A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?
Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?
Which of the following BEST enables the timely identification of risk exposure?
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
An IS auditor is reviewing security controls related to collaboration tools for a business unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
During the planning stage of a compliance audit, an IS auditor discovers that a bank's inventory of compliance requirements does not include recent regulatory changes related to managing data risk. What should the auditor do FIRST?
Which of the following would be an appropriate rote of internal audit in helping to establish an organization's privacy program?
Providing security certification for a new system should include which of the following prior to the system's implementation?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
Which of the following is MOST helpful for measuring benefits realization for a new system?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:
Which of the following should an IS auditor consider FIRST when evaluating firewall rules?
During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
In an online application which of the following would provide the MOST information about the transaction audit trail?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?
What is the MAIN reason to use incremental backups?
In a RAO model, which of the following roles must be assigned to only one individual?
Which of the following MUST be completed as part of the annual audit planning process?
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
Which of the following is the BEST reason for an organization to use clustering?
Which of the following findings from an IT governance review should be of GREATEST concern?
Which of the following are BEST suited for continuous auditing?
Which of the following is the MOST important activity in the data classification process?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
Which of the following is an example of a preventative control in an accounts payable system?
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
Which of the following represents the HIGHEST level of maturity of an information security program?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?
An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:
Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?
Which of the following is a social engineering attack method?
Capacity management enables organizations to:
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
Which of the following BEST Indicates that an incident management process is effective?
IT disaster recovery time objectives (RTOs) should be based on the:
Which of the following business continuity activities prioritizes the recovery of critical functions?
An information systems security officer's PRIMARY responsibility for business process applications is to:
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
Which of the following is MOST important to ensure when planning a black box penetration test?
Which of the following MOST effectively minimizes downtime during system conversions?
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
Which of the following data would be used when performing a business impact analysis (BIA)?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
Which of the following demonstrates the use of data analytics for a loan origination process?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
Which of the following should be an IS auditor's GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
An organizations audit charier PRIMARILY:
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
Which of the following is the BEST justification for deferring remediation testing until the next audit?
Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?
Which of the following is a social engineering attack method?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?
Which of the following is the BEST data integrity check?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
Which of the following is the MOST effective way for an organization to project against data loss?
Which of the following BEST guards against the risk of attack by hackers?
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor's NEXT course of action?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
The implementation of an IT governance framework requires that the board of directors of an organization:
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
What should an IS auditor do FIRST when a follow-up audit reveals some management action plans have not been initiated?
Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?
An organization has engaged a third party to implement an application to perform business-critical calculations. Which of the following is the MOST important process to help ensure the application provides accurate calculations?
A new system development project is running late against a critical implementation deadline Which of the following is the MOST important activity?
An IS auditor is reviewing a data conversion project Which of the following is the auditor's BEST recommendation prior to go-live?
A computer forensic audit is MOST relevant in which of the following situations?
Which of the following is a PRIMARY responsibility of an IT steering committee?
Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?
An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be the GREATEST concern?
Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
A web proxy server for corporate connections to external resources reduces organizational risk by:
A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
An IS auditor is reviewing an organization's business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor's GREATEST concern?
When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider’s external audit report on service level management when the
A bank has a combination of corporate customer accounts (higher monetary value) and small business accounts (lower monetary value) as part of online banking. Which of the following is the BEST sampling approach for an IS auditor to use for these accounts?
An IS auditor engaged in developing the annual internal audit plan learns that the chief information officer (CIO) has requested there be no IS audits in the upcoming year as more time is needed to address a large number of recommendations from the previous year. Which of the following should the auditor do FIRST
A firewall between internal network segments improves security and reduces risk by:
In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?
An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?
An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?
During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor's GREATEST concern with this situation?
Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization's security policy?
An IS auditor is reviewing a bank's service level agreement (SLA) with a third-party provider that hosts the bank's secondary data center, which of the following findings should be of GREATEST concern to the auditor?
