Which of the following are used in a firewall to protect the entity's internal resources?
A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed Which of the following is the MOST important requirement to include In the vendor contract to ensure continuity?
Which of the following is the BEST source of information to determine the required level of data protection on a file server?
In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?
An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?
Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
A database administrator (DBA) should be prevented from having end user responsibilities:
Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
An IS auditor is preparing a plan for audits to be carried out over a specified period. Which of the following activities should the IS auditor perform FIRST?
An IS auditor conducts a review of a third-party vendor's reporting of key performance indicators (KPIs) Which of the following findings should be of MOST concern to the auditor?
Which type of device sits on the perimeter of a corporate of home network, where it obtains a public IP address and then generates private IP addresses internally?
An IS auditor engaged in developing the annual internal audit plan learns that the chief information officer (CIO) has requested there be no IS audits in the upcoming year as more time is needed to address a large number of recommendations from the previous year. Which of the following should the auditor do FIRST
A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's mobile device policies and controls in its corporate environment?
Which of the following documents should specify roles and responsibilities within an IT audit organization?
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?
Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization's security policy?
During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor's GREATEST concern with this situation?
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?
An organization has implemented a distributed security administration system to replace the previous centralized one. Which of the following presents the GREATEST potential concern?
The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:
Which of the following would protect the confidentiality of information sent in email messages?
Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?
Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
An IS auditor learns that an in-house system development life cycle (SDLC) project has not met user specifications. The auditor should FIRST examine requirements from which of the following phases?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
In an online application, which of the following would provide the MOST information about the transaction audit trail?
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
Which of the following is MOST important with regard to an application development acceptance test?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
Which of the following is MOST important to determine when conducting an audit Of an organization's data privacy practices?
Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?
An IS auditor Is renewing the deployment of a new automated system Which of the following findings presents the MOST significant risk?
Which of the following would be the BEST process for continuous auditing to a large financial Institution?
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
Which of the following is MOST important when implementing a data classification program?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
Which of the following BEST facilitates the legal process in the event of an incident?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
Which of the following BEST helps to ensure data integrity across system interfaces?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
Which of the following backup schemes is the BEST option when storage media is limited?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
Which of the following is the MOST efficient control to reduce the risk associated with a systems administrator having network administrator responsibilities?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
Which of the following would be MOST useful when analyzing computer performance?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization's goals?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:
Which of the following strategies BEST optimizes data storage without compromising data retention practices?
Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?
Which of the following represents the HIGHEST level of maturity of an information security program?
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
Which of the following BEST enables the timely identification of risk exposure?
An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
How is nonrepudiation supported within a public key infrastructure (PKI) environment?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
While auditing a small organization's data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?
Which of the following is an example of a preventative control in an accounts payable system?
Which of the following is the MOST important Issue for an IS auditor to consider with regard to Voice-over IP (VoIP) communications?
An IS auditor is reviewing a bank's service level agreement (SLA) with a third-party provider that hosts the bank's secondary data center, which of the following findings should be of GREATEST concern to the auditor?
Which of the following is MOST important to consider when developing a service level agreement (SLAP)?
Which of the following provides the MOST assurance of the integrity of a firewall log?
Which of the following would be the BEST criteria for monitoring an IT vendor's service levels?
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
Which of the following findings would be of GREATEST concern when auditing an organization's end-user computing (EUC)?
The PRIMARY reason for an IS auditor to perform a functional walk-through of a business process during the preliminary phase of an audit assignment is to:
Which of the following is the GREATEST advantage of maintaining an internal IS audit function within an organization?
What should be an IS auditor's PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
Which of the following is the PRIMARY reason for an airline's IT management to continuously monitor the controls for a critical integrated flight schedule and payment application?
Which of the following provides the BEST evidence that IT portfolio management is aligned with organizational strategies?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT-related customer service project?
In an annual audit cycle, the audit of an organization's IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
An organization that has decided to approve the use of end-user computing (EUC) should FIRST ensure:
A system performance dashboard indicates several application servers are reaching the defined threshold for maximum CPU allocation. Which of the following would be the IS auditor's BEST recommendation for the IT department?
Which of the following is the BEST source of organizational direction on when to use cloud services?
IT management has accepted the risk associated with an IS auditor's finding due to the cost and complexity of the corrective actions. Which of the following should be the auditor's NEXT course of action?
Which of the following is MOST important for an IS auditor to verify when reviewing the planned use of Benford's law as a data analytics technique to detect fraud in a set of credit card transactions?
Which of the following audit procedures would provide the BEST assurance that an application program is functioning as designed?
Which of the following should be of GREATEST concern to an IS auditor when using data analytics?
Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization’s enterprise architecture (EA) program?
A sample for testing must include the 80 largest client balances and a random sample of the rest. What should the IS auditor recommend?
