An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
Which of the following BEST helps to ensure data integrity across system interfaces?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
Which of the following is MOST critical for the effective implementation of IT governance?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
Which of the following would be MOST useful when analyzing computer performance?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
Which of the following is MOST important when implementing a data classification program?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
Which of the following is necessary for effective risk management in IT governance?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization's information cannot be accessed?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?
Which of the following provides the BEST evidence that a third-party service provider's information security controls
are effective?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?
Which of the following is the MOST important responsibility of user departments associated with program changes?
Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?
Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program'?
When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on
Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?
Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?
Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?
Management has learned the implementation of a new IT system will not be completed on time and has requested an audit. Which of the following audit findings should be of GREATEST concern?
Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
Which of the following is the MOST appropriate control to ensure integrity of online orders?
An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?
When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?
Which of the following is MOST important to consider when reviewing an organization's defined data backup and restoration procedures?
An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
Which of the following are used in a firewall to protect the entity's internal resources?
An organization outsourced its IS functions to meet its responsibility for disaster recovery, the organization should:
Which of the following methods will BEST reduce the risk associated with the transition to a new system using
technologies that are not compatible with the old system?
During an audit which of the following would be MOST helpful in establishing a baseline for measuring data quality?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's data conversion and infrastructure migration plan?
Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?
When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:
The use of which of the following is an inherent risk in the application container infrastructure?
An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?
An IS auditor evaluating the change management process must select a sample from the change log. What is the BEST way to the auditor to confirm the change log is complete?
Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?
What should an IS auditor do FIRST when a follow-up audit reveals some management action plans have not been initiated?
During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor's BEST course of action?
Which of the following provides the MOST assurance of the integrity of a firewall log?
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Which of the following technologies has the SMALLEST maximum range for data transmission between devices?
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?
As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:
When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
Which of the following is MOST important to determine when conducting an audit Of an organization's data privacy practices?
Which of the following should be restricted from a network administrator's privileges in an adequately segregated IT environment?
Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?
In the development of a new financial application, the IS auditor's FIRST involvement should be in the:
An organization's IT risk assessment should include the identification of:
An IS auditor is reviewing an organization's business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor's GREATEST concern?
An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be the GREATEST concern?
Which of the following should be an IS auditor's GREATEST concern when a data owner assigns an incorrect classification level to data?
Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?
Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization's security policy?
Which of the following is the BEST indication of effective IT investment management?
To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
During an audit of a multinational bank's disposal process, an IS auditor notes several findings. Which of the following should be the auditor's GREATEST concern?
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
An IS auditor is evaluating the risk associated with moving from one database management system (DBMS) to another. Which of the following would be MOST helpful to ensure the integrity of the system throughout the change?
A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
Which of the following business continuity activities prioritizes the recovery of critical functions?
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
While auditing a small organization's data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?
Which of the following is MOST important to consider when scheduling follow-up audits?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
Which of the following is an example of a preventative control in an accounts payable system?
Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
Which of the following is MOST helpful for measuring benefits realization for a new system?
Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization's privacy policy?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
In an online application which of the following would provide the MOST information about the transaction audit trail?
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
Which of the following findings from an IT governance review should be of GREATEST concern?
Providing security certification for a new system should include which of the following prior to the system's implementation?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization's security policy?
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
The waterfall life cycle model of software development is BEST suited for which of the following situations?
After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?
An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
Which of the following is MOST important to ensure when planning a black box penetration test?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
The decision to accept an IT control risk related to data quality should be the responsibility of the:
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
The implementation of an IT governance framework requires that the board of directors of an organization:
Which of the following is MOST important with regard to an application development acceptance test?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
Which of the following demonstrates the use of data analytics for a loan origination process?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
Which of the following strategies BEST optimizes data storage without compromising data retention practices?
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
Secure code reviews as part of a continuous deployment program are which type of control?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
Which of the following is MOST important to include in forensic data collection and preservation procedures?
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
Which of the following should be done FIRST when planning a penetration test?
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
Which of the following is the MOST effective way for an organization to project against data loss?
Which of the following is an audit reviewer's PRIMARY role with regard to evidence?
