Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
An IS audit manager is preparing the staffing plan for an audit engagement of a cloud service provider. What should be the manager's PRIMARY concern when being made aware that a new
auditor in the department previously worked for this provider?
A startup organization wants to develop a data loss prevention (DLP) program. The FIRST step should be to implement:
An IS auditor is reviewing documentation from a change that was applied to an application. Which of the following findings would be the GREATEST concern?
Which of the following would a digital signature MOST likely prevent?
While conducting a follow-up on an asset management audit, the IS auditor finds paid invoices for IT devices not recorded in the organization's inventory. Which of the following is the auditor's BEST course of action?
When reviewing hard disk utilization reports, an IS auditor observes that utilization is routinely above 95%. Which of the following should be the GREATEST concern to the IS auditor?
IT management has accepted the risk associated with an IS auditor's finding due to the cost and complexity of the corrective actions. Which of the following should be the auditor's NEXT course of action?
Which of the following should be an IS auditor's GREATEST concern when assessing an IT service configuration database?
An external audit firm was engaged to perform a validation and verification review for a systems implementation project. The IS auditor identifies that regression testing is not part of the project plan and was not performed by the systems implementation team. According to the team, the parallel testing being performed is sufficient, making regression testing unnecessary. What should be the auditor’s NEXT step?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization's payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management experience. What is the BEST course of action?
At the end of each business day, a business-critical application generates a report of financial transac-tions greater than a certain value, and an employee
then checks these transactions for errors. What type of control is in place?
External audits have identified recurring exceptions in the user termination process, despite similar internal audits having reported no exceptions in the past. Which of the following is the IS auditor's BEST course of action to improve the internal audit process in the future?
Which of the following BEST indicates a need to review an organization's information security policy?
An IS auditor can BEST evaluate the business impact of system failures by:
During the course of fieldwork, an internal IS auditor observes a critical vulnerability within a newly deployed application. What is the auditor's BEST course of action?
An IS auditor wants to gain a better understanding of an organization’s selected IT operating system software. Which of the following would be MOST helpful to review?
Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?
Which of the following will BEST ensure that archived electronic information of permanent importance remains accessible over time?
Which of the following is the MOST important consideration when defining an operational log management strategy?
Which of the following is the PRIMARY benefit of effective implementation of appropriate data classification?
An IS auditor is conducting an IT governance audit and notices many initiatives are managed informally by isolated project managers. Which of the following recommendations would have the GREATEST impact on improving the maturity of the IT team?
Which of the following should an IS auditor recommend be done FIRST when an organization is planning to implement an IT compliance program?
Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
Which of the following is MOST helpful for evaluating benefits realized by IT projects?
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following BEST indicates that an incident management process is effective?
When designing metrics for information security, the MOST important consideration is that the metrics:
During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?
Which of the following BEST addresses the availability of an online store?
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
Which of the following is the PRIMARY objective of enterprise architecture (EA)?
An organization has implemented a new data classification scheme and asks the IS auditor to evaluate its effectiveness. Which of the following would be of
GREATEST concern to the auditor?
A telecommunications company has recently created a new fraud department with three employees and acquired a fraud detection system that uses artificial intelligence (AI) modules. Which of the following would be of GREATEST concern to an IS auditor reviewing the system?
An IS auditor finds that the cost of developing an application is now projected to significantly exceed the budget. Which of the following is the GREATEST risk to communicate to senior management?
Management has decided to accept a risk in response to a draft audit recommendation. Which of the following should be the IS auditor’s NEXT course of action?
Which of the following is the GREATEST impact as a result of the ongoing deterioration of a detective control?
Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?
An IS auditor has been asked to provide support to the control self-assessment (CSA) program. Which of the following BEST represents the scope of the auditor’s role in the program?
Which of the following types of firewalls provides the GREATEST degree of control against hacker intrusion?
Which of the following would be an IS auditor's BEST recommendation to senior management when several IT initiatives are found to be misaligned with the organization's strategy?
Which of the following would an IS auditor find to be the GREATEST risk associated with the server room in a remote office location?
Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?
Which of the following is the PRIMARY reason an IS auditor would recommend offsite backups although critical data is already on a redundant array of inexpensive disks (RAID)?
An IS auditor is tasked to review an organization's plan-do-check-act (PDCA) method for improving IT-related processes and wants to determine the accuracy of defined targets to be achieved. Which of the following steps in the PDCA process should the auditor PRIMARILY focus on in this situation?
