Which of the following is the PRIMARY purpose of a rollback plan for a system change?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?
Which of the following is the PRIMARY objective of enterprise architecture (EA)?
An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
Retention periods and conditions for the destruction of personal data should be determined by the.
An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
An IS auditor is reviewing the installation of a new server. The IS auditor ' s PRIMARY objective is to ensure that
For security awareness training to be MOST effective, management should ensure the training:
An IS auditor is evaluating an organization ' s IT strategy and plans. Which of the following would be of GREATEST concern?
When designing metrics for information security, the MOST important consideration is that the metrics:
The BEST way for an IS auditor to validate that separation of duties has been implemented is to perform:
An organization ' s information security policies should be developed PRIMARILY on the basis of:
Which of the following would be of MOST concern to an IS auditor reviewing a data loss prevention (DLP) solution implementation for endpoints?
During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor ' s GREATEST concern with this situation?
Which of the following is the GREATEST concern related to an organization ' s data classification processes?
Providing security certification for a new system should include which of the following prior to the system ' s implementation?
To protect the organization from malware transmitted by physical media, IT administrators have disabled USB access for storage devices. Which of the following BEST describes this type of control?
While reviewing the effectiveness of an incident response program, an IS auditor notices a high number of reported incidents involving malware originating from removable media found by employees. Which of the following is the MOST appropriate recommendation to management?
Which of the following should be of GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
Which of the following MOST effectively minimizes downtime during system conversions?
Which of the following is an IS auditor ' s BEST approach when prepanng to evaluate whether the IT strategy supports the organization ' s vision and mission?
Which of the following is the PRIMARY benefit of benchmarking an organization ' s software development lifecycle practices against a capability maturity model?
Which of the following is the MOST effective way for an organization to project against data loss?
Which of the following is the GREATEST advantage of outsourcing the development of an e-banking solution when in-house technical expertise is not available?
Which of the following parameters reflects the risk threshold for an organization experiencing a service disruption?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
Which of the following is the PRIMARY reason that asset classification is vital to an information security program?
An IS auditor is reviewing an IT project and finds that an earned value analysis (EVA) is not regularly performed as part of project status reporting. Which of the following is the GREATEST risk resulting from this situation?
An IS auditor learns that an in-house system development life cycle (SDLC) project has not met user specifications. The auditor should FIRST examine requirements from which of the following phases?
An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country.
What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted
application?
Which of the following is the BEST way to prevent social engineering incidents?
An organization that has decided to approve the use of end-user computing (EUC) should FIRST ensure:
Which of the following is the BEST review for an IS auditor to conduct when a vulnerability has been exploited by an employee?
During a database security audit, an IS auditor is reviewing the process used to input data. Which of the following is the MOST significant risk area for the auditor to focus on?
Which of the following establishes the PRIMARY difference between a business continuity plan (BCP) and a disaster recovery plan (DRP)?
An outsourced recruitment vendor processes personally identifiable information (PII) related to an organization’s new hires. Which of the following would be the GREATEST concern to an IS auditor reviewing the third-party risk management process?
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?
Which of the following key performance indicators (KPIs) provides stakeholders with the MOST useful information about whether information security risk is being managed?
When reviewing whether IT investments are meeting business objectives, which of the following evaluations would be MOST useful?
Management receives information indicating a high level of risk associated with potential flooding near the organization ' s data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
Which of the following is the BEST recommendation to drive accountability for achieving the desired outcomes specified in a benefits realization plan for an IT project?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT-related customer service project?
Backup procedures for an organization ' s critical data are considered to be which type of control?
The PRIMARY objective of value delivery in reference to IT governance is to:
When reviewing an organization ' s finalized risk assessment process, what would be the MAIN reason for an IS auditor to compare acceptable risk level with residual risk?
When selecting a new data loss prevention (DLP) solution, the MOST important consideration is that the solution:
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users ' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
What is MOST important to verify during an external assessment of network vulnerability?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
During an audit of a multinational bank ' s disposal process, an IS auditor notes several findings. Which of the following should be the auditor ' s GREATEST concern?
An IS auditor wants to inspect recent events in a system to observe failed authentications and password changes. Which of the following is the MOST appropriate method to use for this purpose?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
An organization produces control reports with a desktop application that accesses data in the central production database. Which of the following would give an IS auditor concern about the reliability of these reports?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
Which of the following is the MAIN purpose of an information security management system?
