What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
Which of the following should an IS auditor do FIRST when auditing a robotics process automation (RPA) implementation?
Which of the following provides the BE ST method for maintaining the security of corporate applications pushed to employee-owned mobile devices?
Which of the following is the MOST important consideration for a contingency facility?
An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
Which of the following provides the GREATEST assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively?
When reviewing past results of a recurring annual audit, an IS auditor notes that findings may not have been reported and independence may not have been maintained. Which of the following is the auditor's BEST course of action?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
An organization relies on an external vendor that uses a cloud-based Software as a Service (SaaS) model to back up its data. Which of the following is the GREATEST risk to the organization related to data backup and retrieval?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
Which of the following BEST enables the timely identification of risk exposure?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
Which of the following is MOST important to consider when scheduling follow-up audits?
Which of the following is the BEST reason to implement a data retention policy?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
Which of the following is MOST important to the effectiveness of smoke detectors installed in a data processing facility?
Which of the following should be an IS auditor's PRIMARY focus when auditing the implementation of a new IT operations performance monitoring system?
Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?
Which of the following is the STRONGEST indication of a mature risk management program?
An IS auditor is reviewing an organization's incident management processes. Which of the following observations should be the auditor's GREATEST concern?
Which of the following BEST mitigates the risk of SQL injection attacks against applications exposed to the internet?
At the end of each business day, a business-critical application generates a report of financial transac-tions greater than a certain value, and an employee
then checks these transactions for errors. What type of control is in place?
Which of the following BEST indicates that the effectiveness of an organization's security awareness program has improved?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization's security policy?
The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?
In an online application, which of the following would provide the MOST information about the transaction audit trail?
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
Which of the following is the BEST reason for an organization to use clustering?
An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:
An IS auditor is reviewing security controls related to collaboration tools for a business unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
In an online application which of the following would provide the MOST information about the transaction audit trail?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?
Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:
Which of the following MUST be completed as part of the annual audit planning process?
An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
Which of the following concerns is BEST addressed by securing production source libraries?
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?
An information systems security officer's PRIMARY responsibility for business process applications is to:
Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?
Which of the following business continuity activities prioritizes the recovery of critical functions?
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
Which of the following occurs during the issues management process for a system development project?
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:
Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?
A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?
During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?
A telecommunications company has recently created a new fraud department with three employees and acquired a fraud detection system that uses artificial intelligence (AI) modules. Which of the following would be of GREATEST concern to an IS auditor reviewing the system?
Which of the following provides the BEST assurance that vendor-supported software remains up to date?
Which of the following can BEST reduce the impact of a long-term power failure?
Which of the following is MOST helpful for evaluating benefits realized by IT projects?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the
firewall and:
An IS auditor is reviewing database fields updated in real-time and displayed through other applications in multiple organizational functions. When validating business approval for these various use cases, which of the following sources of information would be the BEST starting point?
Which of the following is the GREATEST risk of project dashboards being set without sufficiently defined criteria?
What should be an IS auditor's PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?
Which of the following is an IS auditor's BEST recommendation to mitigate the risk of eavesdropping associated with an application programming interface (API) integration implementation?
Which of the following BEST enables an IS auditor to prioritize financial reporting spreadsheets for an end-user computing (EUC) audit?
During a follow-up audit, an IS auditor finds that some critical recommendations have not been addressed, as management has decided to accept the risk. Which of the following is the IS auditors BEST course of action?
Which of the following is an IS auditor's BEST course of action when the auditee indicates that a corrective action plan for a high-risk finding will take longer than expected?
Which of the following is the GREATEST risk related to the use of virtualized environments?
An IS auditor is reviewing a decision to consolidate processing for multiple applications onto a single large server. Which of the following is the MOST significant impact from this decision?
Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?
Which of the following will BEST ensure that archived electronic information of permanent importance remains accessible over time?
An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?
When auditing the adequacy of a cooling system for a data center, which of the following is MOST important for the IS auditor to review?
An organization recently migrated Us data warehouse from a legacy system to a different architecture in the cloud. Which of the following should be of GREATEST concern to the IS auditor reviewing the new data architecture?
An IS auditor discovers that backups of critical systems are not being performed in accordance with the recovery point objective (RPO) established in the business continuity plan (BCP). What should the auditor do NEXT?
Which of the following BEST enables an organization to determine the effectiveness of its information security awareness program?
