An IS department is evaluated monthly on its cost-revenue ratio user satisfaction rate, and computer downtime This is BEST zed as an application of.
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's data conversion andinfrastructure migration plan?
The use of access control lists (ACLs) is the MOST effective method to mitigate security risk for routers because they: (Identify Correct answer and related explanation/references from CISA Certification - Information Systems Auditor official Manual or book)
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
Which of the following analytical methods would be MOST useful when trying to identify groups with similar behavior or characteristics in a large population?
When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?
When classifying information, it is MOST important to align the classification to:
When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?
Which of the following control measures is the MOST effective against unauthorized access of confidential information on stolen or lost laptops?
Which of the following should an IS auditor review when evaluating information systems governance for a large organization?
In reviewing the IT strategic plan, the IS auditor should consider whether it identifies the:
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
Which of the following should be of MOST concern to an IS auditor reviewing an organization's operational log management?
An IS auditor wants to gain a better understanding of an organization’s selected IT operating system software. Which of the following would be MOST helpful to review?
Which of following is MOST important to determine when conducting a post-implementation review?
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?
Which of the following is an IS auditor's BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?
Which of the following management decisions presents the GREATEST risk associated with data leakage?
A finance department has a multi-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger. and in year one, the system version upgrade will be applied. Which of the following should be the PRIMARY focus of the IS auditor reviewing the first year of the project?
An IS auditor notes that not all security tests were completed for an online sales system recently promoted to production. Which of the following is the auditor's BEST course of action?
Backup procedures for an organization's critical data are considered to be which type of control?
The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:
Which of the following BEST addresses the availability of an online store?
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?
Which of the following should be an IS auditor's GREATEST concern when a data owner assigns an incorrect classification level to data?
As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (B1A)?
Which of the following concerns is MOST effectively addressed by implementing an IT framework for alignment between IT and business objectives?
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
Which of the following presents the GREATEST challenge to the alignment of business and IT?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
Which of the following backup schemes is the BEST option when storage media is limited?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following is the BEST reason to implement a data retention policy?
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following is MOST critical for the effective implementation of IT governance?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?
Which of the following BEST facilitates the legal process in the event of an incident?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following BEST helps to ensure data integrity across system interfaces?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
Which of the following is necessary for effective risk management in IT governance?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
An IS auditor is reviewing how password resets are performed for users working remotely. Which type of documentation should be requested to understand the detailed steps required for this activity?
Which of the following technologies is BEST suited to fulfill a business requirement for nonrepudiation of business-to-business transactions with external parties without the need for a mutually trusted entity?
Which of the following BEST enables an IS auditor to assess whether jobs were completed according to the job schedule?
Which of the following procedures for testing a disaster recovery plan (DRP) is MOST effective?
Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?
An IS auditor has been asked to provide support to the control self-assessment (CSA) program. Which of the following BEST represents the scope of the auditor’s role in the program?
Which of the following is the GREATEST risk of project dashboards being set without sufficiently defined criteria?
A small organization is experiencing rapid growth and plans to create a new information security policy. Which of the following is MOST relevant to creating the policy?
Which of the following is the BEST review for an IS auditor to conduct when a vulnerability has been exploited by an employee?
Which of the following should be the PRIMARY objective of conducting an audit follow-up of management action plans?
Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?
Which of the following would be MOST important to include in an IS audit report?
Which of the following provides the BEST evidence that all elements of a business continuity plan (BCP) are operating effectively?
An organization is permanently transitioning from onsite to fully remote business operations. When should the existing business impact analysis (BIA) be reviewed?
An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:
Which of the following is the GREATEST risk associated with lack of IT involvement in the organization's strategic planning initiatives?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
Which of the following system attack methods is executed by entering malicious code into the search box of a vulnerable website, causing the server to reveal restricted information?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
Which of the following is the BEST approach to help organizations address risks associated with shadow IT?
An organization's sensitive data is stored in a cloud computing environment and is encrypted. Which of the following findings should be of GREATEST concern to an IS auditor?
An IS auditor discovers that a developer has used the same key to grant access to multiple applications making calls to an application programming interface (API). Which of the following is the BEST recommendation to address this situation?
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change management process?
A sample for testing must include the 80 largest client balances and a random sample of the rest. What should the IS auditor recommend?
Which of the following is MOST appropriate to review when determining if the work completed on an IT project is in alignment with budgeted costs?
