported by this activity?
An IS auditor is evaluating the log management system for an organization with devices and systems in multiple geographic locations. Which of the following is MOST important for the auditor to verify?
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
Which of the following BEST addresses the availability of an online store?
Backup procedures for an organization's critical data are considered to be which type of control?
When assessing a proposed project for the two-way replication of a customer database with a remote call center, the IS auditor should ensure that:
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization's objectives?
In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
An organization has implemented a distributed security administration system to replace the previous centralized one. Which of the following presents the GREATEST potential concern?
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
Which of the following is a PRIMARY responsibility of an IT steering committee?
An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS
Which of the following provides the BEST assurance of data integrity after file transfers?
An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether
Controls related to authorized modifications to production programs are BEST tested by:
The PRIMARY purpose of requiring source code escrow in a contractual agreement is to:
An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?
Which of the following is the BEST approach for determining the overall IT risk appetite of an organization when business units use different methods formanaging IT risks?
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
Which of the following should be the FIRST step when planning an IS audit of a third-party service provider that monitors network activities?
An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?
In the development of a new financial application, the IS auditor's FIRST involvement should be in the:
Which of the following would BEST help to ensure that an incident receives attention from appropriate personnel in a timely manner?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's data conversion andinfrastructure migration plan?
Which of the following provides the BEST evidence that a third-party service provider's information security controls
are effective?
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
Which of the following should be the FIRST step to successfully implement a corporate data classification program?
As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:
Due to advancements in technology and electronic records, an IS auditor has completed an engagement by email only. Which of the following did the IS auditor potentially compromise?
When assessing whether an organization's IT performance measures are comparable to other organizations in the same industry, which of the following would be MOST helpful to review?
Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?
When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on
Which of the following is the BEST source of information for examining the classification of new data?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?
Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?
What would be an IS auditor's BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?
A firewall between internal network segments improves security and reduces risk by:
Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves
for care?
Which of the following is the BEST indication that there are potential problems within an organization's IT service desk function?
An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:
Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan?
Which of the following should be restricted from a network administrator's privileges in an adequately segregated IT environment?
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?
Which of the following is the PRIMARY role of key performance indicators (KPIs) in supporting business process effectiveness?
in a post-implantation Nation review of a recently purchased system it is MOST important for the iS auditor to determine whether the:
Which of the following is the BEST methodology to use for estimating the complexity of developing a large business application?
Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?
Which of the following methods will BEST reduce the risk associated with the transition to a new system using technologies that are not compatible with the old system?
Which of the following is MOST important to consider when reviewing an organization's defined data backup and restoration procedures?
An IS auditor Is renewing the deployment of a new automated system Which of the following findings presents the MOST significant risk?
The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:
Which of the following is the BEST source of information to determine the required level of data protection on a file server?
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
What is the BEST way to reduce the risk of inaccurate or misleading data proliferating through business intelligence systems?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
In a RAO model, which of the following roles must be assigned to only one individual?
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?
An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
Which of the following BEST Indicates that an incident management process is effective?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?
An IS auditor is evaluating the risk associated with moving from one database management system (DBMS) to another. Which of the following would be MOST helpful to ensure the integrity of the system throughout the change?
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
Which of the following is the BEST reason for an organization to use clustering?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
Which of the following should an IS auditor consider FIRST when evaluating firewall rules?
In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
During an audit of a multinational bank's disposal process, an IS auditor notes several findings. Which of the following should be the auditor's GREATEST concern?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization's privacy policy?
Which of the following findings from an IT governance review should be of GREATEST concern?
Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
In an online application, which of the following would provide the MOST information about the transaction audit trail?
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed?
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
During the planning stage of a compliance audit, an IS auditor discovers that a bank's inventory of compliance requirements does not include recent regulatory changes related to managing data risk. What should the auditor do FIRST?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
Which of the following controls is MOST important for ensuring the integrity of system interfaces?
Which of the following physical controls provides the GREATEST assurance that only authorized individuals can access a data center?