Which of the following is the BEST testing approach to facilitate rapid identification of application interface errors?
The PRIMARY purpose of requiring source code escrow in a contractual agreement is to:
Which of the following should be the FIRST step to successfully implement a corporate data classification program?
Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization's configuration and release management process?
Which of the following is the BEST indication of effective IT investment management?
Which of the following is MOST important for an IS auditor to validate when auditing network device management?
Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization's information cannot be accessed?
An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?
Which of the following is an IS auditor's BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?
An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
One advantage of monetary unit sampling is the fact that
What would be an IS auditor's BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization's objectives?
Which of the following provides the MOST useful information regarding an organization's risk appetite and tolerance?
With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?
Which of the following should be of GREATEST concern to an IS auditor when auditing an organization's IT strategy development process?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
When auditing the feasibility study of a system development project, the IS auditor should:
Audit frameworks cart assist the IS audit function by:
In the development of a new financial application, the IS auditor's FIRST involvement should be in the:
An IS auditor is reviewing the security of a web-based customer relationship management (CRM) system that is directly accessed by customers via the Internet, which of the following should be a concern for the auditor?
What is the PRIMARY purpose of performing a parallel run of a now system?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following
is the auditor’s BEST recommendation to prevent unauthorized access?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
Which of the following is MOST important to consider when reviewing an organization's defined data backup and restoration procedures?
During an audit which of the following would be MOST helpful in establishing a baseline for measuring data quality?
The use of which of the following is an inherent risk in the application container infrastructure?
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country.
What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted
application?
Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?
Which of the following should an IS auditor recommend be done FIRST when an organization is made aware of a new regulation that is likely to impact IT security requirements?
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?
When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
The use of control totals satisfies which of the following control objectives?
An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
Which of the following would be the BEST criteria for monitoring an IT vendor's service levels?
When assessing the overall effectiveness of an organization's disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?
Controls related to authorized modifications to production programs are BEST tested by:
During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
The PRIMARY role of a control self-assessment (CSA) facilitator is to:
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
The PRIMARY objective of value delivery in reference to IT governance is to:
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
Which of the following is MOST important when planning a network audit?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following is necessary for effective risk management in IT governance?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
Which of the following is a corrective control?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
Which of the following BEST facilitates the legal process in the event of an incident?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
Which of the following BEST helps to ensure data integrity across system interfaces?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
Which of the following is the PRIMARY basis on which audit objectives are established?
Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?
Which of the following is an example of a preventive control for physical access?
Which of the following would provide management with the MOST reasonable assurance that a new data warehouse will meet the needs of the
organization?
Which of the following is the GREATEST advantage of outsourcing the development of an e-banking solution when in-house technical expertise is not available?
Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?
An organization uses public key infrastructure (PKI) to provide email security. Which of the following would be the MOST efficient method to determine whether email messages have been modified in transit?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
The FIRST step in an incident response plan is to:
Which of the following would be the GREATEST concern to an IS auditor when reviewing the outsourcing contract for an organization's cloud service provider?
Which of the following is the MOST significant risk when an application uses individual end-user accounts to access the underlying database?
Which of the following should be given GREATEST consideration when implementing the use of an open-source product?
Which of the following should be done FIRST to minimize the risk of unstructured data?
Which type of risk would MOST influence the selection of a sampling methodology?
An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor's BEST course of action?
Which of the following physical controls provides the GREATEST assurance that only authorized individuals can access a data center?
An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
A national tax administration agency with a distributed network experiences service disruptions due to a large influx of traffic to a regional office near the end of each year. Which of the following would BEST enable the agency to improve the performance of its servers during the busy period?
An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
Which of the following should be the FIRST step in a data migration project?
Which of the following BEST enables an organization to improve the effectiveness of its incident response team?
Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?
An IS auditor is reviewing the service agreement with a technology company that provides IT help desk services to the organization. Which of the following monthly performance
metrics is the BEST indicator of service quality?
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls?
