When auditing IT organizational structure, which of the following findings presents the GREATEST risk to an organization?
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
Which of the following is an IS auditor ' s BEST recommendation to mitigate the risk of eavesdropping
associated with an application programming interface (API) integration implementation?
A programmer has made unauthorized changes to key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this
problem?
When an IS auditor needs to confirm that an organization is encrypting sensitive information at a database level, which of the following would provide the BEST assurance?
Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?
During recent post-implementation reviews, an IS auditor has noted that several deployed applications are not being used by the business. The MOST likely cause would be the lack of:
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization ' s enterprise architecture (EA) program?
Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users ' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
Which of the following provides the BEST evidence of the validity and integrity of logs in an organization ' s security information and event management (SIEM) system?
Which of the following MOST effectively reduces the probability of a brute force attack being successful?
Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?
The BEST way for an IS auditor to validate that separation of duties has been implemented is to perform:
Which of the following is the MOST likely root cause of shadow IT in an organization?
Which of the following operational log management considerations is MOST important for an organization undergoing a digital transformation?
The PRIMARY objective of value delivery in reference to IT governance is to:
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.
Which of the following is the BEST course of action to address this issue?
A review of an organization ' s enterprise architecture (EA) BEST enables an IS auditor to determine:
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
Which of the following is the MOST important regulatory consideration for an organization determining whether to use its customer data to train AI algorithms?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization ' s level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
An IS auditor is reviewing the installation of a new server. The IS auditor ' s PRIMARY objective is to ensure that
How does the emergence of quantum computing impact traditional data encryption methods?
If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
Which of the following is the BEST way to ensure a vendor complies with system security requirements?
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
An IS auditor is verifying the adequacy of an organization ' s internal controls and is concerned about potential circumvention of regulations. Which of the following is the BEST sampling method to use?
Which of the following findings would be of GREATEST concern when auditing an organization ' s end-user computing (EUC)?
Which of the following would BEST assist an IS auditor in understanding the inputs and outputs of a microservice-oriented application?
A bank wants to outsource a system to a cloud provider residing in another country. Which of the following would be the MOST appropriate IS audit recommendation?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality
within the organization. Which of the following should be recommended as the PRIMARY factor to
determine system criticality?
An IS auditor suspects an organization ' s computer may have been used to commit a crime. Which of the following is the auditor ' s BEST course of action?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
Which of the following is the MOST important consideration when establishing operational log management?
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
Which of the following is the GREATEST concern when applying emergency patches?
Which of the following MOST effectively detects transposition and transcription errors?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor ' s BEST course of action?
In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?
How does a continuous integration/continuous development (CI/CD) process help to reduce software failure risk?
Which of the following should be an IS auditor ' s PRIMARY consideration when determining which issues to include in an audit report?
An IS auditor is reviewing the service management of an outsourced help desk. Which of the following is the BEST indicator of how effectively the service provider is performing this function?
During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor ' s BEST recommendation?
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
Which of the following should be of MOST concern to an IS auditor reviewing an organization’s IT policies?
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following should be the GREATEST concern for an IS auditor assessing an organization ' s disaster recovery plan (DRP)?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization ' s plans to implement robotic process automation (RPA > to automate routine business tasks?
An organization is modernizing its technology policy framework to demonstrate compliance with external industry standards. Which of the following would be MOST useful to an IS auditor for validating the outcome?
Which of the following is MOST important to include when developing a business continuity plan (BCP)?
An IS auditor has validated that an organization ' s IT department runs several low-priority automated tasks Which of the following is the BEST recommendation for an automated job schedule?
Which of the following BEST contributes to the quality of an audit of a business-critical application?
Which of the following is the PRIMARY role of key performance indicators (KPIs) in supporting business process effectiveness?
Which of the following is the PRIMARY purpose of a rollback plan for a system change?
Which of the following findings would be of GREATEST concern to an IS auditor reviewing firewall security for an organization ' s corporate network?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
Which of the following biometric access controls has the HIGHEST rate of false negatives?
An IS auditor is reviewing an organization ' s incident management processes and procedures. Which of the following observations should be the auditor ' s GREATEST concern?
Following a merger, a review of an international organization determines the IT steering committee ' s decisions do not extend to regional offices as required in the consolidated IT operating model. Which of the following is the IS auditor ' s BEST recommendation?