When selecting a new data loss prevention (DLP) solution, the MOST important consideration is that the solution:
Which of the following is MOST appropriate to review when determining if the work completed on an IT project is in alignment with budgeted costs?
Which of the following BEST enables an organization to determine the effectiveness of its information security awareness program?
A PRIMARY objective of risk management is to keep the total cost of risks below the:
Which of the following controls BEST provides confidentiality and nonrepudiation for an online business looking for digital payment data security?
An IS auditor is reviewing an organization's system development life cycle (SDLC) Which of the following MUST be included in the review?
During a follow-up audit, an IS auditor finds that some critical recommendations have not been addressed, as management has decided to accept the risk. Which of the following is the IS auditors BEST course of action?
Which of the following security measures is MOST important for protecting Internet of Things (IoT) devices from potential cyberattacks?
An IS auditor is reviewing an organization's risk management program. Which of the following should be the PRIMARY driver of the enterprise IT risk appetite?
Which of the following issues identified during a formal review of an organization's information security policies presents the GREATEST potential risk to the organization?
An IS auditor reviewing the system development life cycle (SDLC) finds there is no requirement for business cases. Which of the following should be offGREATEST concern to the organization?
Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?
Which of the following should be of GREATEST concern for an IS auditor when reviewing user account policies?
An IS auditor is reviewing the service management of an outsourced help desk. Which of the following is the BEST indicator of how effectively the service provider is performing this function?
Which of the following backup methods is MOST appropriate when storage space is limited?
Which of the following is an IS auditor’s BEST recommendation after identifying that HR staff create new employees in the payroll system as well as process payroll due to limited staffing?
An IS auditor finds that a number of key patches have not been applied in a timely manner due to re-source constraints. Which of the following is the GREATEST risk to the organization in this
situation?
Which of the following should be the GREATEST concern for an IS auditor assessing an organization's disaster recovery plan (DRP)?
An organization saves confidential information in a file with password protection and the file is placed in a shared folder. An attacker has stolen this information by obtaining the password through social engineering. Implementing which of the following would BEST enable the organization to prevent this type of incident in the future?
Which of the following is the BEST way to foster continuous improvement of IS audit processes and practices?
Which of the following is the BEST control to help ensure the completeness of outbound transactions?
An IS auditor is reviewing the system development practices of an organization that is about to move from a Waterfall to an Agile approach. Which of the following is MOST important for the auditor to focus on as a result of this move?
A white box testing method is applicable with which of the following testing processes?
The GREATEST benefit of using a polo typing approach in software development is that it helps to:
Based on best practices, which types of accounts should be disabled for interactive login?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
An IS auditor is reviewing an organization's cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?
An IS auditor is reviewing how password resets are performed for users working remotely. Which type of documentation should be requested to understand the detailed steps required for this activity?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
An organization is permanently transitioning from onsite to fully remote business operations. When should the existing business impact analysis (BIA) be reviewed?
A network analyst is monitoring the network after hours and detects activity that appears to be a brute-force attempt to compromise a critical server. After reviewing the alerts to ensure their accuracy, what should be done NEXT?
Which of the following is an IS auditor's BEST course of action when the auditee indicates that a corrective action plan for a high-risk finding will take longer than expected?
Which of the following BEST indicates a need to review an organization's information security policy?
Which of the following constitutes an effective detective control in a distributed processing environment?
Which of the following should be done FIRST following an incident that has caused internal servers to be inaccessible, disrupting normal business operations?
An organization produces control reports with a desktop application that accesses data in the central production database. Which of the following would give an IS auditor concern about the reliability of these reports?
Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?
Which of the following is the MOST effective way to detect as many abnormalities as possible during an IS audit?
Which of the following is MOST important to include in a business case for an IT-enabled investment?
In an area susceptible to unexpected increases in electrical power, which of the following would MOST effectively protect the system?
Which of the following BEST enables an organization to verify whether an encrypted message sent by a client has been altered?
In a review of the organization standards and guidelines for IT management, which of the following should be included in an IS development methodology?
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
An organization's IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?
An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?
Which of the following is the GREATEST benefit of an effective data classification process?
Which of the following is the MOST important reason for an organization to automate data purging?
Which of the following is the GREATEST concern related to an organization's data classification processes?
Which type of risk would MOST influence the selection of a sampling methodology?
Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?
An IT strategic plan that BEST leverages IT in achieving organizational goals will include:
When developing customer-facing IT applications, in which stage of the system development life cycle (SDLC) is it MOST beneficial to consider data privacy principles?
Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
Which of the following BEST contributes to the quality of an audit of a business-critical application?
A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?
An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?
An IS auditor is reviewing a client's outsourced payroll system to assess whether the financial audit team can rely on the application. Which of the following findings would be the auditor's
GREATEST concern?
An IS auditor has been tasked with auditing the inventory control process for a large organization that processes millions of data transactions. Which of the following is the BEST testing strategy to adopt?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?