Which of the following helps to ensure the integrity of data for a system interface?
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
Which of the following should be identified FIRST during the risk assessment process?
What is the PRIMARY reason for an organization to classify the data stored on its internal networks?
Which of the following biometric access controls has the HIGHEST rate of false negatives?
Which of the following would be an IS auditor's GREATEST concern when reviewing the organization's business continuity plan (BCP)?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
A global organization's policy states that all workstations must be scanned for malware each day. Which of the following would provide an IS auditor with the BEST evidence of continuous compliance with this policy?
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
Which of the following is the MAIN responsibility of the IT steering committee?
An IS auditor has identified deficiencies within the organization's software development life cycle policies. Which of the following should be done NEXT?
Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?
An organization considering the outsourcing of a business application should FIRST:
Which of the following is the BEST way to ensure an organization's data classification policies are preserved during the process of data transformation?
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
Which of the following is the MOST important reason for an IS auditor to examine the results of a post-incident review performed after a security incident?
The use of which of the following would BEST enhance a process improvement program?
To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality
within the organization. Which of the following should be recommended as the PRIMARY factor to
determine system criticality?
An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?
Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?
Which of the following areas of responsibility would cause the GREATEST segregation of duties conflict if the individual who performs the related tasks also has approval authority?
During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)
agreement. What should the auditor do NEXT?
Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?
Which of the following is the MOST effective accuracy control for entry of a valid numeric part number?
A small business unit is implementing a control self-assessment (CSA) program and leveraging the internal
audit function to test its internal controls annually. Which of the following is the MOST significant benefit of
this approach?
An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?
During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?
An IS auditor should be MOST concerned if which of the following fire suppression systems is utilized to protect an asset storage closet?
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?
Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor's NEXT step should be to:
The BEST way to evaluate the effectiveness of a newly developed application is to:
Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?
During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
Which of the following BEST enables an organization to standardize its IT infrastructure to align with business goals?
An IS auditor is reviewing an organization's cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?
Which of the following is the MOST important consideration when implementing a Zero Trust strategy for mobile, wireless, and Internet of Things (IoT) devices?
Which of the following non-audit activities may impair an IS auditor's independence and objectivity?
Which of the following is an IS auditor's BEST recommendation to help an organization increase the efficiency of computing resources?
Which type of control has been established when an organization implements a security information and event management (SIEM) system?
A post-implementation audit has been completed for the deployment of a sophisticated job scheduling tool Which of the following observations would be of GREATEST concern?
An organization's sensitive data is stored in a cloud computing environment and is encrypted. Which of the following findings should be of GREATEST concern to an IS auditor?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
Which type of testing is used to identify security vulnerabilities in source code in the development environment?
An organization requires the use of a key card to enter its data center. Recently, a control was implemented that requires biometric authentication for each employee.
Which type of control has been added?
An IS auditor finds a user account where privileged access is not appropriate for the user’s role. Which of the following would provide the BEST evidence to determine whether the risk of this access has been exploited?
Which of the following issues identified during a formal review of an organization's information security policies presents the GREATEST potential risk to the organization?
An organization saves confidential information in a file with password protection and the file is placed in a shared folder. An attacker has stolen this information by obtaining the password through social engineering. Implementing which of the following would BEST enable the organization to prevent this type of incident in the future?
Which of the following types of firewalls provides the GREATEST degree of control against hacker intrusion?
An organization is planning to implement a control self-assessment (CSA) program for selected business processes. Which of the following should be the role of the internal audit team for this program?
Which of the following should be used to evaluate an IT development project before an investment is committed?
A startup organization wants to develop a data loss prevention (DLP) program. The FIRST step should be to implement:
Which of the following observations regarding change management should be considered the MOST serious risk by an IS auditor?
An organization requires the use of a key card to enter its data center. Recently, a control was implemented that requires biometric authentication for each employee. Which type of control has
been added?
Which type of security testing is MOST efficient for finding hidden errors in software and facilitating source code optimization?