Which of the following is an analytical review procedure for a payroll system?
The process of applying a hash function to a message and obtaining and ciphering a digest refers to:
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the
firewall and:
Which of the following observations regarding change management should be considered the MOST serious risk by an IS auditor?
An IS auditor noted a recent production incident in which a teller transaction system incorrectly charged fees to customers due to a defect from a recent release. Which of the following should be the auditor's NEXT step?
Effective separation of duties in an online environment can BEST be achieved by utilizing:
Which of the following user actions poses the GREATEST risk for inadvertently introducing malware into a local network?
In order for a firewall to effectively protect a network against external attacks, what fundamental practice must be followed?
Which of the following is the GREATEST concern related to an organization's data classification processes?
Which of the following is the MOST important success factor for implementing a data loss prevention (DLP) tool?
Which of the following BEST reflects a mature strategic planning process?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
What is the Most critical finding when reviewing an organization’s information security management?
Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?
To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?
Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?
In an online application, which of the following would provide the MOST information about the transaction audit trail?
Which of the following findings from an IT governance review should be of GREATEST concern?
Which of the following metrics would BEST measure the agility of an organization's IT function?
An IS auditor is reviewing security controls related to collaboration tools for a business unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?
Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
Which of the following occurs during the issues management process for a system development project?
Which of the following represents the HIGHEST level of maturity of an information security program?
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
Which of the following is MOST helpful for measuring benefits realization for a new system?
Which of the following BEST enables the timely identification of risk exposure?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?
What is the MAIN reason to use incremental backups?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
Which of the following should an IS auditor consider FIRST when evaluating firewall rules?
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed?
An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:
During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
Capacity management enables organizations to:
An IS auditor is evaluating the risk associated with moving from one database management system (DBMS) to another. Which of the following would be MOST helpful to ensure the integrity of the system throughout the change?
An IS auditor should ensure that an application's audit trail:
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?
In an online application which of the following would provide the MOST information about the transaction audit trail?
Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
Which of the following security risks can be reduced by a property configured network firewall?
Which of the following business continuity activities prioritizes the recovery of critical functions?
A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor's GREATEST concern?
Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?
Which of the following documents should specify roles and responsibilities within an IT audit organization?
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor's BEST course of action?
An IT balanced scorecard is PRIMARILY used for:
Which of the following should be of GREATEST concern to an |$ auditor reviewing data conversion and migration during the implementation of a new application system?
After delivering an audit report, the audit manager discovers that evidence was overlooked during the audit This evidence indicates that a procedural control may have failed and could contradict a conclusion of the audit Which of the following risks is MOST affected by this oversight?
Which of the following is MOST important during software license audits?
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
A database administrator (DBA) should be prevented from having end user responsibilities:
Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?
With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?
Which of the following should be the FIRST step when conducting an IT risk assessment?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
Which of the following provides the BEST assurance of data integrity after file transfers?
Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?
When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:
Which of the following would BEST help to ensure that an incident receives attention from appropriate personnel in a timely manner?
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
Which of the following analytical methods would be MOST useful when trying to identify groups with similar behavior or characteristics in a large population?
The use of control totals satisfies which of the following control objectives?
The FIRST step in auditing a data communication system is to determine:
Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?
An IS auditor is asked to review an organization's technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
A new system development project is running late against a critical implementation deadline Which of the following is the MOST important activity?
Controls related to authorized modifications to production programs are BEST tested by:
To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?
An IS auditor is preparing a plan for audits to be carried out over a specified period. Which of the following activities should the IS auditor perform FIRST?
An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?
An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?
An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?
Which of the following is the MOST important Issue for an IS auditor to consider with regard to Voice-over IP (VoIP) communications?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
One advantage of monetary unit sampling is the fact that
An organization outsourced its IS functions to meet its responsibility for disaster recovery, the organization should:
During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor's GREATEST concern with this situation?
Which of the following is the BEST reason for an IS auditor to emphasize to management the importance of using an IT governance framework?
Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan?
Which of the following is a PRIMARY responsibility of an IT steering committee?
A web proxy server for corporate connections to external resources reduces organizational risk by:
Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD)
policy to help prevent data leakage?
Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?
The charging method that effectively encourages the MOST efficient use of IS resources is:
When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?
