During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?
An IS auditor is evaluating the risk associated with moving from one database management system (DBMS) to another. Which of the following would be MOST helpful to ensure the integrity of the system throughout the change?
Providing security certification for a new system should include which of the following prior to the system's implementation?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
Which of the following is a detective control?
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
What is the MAIN reason to use incremental backups?
During the planning stage of a compliance audit, an IS auditor discovers that a bank's inventory of compliance requirements does not include recent regulatory changes related to managing data risk. What should the auditor do FIRST?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?
Which of the following responses to risk associated with separation of duties would incur the LOWEST initial cost?
An IS auditor is assessing backup performance and observes that the system administrator manually initiates backups during unexpected peak usage. Which of the following is the auditor's BEST course of action?
An organization is planning to implement a control self-assessment (CSA) program for selected business processes. Which of the following should be the role of the internal audit team for this program?
Which of the following should be of MOST concern to an IS auditor when reviewing an intrusion detection system (IDS)?
A mission-critical application utilizes a one-node database server. On multiple occasions, the database service has been stopped to perform routine patching, causing application outages. Which of the following should be the IS auditor’s GREATEST concern?
An IS auditor is reviewing the service management of an outsourced help desk. Which of the following is the BEST indicator of how effectively the service provider is performing this function?
Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?
Which of the following is the BEST control to help ensure the completeness of outbound transactions?
Which of the following is the MOST likely root cause of shadow IT in an organization?
Which of the following is the PRIMARY objective of performing quality assurance (QA) in a system development process?
Which of the following is MOST important to consider when determining the usefulness of audit evidence?
A system performance dashboard indicates several application servers are reaching the defined threshold for maximum CPU allocation. Which of the following would be the IS auditor's BEST recommendation for the IT department?
As part of an audit response, an auditee has concerns with the recommendations and is hesitant to implement them. Which of the following is the BEST course of action for the IS auditor?
An IS auditor observes that a large number of departed employees have not been removed from the accounts payable system. Which of the following is MOST important to determine in order to assess the risk1?
Which of the following BEST indicates a need to review an organization's information security policy?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's incident response management program?
The following findings are the result of an IS auditor’s post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?
Which type of control has been established when an organization implements a security information and event management (SIEM) system?
Which of the following responsibilities associated with a disaster recovery plan (DRP) can be outsourced to a Disaster Recovery as a Service (DRaaS) provider?
Which of the following is the MOST effective way to ensure adequate system resources are available for high-priority activities?
Which of the following is the BEST reason for software developers to use automated testing versus manual testing?
Which of the following is the MOST important consideration to facilitate prosecution of a perpetrator after a cybercrime?
What is the purpose of hashing a document?
An IS auditor is reviewing a medical device that is attached to a patient’s body, which automatically takes and uploads measurements to a cloud server. Treatment may be updated based on the measurements. Which of the following should be the auditor's PRIMARY focus?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization's enterprise architecture (EA) program?
Which of the following is the BEST method for converting system-generated log files into a format suitable for data analysis?
Which of the following is PRIMARILY used in blockchain technology to create a distributed immutable ledger?
An organization has implemented a new data classification scheme and asks the IS auditor to evaluate its effectiveness. Which of the following would be of
GREATEST concern to the auditor?
Which of the following is the BEST control to help ensure that security requirements are considered throughout the life cycle of an agile software development project?
Which of the following is the PRIMARY purpose of a business impact analysts (BIA) in an organization's overall risk management strategy?
Which of the following MOST effectively reduces the probability of a brute force attack being successful?
Which of the following is the PRIMARY benefit of monitoring IT operational logs?
Who is responsible for defining data access permissions?
Which of the following controls would BEST help a forensic investigator prevent modifications in digital evidence?