Which of the following is an example of a preventative control in an accounts payable system?
Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?
An information systems security officer's PRIMARY responsibility for business process applications is to:
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
Which of the following is MOST important to consider when scheduling follow-up audits?
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
Which of the following would be an appropriate rote of internal audit in helping to establish an organization's privacy program?
Stress testing should ideally be earned out under a:
Which of the following findings from an IT governance review should be of GREATEST concern?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed Which of the following is the MOST important requirement to include In the vendor contract to ensure continuity?
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?
Which of the following is the MOST important activity in the data classification process?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?
IT disaster recovery time objectives (RTOs) should be based on the:
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
In a RAO model, which of the following roles must be assigned to only one individual?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?
The PRIMARY focus of a post-implementation review is to verify that:
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
Which of the following BEST Indicates that an incident management process is effective?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?
The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
Which of the following documents should specify roles and responsibilities within an IT audit organization?
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
Which of the following is a social engineering attack method?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following metrics would BEST measure the agility of an organization's IT function?
In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
Which of the following BEST enables the timely identification of risk exposure?
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?