During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?
Retention periods and conditions for the destruction of personal data should be determined by the.
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
Which of the following is MOST important to include in security awareness training?
The use of control totals reduces the risk of:
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
Which of the following helps to ensure the integrity of data for a system interface?
In a large organization, IT deadlines on important projects have been missed because IT resources are not prioritized properly. Which of the following is the BEST recommendation to address this problem?
An IS auditor is reviewing a client's outsourced payroll system to assess whether the financial audit team can rely on the application. Which of the following findings would be the auditor's
GREATEST concern?
The record-locking option of a database management system (DBMS) serves to.
What is the FIRST step when creating a data classification program?
In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?
An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?
Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?
Which of the following is the MOST significant risk when an application uses individual end-user accounts to access the underlying database?
Which of the following is the BEST way to ensure an organization's data classification policies are preserved during the process of data transformation?
The BEST way to evaluate the effectiveness of a newly developed application is to:
Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?
Which of the following BEST enables an organization to improve the effectiveness of its incident response team?
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
The following findings are the result of an IS auditor's post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data
classification in this project?
Which of the following is the PRIMARY benefit of a tabletop exercise for an incident response plan?
Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization's disaster recovery plan (DRP)?
When reviewing past results of a recurring annual audit, an IS auditor notes that findings may not have been reported and independence may not have been maintained. Which of the following is the auditor's BEST course of action?
Which of the following is the BEST way for an IS auditor to assess the design of an automated application control?
An IS auditor is planning an audit of an organization's risk management practices. Which of the following would provide the MOST useful information about
risk appetite?
Which of the following provides the BEST evidence of the validity and integrity of logs in an organization's security information and event management (SIEM) system?
Which of the following should be the FIRST step in a data migration project?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
Which of the following BEST facilitates strategic program management?
Which of the following would BEST indicate the effectiveness of a security awareness training program?
The PRIMARY purpose of an incident response plan is to:
An IS auditor should be MOST concerned if which of the following fire suppression systems is utilized to protect an asset storage closet?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor's NEXT step should be to:
Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization's patch management process?
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?
Which of the following is MOST critical to the success of an information security program?
Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?
An IT strategic plan that BEST leverages IT in achieving organizational goals will include:
Which of the following metrics is the BEST indicator of the performance of a web application
When planning an internal penetration test, which of the following is the MOST important step prior to finalizing the scope of testing?
Which of the following is the BEST reason to implement a data retention policy?
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.
Which of the following is the BEST course of action to address this issue?
An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor's NEXT course of action?
Which of the following is MOST critical to the success of an information security program?
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
Which type of risk would MOST influence the selection of a sampling methodology?
The BEST way to provide assurance that a project is adhering to the project plan is to:
An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
An organization is disposing of removable onsite media which contains sensitive information. Which of the following is the MOST effective method to prevent disclosure of sensitive data?
An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?
A small IT department has embraced DevOps, which allows members of this group to deploy code to production and maintain some development access to automate releases. Which of the following is the MOST effective control?
Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:
Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor's NEXT course of action?
An IS auditor reviewing incident response management processes notices that resolution times for reoccurring incidents have not shown improvement. Which of the following is the auditor's BEST recommendation?
Which of the following is MOST important to include when developing a business continuity plan (BCP)?
An organization has replaced its call center with Al chatbots that autonomously learn new responses through internet queries and customer conversation history. Which of the following would an IS auditor tasked with verifying IT controls consider to be the GREATEST risk?
A PRIMARY objective of risk management is to keep the total cost of risks below the:
The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
An IS auditor is reviewing how password resets are performed for users working remotely. Which type of documentation should be requested to understand the detailed steps required for this activity?
Which of the following is the PRIMARY function of a data loss prevention (DLP) policy when implemented in an organization's DLP solution?
Which of the following should be used as the PRIMARY basis for prioritizing IT projects and initiatives?
