Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:

A.

reflect current practices.

B.

include new systems and corresponding process changes.

C.

incorporate changes to relevant laws.

D.

be subject to adequate quality assurance (QA).

During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?

A.

Revise the assessment based on senior management's objections.

B.

Escalate the issue to audit management.

C.

Finalize the draft audit report without changes.

D.

Gather evidence to analyze senior management's objections

When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?

A.

Observing the execution of a daily backup run

B.

Evaluating the backup policies and procedures

C.

Interviewing key personnel evolved In the backup process

D.

Reviewing a sample of system-generated backup logs

Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?

A.

The job scheduler application has not been designed to display pop-up error messages.

B.

Access to the job scheduler application has not been restricted to a maximum of two staff members

C.

Operations shift turnover logs are not utilized to coordinate and control the processing environment

D.

Changes to the job scheduler application's parameters are not approved and reviewed by an operations supervisor

An IS auditor is evaluating the risk associated with moving from one database management system (DBMS) to another. Which of the following would be MOST helpful to ensure the integrity of the system throughout the change?

A.

Preserving the same data classifications

B.

Preserving the same data inputs

C.

Preserving the same data structure

D.

Preserving the same data interfaces

Providing security certification for a new system should include which of the following prior to the system's implementation?

A.

End-user authorization to use the system in production

B.

External audit sign-off on financial controls

C.

Testing of the system within the production environment

D.

An evaluation of the configuration management practices

Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?

A.

Audit charter

B.

IT steering committee

C.

Information security policy

D.

Audit best practices

Which of the following is a detective control?

A.

Programmed edit checks for data entry

B.

Backup procedures

C.

Use of pass cards to gain access to physical facilities

D.

Verification of hash totals

Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?

A.

Data from the source and target system may be intercepted.

B.

Data from the source and target system may have different data formats.

C.

Records past their retention period may not be migrated to the new system.

D.

System performance may be impacted by the migration

The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:

A.

the access control system's log settings.

B.

how the latest system changes were implemented.

C.

the access control system's configuration.

D.

the access rights that have been granted.

Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?

A.

Logs are being collected in a separate protected host

B.

Automated alerts are being sent when a risk is detected

C.

Insider attacks are being controlled

D.

Access to configuration files Is restricted.

An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?

A.

Attack vectors are evolving for industrial control systems.

B.

There is a greater risk of system exploitation.

C.

Disaster recovery plans (DRPs) are not in place.

D.

Technical specifications are not documented.

What is the MAIN reason to use incremental backups?

A.

To improve key availability metrics

B.

To reduce costs associates with backups

C.

To increase backup resiliency and redundancy

D.

To minimize the backup time and resources

During the planning stage of a compliance audit, an IS auditor discovers that a bank's inventory of compliance requirements does not include recent regulatory changes related to managing data risk. What should the auditor do FIRST?

A.

Ask management why the regulatory changes have not been Included.

B.

Discuss potential regulatory issues with the legal department

C.

Report the missing regulatory updates to the chief information officer (CIO).

D.

Exclude recent regulatory changes from the audit scope.

An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?

A.

A single point of failure for both voice and data communications

B.

Inability to use virtual private networks (VPNs) for internal traffic

C.

Lack of integration of voice and data communications

D.

Voice quality degradation due to packet toss

A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?

A.

Compare the agile process with previous methodology.

B.

Identify and assess existing agile process control

C.

Understand the specific agile methodology that will be followed.

D.

Interview business process owners to compile a list of business requirements

Which of the following responses to risk associated with separation of duties would incur the LOWEST initial cost?

A.

Risk mitigation

B.

Risk acceptance

C.

Risk transference

D.

Risk reduction

An IS auditor is assessing backup performance and observes that the system administrator manually initiates backups during unexpected peak usage. Which of the following is the auditor's BEST course of action?

A.

Review separation of duties documentation.

B.

Verify the load balancer configuration.

C.

Recommend using cloud-based backups.

D.

Inspect logs to verify timely execution of backups.

An organization is planning to implement a control self-assessment (CSA) program for selected business processes. Which of the following should be the role of the internal audit team for this program?

A.

Perform testing to validate the accuracy of management's self-assessment.

