Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
Which of the following is the GREATEST concern associated with a high number of IT policy exceptions approved by management?
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor's NEXT course of action?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
The implementation of an IT governance framework requires that the board of directors of an organization:
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
Which of the following data would be used when performing a business impact analysis (BIA)?
What is MOST important to verify during an external assessment of network vulnerability?
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?
Which of the following is MOST important to consider when developing a service level agreement (SLAP)?
Which of the following is the PRIMARY role of key performance indicators (KPIs) in supporting business process effectiveness?
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
A new system development project is running late against a critical implementation deadline Which of the following is the MOST important activity?
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''
The PRIMARY purpose of a configuration management system is to:
Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?
Which of the following should be of GREATEST concern to an |$ auditor reviewing data conversion and migration during the implementation of a newapplication system?
A web proxy server for corporate connections to external resources reduces organizational risk by:
Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves
for care?
An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?
During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor's BEST course of action?
Which of the following is the MAJOR advantage of automating internal controls?
What is the PRIMARY purpose of performing a parallel run of a now system?
Due to advancements in technology and electronic records, an IS auditor has completed an engagement by email only. Which of the following did the IS auditor potentially compromise?
An IS auditor is preparing a plan for audits to be carried out over a specified period. Which of the following activities should the IS auditor perform FIRST?
Which of the following is MOST important during software license audits?
Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization's configuration and release management process?
Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?
The PRIMARY purpose of requiring source code escrow in a contractual agreement is to: