Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
A database administrator (DBA) should be prevented from having end user responsibilities:
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
Which of the following would be MOST useful when analyzing computer performance?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
Which of the following is necessary for effective risk management in IT governance?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
While auditing a small organization's data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following is an example of a preventative control in an accounts payable system?
In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization's privacy policy?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
Which of the following BEST Indicates that an incident management process is effective?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
Which of the following BEST enables the timely identification of risk exposure?
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
Which of the following concerns is BEST addressed by securing production source libraries?
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
Which of the following is MOST critical for the effective implementation of IT governance?
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following is the MOST important outcome of an information security program?
Providing security certification for a new system should include which of the following prior to the system's implementation?
The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?
In a RAO model, which of the following roles must be assigned to only one individual?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
In an online application, which of the following would provide the MOST information about the transaction audit trail?
A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
An information systems security officer's PRIMARY responsibility for business process applications is to:
Which of the following is the MOST important activity in the data classification process?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?
An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?
Which of the following BEST contributes to the quality of an audit of a business-critical application?
Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality
within the organization. Which of the following should be recommended as the PRIMARY factor to
determine system criticality?
Which of the following provides the BE ST method for maintaining the security of corporate applications pushed to employee-owned mobile devices?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
An IS auditor is reviewing an organization's business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?
An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
The following findings are the result of an IS auditor's post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
Which of the following helps to ensure the integrity of data for a system interface?
Which of the following is the MOST important control for virtualized environments?
An organization is disposing of removable onsite media which contains sensitive information. Which of the following is the MOST effective method to prevent disclosure of sensitive data?
What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?
A small business unit is implementing a control self-assessment (CSA) program and leveraging the internal
audit function to test its internal controls annually. Which of the following is the MOST significant benefit of
this approach?
During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)
agreement. What should the auditor do NEXT?
Which of the following statements appearing in an organization's acceptable use policy BEST demonstrates alignment with data classification standards related to the protection of information assets?
The BEST way to provide assurance that a project is adhering to the project plan is to:
Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:
An IS auditor is planning an audit of an organization's risk management practices. Which of the following would provide the MOST useful information about
risk appetite?
Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?
Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
An IS auditor is reviewing the service agreement with a technology company that provides IT help desk services to the organization. Which of the following monthly performance
metrics is the BEST indicator of service quality?
Which of the following is MOST critical to the success of an information security program?
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
When planning an internal penetration test, which of the following is the MOST important step prior to finalizing the scope of testing?
An organization plans to replace its nightly batch processing backup to magnetic tape with real-time replication to a second data center. Which of the following is the GREATEST risk associated with this change?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
An IS auditor should be MOST concerned if which of the following fire suppression systems is utilized to protect an asset storage closet?
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
Which of the following is the MOST significant risk when an application uses individual end-user accounts to access the underlying database?
Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?
Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?
During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility Which of the following is the IS auditor's BEST course of action?
Which of the following is the BEST sampling method to use when relatively few errors are expected to be found in a population?
Which of the following is the MOST effective control over visitor access to highly secured areas?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
Which of the following is the MOST important prerequisite for implementing a data loss prevention (DLP) tool?
Which of the following biometric access controls has the HIGHEST rate of false negatives?
Which of the following physical controls provides the GREATEST assurance that only authorized individuals can access a data center?
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
Which of the following is MOST critical to the success of an information security program?
An organization relies on an external vendor that uses a cloud-based Software as a Service (SaaS) model to back up its data. Which of the following is the GREATEST risk to the organization related to data backup and retrieval?
To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?
Which of the following would provide management with the MOST reasonable assurance that a new data warehouse will meet the needs of the
organization?
During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?
An organization has partnered with a third party to transport backup drives to an offsite storage facility. Which of the following is MOST important before sending the drives?
Which of the following would BEST indicate the effectiveness of a security awareness training program?
When reviewing a business case for a proposed implementation of a third-party system, which of the following should be an IS auditor's GREATEST concern?
Which of the following would be an IS auditor's GREATEST concern when reviewing the organization's business continuity plan (BCP)?
An IS auditor is verifying the adequacy of an organization's internal controls and is concerned about potential circumvention of regulations. Which of the following is the BEST sampling method to use?
Which of the following would BEST guide an IS auditor when determining an appropriate time to schedule the follow-up of agreed corrective actions for reported audit issues?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
When planning a follow-up, the IS auditor is informed by operational management that recent organizational changes have addressed the previously identified risk and implementing the action plan is no longer necessary. What should the auditor do NEXT?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor's NEXT course of action?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?