An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor ' s NEXT action1?
Which of the following responsibilities associated with a disaster recovery plan (DRP) can be outsourced to a Disaster Recovery as a Service (DRaaS) provider?
When classifying information, it is MOST important to align the classification to:
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?
An IS auditor discovers from patch logs that some in-scope systems are not compliant with the regular patching schedule. What should the auditor do NEXT?
Following a discussion on the results of a recent audit engagement, the process owner of the audited area has provided an action plan addressing the gaps and recommendations. The auditor disagrees with some of the responses where the process owner is accepting a level of residual risk that is not within the organization ' s risk appetite. What is the auditor ' s BEST course of action?
Which of the following is the GREATEST risk that could result from a contracted penetration tester attempting SQL injection techniques on the production system?
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor ' s NEXT course of action?
Which of the following provides the BEST evidence that a third-party service provider ' s information security controls
are effective?
Which of the following is the GREATEST risk associated with utilizing spreadsheets for financial reporting in end-user computing (EUC)?
Which of the following is the MOST effective control to mitigate against the risk of inappropriate activity by employees?
An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country.
What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted
application?
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
Which of the following is an IS auditor’s MOST important step in a privacy audit?
Which of the following is the MAIN objective of enterprise architecture (EA) governance?
Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?
An organization ' s IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?
An IS auditor is reviewing an organization ' s risk management program. Which of the following should be the PRIMARY driver of the enterprise IT risk appetite?
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
Which of the following should be an IS auditor ' s GREATEST concern when a data owner assigns an incorrect classification level to data?
Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization ' s configuration and release management process?
An IS auditor conducts a review of a third-party vendor ' s reporting of key performance indicators (KPIs) Which of the following findings should be of MOST concern to the auditor?
What should an IS auditor ensure when a financial organization intends to utilize production data in the testing environment?
What is the PRIMARY purpose of performing a parallel run of a now system?
When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?
Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?
Which of the following is the BEST way to detect unauthorized copies of licensed software on systems?
An organization has both an IT strategy committee and an IT steering committee. When reviewing the minutes of the IT steering committee, an IS auditor would expect to find that the
committee:
Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following is the PRIMARY objective of performing quality assurance (QA) in a system development process?
The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor ' s NEXT course of action?
Which of the following is the PRIMARY benefit of implementing an IT capacity management process?
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization ' s mobile device policies and controls in its corporate environment?
When evaluating whether the expected benefits of a project have been achieved, it is MOST important for an IS auditor to review:
A system experiences multiple recurring processing errors. Which of the following is the PRIMARY concern for an IS auditor?
Using swipe cards to limit employee access to restricted areas requires implementing which additional control?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
Which of the following is the BEST control to help ensure the completeness of outbound transactions?
When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?
Which of the following user actions poses the GREATEST risk for inadvertently introducing malware into a local network?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether
Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?
An organization has partnered with a third party to transport backup drives to an offsite storage facility. Which of the following is MOST important before sending the drives?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
Which of the following BEST enables alignment of IT with business objectives?
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
An organization has introduced a capability maturity model to the system development life cycle (SDLC) to measure improvements. Which of the following is the BEST indication of successful process improvement?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
Which of the following is MOST likely to be a project deliverable of an agile software development methodology?
Which of the following system attack methods is executed by entering malicious code into the search box of a vulnerable website, causing the server to reveal restricted information?
The record-locking option of a database management system (DBMS) serves to.
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
Which of the following is MOST important for an IS auditor to assess during a post-implementation review of a newly modified IT application developed in-house?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
Which of the following is an IS auditor ' s BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?
Which of the following performance management tools BEST helps an IS auditor evaluate the success of an organization’s IT strategy implementation and execution?
Which of the following should be the IS auditor ' s PRIMARY focus, when evaluating an organization ' s offsite storage facility?
An IS auditor assessing the controls within a newly implemented call center would First
When planning an audit to assess controls for an application in the cloud environment, it is MOST important for an IS auditor to understand:
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
An IS auditor reviewing an organization’s IT systems finds that the organization frequently purchases systems that are incompatible with the technologies already in the organization. Which of the following is the MOST likely reason?
Which of the following BEST indicates that the effectiveness of an organization ' s security awareness program has improved?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?