Which of the following control measures is the MOST effective against unauthorized access of confidential information on stolen or lost laptops?
An external attacker spoofing an internal Internet Protocol (IP) address can BEST be detected by which of the following?
Which of the following should be used as the PRIMARY basis for prioritizing IT projects and initiatives?
Which of the following is the PRIMARY reason to perform a risk assessment?
Which of the following should be the IS auditor ' s PRIMARY focus, when evaluating an organization ' s offsite storage facility?
An IS auditor reviewing an organization’s online payment system finds that the system sometimes duplicates payments. Which control will BEST compensate for this weakness?
Which of the following provides re BEST evidence that outsourced provider services are being properly managed?
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
Which of the following is MOST important to consider when scheduling follow-up audits?
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
Which of the following management decisions presents the GREATEST risk associated with data leakage?
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
A sample for testing must include the 80 largest client balances and a random sample of the rest. What should the IS auditor recommend?
Which of the following is the PRIMARY advantage of a decentralized database architecture over a centralized architecture?
Which of the following is me GREATE ST impact as a result of the ongoing deterioration of a detective control?
An organization has replaced its call center with Al chatbots that autonomously learn new responses through internet queries and customer conversation history. Which of the following would an IS auditor tasked with verifying IT controls consider to be the GREATEST risk?
Which of the following is the MOST cost-effective way to determine the effectiveness of a business continuity plan (BCP)?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
Which of the following concerns is BEST addressed by securing production source libraries?
The use of which of the following would BEST enhance a process improvement program?
Which of the following is the MAIN objective of enterprise architecture (EA) governance?
Which of the following observations regarding change management should be considered the MOST serious risk by an IS auditor?
Which of the following provides the BEST evidence of the validity and integrity of logs in an organization ' s security information and event management (SIEM) system?
An organization outsourced its IS functions to meet its responsibility for disaster recovery, the organization should:
When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:
An IS department is evaluated monthly on its cost-revenue ratio user satisfaction rate, and computer downtime This is BEST zed as an application of.
Which of the following is the BEST indication that there are potential problems within an organization ' s IT service desk function?
Which of the following recommendations would BEST prevent the implementation of IT projects without collaborating with the business?
Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?
An IS auditor is reviewing a decision to consolidate processing for multiple applications onto a single large server. Which of the following is the MOST significant impact from this decision?
Which of the following audit evidence collection procedures is MOST reliable?
Which of the following is MOST important for the successful establishment of a security vulnerability management program?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:
Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor ' s BEST recommendation to protect data in case of recurrence?
Which of the following technology trends can lead to more robust data loss prevention (DLP) tools?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization ' s incident response management program?
Which of the following should be the FIRST step in managing the impact of recently discovered zero-day vulnerabilities?
A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?
Which of the following is the GREATEST risk associated with hypervisors in virtual environments?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor ' s BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
An organization has implemented a distributed security administration system to replace the previous centralized one. Which of the following presents the GREATEST potential concern?
An IS auditor suspects an organization ' s computer may have been used to commit a crime. Which of the following is the auditor ' s BEST course of action?
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
An organization has partnered with a third party to transport backup drives to an offsite storage facility. Which of the following is MOST important before sending the drives?
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
An IS auditor has been asked to review the quality of data in a general ledger system. Which of the following would provide the auditor with the MOST meaningful results?
Which of the following would be MOST important to include in an IS audit report?
Which of the following observations should be of GREATEST concern to an IS auditor assessing access controls for the accounts payable module of a finance system?
An IS auditor is reviewing an organization ' s cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?
A bank has a combination of corporate customer accounts (higher monetary value) and small business accounts (lower monetary value) as part of online banking. Which of the following is the BEST sampling approach for an IS auditor to use for these accounts?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor ' s BEST course of action?
A new regulation has been enacted that mandates specific information security practices for the protection of customer data. Which of the following is MOST useful for an IS auditor to review when auditing against the regulation?
An IS auditor is reviewing the system development practices of an organization that is about to move from a Waterfall to an Agile approach. Which of the following is MOST important for the auditor to focus on as a result of this move?
