Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?
An IS auditor engaged in developing the annual internal audit plan learns that the chief information officer (CIO) has requested there be no IS audits in the upcoming year as more time is needed to address a large number of recommendations from the previous year. Which of the following should the auditor do FIRST
When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on
Which of the following are used in a firewall to protect the entity's internal resources?
Which of the following should be the FIRST step to successfully implement a corporate data classification program?
Which of the following is the BEST indicator for measuring performance of IT help desk function?
An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?
An IS auditor conducts a review of a third-party vendor's reporting of key performance indicators (KPIs) Which of the following findings should be of MOST concern to the auditor?
Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?
An IS auditor learns that an in-house system development life cycle (SDLC) project has not met user specifications. The auditor should FIRST examine requirements from which of the following phases?
When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
What is the BEST way to reduce the risk of inaccurate or misleading data proliferating through business intelligence systems?
An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
Which of the following BEST enables alignment of IT with business objectives?
An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?
Which of the following is a PRIMARY responsibility of an IT steering committee?
When is it MOST important for an IS auditor to apply the concept of materiality in an audit?
An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?
Which of following is MOST important to determine when conducting a post-implementation review?
Which of the following provides the MOST assurance of the integrity of a firewall log?
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?
Which of the following provides the MOST reliable method of preventing unauthonzed logon?
Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
What is the MOST effective way to detect installation of unauthorized software packages by employees?
In the development of a new financial application, the IS auditor's FIRST involvement should be in the:
Which of the following is the BEST method to delete sensitive information from storage media that will be reused?
Which of the following is MOST important to consider when developing a service level agreement (SLAP)?
An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether
An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:
Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
Which of the following should be restricted from a network administrator's privileges in an adequately segregated IT environment?
Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?
An organization's IT risk assessment should include the identification of:
An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?
Which of the following is me GREATE ST impact as a result of the ongoing deterioration of a detective control?
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?
Which of the following is an IS auditor's BEST approach when prepanng to evaluate whether the IT strategy supports the organization's vision and mission?
Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?
An IS auditor should be MOST concerned if which of the following fire suppression systems is utilized to protect an asset storage closet?
Which of the following is the MOST important advantage of participating in beta testing of software products?
Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?
Which of the following is MOST critical to the success of an information security program?
Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?
When developing customer-facing IT applications, in which stage of the system development life cycle (SDLC) is it MOST beneficial to consider data privacy principles?
Which of the following is the BEST reason to implement a data retention policy?
When planning a follow-up, the IS auditor is informed by operational management that recent organizational changes have addressed the previously identified risk and implementing the action plan is no longer necessary. What should the auditor do NEXT?
An IS auditor is planning an audit of an organization's risk management practices. Which of the following would provide the MOST useful information about
risk appetite?
Which of the following should be identified FIRST during the risk assessment process?
Which of the following is MOST important for the successful establishment of a security vulnerability management program?
Which of the following is the MOST important responsibility of data owners when implementing a data classification process?
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor's NEXT step should be to:
Which of the following is the BEST way to ensure an organization's data classification policies are preserved during the process of data transformation?
An organization uses public key infrastructure (PKI) to provide email security. Which of the following would be the MOST efficient method to determine whether email messages have been modified in transit?
A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor's NEXT course of action?
Which of the following is the MOST effective control over visitor access to highly secured areas?
During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?
Which of the following should be the FIRST step in a data migration project?
Which of the following provides the BEST evidence of the validity and integrity of logs in an organization's security information and event management (SIEM) system?
An organization has an acceptable use policy in place, but users do not formally acknowledge the policy. Which of the following is the MOST significant risk from this finding?
Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?
Which of the following is MOST important to include in security awareness training?
An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?
In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?
An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?
Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?
During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor's BEST course of action?
Which of the following is an IS auditor's BEST recommendation to mitigate the risk of eavesdropping
associated with an application programming interface (API) integration implementation?
An organization has partnered with a third party to transport backup drives to an offsite storage facility. Which of the following is MOST important before sending the drives?
A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?
An IS auditor has been tasked with auditing the inventory control process for a large organization that processes millions of data transactions. Which of the following is the BEST testing strategy to adopt?
Which of the following areas of responsibility would cause the GREATEST segregation of duties conflict if the individual who performs the related tasks also has approval authority?
The record-locking option of a database management system (DBMS) serves to.
Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
Which of the following BEST contributes to the quality of an audit of a business-critical application?
An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization's payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management
experience. What is the BEST course of action?
During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?
During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?
Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?
Which of the following BEST enables an organization to improve the effectiveness of its incident response team?
An IS auditor determines that the vendor's deliverables do not include the source code for a newly acquired product. To address this issue, which of the following should the auditor recommend be included in the contract?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
An IS auditor finds that the cost of developing an application is now projected to significantly exceed the budget. Which of the following is the GREATEST risk to communicate to senior management?
Which of the following presents the GREATEST risk to an organization's ability to manage quality control (QC) processes?
Which of the following can BEST reduce the impact of a long-term power failure?
Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?
Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics
system?
Which of the following applications has the MOST inherent risk and should be prioritized during audit planning?
Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?
Which of the following is MOST important to review during the project initiation phase of developing and deploying a new application?
A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:
Which of the following BEST reflects a mature strategic planning process?
An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?
An IS auditor can BEST evaluate the business impact of system failures by:
Which of the following is the BEST way to ensure a vendor complies with system security requirements?