An IS auditor is reviewing an organizations release management practices and observes inconsistent and inaccurate estimation of the size and complexity of business application development projects. Which of the following should the auditor recommend to address this issue?
Which of the following system redundancy configurations BEST improves system resiliency and reduces the possibility of a single cause of failure impacting system dependability?
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
An organization ' s software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
An IS auditor is reviewing an organization ' s cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?
During the review of a system disruption incident, an IS auditor notes that IT support staff were put in a position to make decisions beyond their level of authority.
Which of the following is the BEST recommendation to help prevent this situation in the future?
Which of the following findings from a network security review presents the GREATEST risk to the organization?
Which of the following is the BEST reason for an IS auditor to emphasize to management the importance of using an IT governance framework?
A staff accountant regularly uploads spreadsheets with inventory levels to the organization ' s financial reporting system. The transfers are executed through a customized interface created by an in-house developer. Which of the following is MOST important for the IS auditor to confirm during a review of the interface?
Which of the following is MOST important to ensure when planning a black box penetration test?
Which of the following is the MOST effective way for an IS auditor to ensure information is preserved when conducting a forensic investigation?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
Which of the following controls is MOST important for ensuring the integrity of system interfaces?
Which of the following BEST describes the concept of fault tolerance in system resiliency?
Data from a system of sensors located outside of a network is received by the open ports on a server. Which of the following is the BEST way to ensure the integrity of the data being collected from the sensor system?
A bank performed minor changes to the interest calculation computer program. Which of the following techniques would provide the STRONGEST evidence to determine whether the interest calculations are correct?
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?
Which of the following is the GREATEST benefit of adopting an Agile audit methodology?
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
An IS auditor is planning an audit of an organization ' s accounts payable processes. Which of the following controls is MOST important to assess in the audit?
Which of the following is MOST helpful for measuring benefits realization for a new system?
An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization ' s payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management
experience. What is the BEST course of action?
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
What is the MOST effective way to detect installation of unauthorized software packages by employees?
Which of the following audit evidence collection procedures is MOST reliable?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
An IS auditor reviewing a job scheduling tool notices performance and reliability problems. Which of the following is MOST likely affecting the tool?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
Which of the following security risks can be reduced by a property configured network firewall?
Which of the following provides the BEST evidence that IT portfolio management is aligned with organizational strategies?
Which of the following is MOST important to consider when scheduling follow-up audits?
Which of the following is MOST important to consider when developing a service level agreement (SLAP)?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
An IS auditor is assessing backup performance and observes that the system administrator manually initiates backups during unexpected peak usage. Which of the following is the auditor ' s BEST course of action?
Which of the following BEST demonstrates to senior management and the board that an audit function is compliant with standards and the code of ethics?
An IS auditor is reviewing a machine learning (ML) model that predicts the likelihood that a user will watch a certain movie. Which of the following would be of GREATEST concern to the auditor?
A white box testing method is applicable with which of the following testing processes?
An organization that processes credit card information employs a remote workforce. Which of the following is the MOST effective way to mitigate risk associated with data exfiltration?
When auditing an organization ' s software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
Which of the following controls helps to ensure that data extraction queries run by the database administrator (DBA) are monitored?
Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor ' s PRIMARY concern would be:
Which of the following is the MOST effective way for an organization to project against data loss?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
An IS auditor is reviewing a client ' s outsourced payroll system to assess whether the financial audit team can rely on the application. Which of the following findings would be the auditor ' s
GREATEST concern?
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor ' s NEXT course of action?
Which of the following parameters reflects the risk threshold for an organization experiencing a service disruption?
An organization performs virtual machine (VM) replication instead of daily backups of its critical servers. Which of the following is MOST important to validate when evaluating the adequacy of recovery procedures?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
An IS auditor discovers that backups of critical systems are not being performed in accordance with the recovery point objective (RPO) established in the business continuity plan (BCP). What should the auditor do NEXT?
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?
Which of the following BEST indicates a need to review an organization ' s information security policy?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization ' s website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
A current project to develop IT-based solutions will need additional funding to meet changes in business requirements. Who is BEST suited to obtain this additional funding?
An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
Which of the following will BEST ensure that archived electronic information of permanent importance remains accessible over time?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
In a review of the organization standards and guidelines for IT management, which of the following should be included in an IS development methodology?
Which of the following should be used to evaluate an IT development project before an investment is committed?
Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?
An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:
A business application ' s database is copied to a replication server within minutes. Which of the following processes taking place during business hours will MOST benefit from this architecture?
Which of the following is the BEST recommendation by an IS auditor to prevent unauthorized access to Internet of Things (loT) devices ' ?
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor ' s BEST course of action?
Which of the following should be the IS auditor ' s PRIMARY focus when evaluating an organizations offsite storage facility?
An organization outsourced its IS functions to meet its responsibility for disaster recovery, the organization should:
The process of applying a hash function to a message and obtaining and ciphering a digest refers to:
in a post-implantation Nation review of a recently purchased system it is MOST important for the iS auditor to determine whether the:
An IS auditor is reviewing a decision to consolidate processing for multiple applications onto a single large server. Which of the following is the MOST significant impact from this decision?
Which of the following is the BEST control to mitigate the risk of shadow IT?
Which of the following occurs during the issues management process for a system development project?
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
Which of the following should be of GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?
Which type of threat can utilize a large group of automated social media accounts to steal data, send spam, or launch distributed denial of service (DDoS) attacks?
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization ' s information security governance?
Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?
Which of the following should be done FIRST when planning a penetration test?
Which of the following is an IS auditor ' s BEST recommendation to help an organization increase the efficiency of computing resources?
Which of the following provides the BEST assurance of data integrity after file transfers?
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor ' s BEST recommendation for a compensating control?
In an annual audit cycle, the audit of an organization ' s IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
Which of the following recommendations would BEST prevent the implementation of IT projects without collaborating with the business?
When classifying information, it is MOST important to align the classification to:
Which of the following should be an IS auditor ' s PRIMARY focus when evaluating the response process for cybercrimes?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
While auditing a small organization ' s data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?
An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?
An IS auditor is reviewing the security of a web-based customer relationship management (CRM) system that is directly accessed by customers via the Internet, which of the following should be a concern for the auditor?
Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?
After areas have been appropriately scoped, what is the IS auditor ' s NEXT step in the selection for sampling?
Which of the following security measures is MOST important for protecting Internet of Things (IoT) devices from potential cyberattacks?
Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?
Which of the following is the GREATEST risk of project dashboards being set without sufficiently defined criteria?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider’s external audit report on service level management when the
Which of the following BEST indicates that an incident management process is effective?
An organization has decided to reengineer business processes to improve the performance of overall IT service delivery. Which of the following recommendations from the project team should be the GREATEST concern to the IS auditor?
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
Which of the following MUST be performed by senior audit leadership prior to starting an IS audit project?
When an intrusion into an organization ' s network is detected, which of the following should be done FIRST?
An organization has decided to purchase a web-based email service from a third-party vendor and eliminate its own email server infrastructure. What type of cloud computing environment would BEST meet the organization ' s objective?
Which of the following MUST be completed as part of the annual audit planning process?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
Which of the following is the BEST indicator of the effectiveness of an organization ' s incident response program?
Which of the following would be the BEST process for continuous auditing to a large financial Institution?
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
Which of the following is the BEST way to determine the adequacy of controls for detecting inappropriate network activity in an organization?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
Which of the following is the MOST important responsibility of data owners when implementing a data classification process?
Which of the following BEST helps monitor and manage operational logs to create value for an organization?
Which of the following is the MOST important success factor for implementing a data loss prevention (DLP) tool?
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
An IS auditor noted a recent production incident in which a teller transaction system incorrectly charged fees to customers due to a defect from a recent release. Which of the following should be the auditor ' s NEXT step?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization ' s incident management processes?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
Which of the following should be given GREATEST consideration when implementing the use of an open-source product?
A PRIMARY objective of risk management is to keep the total cost of risks below the:
An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?
An IS auditor is reviewing a data conversion project Which of the following is the auditor ' s BEST recommendation prior to go-live?
The PRIMARY reason to assign data ownership for protection of data is to establish:
Which of the following is MOST important when defining the IS audit scope?
Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?
An IS auditor has discovered that a software system still in regular use is outdated and no longer supported. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
An IS auditor wants to gain a better understanding of an organization’s selected IT operating system software. Which of the following would be MOST helpful to review?
Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?
Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?
Which of the following is the PRIMARY role of the IS auditor m an organization ' s information classification process?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
Which of the following applications has the MOST inherent risk and should be prioritized during audit planning?