When reviewing the disaster recovery strategy, IT management identified an application that requires a short recovery point objective (RPO). Which of the following data restoration strategies would BEST enable the organization to meet this objective?
Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
Which of the following should be of GREATEST concern to an IS auditor when using data analytics?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
Which of the following responsibilities associated with a disaster recovery plan (DRP) can be outsourced to a Disaster Recovery as a Service (DRaaS) provider?
An IS auditor finds an IT manager recently changed a Software as a Service (SaaS) provider contract in an effort to cut costs. The new contract increases the time to resolve incidents. Which of the following should be the auditor’s GREATEST concern?
As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:
Management has agreed to move the organization ' s data center due to recent flood map changes in its current location. Which risk response has been adopted?
Which of the following should be the PRIMARY focus when communicating an IS audit issue to management?
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management ' s decision. Which of the following should be the IS auditor ' s NEXT course of action?
During the development of a business case for a new application, the IS auditor should be PRIMARILY involved in the:
An IS auditor notes that not all security tests were completed for an online sales system recently promoted to production. Which of the following is the auditor ' s BEST course of action?
Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?
An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?
Which of the following is the MOST likely root cause of shadow IT in an organization?
Which of the following statements appearing in an organization ' s acceptable use policy BEST demonstrates alignment with data classification standards related to the protection of information assets?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
An organization recently migrated Us data warehouse from a legacy system to a different architecture in the cloud. Which of the following should be of GREATEST concern to the IS auditor reviewing the new data architecture?
Which of the following is an IS auditor ' s BEST course of action when the auditee indicates that a corrective action plan for a high-risk finding will take longer than expected?
An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?
Which of the following is the BEST control to help ensure that security requirements are considered throughout the life cycle of an agile software development project?
In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?
A financial accounting system audit determined that audit logging of transactions had been disabled by a finance employee. The IS auditor recommended that finance personnel no longer have the capability to change audit logging settings. Which of the following is MOST important to verify during the follow-up?
Who is accountable for an organization ' s enterprise risk management (ERM) program?
Which of the following is the BEST approach for determining the overall IT risk appetite of an organization when business units use different methods formanaging IT risks?
Which of the following is the MOST effective control when granting access to a service provider for a ctoud-6ased application?
What should an IS auditor ensure when a financial organization intends to utilize production data in the testing environment?
Which of the following security measures is MOST important for protecting Internet of Things (IoT) devices from potential cyberattacks?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
A database administrator (DBA) should be prevented from having end user responsibilities:
A web application is developed in-house by an organization. Which of the following would provide the BEST evidence to an IS auditor that the application is secure from external attack?
Which of the following should an IS auditor do FIRST when auditing a robotics process automation (RPA) implementation?
To develop meaningful recommendations ' or findings, which of the following is MOST important ' or an IS auditor to determine and understand?
An IS audit manager is preparing the staffing plan for an audit engagement of a cloud service provider. What should be the manager ' s PRIMARY concern when being made aware that a new
auditor in the department previously worked for this provider?
Which of the following provides the BEST evidence that all elements of a business continuity plan (BCP) are operating effectively?
Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization ' s disaster recovery plan (DRP)?
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?
Which of the following provides the BEST assurance of data integrity after file transfers?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
An IS auditor is reviewing an organization ' s incident management processes. Which of the following observations should be the auditor ' s GREATEST concern?
Reviewing which of the following would provide the BEST indication that a project is progressing as planned?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
Which of the following presents the GREATEST risk to an organization ' s ability to manage quality control (QC) processes?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization ' s website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
In which phase of the audit life cycle process should an IS auditor initially discuss observations with management?
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
Which of the following controls helps to ensure that data extraction queries run by the database administrator (DBA) are monitored?
An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
The business case for an information system investment should be available for review until the:
Which of the following system attack methods is executed by entering malicious code into the search box of a vulnerable website, causing the server to reveal restricted information?
Which of the following is the MOST effective way for an IS auditor to ensure information is preserved when conducting a forensic investigation?
IT management has accepted the risk associated with an IS auditor ' s finding due to the cost and complexity of the corrective actions. Which of the following should be the auditor ' s NEXT course of action?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization’s enterprise architecture (EA) program?
Which of the following would be an auditor ' s GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?
