Which of the following is the GREATEST risk associated with storing customer data on a web server?
Which of the following security risks can be reduced by a property configured network firewall?
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
Capacity management enables organizations to:
During the planning stage of a compliance audit, an IS auditor discovers that a bank's inventory of compliance requirements does not include recent regulatory changes related to managing data risk. What should the auditor do FIRST?
Which of the following is a detective control?
Which of the following is MOST important to consider when scheduling follow-up audits?
An IS auditor is reviewing security controls related to collaboration tools for a business unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?
Which of the following should an IS auditor consider FIRST when evaluating firewall rules?
Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor's GREATEST concern?
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
Which of the following is MOST helpful for measuring benefits realization for a new system?
In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
IT disaster recovery time objectives (RTOs) should be based on the:
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
The GREATEST benefit of using a polo typing approach in software development is that it helps to:
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
Which of the following documents should specify roles and responsibilities within an IT audit organization?
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization's security policy?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?
An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:
Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
Which of the following represents the HIGHEST level of maturity of an information security program?
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following is the MOST important activity in the data classification process?
Which of the following metrics would BEST measure the agility of an organization's IT function?
Which of the following is a social engineering attack method?
The IS quality assurance (OA) group is responsible for:
Which of the following findings from an IT governance review should be of GREATEST concern?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
While auditing a small organization's data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?
Which of the following is the BEST reason for an organization to use clustering?
An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
In an online application which of the following would provide the MOST information about the transaction audit trail?
Which of the following audit procedures would provide the BEST assurance that an application program is functioning as designed?
A hearth care organization utilizes Internet of Things (loT) devices to improve patient outcomes through real-time patient monitoring and advanced diagnostics. Which of the following would BEST assist in isolating these devices from corporate network traffic?
Management has decided to accept a risk in response to a draft audit recommendation. Which of the following should be the IS auditor’s NEXT course of action?
An IS auditor has been asked to provide support to the control self-assessment (CSA) program. Which of the following BEST represents the scope of the auditor’s role in the program?
Which of the following protocols should be used when transferring data via the internet?
Which of the following provides re BEST evidence that outsourced provider services are being properly managed?
Which of the following is the PRIMARY benefit of effective implementation of appropriate data classification?
Which of the following is the PRIMARY benefit of operational log management?
A business application's database is copied to a replication server within minutes. Which of the following processes taking place during business hours will MOST benefit from this architecture?
An IS auditor is assessing backup performance and observes that the system administrator manually initiates backups during unexpected peak usage. Which of the following is the auditor's BEST course of action?
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
An IS auditor discovers that backups of critical systems are not being performed in accordance with the recovery point objective (RPO) established in the business continuity plan (BCP). What should the auditor do NEXT?
Which of the following presents the GREATEST risk associated with end-user computing (EUC) applica-tions over financial reporting?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
A programmer has made unauthorized changes to key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this
problem?
Which of the following will BEST ensure that archived electronic information of permanent importance remains accessible over time?
An organization's strategy to source certain IT functions from a Software as a Service (SaaS) provider should be approved by the:
Which of the following is the GREATEST advantage of maintaining an internal IS audit function within an organization?
Which of the following is the GREATEST impact as a result of the ongoing deterioration of a detective control?
Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?
Which of the following would be the GREATEST concern during a financial statement audit?
An IS auditor found that operations personnel failed to run a script contributing to year-end financial statements. Which of the following is the BEST recommendation?
Which of the following is the MOST important consideration when developing tabletop exercises within a cybersecurity incident response plan?
Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?
Data Loss Prevention (DLP) tools provide the MOST protection against:
Which of the following is MOST appropriate to review when determining if the work completed on an IT project is in alignment with budgeted costs?
Which of the following is the PRIMARY objective of performing quality assurance (QA) in a system development process?
The process of applying a hash function to a message and obtaining and ciphering a digest refers to:
Which of the following should be the PRIMARY objective of conducting an audit follow-up of management action plans?
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
An organization is ready to implement a new IT solution consisting of multiple modules. The last module updates the processed data into the database. Which of the following findings should be of MOST concern to the IS auditor?
Which type of control has been established when an organization implements a security information and event management (SIEM) system?
An organization is modernizing its technology policy framework to demonstrate compliance with external industry standards. Which of the following would be MOST useful to an IS auditor for validating the outcome?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
Which of the following types of firewalls provides the GREATEST degree of control against hacker intrusion?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the
associated risk?
Which of the following is the BEST way to mitigate risk to an organization's network associated with devices permitted under a bring your own device (BYOD) policy?
Which of the following user actions poses the GREATEST risk for inadvertently introducing malware into a local network?
An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:
A finance department has a two-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger in year one the system version upgrade will be applied and in year two business processes will be updated to implement new system functionality. Which of the following should be the PRIMARY focus of an IS auditor reviewing the second year of the implementation'?
The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
Which of the following is MOST helpful in identifying system performance constraints?
Which of the following observations regarding change management should be considered the MOST serious risk by an IS auditor?
When protecting the confidentiality of information assets, the MOST effective control practice is the:
Which of the following is a threat to IS auditor independence?
