An IS auditor reviewing incident response management processes notices that resolution times for reoccurring incidents have not shown improvement. Which of the following is the auditor's BEST recommendation?
An IS auditor is reviewing an organization's business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
An IS auditor is reviewing a client's outsourced payroll system to assess whether the financial audit team can rely on the application. Which of the following findings would be the auditor's
GREATEST concern?
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
Which of the following statements appearing in an organization's acceptable use policy BEST demonstrates alignment with data classification standards related to the protection of information assets?
Which of the following BEST demonstrates to senior management and the board that an audit function is compliant with standards and the code of ethics?
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor's NEXT step should be to:
A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
Which of the following should be done FIRST to minimize the risk of unstructured data?
Which of the following is an example of a preventive control for physical access?
Which of the following is MOST likely to be a project deliverable of an agile software development methodology?
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?
Retention periods and conditions for the destruction of personal data should be determined by the.
An organization considering the outsourcing of a business application should FIRST:
An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization's payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management
experience. What is the BEST course of action?
Which of the following BEST enables a benefits realization process for a system development project?
Which of the following is an IS auditor's BEST recommendation to mitigate the risk of eavesdropping
associated with an application programming interface (API) integration implementation?
An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?
Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?
Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
Which of the following would minimize the risk of losing transactions as a result of a disaster?
Which of the following is the BEST sampling method to use when relatively few errors are expected to be found in a population?
A bank wants to outsource a system to a cloud provider residing in another country. Which of the following would be the MOST appropriate IS audit recommendation?
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
When developing customer-facing IT applications, in which stage of the system development life cycle (SDLC) is it MOST beneficial to consider data privacy principles?
Which of the following physical controls provides the GREATEST assurance that only authorized individuals can access a data center?
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
An organization plans to replace its nightly batch processing backup to magnetic tape with real-time replication to a second data center. Which of the following is the GREATEST risk associated with this change?
Which of the following is the MOST important consideration when establishing vulnerability scanning on critical IT infrastructure?
Which of the following is the MOST effective accuracy control for entry of a valid numeric part number?
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
Which of the following areas of responsibility would cause the GREATEST segregation of duties conflict if the individual who performs the related tasks also has approval authority?
Which of the following is the MOST significant risk when an application uses individual end-user accounts to access the underlying database?
Which of the following provides the GREATEST assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively?
Which of the following is the MOST important advantage of participating in beta testing of software products?
Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization's disaster recovery plan (DRP)?
Which of the following is MOST useful when planning to audit an organization's compliance with cybersecurity regulations in foreign countries?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
Which of the following BEST facilitates the legal process in the event of an incident?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
An IS auditor assessing the controls within a newly implemented call center would First
If enabled within firewall rules, which of the following services would present the GREATEST risk?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
Which of the following is MOST critical for the effective implementation of IT governance?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?
Which of the following is the BEST reason to implement a data retention policy?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
Which of the following should be an IS auditor's GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
A proper audit trail of changes to server start-up procedures would include evidence of:
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
Which of the following MOST effectively minimizes downtime during system conversions?
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
Which of the following is the GREATEST concern associated with a high number of IT policy exceptions approved by management?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:
Which of the following is MOST important to ensure when planning a black box penetration test?
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor's NEXT course of action?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
Which of the following would be a result of utilizing a top-down maturity model process?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
During a follow-up engagement, an IS auditor confirms evidence of a problem that was not an issue in the original audit. Which of the following is the auditor's BEST course of action?
Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
Which of the following is an audit reviewer's PRIMARY role with regard to evidence?
Which of the following can BEST reduce the impact of a long-term power failure?
Which of the following is the GREATEST risk of project dashboards being set without sufficiently defined criteria?
Which type of testing is used to identify security vulnerabilities in source code in the development environment?
Using swipe cards to limit employee access to restricted areas requires implementing which additional control?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the
auditor's BEST recommendation to help prevent unauthorized access?
The PRIMARY role of an IS auditor in the remediation of problems found during an audit engagement is to:
Which of the following is the GREATEST advantage of maintaining an internal IS audit function within an organization?
