Certified Information Systems Auditor Questions and Answers
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
IT disaster recovery time objectives (RTOs) should be based on the:
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following BEST Indicates that an incident management process is effective?
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
In a RAO model, which of the following roles must be assigned to only one individual?
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?
A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?
Which of the following is the MAIN purpose of an information security management system?
Which of the following is a detective control?
Which of the following documents should specify roles and responsibilities within an IT audit organization?
Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization's security policy?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
Providing security certification for a new system should include which of the following prior to the system's implementation?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
Which of the following is MOST important to consider when scheduling follow-up audits?
During an audit of a multinational bank's disposal process, an IS auditor notes several findings. Which of the following should be the auditor's GREATEST concern?
Which of the following security risks can be reduced by a property configured network firewall?
The PRIMARY focus of a post-implementation review is to verify that:
Which of the following is a social engineering attack method?
An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed Which of the following is the MOST important requirement to include In the vendor contract to ensure continuity?
In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
Which of the following is an example of a preventative control in an accounts payable system?
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
Which of the following is the BEST reason for an organization to use clustering?
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
In order to be useful, a key performance indicator (KPI) MUST
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
Which of the following is the MOST important activity in the data classification process?
Which of the following should be the PRIMARY objective of conducting an audit follow-up of management action plans?
A programmer has made unauthorized changes to key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this
problem?
An IS auditor is tasked to review an organization's plan-do-check-act (PDCA) method for improving IT-related processes and wants to determine the accuracy of defined targets to be achieved. Which of the following steps in the PDCA process should the auditor PRIMARILY focus on in this situation?
Which of the following would a digital signature MOST likely prevent?
Which of the following BEST indicates that the effectiveness of an organization's security awareness program has improved?
An organization allows programmers to change production systems in emergency situations without seeking prior approval. Which of the following controls should an IS auditor consider MOST
important?
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
Which of the following is MOST important when creating a forensic image of a hard drive?
Which of the following is the MOST important consideration when developing tabletop exercises within a cybersecurity incident response plan?
An IS auditor is reviewing a medical device that is attached to a patient’s body, which automatically takes and uploads measurements to a cloud server. Treatment may be updated based on the measurements. Which of the following should be the auditor's PRIMARY focus?
Which of the following is the PRIMARY advantage of using an automated security log monitoring tool instead of conducting a manual review to monitor the use of privileged access?
When designing metrics for information security, the MOST important consideration is that the metrics:
When reviewing hard disk utilization reports, an IS auditor observes that utilization is routinely above 95%. Which of the following should be the GREATEST concern to the IS auditor?
Which of the following criteria is MOST important for the successful delivery of benefits from an IT project?
An IS audit manager is preparing the staffing plan for an audit engagement of a cloud service provider. What should be the manager's PRIMARY concern when being made aware that a new
auditor in the department previously worked for this provider?
An organization has both an IT strategy committee and an IT steering committee. When reviewing the minutes of the IT steering committee, an IS auditor would expect to find that the
committee:
Which type of threat can utilize a large group of automated social media accounts to steal data, send spam, or launch distributed denial of service (DDoS) attacks?
An IS auditor is reviewing a network diagram. Which of the following would be the BEST location for placement of a firewall?
When designing a data analytics process, which of the following should be the stakeholder's role in automating data extraction and validation?
Which of the following BEST ensures that effective change management is in place in an IS environment?
An external attacker spoofing an internal Internet Protocol (IP) address can BEST be detected by which of the following?
Which of the following should be of GREATEST concern to an IS auditor assessing an organization's patch management program?
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
When planning a review of IT governance, an IS auditor is MOST likely to:
Data from a system of sensors located outside of a network is received by the open ports on a server. Which of the following is the BEST way to ensure the integrity of the data being collected from the sensor system?
A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:
Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?
A global bank plans to use a cloud provider for backup of customer financial data. Which of the following should be the PRIMARY focus of this project?
A startup organization wants to develop a data loss prevention (DLP) program. The FIRST step should be to implement:
Which of the following controls helps to ensure that data extraction queries run by the database administrator (DBA) are monitored?
During a follow-up engagement, an IS auditor confirms evidence of a problem that was not an issue in the original audit. Which of the following is the auditor's BEST course of action?
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
An IS auditor is supporting a forensic investigation. An image of affected storage media has been captured while collecting digital forensic evidence. Which of the following techniques would BEST enable an IS auditor to verify that the captured image is an exact, unchanged replica of the original media?