Which type of device sits on the perimeter of a corporate of home network, where it obtains a public IP address and then generates private IP addresses internally?
Which of the following is MOST important for an IS auditor to validate when auditing network device management?
As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:
Which of the following is MOST helpful to an IS auditor when assessing the effectiveness of controls?
Which of the following is the BEST method to delete sensitive information from storage media that will be reused?
Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?
Which of the following should an IS auditor recommend be done FIRST when an organization is made aware of a new regulation that is likely to impact IT security requirements?
An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?
Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?
The use of access control lists (ACLs) is the MOST effective method to mitigate security risk for routers because they: (Identify Correct answer and related explanation/references from CISA Certification - Information Systems Auditor official Manual or book)
When is it MOST important for an IS auditor to apply the concept of materiality in an audit?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following
is the auditor’s BEST recommendation to prevent unauthorized access?
Afire alarm system has been installed in the computer room The MOST effective location for the fire alarm control panel would be inside the
A finance department has a multi-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger. and in year one, the system version upgrade will be applied. Which of the following should be the PRIMARY focus of the IS auditor reviewing the first year of the project?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
Which of the following backup schemes is the BEST option when storage media is limited?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
Which of the following would be MOST useful when analyzing computer performance?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
Which of the following is necessary for effective risk management in IT governance?
Which of the following is MOST important when planning a network audit?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
The PRIMARY objective of value delivery in reference to IT governance is to:
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
Which of the following is an audit reviewer's PRIMARY role with regard to evidence?
A proper audit trail of changes to server start-up procedures would include evidence of:
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
Which of the following BEST guards against the risk of attack by hackers?
Which of the following strategies BEST optimizes data storage without compromising data retention practices?
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?
What is MOST important to verify during an external assessment of network vulnerability?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor's NEXT course of action?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
Which of the following BEST indicates the effectiveness of an organization's risk management program?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
Retention periods and conditions for the destruction of personal data should be determined by the.
Which of the following is the MOST important reason for an IS auditor to examine the results of a post-incident review performed after a security incident?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
What is the PRIMARY reason for an organization to classify the data stored on its internal networks?
Which of the following is MOST important for the successful establishment of a security vulnerability management program?
An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?
An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
An IS auditor reviewing a job scheduling tool notices performance and reliability problems. Which of the following is MOST likely affecting the tool?
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor's NEXT step should be to:
Which of the following biometric access controls has the HIGHEST rate of false negatives?
Which of the following is the BEST reason to implement a data retention policy?
An IS auditor is reviewing an organization's business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
The BEST way to provide assurance that a project is adhering to the project plan is to:
Which of the following is the MOST effective accuracy control for entry of a valid numeric part number?
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
The BEST way to evaluate the effectiveness of a newly developed application is to:
Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
Which of the following should an IS auditor use when verifying a three-way match has occurred in an enterprise resource planning (ERR) system?
Which of the following is the MOST important consideration for a contingency facility?
A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?
An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?
An IS auditor reviewing incident response management processes notices that resolution times for reoccurring incidents have not shown improvement. Which of the following is the auditor's BEST recommendation?
An organization has shifted from a bottom-up approach to a top-down approach in the development of IT policies. This should result in:
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
Which of the following is MOST critical to the success of an information security program?
Which of the following is an IS auditor's BEST recommendation to mitigate the risk of eavesdropping
associated with an application programming interface (API) integration implementation?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
An IS auditor is planning an audit of an organization's risk management practices. Which of the following would provide the MOST useful information about
risk appetite?
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?
An organization's IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?
Which of the following would minimize the risk of losing transactions as a result of a disaster?
A small IT department has embraced DevOps, which allows members of this group to deploy code to production and maintain some development access to automate releases. Which of the following is the MOST effective control?
Which of the following areas of responsibility would cause the GREATEST segregation of duties conflict if the individual who performs the related tasks also has approval authority?
When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?
Which of the following metrics is the BEST indicator of the performance of a web application
Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls?
Which of the following is the BEST indication of effective governance over IT infrastructure?
Which of the following is the MAIN responsibility of the IT steering committee?
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
An IT strategic plan that BEST leverages IT in achieving organizational goals will include:
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
Which of the following helps to ensure the integrity of data for a system interface?
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change
management process?
An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization's payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management
experience. What is the BEST course of action?
An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?