Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
Which of the following BEST demonstrates to senior management and the board that an audit function is compliant with standards and the code of ethics?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Which of the following security risks can be reduced by a property configured network firewall?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?
During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
Secure code reviews as part of a continuous deployment program are which type of control?
To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?
An IS auditor is reviewing security controls related to collaboration tools for a business unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
In an online application which of the following would provide the MOST information about the transaction audit trail?
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?
Which of the following BEST enables an organization to determine the effectiveness of its information security awareness program?
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
An IS auditor can BEST evaluate the business impact of system failures by:
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
Which of the following is MOST helpful to an IS auditor when assessing the effectiveness of controls?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
Which of the following is the MOST appropriate responsibility of an IS auditor involved in a data center renovation project?
Which of the following occurs during the issues management process for a system development project?
Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the
auditor's BEST recommendation to help prevent unauthorized access?
Which of the following is the MOST important task of an IS auditor during an application post-implementation review?
An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether
Which of the following is MOST important for an IS auditor to assess during a post-implementation review of a newly modified IT application developed in-house?
An IS auditor observes that a large number of departed employees have not been removed from the accounts payable system. Which of the following is MOST important to determine in order to assess the risk1?
The implementation of an IT governance framework requires that the board of directors of an organization:
During an IS audit of a data center, it was found that programmers are allowed to make emergency fixes to operational programs. Which of the following should be the IS auditor's PRIMARY recommendation?
An IS auditor finds that the cost of developing an application is now projected to significantly exceed the budget. Which of the following is the GREATEST risk to communicate to senior management?
An organization saves confidential information in a file with password protection and the file is placed in a shared folder. An attacker has stolen this information by obtaining the password through social engineering. Implementing which of the following would BEST enable the organization to prevent this type of incident in the future?
During a physical security audit, an IS auditor was provided a proximity badge that granted access to three specific floors in a corporate office building. Which of the following issues should be of MOST concern?
Which of the following findings related to segregation of duties should be of GREATEST concern to an IS auditor?
Which of the following is the GREATEST impact as a result of the ongoing deterioration of a detective control?
Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?
Which of the following is the BEST sampling method to use when relatively few errors are expected to be found in a population?
Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
Which of the following provides the MOST reliable method of preventing unauthonzed logon?
Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?
Which of the following is an example of a preventative control in an accounts payable system?
The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:
Which of the following is the BEST reason for an organization to use clustering?
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
What is the Most critical finding when reviewing an organization’s information security management?
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
Which of the following metrics would BEST measure the agility of an organization's IT function?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
Which of the following is MOST helpful for measuring benefits realization for a new system?
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
Which of the following findings from an IT governance review should be of GREATEST concern?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
Providing security certification for a new system should include which of the following prior to the system's implementation?
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
Which of the following would be MOST useful when analyzing computer performance?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
Which of the following BEST helps to ensure data integrity across system interfaces?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality
within the organization. Which of the following should be recommended as the PRIMARY factor to
determine system criticality?
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
Which of the following is an IS auditor's BEST recommendation to mitigate the risk of eavesdropping
associated with an application programming interface (API) integration implementation?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
Which of the following is the BEST reason to implement a data retention policy?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:
Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?
Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?
Which of the following is MOST critical to the success of an information security program?
Which of the following provides the MOST protection against emerging threats?
Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
A proper audit trail of changes to server start-up procedures would include evidence of:
Which of the following data would be used when performing a business impact analysis (BIA)?
An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;
Which of the following should be the FIRST step in the incident response process for a suspected breach?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
Which of the following is MOST critical for the effective implementation of IT governance?
Which of the following is MOST important when implementing a data classification program?
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
Which of the following strategies BEST optimizes data storage without compromising data retention practices?
Which of the following is the MAIN purpose of an information security management system?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
Which of the following is MOST important with regard to an application development acceptance test?
During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:
Which of the following demonstrates the use of data analytics for a loan origination process?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
Which of the following components of a risk assessment is MOST helpful to management in determining the level of risk mitigation to apply?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''
An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?
Which of the following is the BEST approach for determining the overall IT risk appetite of an organization when business units use different methods formanaging IT risks?
When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
Which of the following should an IS auditor review when evaluating information systems governance for a large organization?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
In the development of a new financial application, the IS auditor's FIRST involvement should be in the:
When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?
A finance department has a multi-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger. and in year one, the system version upgrade will be applied. Which of the following should be the PRIMARY focus of the IS auditor reviewing the first year of the project?
Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization's configuration and release management process?
Which of the following is a PRIMARY responsibility of an IT steering committee?
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
Which of the following is the BEST testing approach to facilitate rapid identification of application interface errors?
Which of the following are used in a firewall to protect the entity's internal resources?
An IS auditor is reviewing the security of a web-based customer relationship management (CRM) system that is directly accessed by customers via the Internet, which of the following should be a concern for the auditor?
Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?
Which of the following would protect the confidentiality of information sent in email messages?
Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?
in a post-implantation Nation review of a recently purchased system it is MOST important for the iS auditor to determine whether the:
Which type of device sits on the perimeter of a corporate of home network, where it obtains a public IP address and then generates private IP addresses internally?
Which of the following should be an IS auditor's PRIMARY focus when evaluating the response process for cybercrimes?
Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?
An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?
Email required for business purposes is being stored on employees' personal devices.
Which of the following is an IS auditor's BEST recommendation?
An IS auditor learns that an in-house system development life cycle (SDLC) project has not met user specifications. The auditor should FIRST examine requirements from which of the following phases?
During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor's BEST course of action?
Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?
Which of the following is the BEST indication to an IS auditor that management's post-implementation review was effective?
Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program'?
An IS auditor is reviewing an organization's business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor's GREATEST concern?
A computer forensic audit is MOST relevant in which of the following situations?
Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization's security policy?
As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:
The use of control totals satisfies which of the following control objectives?
A firewall between internal network segments improves security and reduces risk by:
What is the PRIMARY purpose of performing a parallel run of a now system?
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?
Which of the following should be of GREATEST concern to an |$ auditor reviewing data conversion and migration during the implementation of a newapplication system?
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?
When classifying information, it is MOST important to align the classification to:
An IS auditor evaluating the change management process must select a sample from the change log. What is the BEST way to the auditor to confirm the change log is complete?
When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?
Due to advancements in technology and electronic records, an IS auditor has completed an engagement by email only. Which of the following did the IS auditor potentially compromise?
Which of the following is MOST important to consider when developing a service level agreement (SLAP)?
Which of the following is the PRIMARY reason to perform a risk assessment?
During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?
The use of access control lists (ACLs) is the MOST effective method to mitigate security risk for routers because they: (Identify Correct answer and related explanation/references from CISA Certification - Information Systems Auditor official Manual or book)
Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?
When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
Which of the following is the MOST appropriate control to ensure integrity of online orders?
What is the MOST effective way to detect installation of unauthorized software packages by employees?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's data conversion andinfrastructure migration plan?
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
Which of the following is the BEST source of information for examining the classification of new data?
Backup procedures for an organization's critical data are considered to be which type of control?
The use of which of the following is an inherent risk in the application container infrastructure?
Which of the following is the MOST important consideration for patching mission critical business application servers against known vulnerabilities?
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?
An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data
classification in this project?
An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?
The record-locking option of a database management system (DBMS) serves to.
Which of the following is MOST critical to the success of an information security program?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
An organization considering the outsourcing of a business application should FIRST:
An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?
Which of the following is the MOST important consideration for a contingency facility?
Which of the following statements appearing in an organization's acceptable use policy BEST demonstrates alignment with data classification standards related to the protection of information assets?
Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?
Which of the following is MOST critical to the success of an information security program?
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor's NEXT course of action?
Which of the following is the MOST important advantage of participating in beta testing of software products?
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
The use of which of the following would BEST enhance a process improvement program?
Which of the following would be the GREATEST concern to an IS auditor when reviewing the outsourcing contract for an organization's cloud service provider?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?
A small IT department has embraced DevOps, which allows members of this group to deploy code to production and maintain some development access to automate releases. Which of the following is the MOST effective control?
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
Which of the following is the MOST significant risk when an application uses individual end-user accounts to access the underlying database?
Which of the following is MOST helpful for an IS auditor to review when evaluating an organizations business process that are supported by applications and IT systems?
Which of the following is the MOST important control for virtualized environments?
Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?
Which of the following is the GREATEST advantage of outsourcing the development of an e-banking solution when in-house technical expertise is not available?
When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?
An IS auditor has identified deficiencies within the organization's software development life cycle policies. Which of the following should be done NEXT?
An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
When reviewing past results of a recurring annual audit, an IS auditor notes that findings may not have been reported and independence may not have been maintained. Which of the following is the auditor's BEST course of action?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
Which of the following helps to ensure the integrity of data for a system interface?
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?
Which of the following is the BEST reason to implement a data retention policy?
Which of the following is the BEST point in time to conduct a post-implementation review?
Which of the following is MOST useful when planning to audit an organization's compliance with cybersecurity regulations in foreign countries?
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls?
An organization uses public key infrastructure (PKI) to provide email security. Which of the following would be the MOST efficient method to determine whether email messages have been modified in transit?
Which of the following is the MOST effective accuracy control for entry of a valid numeric part number?
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
An IS auditor should be MOST concerned if which of the following fire suppression systems is utilized to protect an asset storage closet?
An IS auditor is reviewing an organization's business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
Which of the following BEST contributes to the quality of an audit of a business-critical application?
The BEST way to evaluate the effectiveness of a newly developed application is to:
Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?
What is the PRIMARY reason for an organization to classify the data stored on its internal networks?
During a pre-implementation review, an IS auditor notes that some scenarios have not been tested. Management has indicated that the project is critical and cannot be postponed. Which of the following is the auditor's BEST course of action?