Which of the following is the BEST methodology to use for estimating the complexity of developing a large business application?
Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?
An IS auditor determines that the vendor ' s deliverables do not include the source code for a newly acquired product. To address this issue, which of the following should the auditor recommend be included in the contract?
Email required for business purposes is being stored on employees ' personal devices.
Which of the following is an IS auditor ' s BEST recommendation?
Which of the following controls is MOST important for ensuring the integrity of system interfaces?
An organization plans to centrally decommission end-of-life databases and migrate the data to the latest model of hardware. Which of the following BEST ensures data integrity is preserved during the migration?
During the audit of an enterprise resource planning (ERP) system, an IS auditor found an applicationpatch was applied to the production environment. It is MOST
important for the IS auditor to verify approval from the:
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization ' s objectives?
Which of the following should be restricted from a network administrator ' s privileges in an adequately segregated IT environment?
Which of the following is MOST likely to be a project deliverable of an agile software development methodology?
When auditing the feasibility study of a system development project, the IS auditor should:
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
A finance department has a multi-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger. and in year one, the system version upgrade will be applied. Which of the following should be the PRIMARY focus of the IS auditor reviewing the first year of the project?
During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor ' s BEST recommendation?
What would be an IS auditor ' s BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?
Which of the following should be of GREATEST concern to an IS auditor assessing an organization ' s patch management program?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
An IS auditor is reviewing the service management of an outsourced help desk. Which of the following is the BEST indicator of how effectively the service provider is performing this function?
Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
An organization is ready to implement a new IT solution consisting of multiple modules. The last module updates the processed data into the database. Which of the following findings should be of MOST concern to the IS auditor?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
Which of the following is an example of a preventative control in an accounts payable system?
An organization considering the outsourcing of a business application should FIRST:
Which of the following is the BEST point in time to conduct a post-implementation review?
Which of the following is the MOST important action when populating a project risk register?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
While auditing a small organization ' s data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
An IS auditor is auditing the operating effectiveness of weekly user access reviews. Of the five weekly reviews sampled, one has not been signed or dated. What is the MAIN reason to note this observation as a finding?
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
When reviewing a business case for a proposed implementation of a third-party system, which of the following should be an IS auditor ' s GREATEST concern?
Which of the following should an IS auditor recommend be done FIRST when an organization is planning to implement an IT compliance program?
Which of the following should be an IS auditor ' s PRIMARY focus when auditing the implementation of a new IT operations performance monitoring system?
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
Which of the following BEST addresses the availability of an online store?
Which of the following is the GREATEST concern when applying emergency patches?
An IS auditor is reviewing a bank ' s service level agreement (SLA) with a third-party provider that hosts the bank ' s secondary data center, which of the following findings should be of GREATEST concern to the auditor?
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
Which of the following provides the BEST evidence that IT portfolio management is aligned with organizational strategies?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
An IS auditor is tasked to review an organization ' s plan-do-check-act (PDCA) method for improving IT-related processes and wants to determine the accuracy of defined targets to be achieved. Which of the following steps in the PDCA process should the auditor PRIMARILY focus on in this situation?
In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?
Which of the following would BEST assist an IS auditor in understanding the inputs and outputs of a microservice-oriented application?
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
During an IS audit of a data center, it was found that programmers are allowed to make emergency fixes to operational programs. Which of the following should be the IS auditor ' s PRIMARY recommendation?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization ' s method to transport sensitive data between offices?
An IS auditor is planning a review of an organizations robotic process automation (RPA) technology. Which of the following MUST be included in the audit work plan?
An organization using a cloud provider for its online billing system requires the website to be accessible to customers at all times. What is the BEST way to verify the organization ' s business requirements are met?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor ' s BEST course of action?
Which of the following BEST indicates a need to review an organization ' s information security policy?
An IS auditor is reviewing an organization ' s system development life cycle (SDLC) Which of the following MUST be included in the review?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
Which type of control has been established when an organization implements a security information and event management (SIEM) system?
An IS auditor decides to review a data inventory list captured directly from a system instead of relying on an interview with the system owner. Which of the following provides the BEST justification for the auditor ' s decision?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?
An organization is implementing a new system that supports a month-end business process. Which of the following implementation strategies would be MOST efficient to decrease business downtime?