An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?
Which of the following is a PRIMARY responsibility of an IT steering committee?
An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
In order for a firewall to effectively protect a network against external attacks, what fundamental practice must be followed?
An IS auditor finds that an organization ' s data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor ' s MAIN concern should be that:
An IS auditor is performing a follow-up audit for findings identified in an organization ' s user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?
An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?
Management has agreed to move the organization ' s data center due to recent flood map changes in its current location. Which risk response has been adopted?
Which of the following is the GREATEST benefit of an effective data classification process?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor ' s BEST course of action would be to:
Which of the following BEST demonstrates alignment of the IT department with the corporate mission?
How is nonrepudiation supported within a public key infrastructure (PKI) environment?
During an information security review, an IS auditor learns an organizational policy requires all employ-ees to attend information security training during the first week of each new year. What is
the auditor ' s BEST recommendation to ensure employees hired after January receive adequate guid-ance regarding security awareness?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following concerns is BEST addressed by securing production source libraries?
When planning a review of IT governance, an IS auditor is MOST likely to:
Which of the following issues identified during a formal review of an organization ' s information security policies presents the GREATEST potential risk to the organization?
Which of the following should be a concern to an IS auditor reviewing an organization’s use of a major cloud provider for Infrastructure as a Service (IaaS)?
Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization ' s goals?
During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?
What is the Most critical finding when reviewing an organization’s information security management?
An organization offers an e-commerce platform that allows consumer-to-consumer transactions. The platform now uses blockchain technology to ensure the parties are unable to deny the transactions. Which of the following attributes BEST describes the risk element that this technology is addressing?
Which of the following is the BEST reason for an organization to use clustering?
Which of the following is the PRIMARY reason to perform a risk assessment?
Which of the following provides the BEST evidence that system requirements are met when evaluating a project before implementation?
Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics
system?
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
An organization plans to centrally decommission end-of-life databases and migrate the data to the latest model of hardware. Which of the following BEST ensures data integrity is preserved during the migration?
An organization ' s security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?
Which of the following can BEST reduce the impact of a long-term power failure?
What should be an IS auditor ' s PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
Which of the following is an effective way to ensure the integrity of file transfers in a peer-to-peer (P2P) computing environment?
Which of the following is MOST important to consider when reviewing an organization ' s defined data backup and restoration procedures?
Which of the following activities is MOST likely to increase internal audit quality?
An IS auditor is tasked to review an organization ' s plan-do-check-act (PDCA) method for improving IT-related processes and wants to determine the accuracy of defined targets to be achieved. Which of the following steps in the PDCA process should the auditor PRIMARILY focus on in this situation?
Which of the following should be the FIRST step in a data migration project?
An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated. Which of the following should be of
MOST concern?
How does public key infrastructure (PKI) help to verify that a digitally signed document is not a forgery?
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization ' s information security plan includes:
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor ' s NEXT step should be to:
To help determine whether a controls-reliant approach to auditing financial systems in a company should be used, which sequence of IS audit work is MOST appropriate?
Which of the following is the PRIMARY benefit of operational log management?
Which of the following is BEST used for detailed testing of a business application ' s data and configuration files?
Which of the following is necessary for effective risk management in IT governance?
In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?
Which of the following is the MOST important consideration for patching mission critical business application servers against known vulnerabilities?
Which of the following issues associated with a data center ' s closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
An organization is disposing of removable onsite media which contains sensitive information. Which of the following is the MOST effective method to prevent disclosure of sensitive data?
Which of the following is the MOST effective control when granting access to a service provider for a ctoud-6ased application?
An organization ' s sensitive data is stored in a cloud computing environment and is encrypted. Which of the following findings should be of GREATEST concern to an IS auditor?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
Which of the following findings would be of GREATEST concern when reviewing project risk management practices?
Which of the following BEST facilitates the legal process in the event of an incident?
An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?
An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?
The charging method that effectively encourages the MOST efficient use of IS resources is:
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
When information processing has been outsourced to another organization, an IS auditor reviewing the contract should expect it to specify:
A proper audit trail of changes to server start-up procedures would include evidence of:
Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves
for care?
Which of the following is the GREATEST advantage of maintaining an internal IS audit function within an organization?
