An IS auditor is planning an audit of an organization's risk management practices. Which of the following would provide the MOST useful information about
risk appetite?
A small business unit is implementing a control self-assessment (CSA) program and leveraging the internal
audit function to test its internal controls annually. Which of the following is the MOST significant benefit of
this approach?
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization's goals and strategic objectives?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor's NEXT course of action?
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?
Which of the following would provide management with the MOST reasonable assurance that a new data warehouse will meet the needs of the
organization?
In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?
Which of the following is the MOST important advantage of participating in beta testing of software products?
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
Which of the following is the MOST important responsibility of data owners when implementing a data classification process?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
The BEST way to provide assurance that a project is adhering to the project plan is to:
Which of the following is the MOST effective control over visitor access to highly secured areas?
Which of the following would be the BEST criteria for monitoring an IT vendor's service levels?
Which type of device sits on the perimeter of a corporate of home network, where it obtains a public IP address and then generates private IP addresses internally?
Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization's privacy policy?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
Which of the following technologies has the SMALLEST maximum range for data transmission between devices?
Which of the following is MOST important to determine when conducting an audit Of an organization's data privacy practices?
During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?
Which of the following is the BEST indication that there are potential problems within an organization's IT service desk function?
Which of the following would protect the confidentiality of information sent in email messages?
When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on
What should an IS auditor do FIRST when a follow-up audit reveals some management action plans have not been initiated?
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?
An IS auditor engaged in developing the annual internal audit plan learns that the chief information officer (CIO) has requested there be no IS audits in the upcoming year as more time is needed to address a large number of recommendations from the previous year. Which of the following should the auditor do FIRST
A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?
An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?
Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves
for care?
What is the BEST way to reduce the risk of inaccurate or misleading data proliferating through business intelligence systems?
Controls related to authorized modifications to production programs are BEST tested by:
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country.
What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted
application?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
Which of the following is the BEST reason for an IS auditor to emphasize to management the importance of using an IT governance framework?
When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
Which of following is MOST important to determine when conducting a post-implementation review?
When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?
When is it MOST important for an IS auditor to apply the concept of materiality in an audit?
When classifying information, it is MOST important to align the classification to:
An IS auditor is reviewing the security of a web-based customer relationship management (CRM) system that is directly accessed by customers via the Internet, which of the following should be a concern for the auditor?
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (B1A)?
Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization's information cannot be accessed?
An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?
An organization has implemented a distributed security administration system to replace the previous centralized one. Which of the following presents the GREATEST potential concern?
An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?
Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?
An IS auditor finds that while an organization's IT strategy is heavily focused on research and development, the majority of protects n the IT portfolio focus on operations and maintenance. Which of the Mowing is the BEST recommendation?
During an audit which of the following would be MOST helpful in establishing a baseline for measuring data quality?
An IS auditor notes that not all security tests were completed for an online sales system recently promoted to production. Which of the following is the auditor's BEST course of action?
After delivering an audit report, the audit manager discovers that evidence was overlooked during the audit This evidence indicates that a procedural control may have failed and could contradict a conclusion of the audit Which of the following risks is MOST affected by this oversight?
Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?
Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
An IS department is evaluated monthly on its cost-revenue ratio user satisfaction rate, and computer downtime This is BEST zed as an application of.
When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?
Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?
A bank has a combination of corporate customer accounts (higher monetary value) and small business accounts (lower monetary value) as part of online banking. Which of the following is the BEST sampling approach for an IS auditor to use for these accounts?
Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan?
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
What would be an IS auditor's BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?
An IS auditor is asked to review an organization's technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
Which of the following are used in a firewall to protect the entity's internal resources?
Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program'?
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
Which of the following is the BEST indication of effective IT investment management?
An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?
Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?
A new system development project is running late against a critical implementation deadline Which of the following is the MOST important activity?
Which of the following should be of GREATEST concern to an |$ auditor reviewing data conversion and migration during the implementation of a newapplication system?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
Which of the following strategies BEST optimizes data storage without compromising data retention practices?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
Which of the following demonstrates the use of data analytics for a loan origination process?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor's NEXT course of action?
An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
The implementation of an IT governance framework requires that the board of directors of an organization:
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
Which of the following is the GREATEST concern associated with a high number of IT policy exceptions approved by management?
Which of the following should be an IS auditor's GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
Secure code reviews as part of a continuous deployment program are which type of control?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
A proper audit trail of changes to server start-up procedures would include evidence of:
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
Which of the following is the BEST reason to implement a data retention policy?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
Which of the following is MOST critical for the effective implementation of IT governance?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
Which of the following would be MOST useful when analyzing computer performance?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
A new regulation has been enacted that mandates specific information security practices for the protection of customer data. Which of the following is MOST useful for an IS auditor to review when auditing against the regulation?
An organization is permanently transitioning from onsite to fully remote business operations. When should the existing business impact analysis (BIA) be reviewed?
During the course of fieldwork, an internal IS auditor observes a critical vulnerability within a newly deployed application. What is the auditor's BEST course of action?
What should be an IS auditor's PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?
An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:
The following findings are the result of an IS auditor’s post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's job scheduling practices?
Which of the following key performance indicators (KPIs) provides stakeholders with the MOST useful information about whether information security risk is being managed?
Before the release of a new application into an organization’s production environment, which of the following should be in place to ensure that proper testing has occurred and rollback plans are in place?
Which of the following would MOST likely jeopardize the independence of a quality assurance (QA} team and could lead to conflict of interest?
An IS auditor is evaluating the log management system for an organization with devices and systems in multiple geographic locations. Which of the following is MOST important for the auditor to verify?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the
associated risk?
Which of the following is the MOST important consideration of any disaster response plan?
The process of applying a hash function to a message and obtaining and ciphering a digest refers to:
Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?
An IS auditor is reviewing a medical device that is attached to a patient’s body, which automatically takes and uploads measurements to a cloud server. Treatment may be updated based on the measurements. Which of the following should be the auditor's PRIMARY focus?
Of the following who should be responsible for cataloging and inventorying robotic process automation (RPA) processes?
Which of the following provides the BEST assurance that vendor-supported software remains up to date?
Which of the following would be an IS auditor's BEST recommendation to senior management when several IT initiatives are found to be misaligned with the organization's strategy?
Which of the following is the MOST important task of an IS auditor during an application post-implementation review?
Which of the following is the MOST important consideration to facilitate prosecution of a perpetrator after a cybercrime?
An IS auditor is assessing backup performance and observes that the system administrator manually initiates backups during unexpected peak usage. Which of the following is the auditor's BEST course of action?
Which of the following should be of MOST concern to an IS auditor reviewing an organization’s business impact analysis (BIA)?
Which of the following should be of GREATEST concern to an IS auditor reviewing system interfaces used to transfer publicly available information?
An IS auditor finds that irregularities have occurred and that auditee management has chosen to ignore them. If reporting to external authorities is required which of the following is the BEST action for the IS auditor to take?
Which of the following is an analytical review procedure for a payroll system?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
Which of the following is the MOST effective control when granting access to a service provider for a ctoud-6ased application?
An IS auditor observes that a large number of departed employees have not been removed from the accounts payable system. Which of the following is MOST important to determine in order to assess the risk1?
Which of the following will BEST ensure that archived electronic information of permanent importance remains accessible over time?
In a review of the organization standards and guidelines for IT management, which of the following should be included in an IS development methodology?
An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?
Which of the following controls is the BEST recommendation to prevent the skimming of debit or credit card data in point of sale (POS) systems?
Which type of testing is used to identify security vulnerabilities in source code in the development environment?
An organization produces control reports with a desktop application that accesses data in the central production database. Which of the following would give an IS auditor concern about the reliability of these reports?
Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?
Which of the following is the MOST effective way to evaluate the physical security of a data center?
An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated. Which of the following should be of
MOST concern?
Which of the following is the MOST efficient way to identify fraudulent activity on a set of transactions?
Which of the following is the PRIMARY purpose of conducting a control self-assessment (CSA)?
Which of the following findings would be of GREATEST concern to an IS auditor reviewing the security architecture of an organization that has just implemented a Zero Trust solution?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's incident response management program?
An organization wants to use virtual desktops to deliver corporate applications to its end users. Which of the following should an IS auditor recommend to prevent domain name system (DNS) poisoning in their cloud environment?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
Which of the following is the GREATEST impact as a result of the ongoing deterioration of a detective control?
An IS auditor reviewing the system development life cycle (SDLC) finds there is no requirement for business cases. Which of the following should be offGREATEST concern to the organization?
Which of the following is an IS auditor’s BEST approach when low-risk anomalies have been identified?
Which of the following BEST indicates that an incident management process is effective?
Which of the following technologies BEST assists in protection of digital evidence as part of forensic investigation acquisition?
Which of the following control measures is the MOST effective against unauthorized access of confidential information on stolen or lost laptops?
During which stage of the penetration test cycle does the tester utilize identified vulnerabilities to attempt to access the target system?
Which of the following is the PRIMARY benefit of introducing business impact analyses (BIAs) to business resiliency strategies?
Which of the following is the PRIMARY purpose of a rollback plan for a system change?
Which of the following should be of GREATEST concern to an IS auditor assessing an organization's patch management program?
Which of the following is the PRIMARY advantage of using an automated security log monitoring tool over a manual review to monitor the use of privileged access?
What should be the PRIMARY focus during a review of a business process improvement project?
Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?
The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?
A new system development project is running late against a critical implementation deadline. Which of the following is the MOST important activity?
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
Which of the following should be of GREATEST concern for an IS auditor when reviewing user account policies?
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
During a follow-up engagement, an IS auditor confirms evidence of a problem that was not an issue in the original audit. Which of the following is the auditor's BEST course of action?
Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
In a RAO model, which of the following roles must be assigned to only one individual?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
An IS auditor is reviewing security controls related to collaboration tools for a business unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?
During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
An information systems security officer's PRIMARY responsibility for business process applications is to:
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
Which of the following documents should specify roles and responsibilities within an IT audit organization?
A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization's security policy?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
Providing security certification for a new system should include which of the following prior to the system's implementation?
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
Which of the following is MOST helpful for measuring benefits realization for a new system?
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor's GREATEST concern?
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?
To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
Which of the following would be an appropriate rote of internal audit in helping to establish an organization's privacy program?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
Which of the following represents the HIGHEST level of maturity of an information security program?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?
The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:
Which of the following is the BEST reason for an organization to use clustering?
Which of the following should an IS auditor consider FIRST when evaluating firewall rules?
Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
Which of the following MUST be completed as part of the annual audit planning process?
Which of the following business continuity activities prioritizes the recovery of critical functions?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
During an audit of a multinational bank's disposal process, an IS auditor notes several findings. Which of the following should be the auditor's GREATEST concern?
Which of the following security risks can be reduced by a property configured network firewall?
What is the Most critical finding when reviewing an organization’s information security management?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
An IS auditor is verifying the adequacy of an organization's internal controls and is concerned about potential circumvention of regulations. Which of the following is the BEST sampling method to use?
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
Which of the following BEST supports the effectiveness of a compliance program?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?
Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?
Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization's disaster recovery plan (DRP)?
Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?
Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization's patch management process?
Which of the following statements appearing in an organization's acceptable use policy BEST demonstrates alignment with data classification standards related to the protection of information assets?
What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?
An organization has an acceptable use policy in place, but users do not formally acknowledge the policy. Which of the following is the MOST significant risk from this finding?
Which of the following provides the GREATEST assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively?
Which of the following controls is MOST important for ensuring the integrity of system interfaces?
Which of the following is MOST useful when planning to audit an organization's compliance with cybersecurity regulations in foreign countries?
A small IT department has embraced DevOps, which allows members of this group to deploy code to production and maintain some development access to automate releases. Which of the following is the MOST effective control?
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change
management process?
Which of the following should an IS auditor use when verifying a three-way match has occurred in an enterprise resource planning (ERR) system?
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
An IS auditor learns that an organization's business continuity plan (BCP) has not been updated in the last 18 months and that the organization recently closed a production plant. Which of the following is the auditor's BEST course of action?
Which of the following is the MOST important consideration for a contingency facility?
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization's payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management
experience. What is the BEST course of action?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?
Which of the following is an example of a preventive control for physical access?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
A global organization's policy states that all workstations must be scanned for malware each day. Which of the following would provide an IS auditor with the BEST evidence of continuous compliance with this policy?
An organization considering the outsourcing of a business application should FIRST:
Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?