Which of the following controls BEST provides confidentiality and nonrepudiation for an online business looking for digital payment data security?
The MOST effective way to reduce sampling risk is to increase:
Which of the following network communication protocols is used by network devices such as routers to send error messages and operational information indicating success or failure when communicating with another IP address?
Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?
An organization is establishing a steering committee for the implementation of a new enterprise resource planning (ERP) system that uses Agile project management methodology. What is the MOST important criterion for the makeup of this committee?
Which of the following will BEST ensure that archived electronic information of permanent importance remains accessible over time?
The PRIMARY objective of the disaster recovery planning process is to:
Which of the following is the GREATEST benefit of an effective data classification process?
The PRIMARY role of an IS auditor in the remediation of problems found during an audit engagement is to:
The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:
Which of the following poses the GREATEST risk to an organization related to system interfaces?
Which of the following is MOST important for an IS auditor to verify when reviewing the planned use of Benford's law as a data analytics technique to detect fraud in a set of credit card transactions?
Which of the following BEST helps data loss prevention (DLP) tools detect movement of sensitive data m transit?
An organization's strategy to source certain IT functions from a Software as a Service (SaaS) provider should be approved by the:
Using swipe cards to limit employee access to restricted areas requires implementing which additional control?
How does a continuous integration/continuous development (CI/CD) process help to reduce software failure risk?
A contract for outsourcing IS functions should always include:
An organization has both an IT strategy committee and an IT steering committee. When reviewing the minutes of the IT steering committee, an IS auditor would expect to find that the
committee:
Which of the following is MOST important for an IS auditor to determine when reviewing the design and implementation of controls?
An IS auditor learns that an organization did not conduct any penetration testing over one internet-facing webpage prior to of the following is the auditor's BEST course of action?
Which of the following provides an IS auditor the BEST evidence that a third-party service provider's information security controls are effective?
Which of the following is the BEST metric to measure the quality of software developed in an organization?
Which of the following would present the GREATEST risk within a release management process for a new application?
During which stage of the penetration test cycle does the tester utilize identified vulnerabilities to attempt to access the target system?
An organization allows programmers to change production systems in emergency situations without seeking prior approval. Which of the following controls should an IS auditor consider MOST
important?
Which of the following approaches would present the GREATEST concern for the implementation of a quality assurance (QA) function?
Which of the following is the PRIMARY benefit of operational log management?
Which of the following should be of GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
When designing a data analytics process, which of the following should be the stakeholder's role in automating data extraction and validation?
Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?
Which of the following is the BEST source of organizational direction on when to use cloud services?
An IS auditor is reviewing desktop software profiles and notes that a user has downloaded and installed several games that are not approved by the company. Which of the following is the MOST significant risk that could result from this situation?
Which of the following threats is mitigated by a firewall?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
What is the MAIN purpose of an organization's internal IS audit function?
An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?
An IS auditor determines elevated administrator accounts for servers that are not properly checked out and then back in after each use. Which of the following is the MOST appropriate sampling technique to determine the scope of the problem?
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
A national bank recently migrated a large number of business-critical applications to the cloud. Which of the following is MOST important to ensuring the resiliency of the applications?
An IS auditor is reviewing a decision to consolidate processing for multiple applications onto a single large server. Which of the following is the MOST significant impact from this decision?
An IS auditor is reviewing an organization that performs backups on local database servers every two weeks and does not have a formal policy to govern data backup and restoration procedures. Which of the following findings presents the GREATEST risk to the organization?
Which of the following should be done FIRST when creating a data protection program?
A security review focused on data loss prevention (DLP) revealed the organization has no visibility to data stored in the cloud. What is the IS auditor's BEST recommendation to address this
issue?
Which of the following is the BEST indication that an information security awareness program is effective?
Which of the following is the MOST likely root cause of shadow IT in an organization?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?
Which of the following is the PRIMARY benefit of introducing business impact analyses (BIAs) to business resiliency strategies?
