An IS auditor is planning a review of an organizations cybersecurity incident response maturity Which of the following methodologies would provide the MOST reliable conclusions?
Which of the following controls is the BEST recommendation to prevent the skimming of debit or credit card data in point of sale (POS) systems?
What should be the PRIMARY focus during a review of a business process improvement project?
Which of the following is the MAIN objective of enterprise architecture (EA) governance?
An IS auditor is reviewing a data conversion project. Which of the following is the auditor's BEST recommendation prior to go-live?
Which of the following is an IS auditor's BEST recommendation for mitigating risk associated with inadvertent disclosure of sensitive information by employees?
Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?
An IS auditor is reviewing an IT project and finds that an earned value analysis (EVA) is not regularly performed as part of project status reporting. Which of the following is the GREATEST risk resulting from this situation?
Which of the following is MOST important to include when developing a business continuity plan (BCP)?
Which of the following is the BEST disposal method for flash drives that previously stored confidential data?
Which of the following establishes the PRIMARY difference between a business continuity plan (BCP) and a disaster recovery plan (DRP)?
An organization's payroll department recently implemented a new Software as a Service (SaaS) tool for payment processing. Which of the following audits is MOST appropriate for an IS auditor to validate that the new tool is configured as expected to meet performance requirements?
Which of the following is MOST important to the effectiveness of smoke detectors installed in a data processing facility?
In an annual audit cycle, the audit of an organization's IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
When auditing the adequacy of a cooling system for a data center, which of the following is MOST important for the IS auditor to review?
Which of the following poses the GREATEST potential concern for an organization that decides to consolidate mission-critical applications on a large server as part of IT capacity management?
Which of the following is the PRIMARY benefit of benchmarking an organization's software development lifecycle practices against a capability maturity model?
Which of the following is the BEST source of organizational direction on when to use cloud services?
An IS auditor is reviewing how password resets are performed for users working remotely. Which type of documentation should be requested to understand the detailed steps required for this activity?
Which of the following threats is mitigated by a firewall?
An organization is permanently transitioning from onsite to fully remote business operations. When should the existing business impact analysis (BIA) be reviewed?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
Which type of testing is used to identify security vulnerabilities in source code in the development environment?
Which of the following measures BEST mitigates the risk of data exfiltration during a cyberattack?
Which of the following is the BEST approach to help organizations address risks associated with shadow IT?
An organization is planning to implement a control self-assessment (CSA) program tor selected business processes Which of the following should be the role of the internal audit team for this program?
Which of the following is the BEST metric to measure the quality of software developed in an organization?
Attribute sampling is BEST suited to estimate:
Who is accountable for an organization's enterprise risk management (ERM) program?
Which of the following should be an IS auditor's PRIMARY focus when auditing the implementation of a new IT operations performance monitoring system?
An IS auditor is assessing an organization's DevSecOps approach. Which of the following BEST indicates a proactive approach to identifying vulnerabilities?
An IS auditor wants to verify alignment of the organization's business continuity plan (BCP) with the business strategy. Which of the following would be MOST helpful to review?
Which of the following is an IS auditor's BEST course of action when the auditee indicates that a corrective action plan for a high-risk finding will take longer than expected?
During an organization's implementation of a data loss prevention (DLP) solution, which of the following activities should be completed FIRST?
Which of the following observations should be of GREATEST concern to an IS auditor assessing access controls for the accounts payable module of a finance system?
Which of the following BEST indicates to an IS auditor that an organization handles emergency changes appropriately and transparently?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?
Which of the following BEST facilitates the legal process in the event of an incident?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?