For security awareness training to be MOST effective, management should ensure the training:
Which of the following helps to ensure the integrity of data for a system interface?
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor ' s BEST recommendation would be to:
Which of the following controls is MOST effective at preventing system failures when implementing a new web application?
Which of the following is the MOST efficient control to reduce the risk associated with a systems administrator having network administrator responsibilities?
A bank has a combination of corporate customer accounts (higher monetary value) and small business accounts (lower monetary value) as part of online banking. Which of the following is the BEST sampling approach for an IS auditor to use for these accounts?
Which of the following constitutes an effective detective control in a distributed processing environment?
Which of the following should be the FIRST step to successfully implement a corporate data classification program?
Which of the following BEST enables an IS auditor to confirm the batch processing to post transactions from an input source is successful?
When designing metrics for information security, the MOST important consideration is that the metrics:
An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be the GREATEST concern?
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
Which of the following is the MOST important consideration when relying on the work of the prior auditor?
Which of the following BEST supports an organization ' s objective of restricting the use of removable storage devices by users?
A computer forensic audit is MOST relevant in which of the following situations?
An organization saves confidential information in a file with password protection and the file is placed in a shared folder. An attacker has stolen this information by obtaining the password through social engineering. Implementing which of the following would BEST enable the organization to prevent this type of incident in the future?
Which of the following should be an IS auditor ' s GREATEST concern when reviewing an organization ' s security controls for policy compliance?
Which of the following is the BEST source of information for examining the classification of new data?
Which of the following should be the GREATEST concern for an IS auditor reviewing recent disaster recovery operations?
An organization using a cloud provider for its online billing system requires the website to be accessible to customers at all times. What is the BEST way to verify the organization ' s business requirements are met?
When assessing the overall effectiveness of an organization ' s disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?
An information systems security officer ' s PRIMARY responsibility for business process applications is to:
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?
Which of the following methods would MOST effectively provide positive authentication for physical access?
An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?
Which of the following should be an IS auditor ' s GREATEST concern when an international organization intends to roll out a global data privacy policy?
An IS auditor learns that a business owner violated the organization ' s security policy by creating a web page with access to production data. The auditor ' s NEXT step should be to:
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor ' s PRIMARY concern?
During a follow-up engagement, an IS auditor confirms evidence of a problem that was not an issue in the original audit. Which of the following is the auditor ' s BEST course of action?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
Which of the following provides the GREATEST assurance that an organization has effective controls preventing connection of unauthorized Internet of Things (IoT) devices to the corporate network?
Which of the following metrics is the BEST indicator of the performance of a web application
Which of the following is the BEST indication to an IS auditor that management ' s post-implementation review was effective?
Which of the following responsibilities of an organization ' s quality assurance (QA) function should raise concern for an IS auditor?
Which of the following is the PRIMARY reason that asset classification is vital to an information security program?
An organization allows programmers to change production systems in emergency situations without seeking prior approval. Which of the following controls should an IS auditor consider MOST
important?
During an audit of an organization ' s risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?
During the course of fieldwork, an internal IS auditor observes a critical vulnerability within a newly deployed application. What is the auditor ' s BEST course of action?
What would be an IS auditor ' s BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
Which of the following is the GREATEST concern associated with a high number of IT policy exceptions approved by management?
Which of the following should be an IS auditor ' s PRIMARY focus when auditing the implementation of a new IT operations performance monitoring system?
Which of the following is the GREATEST risk associated with hypervisors in virtual environments?
Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?
Which of the following is an analytical review procedure for a payroll system?
Which of the following is the MOST effective way to detect as many abnormalities as possible during an IS audit?
Which of the following should an IS auditor perform FIRST when auditing an outsourced human resource application?
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
A data center ' s physical access log system captures each visitor ' s identification document numbers along with the visitor ' s photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
Which of the following is MOST helpful for understanding an organization’s key driver to modernize application platforms?
Which of the following should be of GREATEST concern to an IS auditor when using data analytics?
An organization wants to use virtual desktops to deliver corporate applications to its end users. Which of the following should an IS auditor recommend to prevent domain name system (DNS) poisoning in their cloud environment?
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor ' s NEXT course of action?
Which of the following would be an auditor ' s GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?
Which of the following would be the GREATEST concern for an IS auditor conducting a pre-implementation review of a data loss prevention (DLP > tool?