Which of the following is MOST important for an IS auditor to determine when reviewing the design and implementation of controls?
An IS auditor is reviewing a machine learning model that predicts the likelihood that a user will watch a certain movie. Which of the following would be of GREATEST concern to the auditor?
An IS auditor is assessing the adequacy of management ' s remediation action plan. Which of the following should be the MOST important consideration?
Which of the following roles is PRIMARILY responsible for mitigating the risk of benefits not being realized in an IT project?
An IS auditor Is renewing the deployment of a new automated system Which of the following findings presents the MOST significant risk?
Which of the following is an objective of IT project portfolio management?
An IS auditor is reviewing database fields updated in real-time and displayed through other applications in multiple organizational functions. When validating business approval for these various use cases, which of the following sources of information would be the BEST starting point?
An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?
An organization used robotic process automation (RPA) technology to develop software bots that extract data from various sources for input into a legacy financial application. Which of the following should be of GREATEST concern to an IS auditor when reviewing the software bot job scheduling and production process automation?
Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?
During an audit of payment services of a branch based in a foreign country, a large global bank ' s audit team identifies an opportunity to use data analytics techniques to identify abnormal payments. Which of the following is the team ' s MOST important course of action?
A mission-critical application utilizes a one-node database server. On multiple occasions, the database service has been stopped to perform routine patching, causing application outages. Which of the following should be the IS auditor’s GREATEST concern?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
Which of the following should an IS auditor consider FIRST when evaluating firewall rules?
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
An IS auditor is conducting an IT governance audit and notices many initiatives are managed informally by isolated project managers. Which of the following recommendations would have the GREATEST impact on improving the maturity of the IT team?
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following is the MOST important outcome of an information security program?
Which of the following is the BEST indicator for measuring performance of IT help desk function?
Which of the following is the PRIMARY objective of performing quality assurance (QA) in a system development process?
Which type of testing is used to identify security vulnerabilities in source code in the development environment?
An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?
Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?
Which of the following is the MOST effective control to mitigate against the risk of inappropriate activity by employees?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor ' s PRIMARY concern would be:
An external IS auditor is reviewing the continuous monitoring system for a large bank and notes several potential issues. Which of the following would present the GREATEST concern regarding the reliability of the monitoring system?
The MOST important measure of the effectiveness of an organization ' s security program is the:
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
Which of the following BEST enables an IS auditor to prioritize financial reporting spreadsheets for an end-user computing (EUC) audit?
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?
A bank wants to outsource a system to a cloud provider residing in another country. Which of the following would be the MOST appropriate IS audit recommendation?
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor ' s NEXT course of action?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor ' s BEST recommendation should be to:
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
Which of the following are used in a firewall to protect the entity ' s internal resources?
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
Having knowledge in which of the following areas is MOST relevant for an IS auditor reviewing public key infrastructure (PKI)?
Which of the following is the MOST important consideration when implementing a Zero Trust strategy for mobile, wireless, and Internet of Things (IoT) devices?
Which of the following BEST enables a governing body to monitor IT performance based on metrics?
Using swipe cards to limit employee access to restricted areas requires implementing which additional control?
An IS auditor is reviewing an organization ' s primary router access control list. Which of the following should result in a finding?
Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?
Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?
Which of the following BEST supports the effectiveness of a compliance program?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization ' s disaster recovery plan (DRP)?
Which of the following would be the GREATEST concern for an IS auditor conducting a pre-implementation review of a data loss prevention (DLP > tool?
An IS auditor is reviewing an organizations release management practices and observes inconsistent and inaccurate estimation of the size and complexity of business application development projects. Which of the following should the auditor recommend to address this issue?
An IS auditor is reviewing how password resets are performed for users working remotely. Which type of documentation should be requested to understand the detailed steps required for this activity?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
A steering committee established to oversee an organization ' s digital transformation program is MOSTlikely to be involved with which of the following activities?
Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?
Which of the following would BEST prevent an arbitrary application of a patch?
Which of the following BEST enables an organization to standardize its IT infrastructure to align with business goals?
An IS auditor has been tasked with analyzing an organization ' s capital expenditures against its repair and maintenance costs. Which of the following is the BEST reason to use a data analytics tool for this purpose?
Which of the following is the BEST indication of effective IT investment management?