Which of the following non-audit activities may impair an IS auditor's independence and objectivity?
During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
Which of the following should be of GREATEST concern for an IS auditor when reviewing user account policies?
An organization allows programmers to change production systems in emergency situations without seeking prior approval. Which of the following controls should an IS auditor consider MOST
important?
Which of the following is the GREATEST advantage of utilizing guest operating systems m a virtual environment?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
which of the following is a core functionality of a configuration and release management system?
A job is scheduled to transfer data from a transactional system database to a data lake for reporting purposes. Which of the following would be of GREATEST concern to an IS auditor?
Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?
Which of the following BEST indicates that the effectiveness of an organization's security awareness program has improved?
Which of the following would be of GREATEST concern to an IS auditor reviewing the resiliency of an organizational network that has two internet connections?
An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor’s test data set to include?
Which of the following BEST indicates that an incident management process is effective?
Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?
Which of the following is the PRIMARY purpose of batch processing monitoring?
Which of the following would MOST likely jeopardize the independence of a quality assurance (QA} team and could lead to conflict of interest?
Which of the following is an IS auditor's BEST recommendation to mitigate the risk of eavesdropping associated with an application programming interface (API) integration implementation?
An IS auditor is reviewing documentation from a change that was applied to an application. Which of the following findings would be the GREATEST concern?
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
Which of the following is the PRIMARY reason for using a digital signature?
Which of the following should be of GREATEST concern to an IS auditor when using data analytics?
Which of the following is the MOST efficient way to identify fraudulent activity on a set of transactions?
Which of the following is the BEST way to ensure a vendor complies with system security requirements?
Which of the following control measures is the MOST effective against unauthorized access of confidential information on stolen or lost laptops?
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
Cross-site scripting (XSS) attacks are BEST prevented through:
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
Which of the following is the BEST data integrity check?
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
An IT balanced scorecard is the MOST effective means of monitoring:
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following is the MOST effective way for an organization to project against data loss?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
To confirm integrity for a hashed message, the receiver should use:
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
Which of the following is an audit reviewer's PRIMARY role with regard to evidence?
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
Which of the following BEST guards against the risk of attack by hackers?
Which of the following should be an IS auditor's GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
Which of the following would be a result of utilizing a top-down maturity model process?
Which of the following strategies BEST optimizes data storage without compromising data retention practices?
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
Which of the following components of a risk assessment is MOST helpful to management in determining the level of risk mitigation to apply?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Secure code reviews as part of a continuous deployment program are which type of control?
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following is MOST important to ensure when planning a black box penetration test?
Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
The decision to accept an IT control risk related to data quality should be the responsibility of the:
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
Which of the following is the BEST justification for deferring remediation testing until the next audit?
An organizations audit charier PRIMARILY:
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
Which of the following is me GREATE ST impact as a result of the ongoing deterioration of a detective control?
The use of which of the following is an inherent risk in the application container infrastructure?
Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization's configuration and release management process?
Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?
As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (B1A)?
Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?
Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?
While evaluating the data classification process of an organization, an IS auditor's PRIMARY focus should be on whether:
The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
Which of the following should be of GREATEST concern to an |$ auditor reviewing data conversion and migration during the implementation of a newapplication system?
An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?
Which of the following would BEST help to ensure that an incident receives attention from appropriate personnel in a timely manner?
Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
Which of the following is the BEST indication of effective IT investment management?
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
Which of the following should be of GREATEST concern to an IS auditor when auditing an organization's IT strategy development process?
Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
Which of the following is the MAJOR advantage of automating internal controls?
Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?
Which of the following is the PRIMARY reason to perform a risk assessment?
An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application's operating system?
Email required for business purposes is being stored on employees' personal devices.
Which of the following is an IS auditor's BEST recommendation?
A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?
In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?
Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program'?
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?
An organization outsourced its IS functions to meet its responsibility for disaster recovery, the organization should:
The use of access control lists (ACLs) is the MOST effective method to mitigate security risk for routers because they: (Identify Correct answer and related explanation/references from CISA Certification - Information Systems Auditor official Manual or book)
An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?
When assessing the overall effectiveness of an organization's disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?
Which of the following is MOST important to determine when conducting an audit Of an organization's data privacy practices?
What would be an IS auditor's BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?
An IT balanced scorecard is PRIMARILY used for:
Which of the following is the MOST effective control to mitigate against the risk of inappropriate activity by employees?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether
When assessing whether an organization's IT performance measures are comparable to other organizations in the same industry, which of the following would be MOST helpful to review?
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
Which of the following should an organization do to anticipate the effects of a disaster?
Which of the following should an IS auditor review when evaluating information systems governance for a large organization?
After delivering an audit report, the audit manager discovers that evidence was overlooked during the audit This evidence indicates that a procedural control may have failed and could contradict a conclusion of the audit Which of the following risks is MOST affected by this oversight?
Management has learned the implementation of a new IT system will not be completed on time and has requested an audit. Which of the following audit findings should be of GREATEST concern?
