Which of the following is the BEST control to help ensure that security requirements are considered throughout the life cycle of an agile software development project?
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
What should an IS auditor do FIRST when a follow-up audit reveals some management action plans have not been initiated?
Due to advancements in technology and electronic records, an IS auditor has completed an engagement by email only. Which of the following did the IS auditor potentially compromise?
An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:
Which of the following would BEST indicate the effectiveness of a security awareness training program?
Which of the following should be an IS auditor's PRIMARY focus when evaluating the response process for cybercrimes?
Which of the following should be of GREATEST concern to an IS auditor when auditing an organization's IT strategy development process?
Which of the following encryption methods offers the BEST wireless security?
The decision to accept an IT control risk related to data quality should be the responsibility of the:
Which of the following would be the GREATEST concern for an IS auditor conducting a pre-implementation review of a data loss prevention (DLP> tool?
An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?
Which of the following BEST enables alignment of IT with business objectives?
An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?
Which of the following should an IS auditor review when evaluating information systems governance for a large organization?
Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?
Email required for business purposes is being stored on employees' personal devices.
Which of the following is an IS auditor's BEST recommendation?
A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:
Which of the following should be restricted from a network administrator's privileges in an adequately segregated IT environment?
When assessing a proposed project for the two-way replication of a customer database with a remote call center, the IS auditor should ensure that:
When designing a data analytics process, which of the following should be the stakeholder's role in automating data extraction and validation?
An IS auditor is reviewing security controls related to collaboration tools for a business unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
Controls related to authorized modifications to production programs are BEST tested by:
Which of the following is MOST important to consider when reviewing an organization's defined data backup and restoration procedures?
With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization's objectives?
An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?
The PRIMARY purpose of requiring source code escrow in a contractual agreement is to:
An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?
Which of the following is the MAJOR advantage of automating internal controls?
Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
An IS auditor is supporting a forensic investigation. An image of affected storage media has been captured while collecting digital forensic evidence. Which of the following techniques would BEST enable an IS auditor to verify that the captured image is an exact, unchanged replica of the original media?
An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
Which of the following is the MOST effective accuracy control for entry of a valid numeric part number?
Which of the following statements appearing in an organization's acceptable use policy BEST demonstrates alignment with data classification standards related to the protection of information assets?
When an organization conducts business process improvements, the IS auditor should be MOST concerned with the:
Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?
Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?
Which of the following BEST addresses the availability of an online store?
Which of the following would be the GREATEST concern to an IS auditor when reviewing the outsourcing contract for an organization's cloud service provider?
Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?
Which of the following is the BEST sampling method to use when relatively few errors are expected to be found in a population?
An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?
A bank performed minor changes to the interest calculation computer program. Which of the following techniques would provide the STRONGEST evidence to determine whether the interest calculations are correct?
Which of the following should be identified FIRST during the risk assessment process?
Which of the following is the BEST reason for an organization to use clustering?
When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?
Which of the following should be the PRIMARY focus for any network design that deploys a Zero Trust architecture?
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
Which of the following would BEST help to ensure that an incident receives attention from appropriate personnel in a timely manner?
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?
Which of the following is the MOST important control for virtualized environments?
Which of the following is MOST effective for controlling visitor access to a data center?
The BEST way to evaluate the effectiveness of a newly developed application is to:
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
A national tax administration agency with a distributed network experiences service disruptions due to a large influx of traffic to a regional office near the end of each year. Which of the following would BEST enable the agency to improve the performance of its servers during the busy period?
Which of the following would BEST guide an IS auditor when determining an appropriate time to schedule the follow-up of agreed corrective actions for reported audit issues?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
An IS auditor determines that the vendor's deliverables do not include the source code for a newly acquired product. To address this issue, which of the following should the auditor recommend be included in the contract?
Which of the following is MOST critical to the success of an information security program?
Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?
In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor's NEXT course of action?
Which of the following biometric access controls has the HIGHEST rate of false negatives?
An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.
Which of the following is the BEST course of action to address this issue?
Which of the following is the MOST important reason for an IS auditor to examine the results of a post-incident review performed after a security incident?
During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?
During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?
Which type of risk would MOST influence the selection of a sampling methodology?
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
An IS auditor is reviewing an organization's business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor's NEXT step should be to:
Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?
Which of the following provides the BEST evidence of the validity and integrity of logs in an organization's security information and event management (SIEM) system?
Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?
Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
Which of the following provides the BE ST method for maintaining the security of corporate applications pushed to employee-owned mobile devices?
Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?
A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?
An IT strategic plan that BEST leverages IT in achieving organizational goals will include:
Which of the following controls is MOST important for ensuring the integrity of system interfaces?
During the review of a system disruption incident, an IS auditor notes that IT support staff were put in a position to make decisions beyond their level of authority.
Which of the following is the BEST recommendation to help prevent this situation in the future?
Which of the following should be done FIRST to minimize the risk of unstructured data?
An IS auditor learns that an organization's business continuity plan (BCP) has not been updated in the last 18 months and that the organization recently closed a production plant. Which of the following is the auditor's BEST course of action?
Which of the following metrics is the BEST indicator of the performance of a web application
What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data
classification in this project?
Which of the following would provide management with the MOST reasonable assurance that a new data warehouse will meet the needs of the
organization?
An IS auditor is reviewing an organization's incident management processes and procedures. Which of the following observations should be the auditor's GREATEST concern?
Which of the following is the GREATEST risk that could result from a contracted penetration tester attempting SQL injection techniques on the production system?
After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
Which of the following would be an appropriate rote of internal audit in helping to establish an organization's privacy program?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
Which of the following should be the GREATEST concern to an IS auditor reviewing the information security framework of an organization?
A global organization's policy states that all workstations must be scanned for malware each day. Which of the following would provide an IS auditor with the BEST evidence of continuous compliance with this policy?
The BEST way to provide assurance that a project is adhering to the project plan is to:
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?
Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?
Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?
In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?
Which of the following should an organization do to anticipate the effects of a disaster?
An organization has shifted from a bottom-up approach to a top-down approach in the development of IT policies. This should result in:
Which of the following provides the MOST protection against emerging threats?
During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)
agreement. What should the auditor do NEXT?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?
During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
During an audit of a multinational bank's disposal process, an IS auditor notes several findings. Which of the following should be the auditor's GREATEST concern?
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
While evaluating the data classification process of an organization, an IS auditor's PRIMARY focus should be on whether:
Which of the following represents the HIGHEST level of maturity of an information security program?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?
In an online application, which of the following would provide the MOST information about the transaction audit trail?
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
Which of the following is the MOST important activity in the data classification process?
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
Which of the following business continuity activities prioritizes the recovery of critical functions?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
What is the Most critical finding when reviewing an organization’s information security management?
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed Which of the following is the MOST important requirement to include In the vendor contract to ensure continuity?
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
The GREATEST benefit of using a polo typing approach in software development is that it helps to:
Which of the following BEST Indicates that an incident management process is effective?
Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization's privacy policy?
The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization's security policy?
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
Which of the following metrics would BEST measure the agility of an organization's IT function?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
When reviewing the disaster recovery strategy, IT management identified an application that requires a short recovery point objective (RPO). Which of the following data restoration strategies would BEST enable the organization to meet this objective?
Which of the following BEST facilitates the legal process in the event of an incident?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
Which of the following MUST be completed as part of the annual audit planning process?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
Which of the following is an audit reviewer's PRIMARY role with regard to evidence?
An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
Which of the following should be an IS auditor's GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
Which of the following demonstrates the use of data analytics for a loan origination process?
Which of the following would be a result of utilizing a top-down maturity model process?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
Which of the following should be done FIRST when planning a penetration test?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?
Which of the following is MOST important to ensure when planning a black box penetration test?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?
Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
Which of the following MOST effectively minimizes downtime during system conversions?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?
Which of the following provides the BEST evidence that IT portfolio management is aligned with organizational strategies?
During a pre-implementation review, an IS auditor notes that some scenarios have not been tested. Management has indicated that the project is critical and cannot be postponed. Which of the following is the auditor's BEST course of action?
Which of the following is the PRIMARY function of an internal IS auditor when the organization acquires a new IT system to support its business strategy?
Which of the following is MOST helpful for evaluating benefits realized by IT projects?
Which of the following BEST demonstrates alignment of the IT department with the corporate mission?
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
Which of the following is an objective of IT project portfolio management?
Which of the following should be an IS auditor's GREATEST concern when assessing an IT service configuration database?
Which of the following risks is BEST mitigated by implementing an automated three-way match?
An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?
An organization's strategy to source certain IT functions from a Software as a Service (SaaS) provider should be approved by the:
A security review focused on data loss prevention (DLP) revealed the organization has no visibility to data stored in the cloud. What is the IS auditor's BEST recommendation to address this
issue?