Which of the following should be of GREATEST concern to an IS auditor reviewing system interfaces used to transfer publicly available information?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
An IS auditor discovers that backups of critical systems are not being performed in accordance with the recovery point objective (RPO) established in the business continuity plan (BCP). What should the auditor do NEXT?
An organization ' s enterprise architecture (EA) department decides to change a legacy system ' s components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?
An organization has moved all of its infrastructure to the cloud. Which of the following would be an IS auditor’s GREATEST concern related to the organization’s ability to continue operations in case of a disaster?
Which of the following is the PRIMARY benefit of introducing business impact analyses (BIAs) to business resiliency strategies?
Which of the following is the MOST important reason for an IS auditor to examine the results of a post-incident review performed after a security incident?
An IS auditor wants to verify alignment of the organization ' s business continuity plan (BCP) with the business strategy. Which of the following would be MOST helpful to review?
Which of the following is the MOST important advantage of participating in beta testing of software products?
Which of the following occurs during the issues management process for a system development project?
When determining the quality of evidence collected during an audit, it is MOST important to ensure the evidence is:
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?
Which of the following technologies BEST assists in protection of digital evidence as part of forensic investigation acquisition?
An IS auditor is preparing for a review of controls associated with a manufacturing plant ' s implementation of industrial Internet of Things (loT) infrastructure Which of the following vulnerabilities would present the GREATEST security risk to the organization?
Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
Which of the following controls BEST provides confidentiality and nonrepudiation for an online business looking for digital payment data security?
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
An organization ' s senior management thinks current security controls may be excessive and requests an IS auditor ' s advice on how to assess the adequacy of current measures. What is the auditor ' s BEST recommendation to management?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
Which of the following is the MOST effective control over visitor access to highly secured areas?
Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor ' s BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
What should an IS auditor evaluate FIRST when reviewing an organization ' s response to new privacy legislation?
Which of the following should be an IS auditor ' s GREATEST concern when reviewing an organization ' s security controls for policy compliance?
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
Which type of attack poses the GREATEST risk to an organization ' s most sensitive data?
When planning a review of IT governance, an IS auditor is MOST likely to:
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
Which of the following is an example of a preventive control for physical access?
Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?
Which of the following is the BEST reason for an IS auditor to emphasize to management the importance of using an IT governance framework?
Which of the following is MOST useful when planning to audit an organization ' s compliance with cybersecurity regulations in foreign countries?
An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?
Which of the following criteria is MOST important for the successful delivery of benefits from an IT project?
Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?
Which of the following BEST facilitates the successful implementation of IT performance monitoring?
Which of the following provides the GREATEST assurance that an organization has effective controls preventing connection of unauthorized Internet of Things (IoT) devices to the corporate network?
Which of the following is the MOST important consideration when determining how frequently to review a data protection policy?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor ' s BEST course of action?
When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on
Which of the following methods would MOST effectively provide positive authentication for physical access?
An organization has both an IT strategy committee and an IT steering committee. When reviewing the minutes of the IT steering committee, an IS auditor would expect to find that the
committee:
During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)
agreement. What should the auditor do NEXT?
Which of the following backup schemes is the BEST option when storage media is limited?
Which of the following is MOST important for an IS auditor to assess during a post-implementation review of a newly modified IT application developed in-house?
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization ' s goals and strategic objectives?
Which of the following is the BEST reason to implement a data retention policy?
Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?
During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor ' s BEST course of action?
Which of the following is the BEST way to identify key areas for a risk-based audit plan?
Which of the following groups is PRIMARILY accountable for establishing a culture that facilitates an effective and efficient internal control system?
Which of the following MUST be performed by senior audit leadership prior to starting an IS audit project?
Which of the following BEST indicates that an incident management process is effective?
A startup organization wants to develop a data loss prevention (DLP) program. The FIRST step should be to implement:
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
Which of the following is the MOST effective way to ensure adequate system resources are available for high-priority activities?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?
An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.
Which of the following is the BEST course of action to address this issue?
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?
Which of the following is BEST used for detailed testing of a business application ' s data and configuration files?
After areas have been appropriately scoped, what is the IS auditor ' s NEXT step in the selection for sampling?
