Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization's security policy?
Which of the following should an IS auditor consider FIRST when evaluating firewall rules?
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?
Which of the following BEST Indicates that an incident management process is effective?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
In a RAO model, which of the following roles must be assigned to only one individual?
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
An IS auditor has been asked to provide support to the control self-assessment (CSA) program. Which of the following BEST represents the scope of the auditor’s role in the program?
After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?
What is the Most critical finding when reviewing an organization’s information security management?
Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
The GREATEST benefit of using a polo typing approach in software development is that it helps to:
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?
Which of the following occurs during the issues management process for a system development project?
An information systems security officer's PRIMARY responsibility for business process applications is to:
Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
Which of the following concerns is BEST addressed by securing production source libraries?
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
Which of the following MUST be completed as part of the annual audit planning process?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
Which of the following would be an appropriate rote of internal audit in helping to establish an organization's privacy program?
Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
Which of the following data would be used when performing a business impact analysis (BIA)?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
A proper audit trail of changes to server start-up procedures would include evidence of:
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Which of the following would be a result of utilizing a top-down maturity model process?
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
Which of the following is MOST important with regard to an application development acceptance test?
The implementation of an IT governance framework requires that the board of directors of an organization:
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
Which of the following strategies BEST optimizes data storage without compromising data retention practices?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Which of the following is the GREATEST concern associated with a high number of IT policy exceptions approved by management?
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
Which of the following is the BEST reason to implement a data retention policy?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
Which of the following backup schemes is the BEST option when storage media is limited?
Which of the following is MOST critical for the effective implementation of IT governance?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
Which of the following BEST facilitates the legal process in the event of an incident?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
An IS auditor assessing the controls within a newly implemented call center would First
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
Which of the following BEST indicates that the effectiveness of an organization's security awareness program has improved?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
Effective separation of duties in an online environment can BEST be achieved by utilizing:
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
Which of the following should be used as the PRIMARY basis for prioritizing IT projects and initiatives?
When protecting the confidentiality of information assets, the MOST effective control practice is the:
An IS auditor is reviewing a medical device that is attached to a patient’s body, which automatically takes and uploads measurements to a cloud server. Treatment may be updated based on the measurements. Which of the following should be the auditor's PRIMARY focus?
During the audit of an enterprise resource planning (ERP) system, an IS auditor found an applicationpatch was applied to the production environment. It is MOST
important for the IS auditor to verify approval from the:
While conducting a follow-up on an asset management audit, the IS auditor finds paid invoices for IT devices not recorded in the organization's inventory. Which of the following is the auditor's BEST course of action?
Which of the following should be the GREATEST concern for an IS auditor performing a post-implementation review for a major system upgrade?
Which type of testing is used to identify security vulnerabilities in source code in the development environment?
Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?
Which of the following audit procedures would provide the BEST assurance that an application program is functioning as designed?
Which of the following BEST indicates to an IS auditor that an organization handles emergency changes appropriately and transparently?
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
In an annual audit cycle, the audit of an organization's IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
Which of the following is MOST important to the effectiveness of smoke detectors installed in a data processing facility?
Which of the following is the PRIMARY benefit of effective implementation of appropriate data classification?
An organization is ready to implement a new IT solution consisting of multiple modules. The last module updates the processed data into the database. Which of the following findings should be of MOST concern to the IS auditor?
Following an IT audit, management has decided to accept the risk highlighted in the audit report. Which of the following would provide the MOST assurance to the IS auditor that management
is adequately balancing the needs of the business with the need to manage risk?
An IS auditor is conducting an IT governance audit and notices many initiatives are managed informally by isolated project managers. Which of the following recommendations would have the GREATEST impact on improving the maturity of the IT team?
An IS auditor noted a recent production incident in which a teller transaction system incorrectly charged fees to customers due to a defect from a recent release. Which of the following should be the auditor's NEXT step?
Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?
During an organization's implementation of a data loss prevention (DLP) solution, which of the following activities should be completed FIRST?
Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time?
Which of the following would be of GREATEST concern to an IS auditor reviewing the resiliency of an organizational network that has two internet connections?
What should be the PRIMARY focus during a review of a business process improvement project?
During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?
From a risk management perspective, which of the following is the BEST approach when implementing a large and complex data center IT infrastructure?
Which of the following is the PRIMARY purpose of a rollback plan for a system change?
A configuration management audit identified that predefined automated procedures are used when deploying and configuring application infrastructure in a cloud-based
environment. Which of the following is MOST important for the IS auditor to review?
Which of the following is the PRIMARY benefit of monitoring IT operational logs?
Which of the following would be of GREATEST concern to an IS auditor reviewing the feasibility study for a new application system?
A telecommunications company has recently created a new fraud department with three employees and acquired a fraud detection system that uses artificial intelligence (AI) modules. Which of the following would be of GREATEST concern to an IS auditor reviewing the system?
Which of the following is a PRIMARY function of an intrusion detection system (IDS)?
Which of the following should an IS auditor recommend be done FIRST when an organization is planning to implement an IT compliance program?
Which of the following types of firewalls provides the GREATEST degree of control against hacker intrusion?
An organization's strategy to source certain IT functions from a Software as a Service (SaaS) provider should be approved by the:
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
An IS auditor found that operations personnel failed to run a script contributing to year-end financial statements. Which of the following is the BEST recommendation?
A mission-critical application utilizes a one-node database server. On multiple occasions, the database service has been stopped to perform routine patching, causing application outages. Which of the following should be the IS auditor’s GREATEST concern?
Which of the following is the GREATEST benefit of adopting an Agile audit methodology?
Which of the following should be the PRIMARY purpose of conducting tabletop exercises when re-viewing a security incident response plan?
A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:
An IS auditor finds that a recently deployed application has a number of developers with inappropriate update access left over from the testing environment. Which of the following would have BEST prevented the update access from being migrated?
A startup organization wants to develop a data loss prevention (DLP) program. The FIRST step should be to implement:
Which of the following would be MOST important to include in an IS audit report?
An organization has decided to build a data warehouse using source data from several disparate systems to support strategic decision-making.
Which of the following is the BEST way to ensure the accuracy and completeness of the data used to support business decisions?
Which of the following BEST enables an IS auditor to combine and compare access control lists from various applications and devices?
A network analyst is monitoring the network after hours and detects activity that appears to be a brute-force attempt to compromise a critical server. After reviewing the alerts to ensure their accuracy, what should be done NEXT?
Which of the following will BEST ensure that archived electronic information of permanent importance remains accessible over time?
An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?
What would be an IS auditor's BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?
An IS auditor Is renewing the deployment of a new automated system Which of the following findings presents the MOST significant risk?
Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls?
Which of the following is MOST important for an IS auditor to verify when reviewing the use of an outsourcer for disposal of storage media?
An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
Which of the following should be the FIRST step to successfully implement a corporate data classification program?
Which of the following should be of GREATEST concern to an |$ auditor reviewing data conversion and migration during the implementation of a new application system?
An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?
An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?
Due to advancements in technology and electronic records, an IS auditor has completed an engagement by email only. Which of the following did the IS auditor potentially compromise?
A finance department has a multi-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger. and in year one, the system version upgrade will be applied. Which of the following should be the PRIMARY focus of the IS auditor reviewing the first year of the project?
Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?
Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?
To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?
Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?
An organization has implemented a distributed security administration system to replace the previous centralized one. Which of the following presents the GREATEST potential concern?
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization's information cannot be accessed?
The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:
Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization's security policy?
As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:
Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?
A firewall between internal network segments improves security and reduces risk by:
Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?
Which of the following is me GREATE ST impact as a result of the ongoing deterioration of a detective control?
An organization outsourced its IS functions to meet its responsibility for disaster recovery, the organization should:
Which of the following would BEST help to ensure that an incident receives attention from appropriate personnel in a timely manner?
Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves
for care?
The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?
What is the MOST effective way to detect installation of unauthorized software packages by employees?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
Which of the following is the BEST indication of effective IT investment management?
Which of the following is a PRIMARY responsibility of an IT steering committee?
Which of the following provides the BEST evidence that a third-party service provider's information security controls
are effective?
A web proxy server for corporate connections to external resources reduces organizational risk by:
Which of the following is the MOST appropriate control to ensure integrity of online orders?
During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?
Which of the following technologies has the SMALLEST maximum range for data transmission between devices?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?
Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?
in a post-implantation Nation review of a recently purchased system it is MOST important for the iS auditor to determine whether the:
Which of the following concerns is MOST effectively addressed by implementing an IT framework for alignment between IT and business objectives?
Which of the following is the MOST appropriate indicator of change management effectiveness?
When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on
Which of the following would protect the confidentiality of information sent in email messages?
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)
agreement. What should the auditor do NEXT?
A new system development project is running late against a critical implementation deadline Which of the following is the MOST important activity?
A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
Which of the following is MOST critical to the success of an information security program?
An organization is disposing of removable onsite media which contains sensitive information. Which of the following is the MOST effective method to prevent disclosure of sensitive data?
An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?
Which of the following should be done FIRST to minimize the risk of unstructured data?
Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?
Which of the following is the MAIN responsibility of the IT steering committee?
Which of the following is MOST critical to the success of an information security program?
Which of the following is MOST useful when planning to audit an organization's compliance with cybersecurity regulations in foreign countries?
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
Which type of attack poses the GREATEST risk to an organization's most sensitive data?
An organization uses public key infrastructure (PKI) to provide email security. Which of the following would be the MOST efficient method to determine whether email messages have been modified in transit?
An organization has an acceptable use policy in place, but users do not formally acknowledge the policy. Which of the following is the MOST significant risk from this finding?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
Which of the following is the MOST important consideration when establishing vulnerability scanning on critical IT infrastructure?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization's patch management process?
Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics
system?
An IS auditor has been tasked with auditing the inventory control process for a large organization that processes millions of data transactions. Which of the following is the BEST testing strategy to adopt?
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
Which of the following is MOST important for the successful establishment of a security vulnerability management program?
When developing customer-facing IT applications, in which stage of the system development life cycle (SDLC) is it MOST beneficial to consider data privacy principles?
Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
An IS auditor is reviewing a client's outsourced payroll system to assess whether the financial audit team can rely on the application. Which of the following findings would be the auditor's
GREATEST concern?
When reviewing a business case for a proposed implementation of a third-party system, which of the following should be an IS auditor's GREATEST concern?
In a large organization, IT deadlines on important projects have been missed because IT resources are not prioritized properly. Which of the following is the BEST recommendation to address this problem?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor's BEST course of action?
An organization's IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?
What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?
A bank performed minor changes to the interest calculation computer program. Which of the following techniques would provide the STRONGEST evidence to determine whether the interest calculations are correct?
Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization's disaster recovery plan (DRP)?
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization's goals and strategic objectives?
Which of the following should be identified FIRST during the risk assessment process?
An IS auditor is reviewing an organization's business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality
within the organization. Which of the following should be recommended as the PRIMARY factor to
determine system criticality?
Which of the following is an example of a preventive control for physical access?
Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?
Which of the following would BEST indicate the effectiveness of a security awareness training program?
Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?
An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor's NEXT course of action?
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?
During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?
In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
Which of the following BEST enables an organization to improve the effectiveness of its incident response team?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?
Which of the following is the MOST important consideration for a contingency facility?
Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?
Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?
Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?
While auditing a small organization's data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?
Which of the following represents the HIGHEST level of maturity of an information security program?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
Which of the following findings from an IT governance review should be of GREATEST concern?
Which of the following documents should specify roles and responsibilities within an IT audit organization?
In an online application, which of the following would provide the MOST information about the transaction audit trail?