An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization's disaster recovery plan (DRP)?
Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?
An organization plans to replace its nightly batch processing backup to magnetic tape with real-time replication to a second data center. Which of the following is the GREATEST risk associated with this change?
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?
Which of the following would BEST indicate the effectiveness of a security awareness training program?
Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?
An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.
Which of the following is the BEST course of action to address this issue?
Which of the following is the BEST point in time to conduct a post-implementation review?
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
Which of the following is the MOST effective control over visitor access to highly secured areas?
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
Which type of attack targets security vulnerabilities in web applications to gain access to data sets?
An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?
Which of the following is MOST critical to the success of an information security program?
Which of the following metrics is the BEST indicator of the performance of a web application
An IS auditor has been tasked with auditing the inventory control process for a large organization that processes millions of data transactions. Which of the following is the BEST testing strategy to adopt?
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls?
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
Which of the following is the BEST way for an IS auditor to assess the design of an automated application control?
Which of the following is the BEST indication of effective governance over IT infrastructure?