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
Which of the following is the GREATEST advantage of utilizing guest operating systems m a virtual environment?
Which of the following should be of GREATEST concern to an IS auditor reviewing system interfaces used to transfer publicly available information?
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change management process?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following BEST helps to ensure data integrity across system interfaces?
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
Which of the following is MOST important when implementing a data classification program?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?
Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor's BEST course of action?
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
Which of the following BEST enables an organization to improve the effectiveness of its incident response team?
An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?
A bank wants to outsource a system to a cloud provider residing in another country. Which of the following would be the MOST appropriate IS audit recommendation?
Which of the following would BEST protect the confidentiality of sensitive data in transit between multiple offices?
Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?
A web application is developed in-house by an organization. Which of the following would provide the BEST evidence to an IS auditor that the application is secure from external attack?
Which of the following should be of GREATEST concern for an IS auditor when reviewing user account policies?
Which of the following is the PRIMARY objective of enterprise architecture (EA)?
The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:
Which of the following protocols should be used when transferring data via the internet?
An IS auditor is reviewing an organization's cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?
Which of the following BEST enables an IS auditor to confirm the batch processing to post transactions from an input source is successful?
A new system development project is running late against a critical implementation deadline. Which of the following is the MOST important activity?
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Which of the following staff should an IS auditor interview FIRST to obtain a general overview of the various technologies used across different programs?
When building or upgrading enterprise cryptographic infrastructure, which of the following is the MOST critical requirement for growing business environments?
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
What should be the PRIMARY focus during a review of a business process improvement project?
An IS auditor is planning a review of an organizations robotic process automation (RPA) technology. Which of the following MUST be included in the audit work plan?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's mobile device policies and controls in its corporate environment?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
Which of the following would be MOST useful when analyzing computer performance?
An organization requires the use of a key card to enter its data center. Recently, a control was implemented that requires biometric authentication for each employee.
Which type of control has been added?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time?
An IS auditor is tasked to review an organization's plan-do-check-act (PDCA) method for improving IT-related processes and wants to determine the accuracy of defined targets to be achieved. Which of the following steps in the PDCA process should the auditor PRIMARILY focus on in this situation?
Which of the following measures BEST mitigates the risk of data exfiltration during a cyberattack?
Which of the following BEST mitigates the risk associated with the deployment of a new production system?
When reviewing whether IT investments are meeting business objectives, which of the following evaluations would be MOST useful?
When classifying information, it is MOST important to align the classification to:
An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following is the BEST methodology to use for estimating the complexity of developing a large business application?
Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?
An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:
An organization outsourced its IS functions to meet its responsibility for disaster recovery, the organization should:
Which of the following analytical methods would be MOST useful when trying to identify groups with similar behavior or characteristics in a large population?
Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?
Which of the following provides the MOST reliable method of preventing unauthonzed logon?
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
An IS auditor is reviewing a bank's service level agreement (SLA) with a third-party provider that hosts the bank's secondary data center, which of the following findings should be of GREATEST concern to the auditor?
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?
Which of the following technologies has the SMALLEST maximum range for data transmission between devices?
An IS auditor is reviewing a data conversion project Which of the following is the auditor's BEST recommendation prior to go-live?
Backup procedures for an organization's critical data are considered to be which type of control?
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
Which of the following is the BEST method to delete sensitive information from storage media that will be reused?
An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?
The charging method that effectively encourages the MOST efficient use of IS resources is:
Controls related to authorized modifications to production programs are BEST tested by:
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
Which of the following is the MOST appropriate control to ensure integrity of online orders?
Which of the following should be of GREATEST concern to an IS auditor reviewing project documentation for a client relationship management (CRM) system migration project?
Which of the following is the GREATEST advantage of utilizing guest operating systems m a virtual environment?
Which of following is MOST important to determine when conducting a post-implementation review?
During an audit which of the following would be MOST helpful in establishing a baseline for measuring data quality?
Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?
Which of the following is MOST important for an IS auditor to verify when reviewing the use of an outsourcer for disposal of storage media?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
Which of the following is the BEST way to ensure an organization's data classification policies are preserved during the process of data transformation?
Which of the following is the MOST important prerequisite for implementing a data loss prevention (DLP) tool?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
The following findings are the result of an IS auditor's post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?
An organization's IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?
Which of the following biometric access controls has the HIGHEST rate of false negatives?
An IS auditor is verifying the adequacy of an organization's internal controls and is concerned about potential circumvention of regulations. Which of the following is the BEST sampling method to use?