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
What is MOST important to verify during an external assessment of network vulnerability?
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?
The BEST way to provide assurance that a project is adhering to the project plan is to:
Which of the following BEST enables a benefits realization process for a system development project?
Which of the following is the MOST effective control over visitor access to highly secured areas?
Which of the following would provide management with the MOST reasonable assurance that a new data warehouse will meet the needs of the
organization?
Which of the following should be identified FIRST during the risk assessment process?
Which of the following is the MOST important prerequisite for implementing a data loss prevention (DLP) tool?
A small IT department has embraced DevOps, which allows members of this group to deploy code to production and maintain some development access to automate releases. Which of the following is the MOST effective control?
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
Which of the following should be given GREATEST consideration when implementing the use of an open-source product?
Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?
An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?
Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?
Which of the following areas of responsibility would cause the GREATEST segregation of duties conflict if the individual who performs the related tasks also has approval authority?
In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
Which of the following is the MOST effective accuracy control for entry of a valid numeric part number?
During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)
agreement. What should the auditor do NEXT?
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?
During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?
Which of the following BEST supports the effectiveness of a compliance program?
Which of the following would BEST guide an IS auditor when determining an appropriate time to schedule the follow-up of agreed corrective actions for reported audit issues?
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?
During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?
Which of the following is MOST useful when planning to audit an organization's compliance with cybersecurity regulations in foreign countries?
Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?
Which of the following is MOST critical to the success of an information security program?
Which of the following is the MOST important control for virtualized environments?
Which of the following would be the GREATEST concern to an IS auditor when reviewing the outsourcing contract for an organization's cloud service provider?
Which of the following should an IS auditor use when verifying a three-way match has occurred in an enterprise resource planning (ERR) system?
Which of the following is the MOST important consideration when establishing vulnerability scanning on critical IT infrastructure?
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
Which of the following BEST contributes to the quality of an audit of a business-critical application?
An IS auditor is reviewing an organization's business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
When developing customer-facing IT applications, in which stage of the system development life cycle (SDLC) is it MOST beneficial to consider data privacy principles?
Which of the following is MOST likely to be a project deliverable of an agile software development methodology?
Which of the following is the MOST important responsibility of data owners when implementing a data classification process?
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
During the review of a system disruption incident, an IS auditor notes that IT support staff were put in a position to make decisions beyond their level of authority.
Which of the following is the BEST recommendation to help prevent this situation in the future?
A bank wants to outsource a system to a cloud provider residing in another country. Which of the following would be the MOST appropriate IS audit recommendation?
An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization's payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management
experience. What is the BEST course of action?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor's independence?
Which of the following is the MOST important advantage of participating in beta testing of software products?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
Which of the following is MOST helpful for an IS auditor to review when evaluating an organizations business process that are supported by applications and IT systems?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
Which of the following is the MAIN responsibility of the IT steering committee?
An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?
An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
An organization is ready to implement a new IT solution consisting of multiple modules. The last module updates the processed data into the database. Which of the following findings should be of MOST concern to the IS auditor?
A national tax administration agency with a distributed network experiences service disruptions due to a large influx of traffic to a regional office near the end of each year. Which of the following would BEST enable the agency to improve the performance of its servers during the busy period?
Management has decided to accept a risk in response to a draft audit recommendation. Which of the following should be the IS auditor’s NEXT course of action?
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change management process?
Which of the following will BEST ensure that archived electronic information of permanent importance remains accessible over time?
An IS auditor is reviewing an organization's incident management processes and procedures. Which of the following observations should be the auditor's GREATEST concern?
Which of the following is the MOST important consideration when developing tabletop exercises within a cybersecurity incident response plan?
Which of the following is MOST important when defining the IS audit scope?
Which of the following would be MOST important to include in an IS audit report?
During an audit of payment services of a branch based in a foreign country, a large global bank's audit team identifies an opportunity to use data analytics techniques to identify abnormal payments. Which of the following is the team's MOST important course of action?
An organization's information security policies should be developed PRIMARILY on the basis of:
Which of the following BEST indicates to an IS auditor that an organization handles emergency changes appropriately and transparently?
Which of the following is the BEST way to foster continuous improvement of IS audit processes and practices?
A new regulation has been enacted that mandates specific information security practices for the protection of customer data. Which of the following is MOST useful for an IS auditor to review when auditing against the regulation?
Which of the following is the PRIMARY benefit of benchmarking an organization's software development lifecycle practices against a capability maturity model?
Which of the following BEST addresses the availability of an online store?
Which of the following is a PRIMARY function of an intrusion detection system (IDS)?
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's information security governance?
Which of the following BEST enables an IS auditor to prioritize financial reporting spreadsheets for an end-user computing (EUC) audit?
When reviewing hard disk utilization reports, an IS auditor observes that utilization is routinely above 95%. Which of the following should be the GREATEST concern to the IS auditor?
An IS auditor wants to gain a better understanding of an organization’s selected IT operating system software. Which of the following would be MOST helpful to review?
Which of the following is the GREATEST risk of project dashboards being set without sufficiently defined criteria?
During an information security review, an IS auditor learns an organizational policy requires all employ-ees to attend information security training during the first week of each new year. What is
the auditor's BEST recommendation to ensure employees hired after January receive adequate guid-ance regarding security awareness?
Which of the following is the PRIMARY objective of enterprise architecture (EA)?
An IS auditor is reviewing a network diagram. Which of the following would be the BEST location for placement of a firewall?
Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time?
Which of the following is MOST appropriate to review when determining if the work completed on an IT project is in alignment with budgeted costs?
Using swipe cards to limit employee access to restricted areas requires implementing which additional control?
The MOST important measure of the effectiveness of an organization's security program is the:
Which of the following should be used as the PRIMARY basis for prioritizing IT projects and initiatives?
Which of the following is the GREATEST benefit of adopting an Agile audit methodology?
Which of the following poses the GREATEST risk to an organization related to system interfaces?
Which of the following should be the PRIMARY focus when communicating an IS audit issue to management?
An IS auditor is reviewing documentation from a change that was applied to an application. Which of the following findings would be the GREATEST concern?
A steering committee established to oversee an organization's digital transformation program is MOSTlikely to be involved with which of the following activities?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the
auditor's BEST recommendation to help prevent unauthorized access?
An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?
Having knowledge in which of the following areas is MOST relevant for an IS auditor reviewing public key infrastructure (PKI)?
In an annual audit cycle, the audit of an organization's IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
Which of the following is the BEST way to ensure a vendor complies with system security requirements?
Which of the following is the MOST important consideration when establishing operational log management?
IT management has accepted the risk associated with an IS auditor's finding due to the cost and complexity of the corrective actions. Which of the following should be the auditor's NEXT course of action?
An IS auditor is reviewing a medical device that is attached to a patient’s body, which automatically takes and uploads measurements to a cloud server. Treatment may be updated based on the measurements. Which of the following should be the auditor's PRIMARY focus?
Which of the following is the MOST important consideration when defining an operational log management strategy?
Which of the following is an IS auditor's BEST recommendation for mitigating risk associated with inadvertent disclosure of sensitive information by employees?
From a risk management perspective, which of the following is the BEST approach when implementing a large and complex data center IT infrastructure?
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
Which of the following is the PRIMARY reason for using a digital signature?
An IS auditor reviewing an information processing environment decides to conduct external penetration testing. Which of the following is MOST appropriate to include in the audit scope for the organization to distinguish between the auditor's penetration attacks and actual attacks?
A web application is developed in-house by an organization. Which of the following would provide the BEST evidence to an IS auditor that the application is secure from external attack?
Which of the following should be of MOST concern to an IS auditor reviewing an organization's operational log management?
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
Which of the following BEST enables an organization to standardize its IT infrastructure to align with business goals?
Which of the following BEST ensures that effective change management is in place in an IS environment?
An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
In order for a firewall to effectively protect a network against external attacks, what fundamental practice must be followed?
An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated. Which of the following should be of
MOST concern?
A small organization is experiencing rapid growth and plans to create a new information security policy. Which of the following is MOST relevant to creating the policy?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?