When drafting a disaster recovery strategy, what should be the MOST important outcome of a business impact analysis (BIA)?
Which of the following is the GREATEST risk associated with lack of IT involvement in the organization's strategic planning initiatives?
During recent post-implementation reviews, an IS auditor has noted that several deployed applications are not being used by the business. The MOST likely cause would be the lack of:
Which of the following MOST effectively detects transposition and transcription errors?
Which type of threat can utilize a large group of automated social media accounts to steal data, send spam, or launch distributed denial of service (DDoS) attacks?
When reviewing an organization’s enterprise architecture (EA), which of the following is an IS auditor MOST likely to find within the EA documentation?
Which of the following findings would be of GREATEST concern when auditing an organization's end-user computing (EUC)?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the
auditor's BEST recommendation to help prevent unauthorized access?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's mobile device policies and controls in its corporate environment?
An IS auditor finds that the cost of developing an application is now projected to significantly exceed the budget. Which of the following is the GREATEST risk to communicate to senior management?
Having knowledge in which of the following areas is MOST relevant for an IS auditor reviewing public key infrastructure (PKI)?
An organization using a cloud provider for its online billing system requires the website to be accessible to customers at all times. What is the BEST way to verify the organization's business requirements are met?
Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?
Which of the following findings would be of GREATEST concern to an IS auditor reviewing firewall security for an organization's corporate network?
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
A proper audit trail of changes to server start-up procedures would include evidence of:
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
Which of the following is a social engineering attack method?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
The decision to accept an IT control risk related to data quality should be the responsibility of the:
Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?
Which of the following is the MOST effective way for an organization to project against data loss?
Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
Which of the following data would be used when performing a business impact analysis (BIA)?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
Secure code reviews as part of a continuous deployment program are which type of control?
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
Which of the following demonstrates the use of data analytics for a loan origination process?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
Which of the following BEST indicates the effectiveness of an organization's risk management program?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
Which of the following BEST guards against the risk of attack by hackers?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
An organizations audit charier PRIMARILY:
Which of the following is MOST important to ensure when planning a black box penetration test?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
Cross-site scripting (XSS) attacks are BEST prevented through:
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
Which of the following should be done FIRST when planning a penetration test?
Which of the following is MOST important with regard to an application development acceptance test?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
What is the BEST control to address SQL injection vulnerabilities?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
Which of the following is the BEST testing approach to facilitate rapid identification of application interface errors?
in a post-implantation Nation review of a recently purchased system it is MOST important for the iS auditor to determine whether the:
Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?
Which of the following is the BEST source of information to determine the required level of data protection on a file server?
When assessing whether an organization's IT performance measures are comparable to other organizations in the same industry, which of the following would be MOST helpful to review?
An IS auditor is asked to review an organization's technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
A disaster recovery plan (DRP) should include steps for:
Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS
Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD)
policy to help prevent data leakage?
Which of the following are used in a firewall to protect the entity's internal resources?
Management has learned the implementation of a new IT system will not be completed on time and has requested an audit. Which of the following audit findings should be of GREATEST concern?
The FIRST step in auditing a data communication system is to determine:
An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:
Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?
Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?
Which of the following should an IS auditor recommend be done FIRST when an organization is made aware of a new regulation that is likely to impact IT security requirements?
Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?
An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?
When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?
Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
When classifying information, it is MOST important to align the classification to:
Which of the following analytical methods would be MOST useful when trying to identify groups with similar behavior or characteristics in a large population?
An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor's NEXT action1?
Which of the following provides the MOST reliable method of preventing unauthonzed logon?
Email required for business purposes is being stored on employees' personal devices.
Which of the following is an IS auditor's BEST recommendation?
An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on
Which of the following provides the BEST assurance of data integrity after file transfers?
An organization has implemented a distributed security administration system to replace the previous centralized one. Which of the following presents the GREATEST potential concern?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?