In reviewing the IT strategic plan, the IS auditor should consider whether it identifies the:
Of the following who should be responsible for cataloging and inventorying robotic process automation (RPA) processes?
What should be an IS auditor's PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?
In order for a firewall to effectively protect a network against external attacks, what fundamental practice must be followed?
Which of the following is the MOST appropriate testing approach when auditing a daily data flow between two systems via an automated interface to confirm that it is complete and accurate?
Which of the following should be used to evaluate an IT development project before an investment is committed?
An IS auditor is reviewing an organization's cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?
Which of the following risk scenarios is BEST mitigated through the use of a data loss prevention (DLP) tool?
During a follow-up engagement, an IS auditor confirms evidence of a problem that was not an issue in the original audit. Which of the following is the auditor's BEST course of action?
Which of the following cloud capabilities BEST enables an organization to meet unexpectedly high service demand?
What should an IS auditor ensure when a financial organization intends to utilize production data in the testing environment?
Which of the following represents the GREATEST risk to virtualized environments?
A PRIMARY objective of risk management is to keep the total cost of risks below the:
Which of the following is MOST important for an IS auditor to determine when reviewing the design and implementation of controls?
Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?
Which of the following is the BEST indication that a software development project is on track to meet its completion deadline?
Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?
Which of the following presents the GREATEST risk to an organization's ability to manage quality control (QC) processes?
An IS auditor is performing a follow-up audit and notes that some critical deficiencies have not been addressed. The auditor's BEST course of action is to:
During an organization's implementation of a data loss prevention (DLP) solution, which of the following activities should be completed FIRST?
How is nonrepudiation supported within a public key infrastructure (PKI) environment?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's job scheduling practices?
Which of the following should an IS auditor recommend be done FIRST when an organization is planning to implement an IT compliance program?
What should be the PRIMARY focus during a review of a business process improvement project?
The PRIMARY reason to assign data ownership for protection of data is to establish:
An IS auditor found that operations personnel failed to run a script contributing to year-end financial statements. Which of the following is the BEST recommendation?
Which of the following should be of GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
Which of the following is the GREATEST risk associated with security patches being automatically downloaded and applied to production servers?
A new system development project is running late against a critical implementation deadline. Which of the following is the MOST important activity?
An organization wants to use virtual desktops to deliver corporate applications to its end users. Which of the following should an IS auditor recommend to prevent domain name system (DNS) poisoning in their cloud environment?
Which of the following is the PRIMARY benefit of operational log management?
Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?
Which of the following is the BEST way to foster continuous improvement of IS audit processes and practices?
Which of the following should be the GREATEST concern for an IS auditor reviewing recent disaster recovery operations?
Which of the following is the PRIMARY advantage of using an automated security log monitoring tool instead of conducting a manual review to monitor the use of privileged access?
Which of the following would BEST prevent an arbitrary application of a patch?
During the audit of an enterprise resource planning (ERP) system, an IS auditor found an applicationpatch was applied to the production environment. It is MOST
important for the IS auditor to verify approval from the:
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
Which of the following is necessary for effective risk management in IT governance?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the
associated risk?
Which of the following procedures for testing a disaster recovery plan (DRP) is MOST effective?
Which of the following controls helps to reduce fraud risk associated with robotic process automation (RPA)?
Which of the following is an IS auditor's BEST course of action when the auditee indicates that a corrective action plan for a high-risk finding will take longer than expected?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
Which of the following BEST mitigates the risk of SQL injection attacks against applications exposed to the internet?
Which of the following is the PRIMARY purpose of batch processing monitoring?
Which of the following is an IS auditor's BEST recommendation to help an organization increase the efficiency of computing resources?
Which of the following backup schemes is the BEST option when storage media is limited?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following is MOST critical for the effective implementation of IT governance?
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?
Which of the following should be the FIRST step to successfully implement a corporate data classification program?
Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?
An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?
An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?
An IS auditor Is renewing the deployment of a new automated system Which of the following findings presents the MOST significant risk?
When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
Which of the following is the MOST important Issue for an IS auditor to consider with regard to Voice-over IP (VoIP) communications?
Which of the following is the BEST indicator for measuring performance of IT help desk function?
Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?
Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan?
A computer forensic audit is MOST relevant in which of the following situations?
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
Which of the following is the MOST important responsibility of user departments associated with program changes?
Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?
An IS auditor evaluating the change management process must select a sample from the change log. What is the BEST way to the auditor to confirm the change log is complete?
An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?
An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?
Which of the following is MOST important for an IS auditor to review when determining whether IT investments are providing value to tie business?
An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?