An IS auditor is supporting a forensic investigation. An image of affected storage media has been captured while collecting digital forensic evidence. Which of the following techniques would BEST enable an IS auditor to verify that the captured image is an exact, unchanged replica of the original media?
Which of the following controls would BEST help a forensic investigator prevent modifications in digital evidence?
An organization establishes capacity utilization thresholds and monitors for instances when thresholds are exceeded. Which of the following is BEST supported by this activity?
Which of the following should be an IS auditor's GREATEST concern when assessing an IT service configuration database?
The process of applying a hash function to a message and obtaining and ciphering a digest refers to:
In a data center audit, an IS auditor finds that the humidity level is very low. The IS auditor would be MOST concerned because of an expected increase in:
Which of the following should an IS auditor do FIRST when auditing a robotics process automation (RPA) implementation?
An IS auditor wants to inspect recent events in a system to observe failed authentications and password changes. Which of the following is the MOST appropriate method to use for this purpose?
Which of the following is the PRIMARY reason an IS auditor would recommend offsite backups although critical data is already on a redundant array of inexpensive disks (RAID)?
Which of the following should be the PRIMARY focus when communicating an IS audit issue to management?
Which of the following controls is the BEST recommendation to prevent the skimming of debit or credit card data in point of sale (POS) systems?
Which of the following is the MOST efficient way to identify fraudulent activity on a set of transactions?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization’s enterprise architecture (EA) program?
Which of the following is a PRIMARY function of an intrusion detection system (IDS)?
Which of the following backup methods is MOST appropriate when storage space is limited?
Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time?
Which of the following is MOST helpful for evaluating benefits realized by IT projects?
Which of the following is the PRIMARY purpose of conducting a control self-assessment (CSA)?
When protecting the confidentiality of information assets, the MOST effective control practice is the:
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
Which of the following BEST mitigates the risk of SQL injection attacks against applications exposed to the internet?
The PRIMARY role of an IS auditor in the remediation of problems found during an audit engagement is to:
Which of the following system redundancy configurations BEST improves system resiliency and reduces the possibility of a single cause of failure impacting system dependability?
Which of the following BEST demonstrates alignment of the IT department with the corporate mission?
A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?
An IS auditor reviewing incident response management processes notices that resolution times for reoccurring incidents have not shown improvement. Which of the following is the auditor's BEST recommendation?
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
Which of the following is MOST useful when planning to audit an organization's compliance with cybersecurity regulations in foreign countries?
Which of the following areas of responsibility would cause the GREATEST segregation of duties conflict if the individual who performs the related tasks also has approval authority?
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
Which of the following is the BEST way for an IS auditor to assess the design of an automated application control?
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
Which of the following should be identified FIRST during the risk assessment process?
Which of the following provides the BEST evidence of the validity and integrity of logs in an organization's security information and event management (SIEM) system?
Which of the following provides the BE ST method for maintaining the security of corporate applications pushed to employee-owned mobile devices?
Which of the following is an example of a preventive control for physical access?
What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
When planning a follow-up, the IS auditor is informed by operational management that recent organizational changes have addressed the previously identified risk and implementing the action plan is no longer necessary. What should the auditor do NEXT?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
Which of the following is the BEST way to ensure an organization's data classification policies are preserved during the process of data transformation?
An IS auditor determines that the vendor's deliverables do not include the source code for a newly acquired product. To address this issue, which of the following should the auditor recommend be included in the contract?
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?
Which of the following is the PRIMARY basis on which audit objectives are established?
An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.
Which of the following is the BEST course of action to address this issue?
An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?
Which of the following is MOST helpful for an IS auditor to review when evaluating an organizations business process that are supported by applications and IT systems?
In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?
Which of the following provides the MOST protection against emerging threats?
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?
A small business unit is implementing a control self-assessment (CSA) program and leveraging the internal
audit function to test its internal controls annually. Which of the following is the MOST significant benefit of
this approach?
Which of the following controls is MOST important for ensuring the integrity of system interfaces?
Which of the following would minimize the risk of losing transactions as a result of a disaster?
Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?
Which of the following is MOST likely to be a project deliverable of an agile software development methodology?
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
Which of the following is the MOST important consideration for a contingency facility?
An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?
In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
An organization considering the outsourcing of a business application should FIRST:
Which of the following BEST enables a benefits realization process for a system development project?
An IS auditor is reviewing a client's outsourced payroll system to assess whether the financial audit team can rely on the application. Which of the following findings would be the auditor's
GREATEST concern?