Backup procedures for an organization's critical data are considered to be which type of control?
Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?
Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:
Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?
Which of the following would be the BEST process for continuous auditing to a large financial Institution?
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?
Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?
An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?
Controls related to authorized modifications to production programs are BEST tested by:
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
The use of access control lists (ACLs) is the MOST effective method to mitigate security risk for routers because they: (Identify Correct answer and related explanation/references from CISA Certification - Information Systems Auditor official Manual or book)
What is the MOST effective way to detect installation of unauthorized software packages by employees?
Which of the following is the BEST indication to an IS auditor that management's post-implementation review was effective?
As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:
Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?
Which of the following is the BEST indicator for measuring performance of IT help desk function?
A new system development project is running late against a critical implementation deadline Which of the following is the MOST important activity?
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?
The use of control totals satisfies which of the following control objectives?
Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?
An IS auditor is preparing a plan for audits to be carried out over a specified period. Which of the following activities should the IS auditor perform FIRST?
Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?
Which of the following provides the MOST useful information regarding an organization's risk appetite and tolerance?
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
Which of the following provides the MOST reliable method of preventing unauthonzed logon?
An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization's configuration and release management process?
Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?
An IS auditor is reviewing a data conversion project Which of the following is the auditor's BEST recommendation prior to go-live?
Which of the following methods will BEST reduce the risk associated with the transition to a new system using technologies that are not compatible with the old system?
Which of the following should an IS auditor review when evaluating information systems governance for a large organization?
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following is MOST important for an IS auditor to validate when auditing network device management?
Which of the following is the BEST testing approach to facilitate rapid identification of application interface errors?
When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider’s external audit report on service level management when the
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization's objectives?
Which of the following is the BEST method to delete sensitive information from storage media that will be reused?
Which of the following is MOST important to determine when conducting an audit Of an organization's data privacy practices?
An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application's operating system?
An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
Which of the following should be of GREATEST concern to an IS auditor when auditing an organization's IT strategy development process?
Which of the following is MOST helpful for measuring benefits realization for a new system?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:
Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization's security policy?
Which of the following is the BEST performance indicator for the effectiveness of an incident management program?
In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?
Which of the following is a PRIMARY responsibility of an IT steering committee?
An IS auditor is asked to review an organization's technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?
An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?
Which of the following is the MOST effective way for an organization to project against data loss?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
The decision to accept an IT control risk related to data quality should be the responsibility of the:
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
The implementation of an IT governance framework requires that the board of directors of an organization:
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
Which of the following demonstrates the use of data analytics for a loan origination process?
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
Which of the following MOST effectively minimizes downtime during system conversions?
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
An IS auditor is reviewing a bank's service level agreement (SLA) with a third-party provider that hosts the bank's secondary data center, which of the following findings should be of GREATEST concern to the auditor?
Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD)
policy to help prevent data leakage?
Which of the following backup schemes is the BEST option when storage media is limited?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor's NEXT course of action?
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?
Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
Which of the following would be a result of utilizing a top-down maturity model process?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?
In an online application which of the following would provide the MOST information about the transaction audit trail?
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
Which of the following BEST facilitates the legal process in the event of an incident?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
Which of the following is the BEST reason to implement a data retention policy?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
Which of the following BEST helps to ensure data integrity across system interfaces?
Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
Which of the following is the BEST recommendation by an IS auditor to prevent unauthorized access to Internet of Things (loT) devices'?
Which of the following should be the PRIMARY purpose of conducting tabletop exercises when re-viewing a security incident response plan?
Which of the following is the BEST way to ensure a vendor complies with system security requirements?
Which of the following technologies is BEST suited to fulfill a business requirement for nonrepudiation of business-to-business transactions with external parties without the need for a mutually trusted entity?
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
A telecommunications company has recently created a new fraud department with three employees and acquired a fraud detection system that uses artificial intelligence (AI) modules. Which of the following would be of GREATEST concern to an IS auditor reviewing the system?
Which of the following is the BEST approach to help organizations address risks associated with shadow IT?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor’s test data set to include?
Which of the following is the GREATEST benefit of adopting an Agile audit methodology?
An IS auditor finds a user account where privileged access is not appropriate for the user’s role. Which of the following would provide the BEST evidence to determine whether the risk of this access has been exploited?
