What is the PRIMARY benefit of using one-time passwords?
Afire alarm system has been installed in the computer room The MOST effective location for the fire alarm control panel would be inside the
An IS auditor is reviewing an organization's business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor's GREATEST concern?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?
An IS auditor is reviewing the service agreement with a technology company that provides IT help desk services to the organization. Which of the following monthly performance
metrics is the BEST indicator of service quality?
Which of the following is the MOST appropriate indicator of change management effectiveness?
Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
A computer forensic audit is MOST relevant in which of the following situations?
Which of the following is the BEST way to detect unauthorized copies of licensed software on systems?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?
An IS auditor requests direct access to data required to perform audit procedures instead of asking management to provide the data Which of the following is the PRIMARY advantage of this approach?
Which of the following is the MOST important outcome of an information security program?
Audit frameworks cart assist the IS audit function by:
During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor's BEST course of action?
Which of the following BEST protects evidence in a forensic investigation?
Which of the following is MOST important for an IS auditor to review when determining whether IT investments are providing value to tie business?
Which type of risk would MOST influence the selection of a sampling methodology?
An organization is disposing of removable onsite media which contains sensitive information. Which of the following is the MOST effective method to prevent disclosure of sensitive data?
An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization's payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management
experience. What is the BEST course of action?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor's BEST course of action?
Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?
Which of the following BEST enables an organization to improve the effectiveness of its incident response team?
Which of the following provides the GREATEST assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
An IS auditor determines that the vendor's deliverables do not include the source code for a newly acquired product. To address this issue, which of the following should the auditor recommend be included in the contract?
A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?
An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?
Which of the following is MOST important to ensure when developing an effective security awareness program?
A bank performed minor changes to the interest calculation computer program. Which of the following techniques would provide the STRONGEST evidence to determine whether the interest calculations are correct?
Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:
In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?
Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?
The use of control totals reduces the risk of:
An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor's NEXT course of action?
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor's NEXT course of action?
An organization has shifted from a bottom-up approach to a top-down approach in the development of IT policies. This should result in:
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
IT governance should be driven by:
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization's security policy?
While auditing a small organization's data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?