Which of the following is an IS auditor's BEST recommendation for mitigating risk associated with inadvertent disclosure of sensitive information by employees?
A telecommunications company has recently created a new fraud department with three employees and acquired a fraud detection system that uses artificial intelligence (AI) modules. Which of the following would be of GREATEST concern to an IS auditor reviewing the system?
Which of the following is the MOST efficient control to reduce the risk associated with a systems administrator having network administrator responsibilities?
Which of the following findings would be of GREATEST concern when reviewing project risk management practices?
An organization is modernizing its technology policy framework to demonstrate compliance with external industry standards. Which of the following would be MOST useful to an IS auditor for validating the outcome?
Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's IT process performance reports over the last quarter?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the
associated risk?
Which of the following should be of MOST concern to an IS auditor reviewing an organization's operational log management?
Which of the following is the MOST important consideration when relying on the work of the prior auditor?
A white box testing method is applicable with which of the following testing processes?
During an organization's implementation of a data loss prevention (DLP) solution, which of the following activities should be completed FIRST?
Which of the following presents the GREATEST risk to an organization's ability to manage quality control (QC) processes?
Which of the following is an IS auditor’s BEST recommendation after identifying that HR staff create new employees in the payroll system as well as process payroll due to limited staffing?
Which of the following is the GREATEST impact as a result of the ongoing deterioration of a detective control?
Which of the following is the PRIMARY objective of cyber resiliency?
An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?
During recent post-implementation reviews, an IS auditor has noted that several deployed applications are not being used by the business. The MOST likely cause would be the lack of:
During an audit of payment services of a branch based in a foreign country, a large global bank's audit team identifies an opportunity to use data analytics techniques to identify abnormal payments. Which of the following is the team's MOST important course of action?
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
An IS auditor discovers from patch logs that some in-scope systems are not compliant with the regular patching schedule. What should the auditor do NEXT?
A contract for outsourcing IS functions should always include:
Which of the following is the PRIMARY benefit of monitoring IT operational logs?
Which of the following is MOST important for an IS auditor to verify when evaluating tne upgrade of an organization's enterprise resource planning (ERP) application?
Which of the following is found in an audit charter?
During an IS audit of a data center, it was found that programmers are allowed to make emergency fixes to operational programs. Which of the following should be the IS auditor's PRIMARY recommendation?
Which of the following network communication protocols is used by network devices such as routers to send error messages and operational information indicating success or failure when communicating with another IP address?
An organization wants to classify database tables according to its data classification scheme From an IS auditor's perspective the tables should be classified based on the:
An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?
An IS auditor has been tasked with analyzing an organization's capital expenditures against its repair and maintenance costs. Which of the following is the BEST reason to use a data analytics tool for this purpose?
When reviewing whether IT investments are meeting business objectives, which of the following evaluations would be MOST useful?
Which of the following technologies is BEST suited to fulfill a business requirement for nonrepudiation of business-to-business transactions with external parties without the need for a mutually trusted entity?
The GREATEST concern for an IS auditor reviewing vulnerability assessments by the auditee would be if the assessments are:
Which of the following is the BEST disposal method for flash drives that previously stored confidential data?
Which of the following applications has the MOST inherent risk and should be prioritized during audit planning?
Which of the following is MOST useful for determining the strategy for IT portfolio management?
An IS auditor is evaluating the log management system for an organization with devices and systems in multiple geographic locations. Which of the following is MOST important for the auditor to verify?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
Which of the following findings would be of GREATEST concern when auditing an organization's end-user computing (EUC)?
An IS audit manager is preparing the staffing plan for an audit engagement of a cloud service provider. What should be the manager's PRIMARY concern when being made aware that a new
auditor in the department previously worked for this provider?
Which of the following is the MOST efficient way to identify fraudulent activity on a set of transactions?
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
Which of the following is the BEST way to ensure a vendor complies with system security requirements?
The PRIMARY goal of capacity management is to: