Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
Which of the following would be MOST useful when analyzing computer performance?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
Which of the following is MOST important when planning a network audit?
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?
Which of the following BEST helps to ensure data integrity across system interfaces?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following is necessary for effective risk management in IT governance?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following is a corrective control?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?