B.

Advise management on the self-assessment process.

C.

Design testing procedures for management to assess process controls effectively.

D.

De-scope business processes to be covered by CSAs from future audit plans.

Which of the following should be of MOST concern to an IS auditor when reviewing an intrusion detection system (IDS)?

A.

High false-positive rate

B.

Delay in signature updates

C.

High false-negative rate

D.

Decrease in processing speed

A mission-critical application utilizes a one-node database server. On multiple occasions, the database service has been stopped to perform routine patching, causing application outages. Which of the following should be the IS auditor’s GREATEST concern?

A.

Revenue lost due to application outages

B.

Patching performed by the vendor

C.

A large number of scheduled database changes

D.

The presence of a single point of failure

An IS auditor is reviewing the service management of an outsourced help desk. Which of the following is the BEST indicator of how effectively the service provider is performing this function?

A.

Average ticket age

B.

Number of calls worked

C.

Customer satisfaction ratings

D.

Call transcript reviews

Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?

A.

Enhancing the design of data visualization

B.

Increasing speed and efficiency of audit procedures

C.

Confirming completeness and accuracy

D.

Decreasing the time for data analytics execution

Which of the following is the BEST control to help ensure the completeness of outbound transactions?

A.

Perform edit checks to identify erroneous, unusual, or invalid transactions.

B.

Verify transactions are sequentially numbered in the header record.

C.

Ensure the validity of the recipient ID and use auto-numbered reports.

D.

Maintain a log of the number of messages sent and validate periodically.

Which of the following is the MOST likely root cause of shadow IT in an organization?

A.

Lengthy approval for technology investment

B.

The opportunity to reduce software license fees

C.

Ease of use for cloud-based applications and services

D.

Approved software not meeting user requirements

Which of the following is the PRIMARY objective of performing quality assurance (QA) in a system development process?

A.

To ensure that expected benefits have been realized

B.

To ensure the developed system meets business requirements

C.

To ensure the developed system integrates well with another system

D.

To help determine high-level requirements for the new system

Which of the following is MOST important to consider when determining the usefulness of audit evidence?

A.

Timing of the evidence

B.

Nature of evidence gathered

C.

Overall objectives of the review

D.

Competence of the IS auditor

A system performance dashboard indicates several application servers are reaching the defined threshold for maximum CPU allocation. Which of the following would be the IS auditor's BEST recommendation for the IT department?

A.

Increase the defined processing threshold to reflect capacity consumption during normal operations.

B.

Notify end users of potential disruptions caused by degradation of servers.

C.

Terminate both ingress and egress connections of these servers to avoid overload.

D.

Validate the processing capacity of these servers is adequate to complete computing tasks.

As part of an audit response, an auditee has concerns with the recommendations and is hesitant to implement them. Which of the following is the BEST course of action for the IS auditor?

A.

Accept the auditee's response and perform additional testing.

B.

Suggest hiring a third-party consultant to perform a current state assessment.

C.

Conduct further discussions with the auditee to develop a mitigation plan.

D.

Issue a final report without including the opinion of the auditee.

An IS auditor observes that a large number of departed employees have not been removed from the accounts payable system. Which of the following is MOST important to determine in order to assess the risk1?

A.

The frequency of user access reviews performed by management

B.

The frequency of intrusion attempts associated with the accounts payable system

C.

The process for terminating access of departed employees

D.

The ability of departed employees to actually access the system

Which of the following BEST indicates a need to review an organization's information security policy?

A.

High number of low-risk findings in the audit report

B.

Increasing exceptions approved by management

C.

Increasing complexity of business transactions

D.

Completion of annual IT risk assessment

Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's incident response management program?

A.

All incidents have a severity level assigned.

B.

All identified incidents are escalated to the CEO and the CISO.

C.

Incident response is within defined service level agreements (SLAs).

D.

The alerting tools and incident response team can detect incidents.

The following findings are the result of an IS auditor’s post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?

A.

A lessons learned session was never conducted.

B.

Monthly dashboards did not always contain deliverables.

C.

The project’s 10% budget overrun was not reported to senior management.

D.

Measurable benefits were not defined.

