Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
Which of the following is MOST important when implementing a data classification program?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Which of the following MOST effectively minimizes downtime during system conversions?
Which of the following BEST guards against the risk of attack by hackers?
An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
Which of the following BEST indicates the effectiveness of an organization's risk management program?
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
Which of the following should be an IS auditor's GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
Which of the following would be a result of utilizing a top-down maturity model process?
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
The PRIMARY advantage of object-oriented technology is enhanced:
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?