A database administrator (DBA) should be prevented from having end user responsibilities:
Which of the following BEST addresses the availability of an online store?
To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
What is the PRIMARY benefit of using one-time passwords?
Which of the following should be restricted from a network administrator's privileges in an adequately segregated IT environment?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
Which of the following would be the BEST criteria for monitoring an IT vendor's service levels?
Which of the following should an IS auditor recommend be done FIRST when an organization is made aware of a new regulation that is likely to impact IT security requirements?
in a post-implantation Nation review of a recently purchased system it is MOST important for the iS auditor to determine whether the:
Which of the following are used in a firewall to protect the entity's internal resources?
One advantage of monetary unit sampling is the fact that
Which of the following should be an IS auditor's PRIMARY focus when evaluating the response process for cybercrimes?
What is the BEST way to reduce the risk of inaccurate or misleading data proliferating through business intelligence systems?
Which of the following is MOST effective for controlling visitor access to a data center?
Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization's security policy?
Which of the following is the BEST indication that there are potential problems within an organization's IT service desk function?
Controls related to authorized modifications to production programs are BEST tested by:
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
The charging method that effectively encourages the MOST efficient use of IS resources is:
In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?
Which of the following is the MAIN responsibility of the IT steering committee?
Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?
A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?
What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?
Which of the following is the MOST effective control over visitor access to highly secured areas?
The PRIMARY responsibility of a project steering committee is to:
Retention periods and conditions for the destruction of personal data should be determined by the.
During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
An organization considering the outsourcing of a business application should FIRST:
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?
When reviewing past results of a recurring annual audit, an IS auditor notes that findings may not have been reported and independence may not have been maintained. Which of the following is the auditor's BEST course of action?
Which of the following is MOST important to include in security awareness training?
Which of the following is the BEST sampling method to use when relatively few errors are expected to be found in a population?
Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?
An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor's NEXT course of action?
Which of the following is MOST critical to the success of an information security program?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
An IS auditor determines that the vendor's deliverables do not include the source code for a newly acquired product. To address this issue, which of the following should the auditor recommend be included in the contract?
Which of the following metrics is the BEST indicator of the performance of a web application
An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?
Which of the following is the PRIMARY benefit of a tabletop exercise for an incident response plan?
An IS auditor reviewing incident response management processes notices that resolution times for reoccurring incidents have not shown improvement. Which of the following is the auditor's BEST recommendation?
Which of the following is the PRIMARY basis on which audit objectives are established?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
Which of the following is the MOST important control for virtualized environments?
In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?
Which of the following is the MOST important consideration for patching mission critical business application servers against known vulnerabilities?
Which of the following should be done FIRST to minimize the risk of unstructured data?
Which of the following BEST describes a digital signature?
During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
When reviewing an IT strategic plan, the GREATEST concern would be that
When reviewing a business case for a proposed implementation of a third-party system, which of the following should be an IS auditor's GREATEST concern?
Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:
An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
Which of the following BEST demonstrates to senior management and the board that an audit function is compliant with standards and the code of ethics?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
Which of the following is the MOST important consideration when establishing vulnerability scanning on critical IT infrastructure?
An IS auditor is reviewing the service agreement with a technology company that provides IT help desk services to the organization. Which of the following monthly performance
metrics is the BEST indicator of service quality?
Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics
system?
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls?
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization's goals and strategic objectives?
A small business unit is implementing a control self-assessment (CSA) program and leveraging the internal
audit function to test its internal controls annually. Which of the following is the MOST significant benefit of
this approach?
Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change
management process?
When planning an internal penetration test, which of the following is the MOST important step prior to finalizing the scope of testing?
A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?
An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor's independence?
Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization's patch management process?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
Which of the following helps to ensure the integrity of data for a system interface?
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?
The PRIMARY objective of a control self-assessment (CSA) is to:
An IS auditor reviewing a job scheduling tool notices performance and reliability problems. Which of the following is MOST likely affecting the tool?
Stress testing should ideally be carried out under a:
An IS auditor is reviewing an organization's business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
Which of the following is the BEST point in time to conduct a post-implementation review?
The record-locking option of a database management system (DBMS) serves to.
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?
An organization plans to replace its nightly batch processing backup to magnetic tape with real-time replication to a second data center. Which of the following is the GREATEST risk associated with this change?
An IS auditor learns that an organization's business continuity plan (BCP) has not been updated in the last 18 months and that the organization recently closed a production plant. Which of the following is the auditor's BEST course of action?
Which of the following is the MOST important advantage of participating in beta testing of software products?
Which of the following would be an auditor's GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?
An IS auditor has been tasked with auditing the inventory control process for a large organization that processes millions of data transactions. Which of the following is the BEST testing strategy to adopt?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
Which of the following is necessary for effective risk management in IT governance?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
Which of the following is MOST important when planning a network audit?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?
An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
The PRIMARY role of a control self-assessment (CSA) facilitator is to:
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?
The PRIMARY benefit of information asset classification is that it:
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
Which of the following BEST helps to ensure data integrity across system interfaces?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
Which of the following would be MOST useful when analyzing computer performance?