Which type of control has been established when an organization implements a security information and event management (SIEM) system?

A.

Preventive

B.

Detective

C.

Directive

D.

Corrective

Which of the following responsibilities associated with a disaster recovery plan (DRP) can be outsourced to a Disaster Recovery as a Service (DRaaS) provider?

A.

System recovery procedures

B.

Stakeholder communications during a disaster

C.

Validation of recovered data

D.

Processes for maintaining currency of data

Which of the following is the MOST effective way to ensure adequate system resources are available for high-priority activities?

A.

System virtualization

B.

Job scheduling

C.

Zero Trust

D.

Code optimization

Which of the following is the BEST reason for software developers to use automated testing versus manual testing?

A.

CAATs are easily developed

B.

Improved regression testing

C.

Ease of maintaining automated test scripts

D.

Reduces the scope of acceptance testing

Which of the following is the MOST important consideration to facilitate prosecution of a perpetrator after a cybercrime?

A.

An active intrusion detection system (IDS)

B.

Professional collection of unaltered evidence

C.

Reporting to the internal legal department

D.

Immediate law enforcement involvement

What is the purpose of hashing a document?

A.

To prevent unauthorized disclosure of the contents

B.

To validate the integrity of the file contents

C.

To classify the file for internal use only

D.

To compress the size of the file

An IS auditor is reviewing a medical device that is attached to a patient’s body, which automatically takes and uploads measurements to a cloud server. Treatment may be updated based on the measurements. Which of the following should be the auditor's PRIMARY focus?

A.

Physical access controls on the device

B.

Security and quality certification of the device

C.

Device identification and authentication

D.

Confirmation that the device is regularly updated

Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization's enterprise architecture (EA) program?

A.

IT application owners have sole responsibility for architecture approval.

B.

The architecture review board is chaired by the CIO.

C.

Information security requirements are reviewed by the EA program.

D.

The EA program governs projects that are not IT-related.

Which of the following is the BEST method for converting system-generated log files into a format suitable for data analysis?

A.

Extraction

B.

Data acquisition

C.

Imaging

D.

Normalization

Which of the following is PRIMARILY used in blockchain technology to create a distributed immutable ledger?

A.

Artificial intelligence (Al)

B.

Application hardening

C.

Edge computing

D.

Encryption

An organization has implemented a new data classification scheme and asks the IS auditor to evaluate its effectiveness. Which of the following would be of

GREATEST concern to the auditor?

A.

End-user managers determine who should access what information.

B.

The organization has created a dozen different classification categories.

C.

The compliance manager decides how the information should be classified.

D.

The organization classifies most of its information as confidential.

Which of the following is the BEST control to help ensure that security requirements are considered throughout the life cycle of an agile software development project?

A.

Documenting security control requirements and obtaining internal audit sign off

B.

Including project team members who can provide security expertise

C.

Reverting to traditional waterfall software development life cycle (SDLC) techniques

D.

Requiring the project to go through accreditation before release into production

Which of the following is the PRIMARY purpose of a business impact analysts (BIA) in an organization's overall risk management strategy?

A.

Evaluating business investment opportunities for the organization

B.

Identifying critical business processes to effectively prioritize recovery efforts

C.

Ensuring compliance with regulations through regular audits

D.

Conducting vulnerability assessments to enhance network security measures

Which of the following MOST effectively reduces the probability of a brute force attack being successful?

A.

Establishing account activity timeouts

B.

Establishing an account lockout policy

C.

Increasing password change frequency

D.

Requiring minimum password length

Which of the following is the PRIMARY benefit of monitoring IT operational logs?

A.

Detecting processing errors in a timely manner

B.

Identifying configuration flaws in operating systems

C.

Managing the usability and capacity of IT resources

D.

Generating exception reports to assess security compliance

Who is responsible for defining data access permissions?

A.

IT operations manager

B.

Data owner

C.

Database administrator (DBA)

D.

Information security manager

Which of the following controls would BEST help a forensic investigator prevent modifications in digital evidence?

A.

Write-protecting media that contains evidence

B.

Creating digital images of the media that contains evidence

C.

Generating hash values of evidence files on media

D.

Maintaining the chain of custody for digital evidence