An organization's strategy to source certain IT functions from a Software as a Service (SaaS) provider should be approved by the:
A current project to develop IT-based solutions will need additional funding to meet changes in business requirements. Who is BEST suited to obtain this additional funding?
Which of the following is the PRIMARY objective of enterprise architecture (EA)?
Which of the following is the GREATEST risk of project dashboards being set without sufficiently defined criteria?
Which of the following is the BEST control to help ensure the completeness of outbound transactions?
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
A job is scheduled to transfer data from a transactional system database to a data lake for reporting purposes. Which of the following would be of GREATEST concern to an IS auditor?
Which of the following staff should an IS auditor interview FIRST to obtain a general overview of the various technologies used across different programs?
An organization requires the use of a key card to enter its data center. Recently, a control was implemented that requires biometric authentication for each employee.
Which type of control has been added?
Which of the following risk scenarios is BEST mitigated through the use of a data loss prevention (DLP) tool?
Which of the following should be the PRIMARY consideration when incorporating user training and awareness into a data loss prevention (DLP) strategy?
What is the MOST effective way to manage contractors' access to a data center?
Which of the following is the MOST effective control when granting access to a service provider for a ctoud-6ased application?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's mobile device policies and controls in its corporate environment?
Which of the following presents the GREATEST risk to an organization's ability to manage quality control (QC) processes?
Which of the following is the MOST important task of an IS auditor during an application post-implementation review?
The PRIMARY reason to assign data ownership for protection of data is to establish:
Which of the following controls is the BEST recommendation to prevent the skimming of debit or credit card data in point of sale (POS) systems?
While reviewing the effectiveness of an incident response program, an IS auditor notices a high number of reported incidents involving malware originating from removable media found by employees. Which of the following is the MOST appropriate recommendation to management?
During an audit of payment services of a branch based in a foreign country, a large global bank's audit team identifies an opportunity to use data analytics techniques to identify abnormal payments. Which of the following is the team's MOST important course of action?
In a public key cryptographic system, which of the following is the PRIMARY requirement to address the risk of man-in-the-middle attacks through spoofing?
Which of the following metrics is the BEST indicator of the performance of a web application?
Which of the following responsibilities associated with a disaster recovery plan (DRP) can be outsourced to a Disaster Recovery as a Service (DRaaS) provider?
Which of the following should an IS auditor do FIRST when auditing a robotics process automation (RPA) implementation?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization’s enterprise architecture (EA) program?
When protecting the confidentiality of information assets, the MOST effective control practice is the:
During recent post-implementation reviews, an IS auditor has noted that several deployed applications are not being used by the business. The MOST likely cause would be the lack of:
Which of the following technologies BEST assists in protection of digital evidence as part of forensic investigation acquisition?
Which of the following findings would be of GREATEST concern when auditing an organization's end-user computing (EUC)?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
Which of the following should be an IS auditor's PRIMARY focus when auditing the implementation of a new IT operations performance monitoring system?
An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?
An IS auditor is planning a review of an organizations cybersecurity incident response maturity Which of the following methodologies would provide the MOST reliable conclusions?
Which of the following should be of GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
An IS auditor is reviewing an organizations release management practices and observes inconsistent and inaccurate estimation of the size and complexity of business application development projects. Which of the following should the auditor recommend to address this issue?
An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated. Which of the following should be of
MOST concern?
An IS auditor has been asked to review the quality of data in a general ledger system. Which of the following would provide the auditor with the MOST meaningful results?
Which of the following controls is BEST implemented through system configuration?
Network user accounts for temporary workers expire after 90 days.
Application user access is reviewed every 180 days for appropriateness.
Financial data in key reports is traced to source systems for completeness and accuracy.
An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor’s test data set to include?
When an organization conducts business process improvements, the IS auditor should be MOST concerned with the:
Which of the following would be MOST helpful to an IS auditor performing a risk assessment of an application programming interface (API) that feeds credit scores from a well-known commercial credit agency into an organizational system?
Which of the following is the PRIMARY advantage of using an automated security log monitoring tool instead of conducting a manual review to monitor the use of privileged access?
Which of the following should be of GREATEST concern to an IS auditor reviewing project documentation for a client relationship management (CRM) system migration project?
Management has decided to accept a risk in response to a draft audit recommendation. Which of the following should be the IS auditor’s NEXT course of action?
During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor's BEST course of action?
Which of the following is the GREATEST advantage of utilizing guest operating systems m a virtual environment?
Which of the following is the MOST important course of action to ensure a cloud access security broker (CASB) effectively detects and responds to threats?
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
Which of the following tasks would cause the GREATEST segregation of duties (SoD) concern if performed by the person who reconciles the organization's device inventory?
An organization used robotic process automation (RPA) technology to develop software bots that extract data from various sources for input into a legacy financial application. Which of the following should be of GREATEST concern to an IS auditor when reviewing the software bot job scheduling and production process automation?