Which of the following would provide management with the MOST reasonable assurance that a new data warehouse will meet the needs of the
organization?
Which of the following is the BEST sampling method to use when relatively few errors are expected to be found in a population?
An IS auditor is verifying the adequacy of an organization's internal controls and is concerned about potential circumvention of regulations. Which of the following is the BEST sampling method to use?
Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?
Which of the following is the MOST important responsibility of data owners when implementing a data classification process?
Which of the following is MOST important for the successful establishment of a security vulnerability management program?
Which of the following is the MOST important reason for an IS auditor to examine the results of a post-incident review performed after a security incident?
Which of the following should be the FIRST step in a data migration project?
An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor's independence?
Which of the following is MOST critical to the success of an information security program?
During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility Which of the following is the IS auditor's BEST course of action?
During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?
Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?
Which of the following is the MOST important advantage of participating in beta testing of software products?
An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
The record-locking option of a database management system (DBMS) serves to.
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed?
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?
Which of the following occurs during the issues management process for a system development project?
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
Which of the following is the MOST important activity in the data classification process?
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:
During the planning stage of a compliance audit, an IS auditor discovers that a bank's inventory of compliance requirements does not include recent regulatory changes related to managing data risk. What should the auditor do FIRST?
After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed Which of the following is the MOST important requirement to include In the vendor contract to ensure continuity?
In an online application, which of the following would provide the MOST information about the transaction audit trail?
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
Which of the following is MOST helpful for measuring benefits realization for a new system?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?
Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
Which of the following represents the HIGHEST level of maturity of an information security program?
A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor's GREATEST concern?
Which of the following security risks can be reduced by a property configured network firewall?
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?
Which of the following concerns is BEST addressed by securing production source libraries?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?
Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?
Which of the following is MOST helpful for understanding an organization’s key driver to modernize application platforms?
Which of the following user actions poses the GREATEST risk for inadvertently introducing malware into a local network?
Which of the following is MOST important for an IS auditor to assess during a post-implementation review of a newly modified IT application developed in-house?
Which of the following is the MOST important consideration when implementing a Zero Trust strategy for mobile, wireless, and Internet of Things (IoT) devices?
Which of the following audit procedures would provide the BEST assurance that an application program is functioning as designed?
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
Which of the following is the BEST reason for an organization to use clustering?
Providing security certification for a new system should include which of the following prior to the system's implementation?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?
Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization's security policy?
What is the Most critical finding when reviewing an organization’s information security management?
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
In an online application which of the following would provide the MOST information about the transaction audit trail?
The GREATEST benefit of using a polo typing approach in software development is that it helps to:
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
Which of the following BEST indicates the effectiveness of an organization's risk management program?
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
What is MOST important to verify during an external assessment of network vulnerability?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
Which of the following is the GREATEST concern associated with a high number of IT policy exceptions approved by management?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
Which of the following is the MOST effective way for an organization to project against data loss?
An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
Which of the following strategies BEST optimizes data storage without compromising data retention practices?
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
Which of the following should be an IS auditor's GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
Which of the following components of a risk assessment is MOST helpful to management in determining the level of risk mitigation to apply?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
Which of the following should be done FIRST when planning a penetration test?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
Which of the following constitutes an effective detective control in a distributed processing environment?
Which of the following is an IS auditor's BEST approach when prepanng to evaluate whether the IT strategy supports the organization's vision and mission?
Which of the following provides the MOST assurance of the integrity of a firewall log?
An IS auditor is reviewing a bank's service level agreement (SLA) with a third-party provider that hosts the bank's secondary data center, which of the following findings should be of GREATEST concern to the auditor?
Which of the following is the MAJOR advantage of automating internal controls?
Controls related to authorized modifications to production programs are BEST tested by:
An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
An IS auditor is reviewing an organization's business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor's GREATEST concern?
An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?
Which of the following provides a new IS auditor with the MOST useful information to evaluate overall IT performance?
Which of the following is the BEST approach for determining the overall IT risk appetite of an organization when business units use different methods formanaging IT risks?
Which of the following is the BEST source of information to determine the required level of data protection on a file server?
What should an IS auditor do FIRST when a follow-up audit reveals some management action plans have not been initiated?
Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls?
An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''
Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?
Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
An organization has implemented a distributed security administration system to replace the previous centralized one. Which of the following presents the GREATEST potential concern?
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following should an organization do to anticipate the effects of a disaster?
A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?
Which of the following technologies has the SMALLEST maximum range for data transmission between devices?