A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?
Which of the following should be identified FIRST during the risk assessment process?
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
Which of the following is the MOST important advantage of participating in beta testing of software products?
Which of the following is an example of a preventive control for physical access?
Which of the following is the GREATEST advantage of outsourcing the development of an e-banking solution when in-house technical expertise is not available?
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls?
An IS auditor is reviewing an organization's business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
Which of the following is MOST likely to be a project deliverable of an agile software development methodology?
Which of the following BEST demonstrates to senior management and the board that an audit function is compliant with standards and the code of ethics?
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?
During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
An IS auditor is evaluating the risk associated with moving from one database management system (DBMS) to another. Which of the following would be MOST helpful to ensure the integrity of the system throughout the change?
What is the Most critical finding when reviewing an organization’s information security management?
An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:
The waterfall life cycle model of software development is BEST suited for which of the following situations?
An IS auditor reviewing incident response management processes notices that resolution times for reoccurring incidents have not shown improvement. Which of the following is the auditor's BEST recommendation?
Which of the following would BEST guide an IS auditor when determining an appropriate time to schedule the follow-up of agreed corrective actions for reported audit issues?
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?
To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?
Which of the following is the MAJOR advantage of automating internal controls?
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
A bank performed minor changes to the interest calculation computer program. Which of the following techniques would provide the STRONGEST evidence to determine whether the interest calculations are correct?
An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?
An organization relies on an external vendor that uses a cloud-based Software as a Service (SaaS) model to back up its data. Which of the following is the GREATEST risk to the organization related to data backup and retrieval?
Which of the following is the MOST important responsibility of data owners when implementing a data classification process?
What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?
To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?
Which type of attack targets security vulnerabilities in web applications to gain access to data sets?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
Which of the following physical controls provides the GREATEST assurance that only authorized individuals can access a data center?
The following findings are the result of an IS auditor's post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?
Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?
Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:
An IS auditor is planning an audit of an organization's risk management practices. Which of the following would provide the MOST useful information about
risk appetite?
When planning a follow-up, the IS auditor is informed by operational management that recent organizational changes have addressed the previously identified risk and implementing the action plan is no longer necessary. What should the auditor do NEXT?
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor's NEXT step should be to:
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor's BEST course of action?
Which of the following areas of responsibility would cause the GREATEST segregation of duties conflict if the individual who performs the related tasks also has approval authority?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
The BEST way to evaluate the effectiveness of a newly developed application is to:
In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?
Which of the following provides the BE ST method for maintaining the security of corporate applications pushed to employee-owned mobile devices?
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?
During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility Which of the following is the IS auditor's BEST course of action?
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor's NEXT course of action?
Which of the following is the MOST important prerequisite for implementing a data loss prevention (DLP) tool?
An organization considering the outsourcing of a business application should FIRST:
An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data
classification in this project?
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
Which of the following biometric access controls has the HIGHEST rate of false negatives?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor's NEXT course of action?
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
The implementation of an IT governance framework requires that the board of directors of an organization:
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
Which of the following data would be used when performing a business impact analysis (BIA)?
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
Which of the following demonstrates the use of data analytics for a loan origination process?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
The decision to accept an IT control risk related to data quality should be the responsibility of the:
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
Which of the following MOST effectively minimizes downtime during system conversions?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?
An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
Which of the following should be an IS auditor's GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
Which of the following is an audit reviewer's PRIMARY role with regard to evidence?
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
During an audit of a multinational bank's disposal process, an IS auditor notes several findings. Which of the following should be the auditor's GREATEST concern?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
Which of the following concerns is BEST addressed by securing production source libraries?
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
Providing security certification for a new system should include which of the following prior to the system's implementation?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
Which of the following metrics would BEST measure the agility of an organization's IT function?
Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?
Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization's privacy policy?
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
Which of the following findings from an IT governance review should be of GREATEST concern?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
Which of the following is the BEST reason for an organization to use clustering?
Which of the following security risks can be reduced by a property configured network firewall?
Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?
Which of the following is MOST important to consider when scheduling follow-up audits?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?
Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?
Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?
Which of the following should an organization do to anticipate the effects of a disaster?
Which of the following should be of GREATEST concern to an IS auditor when auditing an organization's IT strategy development process?
An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS
Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?
An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?
During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?
Which of the following is the MOST appropriate control to ensure integrity of online orders?
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application's operating system?
Which of the following should be the FIRST step when conducting an IT risk assessment?
In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
Backup procedures for an organization's critical data are considered to be which type of control?
Which of the following provides the BEST assurance of data integrity after file transfers?
When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?
Which of the following is the MOST effective control to mitigate against the risk of inappropriate activity by employees?
An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
Which of the following is MOST important for an IS auditor to verify when reviewing the use of an outsourcer for disposal of storage media?
Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?