Which of the following methods will BEST reduce the risk associated with the transition to a new system using technologies that are not compatible with the old system?
Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?
Which of the following is an IS auditor's BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?
Which of the following is the BEST indicator for measuring performance of IT help desk function?
Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?
A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
An IS auditor is reviewing the security of a web-based customer relationship management (CRM) system that is directly accessed by customers via the Internet, which of the following should be a concern for the auditor?
Which of the following is MOST important to consider when reviewing an organization's defined data backup and restoration procedures?
An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country.
What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted
application?
When is it MOST important for an IS auditor to apply the concept of materiality in an audit?
Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization's configuration and release management process?
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization's information cannot be accessed?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?
An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?
During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor's GREATEST concern with this situation?
Which of the following provides a new IS auditor with the MOST useful information to evaluate overall IT performance?
Which of the following should be of GREATEST concern to an IS auditor when auditing an organization's IT strategy development process?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
An IS auditor learns that an in-house system development life cycle (SDLC) project has not met user specifications. The auditor should FIRST examine requirements from which of the following phases?
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
A web proxy server for corporate connections to external resources reduces organizational risk by:
During an audit which of the following would be MOST helpful in establishing a baseline for measuring data quality?
Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following
is the auditor’s BEST recommendation to prevent unauthorized access?
Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?
A checksum is classified as which type of control?
During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?
Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
Which of the following would be the BEST process for continuous auditing to a large financial Institution?
Which of the following is the BEST approach for determining the overall IT risk appetite of an organization when business units use different methods formanaging IT risks?
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
Which of the following BEST describes an audit risk?
The PRIMARY role of a control self-assessment (CSA) facilitator is to:
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
Which of the following is the BEST reason to implement a data retention policy?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
The PRIMARY objective of value delivery in reference to IT governance is to:
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
Which of the following is MOST important when implementing a data classification program?
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following is MOST important when planning a network audit?
Which of the following is necessary for effective risk management in IT governance?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
Which of the following backup schemes is the BEST option when storage media is limited?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
The PRIMARY benefit of information asset classification is that it:
Which of the following would be MOST useful when analyzing computer performance?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following BEST helps to ensure data integrity across system interfaces?
In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
Which of the following occurs during the issues management process for a system development project?
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?
Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
Which of the following BEST enables the timely identification of risk exposure?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?
Stress testing should ideally be earned out under a:
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?
During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?
Which of the following is MOST important to consider when scheduling follow-up audits?
Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?
An IS auditor is evaluating the risk associated with moving from one database management system (DBMS) to another. Which of the following would be MOST helpful to ensure the integrity of the system throughout the change?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
Upon completion of audit work, an IS auditor should:
Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?
Which of the following findings from an IT governance review should be of GREATEST concern?
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
Which of the following represents the HIGHEST level of maturity of an information security program?
To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?
The PRIMARY focus of a post-implementation review is to verify that:
Which of the following concerns is BEST addressed by securing production source libraries?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
The GREATEST benefit of using a polo typing approach in software development is that it helps to:
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
What is the Most critical finding when reviewing an organization’s information security management?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
What is the MAIN reason to use incremental backups?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization's privacy policy?
Which of the following documents should specify roles and responsibilities within an IT audit organization?
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
During an audit of a multinational bank's disposal process, an IS auditor notes several findings. Which of the following should be the auditor's GREATEST concern?
Which of the following BEST Indicates that an incident management process is effective?
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
Which of the following should an IS auditor consider FIRST when evaluating firewall rules?
Which of the following is an example of a preventative control in an accounts payable system?
Which of the following is the GREATEST risk associated with storing customer data on a web server?
Which of the following is the MOST important activity in the data classification process?
During the planning stage of a compliance audit, an IS auditor discovers that a bank's inventory of compliance requirements does not include recent regulatory changes related to managing data risk. What should the auditor do FIRST?