During the forensic investigation of a cyberattack involving credit card data, which of the following is MOST important to ensure?
Which of the following BEST enables an IS auditor to assess whether jobs were completed according to the job schedule?
An IS auditor is assessing the adequacy of management's remediation action plan. Which of the following should be the MOST important consideration?
An IS auditor has validated that an organization's IT department runs several low-priority automated tasks Which of the following is the BEST recommendation for an automated job schedule?
Which of the following is the MOST significant risk to an organization migrating its onsite application servers to a public cloud service provider?
During an audit of payment services of a branch based in a foreign country, a large global bank's audit team identifies an opportunity to use data analytics techniques to identify abnormal payments. Which of the following is the team's MOST important course of action?
An IS auditor wants to gain a better understanding of an organization’s selected IT operating system software. Which of the following would be MOST helpful to review?
Which of the following audit procedures would provide the BEST assurance that an application program is functioning as designed?
During the audit of an enterprise resource planning (ERP) system, an IS auditor found an applicationpatch was applied to the production environment. It is MOST
important for the IS auditor to verify approval from the:
When conducting an audit of an organization's use of AI in its customer service chatbots, an IS auditor should PRIMARILY focus on the:
Which of the following is an IS auditor's BEST recommendation to mitigate the risk of eavesdropping associated with an application programming interface (API) integration implementation?
Data from a system of sensors located outside of a network is received by the open ports on a server. Which of the following is the BEST way to ensure the integrity of the data being collected from the sensor system?
An IS auditor found that operations personnel failed to run a script contributing to year-end financial statements. Which of the following is the BEST recommendation?
Which of the following findings would be of GREATEST concern when reviewing project risk management practices?
Which of the following is the PRIMARY purpose of conducting a control self-assessment (CSA)?
Which of the following is the GREATEST risk associated with hypervisors in virtual environments?
Which of the following should be the GREATEST concern for an IS auditor performing a post-implementation review for a major system upgrade?
In order for a firewall to effectively protect a network against external attacks, what fundamental practice must be followed?
Which of the following would be the GREATEST concern for an IS auditor conducting a pre-implementation review of a data loss prevention (DLP> tool?
External audits have identified recurring exceptions in the user termination process, despite similar internal audits having reported no exceptions in the past. Which of the following is the IS auditor's BEST course of action to improve the internal audit process in the future?
An IS auditor discovers that backups of critical systems are not being performed in accordance with the recovery point objective (RPO) established in the business continuity plan (BCP). What should the auditor do NEXT?
Which of the following provides re BEST evidence that outsourced provider services are being properly managed?
Which of the following BEST enables an IS auditor to combine and compare access control lists from various applications and devices?
A configuration management audit identified that predefined automated procedures are used when deploying and configuring application infrastructure in a cloud-based
environment. Which of the following is MOST important for the IS auditor to review?
To help determine whether a controls-reliant approach to auditing financial systems in a company should be used, which sequence of IS audit work is MOST appropriate?
Which of the following is the PRIMARY reason for using a digital signature?
Which of the following would MOST likely jeopardize the independence of a quality assurance (QA} team and could lead to conflict of interest?
Which of the following would be an IS auditor's BEST recommendation to senior management when several IT initiatives are found to be misaligned with the organization's strategy?
Which of the following system attack methods is executed by entering malicious code into the search box of a vulnerable website, causing the server to reveal restricted information?
An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated. Which of the following should be of
MOST concern?
Which of the following should an IS auditor do FIRST when auditing a robotics process automation (RPA) implementation?
What should be an IS auditor's PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
Which of the following should be of GREATEST concern to an IS auditor when using data analytics?
An IS auditor is reviewing an organization's cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?
Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
In a public key cryptographic system, which of the following is the PRIMARY requirement to address the risk of man-in-the-middle attacks through spoofing?
Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the
associated risk?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
Which of the following cloud capabilities BEST enables an organization to meet unexpectedly high service demand?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's incident response management program?
An IS auditor finds ad hoc vulnerability scanning is in place with no clear alignment to the organization's wider security threat and vulnerability management program.
Which of the following would BEST enable the organization to work toward improvement in this area?
The MOST important measure of the effectiveness of an organization's security program is the:
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the
firewall and:
Which of the following non-audit activities may impair an IS auditor's independence and objectivity?
An IS auditor is reviewing a data conversion project. Which of the following is the auditor's BEST recommendation prior to go-live?
Which of the following is the BEST way to ensure email confidentiality in transit?