Which of the following will BEST ensure that archived electronic information of permanent importance remains accessible over time?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
To help determine whether a controls-reliant approach to auditing financial systems in a company should be used, which sequence of IS audit work is MOST appropriate?
A new system development project is running late against a critical implementation deadline. Which of the following is the MOST important activity?
An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?
An organization allows programmers to change production systems in emergency situations without seeking prior approval. Which of the following controls should an IS auditor consider MOST
important?
Which of the following is the PRIMARY advantage of using an automated security log monitoring tool instead of conducting a manual review to monitor the use of privileged access?
A steering committee established to oversee an organization's digital transformation program is MOSTlikely to be involved with which of the following activities?
The MOST important measure of the effectiveness of an organization's security program is the:
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
A configuration management audit identified that predefined automated procedures are used when deploying and configuring application infrastructure in a cloud-based
environment. Which of the following is MOST important for the IS auditor to review?
Which type of control has been established when an organization implements a security information and event management (SIEM) system?
An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor’s test data set to include?
Following an IT audit, management has decided to accept the risk highlighted in the audit report. Which of the following would provide the MOST assurance to the IS auditor that management
is adequately balancing the needs of the business with the need to manage risk?
Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time?
A programmer has made unauthorized changes to key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this
problem?
An IS auditor finds a user account where privileged access is not appropriate for the user’s role. Which of the following would provide the BEST evidence to determine whether the risk of this access has been exploited?
Which of the following should be of MOST concern to an IS auditor reviewing an organization's operational log management?
Which of the following BEST describes the role of the IS auditor in a control self-assessment (CSA)?
Which of the following is the MOST appropriate responsibility of an IS auditor involved in a data center renovation project?
Which of the following would BEST prevent an arbitrary application of a patch?
Which of the following is the PRIMARY benefit of benchmarking an organization's software development lifecycle practices against a capability maturity model?
When designing a data analytics process, which of the following should be the stakeholder's role in automating data extraction and validation?
Which of the following is the BEST way to foster continuous improvement of IS audit processes and practices?
Which of the following BEST indicates a need to review an organization's information security policy?
Which of the following BEST indicates that the effectiveness of an organization's security awareness program has improved?
Which of the following network communication protocols is used by network devices such as routers to send error messages and operational information indicating success or failure when communicating with another IP address?
A new regulation has been enacted that mandates specific information security practices for the protection of customer data. Which of the following is MOST useful for an IS auditor to review when auditing against the regulation?
Which of the following cloud capabilities BEST enables an organization to meet unexpectedly high service demand?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the
associated risk?
An IS auditor determines elevated administrator accounts for servers that are not properly checked out and then back in after each use. Which of the following is the MOST appropriate sampling technique to determine the scope of the problem?
An IS auditor discovers from patch logs that some in-scope systems are not compliant with the regular patching schedule. What should the auditor do NEXT?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's job scheduling practices?
During which phase of the software development life cycle should an IS auditor be consulted to recommend security controls?
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system. Which of the following is the IS
auditor's BEST recommendation?
Which of the following would an IS auditor find to be the GREATEST risk associated with the server room in a remote office location?
A small organization is experiencing rapid growth and plans to create a new information security policy. Which of the following is MOST relevant to creating the policy?
Which of the following should be the GREATEST concern for an IS auditor performing a post-implementation review for a major system upgrade?
Which of the following staff should an IS auditor interview FIRST to obtain a general overview of the various technologies used across different programs?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
An IS auditor is reviewing a data conversion project. Which of the following is the auditor's BEST recommendation prior to go-live?
Which of the following should be used as the PRIMARY basis for prioritizing IT projects and initiatives?
Which of the following is the MOST important consideration when defining an operational log management strategy?
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
An IS auditor is reviewing a machine learning model that predicts the likelihood that a user will watch a certain movie. Which of the following would be of GREATEST concern to the auditor?
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?
Which of the following is the BEST recommendation to drive accountability for achieving the desired outcomes specified in a benefits realization plan for an IT project?
An organization produces control reports with a desktop application that accesses data in the central production database. Which of the following would give an IS auditor concern about the reliability of these reports?
Which of the following is a PRIMARY responsibility of an IT steering committee?
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
The use of access control lists (ACLs) is the MOST effective method to mitigate security risk for routers because they: (Identify Correct answer and related explanation/references from CISA Certification - Information Systems Auditor official Manual or book)
What is the BEST way to reduce the risk of inaccurate or misleading data proliferating through business intelligence systems?
Which of the following is the BEST methodology to use for estimating the complexity of developing a large business application?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?
Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?
When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:
Which of the following should be restricted from a network administrator's privileges in an adequately segregated IT environment?
Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization's configuration and release management process?
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?
Which of the following concerns is MOST effectively addressed by implementing an IT framework for alignment between IT and business objectives?
Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?
Which of the following provides the MOST useful information regarding an organization's risk appetite and tolerance?
Which of the following would be the BEST criteria for monitoring an IT vendor's service levels?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
Which of the following is the BEST way to detect unauthorized copies of licensed software on systems?
An IS department is evaluated monthly on its cost-revenue ratio user satisfaction rate, and computer downtime This is BEST zed as an application of.
An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?
Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
In the development of a new financial application, the IS auditor's FIRST involvement should be in the:
Which of the following is MOST important for an IS auditor to validate when auditing network device management?
Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls?
An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?
Which of the following is MOST important for an IS auditor to verify when reviewing the use of an outsourcer for disposal of storage media?
Which type of device sits on the perimeter of a corporate of home network, where it obtains a public IP address and then generates private IP addresses internally?
An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application's operating system?
Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?
The use of which of the following is an inherent risk in the application container infrastructure?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following should be the FIRST step to successfully implement a corporate data classification program?
Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization's security policy?
An IS auditor finds that while an organization's IT strategy is heavily focused on research and development, the majority of protects n the IT portfolio focus on operations and maintenance. Which of the Mowing is the BEST recommendation?
When assessing whether an organization's IT performance measures are comparable to other organizations in the same industry, which of the following would be MOST helpful to review?
Which of the following provides the BEST assurance of data integrity after file transfers?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
Which of the following should be the FIRST step when planning an IS audit of a third-party service provider that monitors network activities?
Which of the following is MOST important for an IS auditor to review when determining whether IT investments are providing value to tie business?
Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?
Which of the following is the MOST effective control to mitigate against the risk of inappropriate activity by employees?
An IS auditor conducts a review of a third-party vendor's reporting of key performance indicators (KPIs) Which of the following findings should be of MOST concern to the auditor?
To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
Which of the following technologies has the SMALLEST maximum range for data transmission between devices?
Which of the following is me GREATE ST impact as a result of the ongoing deterioration of a detective control?
An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?
Providing security certification for a new system should include which of the following prior to the system's implementation?
Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?
Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?
Which of the following BEST enables the timely identification of risk exposure?
An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
Which of the following is the MOST important consideration for a contingency facility?
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
An information systems security officer's PRIMARY responsibility for business process applications is to:
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
Which of the following occurs during the issues management process for a system development project?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
In an online application which of the following would provide the MOST information about the transaction audit trail?
Which of the following would be an appropriate rote of internal audit in helping to establish an organization's privacy program?
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?
Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
Which of the following is the BEST reason for an organization to use clustering?
In a RAO model, which of the following roles must be assigned to only one individual?
Which of the following is MOST important to consider when scheduling follow-up audits?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
Which of the following business continuity activities prioritizes the recovery of critical functions?
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?
Which of the following concerns is BEST addressed by securing production source libraries?
Which of the following represents the HIGHEST level of maturity of an information security program?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
In an online application, which of the following would provide the MOST information about the transaction audit trail?
Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?
The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:
Which of the following is the GREATEST risk associated with storing customer data on a web server?
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
During an audit of a multinational bank's disposal process, an IS auditor notes several findings. Which of the following should be the auditor's GREATEST concern?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?
An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor's independence?
Which of the following is the MOST important consideration for patching mission critical business application servers against known vulnerabilities?
Which of the following would BEST indicate the effectiveness of a security awareness training program?
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization's goals and strategic objectives?
The BEST way to evaluate the effectiveness of a newly developed application is to:
An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?