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?
An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization's payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management
experience. What is the BEST course of action?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
Which of the following is the MOST important advantage of participating in beta testing of software products?
Which of the following is the MAIN purpose of an information security management system?
Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor's GREATEST concern?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD)
policy to help prevent data leakage?
Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?
An IS auditor evaluating the change management process must select a sample from the change log. What is the BEST way to the auditor to confirm the change log is complete?
Which of the following is MOST important for an IS auditor to validate when auditing network device management?
Which of the following is an IS auditor's BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?
An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?
Which of the following is the BEST reason for an IS auditor to emphasize to management the importance of using an IT governance framework?
A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization's objectives?
Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?
An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?
Which of the following should be of GREATEST concern to an IS auditor when auditing an organization's IT strategy development process?
When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:
When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?
Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?
Which of the following is MOST important for an IS auditor to review when determining whether IT investments are providing value to tie business?
Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?
Which of the following should be restricted from a network administrator's privileges in an adequately segregated IT environment?
During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor's BEST course of action?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following
is the auditor’s BEST recommendation to prevent unauthorized access?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
Which of the following is the BEST performance indicator for the effectiveness of an incident management program?
Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves
for care?
Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?
When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?
Email required for business purposes is being stored on employees' personal devices.
Which of the following is an IS auditor's BEST recommendation?
Which of the following provides a new IS auditor with the MOST useful information to evaluate overall IT performance?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?
An organization has implemented a distributed security administration system to replace the previous centralized one. Which of the following presents the GREATEST potential concern?
What would be an IS auditor's BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?
A steering committee established to oversee an organization's digital transformation program is MOSTlikely to be involved with which of the following activities?
Which of the following is the MAIN objective of enterprise architecture (EA) governance?
Which of the following is the BEST way to mitigate risk to an organization's network associated with devices permitted under a bring your own device (BYOD) policy?
An IS auditor observes that a large number of departed employees have not been removed from the accounts payable system. Which of the following is MOST important to determine in order to assess the risk1?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
Which of the following should be the FIRST step in the incident response process for a suspected breach?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor's NEXT course of action?
Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?
In a large organization, IT deadlines on important projects have been missed because IT resources are not prioritized properly. Which of the following is the BEST recommendation to address this problem?
Which of the following is the MAIN responsibility of the IT steering committee?
An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?
During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?
An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?
An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization's goals and strategic objectives?
A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
Which of the following is the BEST point in time to conduct a post-implementation review?
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
A national tax administration agency with a distributed network experiences service disruptions due to a large influx of traffic to a regional office near the end of each year. Which of the following would BEST enable the agency to improve the performance of its servers during the busy period?
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor's NEXT step should be to:
In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?
During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?
Which of the following physical controls provides the GREATEST assurance that only authorized individuals can access a data center?
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
An IS auditor has been tasked with auditing the inventory control process for a large organization that processes millions of data transactions. Which of the following is the BEST testing strategy to adopt?
An IS auditor is reviewing the service agreement with a technology company that provides IT help desk services to the organization. Which of the following monthly performance
metrics is the BEST indicator of service quality?
An organization is disposing of removable onsite media which contains sensitive information. Which of the following is the MOST effective method to prevent disclosure of sensitive data?
Which of the following is MOST important to include in security awareness training?
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
An organization has an acceptable use policy in place, but users do not formally acknowledge the policy. Which of the following is the MOST significant risk from this finding?
What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?
During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?
An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
Which of the following should be given GREATEST consideration when implementing the use of an open-source product?
During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility Which of the following is the IS auditor's BEST course of action?
Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?
When developing customer-facing IT applications, in which stage of the system development life cycle (SDLC) is it MOST beneficial to consider data privacy principles?
An IS auditor learns that an organization's business continuity plan (BCP) has not been updated in the last 18 months and that the organization recently closed a production plant. Which of the following is the auditor's BEST course of action?
Which of the following is the PRIMARY basis on which audit objectives are established?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor's NEXT course of action?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
Which of the following is MOST important for an effective control self-assessment (CSA) program?
Which of the following is an audit reviewer's PRIMARY role with regard to evidence?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
Secure code reviews as part of a continuous deployment program are which type of control?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
Which of the following is the MOST effective way for an organization to project against data loss?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?
A proper audit trail of changes to server start-up procedures would include evidence of:
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?