Following a merger, a review of an international organization determines the IT steering committee ' s decisions do not extend to regional offices as required in the consolidated IT operating model. Which of the following is the IS auditor ' s BEST recommendation?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization ' s mobile device policies and controls in its corporate environment?
Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank ' s customers. Which of the following controls is MOST important for the auditor to confirm is in place?
Which of the following should be the PRIMARY consideration when incorporating user training and awareness into a data loss prevention (DLP) strategy?
Which of the following represents the GREATEST risk to virtualized environments?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
A post-implementation audit has been completed for the deployment of a sophisticated job scheduling tool Which of the following observations would be of GREATEST concern?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization ' s plans to implement robotic process automation (RPA > to automate routine business tasks?
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
Which of the following is the GREATEST risk of project dashboards being set without sufficiently defined criteria?
Which of the following controls is BEST implemented through system configuration?
Network user accounts for temporary workers expire after 90 days.
Application user access is reviewed every 180 days for appropriateness.
Financial data in key reports is traced to source systems for completeness and accuracy.
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
Which of the following should be the GREATEST concern for an IS auditor assessing an organization ' s disaster recovery plan (DRP)?
Which of the following analytical methods would be MOST useful when trying to identify groups with similar behavior or characteristics in a large population?
Which of the following is the MOST important regulatory consideration for an organization determining whether to use its customer data to train AI algorithms?
An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor ' s NEXT action1?
Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics
system?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor ' s BEST course of action would be to:
Which of the following is the BEST method to safeguard data on an organization ' s laptop computers?
An organization saves confidential information in a file with password protection and the file is placed in a shared folder. An attacker has stolen this information by obtaining the password through social engineering. Implementing which of the following would BEST enable the organization to prevent this type of incident in the future?
Which type of threat can utilize a large group of automated social media accounts to steal data, send spam, or launch distributed denial of service (DDoS) attacks?
Visitors to a data center are required to present an ID and pre-approved documents. Which type of control has been implemented?
Which of the following is the PRIMARY benefit of monitoring IT operational logs?
Which of the following is MOST important when defining the IS audit scope?
Which of the following should be an IS auditor ' s GREATEST concern when evaluating an organization ' s ability to recover from system failures?
During an information security review, an IS auditor learns an organizational policy requires all employ-ees to attend information security training during the first week of each new year. What is
the auditor ' s BEST recommendation to ensure employees hired after January receive adequate guid-ance regarding security awareness?
A network analyst is monitoring the network after hours and detects activity that appears to be a brute-force attempt to compromise a critical server. After reviewing the alerts to ensure their accuracy, what should be done NEXT?
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
Which of the following is the PRIMARY reason to involve IS auditors in the software acquisition process?
In an annual audit cycle, the audit of an organization ' s IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
Which of the following poses the GREATEST risk to the use of active RFID tags?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
Which of the following is the MAIN responsibility of the IT steering committee?
Which of the following staff should an IS auditor interview FIRST to obtain a general overview of the various technologies used across different programs?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
Which of the following would be the BEST criteria for monitoring an IT vendor ' s service levels?
An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?
Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
An IS auditor discovers from patch logs that some in-scope systems are not compliant with the regular patching schedule. What should the auditor do NEXT?
The process of applying a hash function to a message and obtaining and ciphering a digest refers to:
Which of the following biometric access controls has the HIGHEST rate of false negatives?
An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:
Which of the following business continuity activities prioritizes the recovery of critical functions?
Which of the following would be of GREATEST concern when reviewing an organization ' s security information and event management (SIEM) solution?
An organization ' s networking team wants to route data between two virtual local area networks (VLANs). Which type of device is the BEST recommendation for installation of the VLANs?
Which of the following provides the MOST protection against emerging threats?
An IS auditor has been asked to review the integrity of data transfer between two business-critical systems that have not been tested since implementation. Which of the following would provide the MOST useful information to plan an audit?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
Which type of device sits on the perimeter of a corporate of home network, where it obtains a public IP address and then generates private IP addresses internally?
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization ' s data loss prevention (DLP) controls?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
An organization has decided to build a data warehouse using source data from several disparate systems to support strategic decision-making.
Which of the following is the BEST way to ensure the accuracy and completeness of the data used to support business decisions?
Which of the following methods provides the MOST reliable audit evidence?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system ' s security settings Where would the auditor MOST likely find this information?