An IS auditor is conducting an IT governance audit and notices many initiatives are managed informally by isolated project managers. Which of the following recommendations would have the GREATEST impact on improving the maturity of the IT team?
While reviewing the effectiveness of an incident response program, an IS auditor notices a high number of reported incidents involving malware originating from removable media found by employees. Which of the following is the MOST appropriate recommendation to management?
An organization has implemented a new data classification scheme and asks the IS auditor to evaluate its effectiveness. Which of the following would be of
GREATEST concern to the auditor?
A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:
Which of the following tasks would cause the GREATEST segregation of duties (SoD) concern if performed by the person who reconciles the organization's device inventory?
Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
Which of the following should be the GREATEST concern for an IS auditor assessing an organization's disaster recovery plan (DRP)?
Which of the following should be the GREATEST concern to an IS auditor reviewing the information security framework of an organization?
Which of the following findings related to segregation of duties should be of GREATEST concern to an IS auditor?
An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?
An IS auditor is reviewing a data conversion project. Which of the following is the auditor's BEST recommendation prior to go-live?
Which of the following is the MOST important success factor for implementing a data loss prevention (DLP) tool?
An IS auditor reviewing the system development life cycle (SDLC) finds there is no requirement for business cases. Which of the following should be offGREATEST concern to the organization?
A startup organization wants to develop a data loss prevention (DLP) program. The FIRST step should be to implement:
Which of the following would be MOST helpful to an IS auditor performing a risk assessment of an application programming interface (API) that feeds credit scores from a well-known commercial credit agency into an organizational system?
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated. Which of the following should be of
MOST concern?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's job scheduling practices?
An IS auditor is assessing the adequacy of management's remediation action plan. Which of the following should be the MOST important consideration?
Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time?
In order for a firewall to effectively protect a network against external attacks, what fundamental practice must be followed?
A configuration management audit identified that predefined automated procedures are used when deploying and configuring application infrastructure in a cloud-based
environment. Which of the following is MOST important for the IS auditor to review?
Which of the following BEST addresses the availability of an online store?
A global bank plans to use a cloud provider for backup of customer financial data. Which of the following should be the PRIMARY focus of this project?
Management has requested a post-implementation review of a newly implemented purchasing package to determine the extent that business requirements are being met. Which of the following
is MOST likely to be assessed?
Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?
An IS auditor wants to inspect recent events in a system to observe failed authentications and password changes. Which of the following is the MOST appropriate method to use for this purpose?
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Which of the following should be an IS auditor's PRIMARY consideration when determining which issues to include in an audit report?
Which of the following is the PRIMARY reason an IS auditor would recommend offsite backups although critical data is already on a redundant array of inexpensive disks (RAID)?
A steering committee established to oversee an organization's digital transformation program is MOSTlikely to be involved with which of the following activities?
Which of the following BEST indicates to an IS auditor that an organization handles emergency changes appropriately and transparently?
An organization's sensitive data is stored in a cloud computing environment and is encrypted. Which of the following findings should be of GREATEST concern to an IS auditor?
Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?
What is the MOST effective way to manage contractors' access to a data center?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
Which of the following BEST ensures that effective change management is in place in an IS environment?
Which of the following is the PRIMARY purpose of a rollback plan for a system change?
Which of the following would BEST prevent an arbitrary application of a patch?
Which of the following is the PRIMARY advantage of using an automated security log monitoring tool instead of conducting a manual review to monitor the use of privileged access?
An IS auditor found that operations personnel failed to run a script contributing to year-end financial statements. Which of the following is the BEST recommendation?
Which of the following staff should an IS auditor interview FIRST to obtain a general overview of the various technologies used across different programs?
Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time?
During an information security review, an IS auditor learns an organizational policy requires all employ-ees to attend information security training during the first week of each new year. What is
the auditor's BEST recommendation to ensure employees hired after January receive adequate guid-ance regarding security awareness?
Which of the following BEST demonstrates alignment of the IT department with the corporate mission?
Which of the following findings would be of GREATEST concern to an IS auditor reviewing the security architecture of an organization that has just implemented a Zero Trust solution?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
Which of the following is the BEST reason to implement a data retention policy?
Which of the following backup schemes is the BEST option when storage media is limited?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
Which of the following would be MOST useful when analyzing computer performance?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
The PRIMARY objective of value delivery in reference to IT governance is to:
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
Which of the following BEST facilitates the legal process in the event of an incident?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following is MOST critical for the effective implementation of IT governance?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
The decision to accept an IT control risk related to data quality should be the responsibility of the:
IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following demonstrates the use of data analytics for a loan origination process?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
Which of the following is MOST important with regard to an application development acceptance test?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
Which of the following should be an IS auditor's GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
While auditing a small organization's data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
Which of the following MUST be completed as part of the annual audit planning process?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
Which of the following is MOST important to consider when scheduling follow-up audits?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?
Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization's privacy policy?
Which of the following is the BEST reason for an organization to use clustering?
What is the Most critical finding when reviewing an organization’s information security management?
Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?
Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?
A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
In an online application which of the following would provide the MOST information about the transaction audit trail?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed?
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
Which of the following is an example of a preventative control in an accounts payable system?
Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?
An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
Which of the following is the GREATEST risk associated with storing customer data on a web server?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?
An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS
Which of the following would BEST help to ensure that an incident receives attention from appropriate personnel in a timely manner?
Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
Which of the following is the BEST performance indicator for the effectiveness of an incident management program?
An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?
Email required for business purposes is being stored on employees' personal devices.
Which of the following is an IS auditor's BEST recommendation?
Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?