Which of the following is the MOST important advantage of participating in beta testing of software products?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
During the review of a system disruption incident, an IS auditor notes that IT support staff were put in a position to make decisions beyond their level of authority.
Which of the following is the BEST recommendation to help prevent this situation in the future?
A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?
An IS auditor learns that an organization's business continuity plan (BCP) has not been updated in the last 18 months and that the organization recently closed a production plant. Which of the following is the auditor's BEST course of action?
Which of the following is MOST helpful for an IS auditor to review when evaluating an organizations business process that are supported by applications and IT systems?
Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?
A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?
Which of the following should be identified FIRST during the risk assessment process?
Which of the following is the BEST way to ensure an organization's data classification policies are preserved during the process of data transformation?
Which of the following BEST enables a benefits realization process for a system development project?
Which of the following is MOST critical to the success of an information security program?
An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
Which of the following is the BEST point in time to conduct a post-implementation review?
In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?
Which of the following would BEST indicate the effectiveness of a security awareness training program?
A national tax administration agency with a distributed network experiences service disruptions due to a large influx of traffic to a regional office near the end of each year. Which of the following would BEST enable the agency to improve the performance of its servers during the busy period?
During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?
Which of the following BEST contributes to the quality of an audit of a business-critical application?
The BEST way to provide assurance that a project is adhering to the project plan is to:
When reviewing a business case for a proposed implementation of a third-party system, which of the following should be an IS auditor's GREATEST concern?
Which of the following is the GREATEST advantage of outsourcing the development of an e-banking solution when in-house technical expertise is not available?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
An organization considering the outsourcing of a business application should FIRST:
Which of the following is the BEST reason to implement a data retention policy?
An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization's payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management
experience. What is the BEST course of action?
An IS auditor is planning an audit of an organization's risk management practices. Which of the following would provide the MOST useful information about
risk appetite?
When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
When developing customer-facing IT applications, in which stage of the system development life cycle (SDLC) is it MOST beneficial to consider data privacy principles?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
Which of the following statements appearing in an organization's acceptable use policy BEST demonstrates alignment with data classification standards related to the protection of information assets?
An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?
Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
Which of the following provides the BEST evidence of the validity and integrity of logs in an organization's security information and event management (SIEM) system?
During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?
An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?
An IS auditor reviewing incident response management processes notices that resolution times for reoccurring incidents have not shown improvement. Which of the following is the auditor's BEST recommendation?
Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?
An organization has shifted from a bottom-up approach to a top-down approach in the development of IT policies. This should result in:
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
An organization is disposing of removable onsite media which contains sensitive information. Which of the following is the MOST effective method to prevent disclosure of sensitive data?
An organization relies on an external vendor that uses a cloud-based Software as a Service (SaaS) model to back up its data. Which of the following is the GREATEST risk to the organization related to data backup and retrieval?
Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics
system?
An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?
An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor's independence?
Which of the following is the MOST important responsibility of data owners when implementing a data classification process?
The record-locking option of a database management system (DBMS) serves to.
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor's NEXT step should be to:
An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality
within the organization. Which of the following should be recommended as the PRIMARY factor to
determine system criticality?
Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?
Which of the following should be done FIRST to minimize the risk of unstructured data?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?
The BEST way to evaluate the effectiveness of a newly developed application is to:
Which of the following provides the MOST protection against emerging threats?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
Which of the following is the MOST important consideration for patching mission critical business application servers against known vulnerabilities?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following is MOST critical for the effective implementation of IT governance?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
Which of the following is a PRIMARY function of an intrusion detection system (IDS)?
Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?
The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:
Which of the following provides the BEST evidence that all elements of a business continuity plan (BCP) are operating effectively?
Which of the following is MOST important for an IS auditor to verify when reviewing the planned use of Benford's law as a data analytics technique to detect fraud in a set of credit card transactions?
An IS auditor is reviewing an organization's incident management processes. Which of the following observations should be the auditor's GREATEST concern?
Which of the following is the MOST important consideration when developing tabletop exercises within a cybersecurity incident response plan?
Which of the following should be of MOST concern to an IS auditor reviewing an organization's operational log management?
A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?