Which of the following should be the PRIMARY focus when communicating an IS audit issue to management?
The MOST important measure of the effectiveness of an organization's security program is the:
Which of the following is the MOST effective way to evaluate the physical security of a data center?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?
Which of the following presents the GREATEST risk to an organization's ability to manage quality control (QC) processes?
Who is accountable for an organization's enterprise risk management (ERM) program?
Which of the following is the PRIMARY reason an IS auditor would recommend offsite backups although critical data is already on a redundant array of inexpensive disks (RAID)?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
An IS auditor finds that the cost of developing an application is now projected to significantly exceed the budget. Which of the following is the GREATEST risk to communicate to senior management?
Following an IT audit, management has decided to accept the risk highlighted in the audit report. Which of the following would provide the MOST assurance to the IS auditor that management
is adequately balancing the needs of the business with the need to manage risk?
Which of the following BEST enables an IS auditor to combine and compare access control lists from various applications and devices?
The process of applying a hash function to a message and obtaining and ciphering a digest refers to:
At the end of each business day, a business-critical application generates a report of financial transac-tions greater than a certain value, and an employee
then checks these transactions for errors. What type of control is in place?
In a review of the organization standards and guidelines for IT management, which of the following should be included in an IS development methodology?
Which of the following provides the BEST evidence that system requirements are met when evaluating a project before implementation?
During which phase of the software development life cycle should an IS auditor be consulted to recommend security controls?
Which of the following components of a risk assessment is MOST helpful to management in determining the level of risk mitigation to apply?
Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?
Which of the following audit procedures would provide the BEST assurance that an application program is functioning as designed?
During an IS audit of a data center, it was found that programmers are allowed to make emergency fixes to operational programs. Which of the following should be the IS auditor's PRIMARY recommendation?
An IS auditor has been asked to provide support to the control self-assessment (CSA) program. Which of the following BEST represents the scope of the auditor’s role in the program?
Which of the following should be used as the PRIMARY basis for prioritizing IT projects and initiatives?
In reviewing the IT strategic plan, the IS auditor should consider whether it identifies the:
An organization offers an e-commerce platform that allows consumer-to-consumer transactions. The platform now uses blockchain technology to ensure the parties are unable to deny the transactions. Which of the following attributes BEST describes the risk element that this technology is addressing?
An IS auditor finds that a recently deployed application has a number of developers with inappropriate update access left over from the testing environment. Which of the following would have BEST prevented the update access from being migrated?
Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?
Which of the following provides the BE ST method for maintaining the security of corporate applications pushed to employee-owned mobile devices?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
Which of the following is the MAIN responsibility of the IT steering committee?
Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
Which of the following is an IS auditor's BEST recommendation to mitigate the risk of eavesdropping
associated with an application programming interface (API) integration implementation?
Which of the following is the BEST indication of effective governance over IT infrastructure?
Which of the following is the BEST way for an IS auditor to assess the design of an automated application control?
An IT strategic plan that BEST leverages IT in achieving organizational goals will include:
Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?
During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?
A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?
The PRIMARY purpose of an incident response plan is to:
An IS auditor should be MOST concerned if which of the following fire suppression systems is utilized to protect an asset storage closet?
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change
management process?
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
Which of the following should an IS auditor use when verifying a three-way match has occurred in an enterprise resource planning (ERR) system?
A national tax administration agency with a distributed network experiences service disruptions due to a large influx of traffic to a regional office near the end of each year. Which of the following would BEST enable the agency to improve the performance of its servers during the busy period?
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?
What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?
Which of the following would minimize the risk of losing transactions as a result of a disaster?
Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics
system?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization's patch management process?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
The use of control totals reduces the risk of:
Which of the following is the MOST important consideration when establishing vulnerability scanning on critical IT infrastructure?
An organization has shifted from a bottom-up approach to a top-down approach in the development of IT policies. This should result in:
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor's NEXT step should be to:
Which of the following BEST enables a benefits realization process for a system development project?
An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization's goals and strategic objectives?
When reviewing past results of a recurring annual audit, an IS auditor notes that findings may not have been reported and independence may not have been maintained. Which of the following is the auditor's BEST course of action?
In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?
Which of the following BEST enables an organization to improve the effectiveness of its incident response team?
Which of the following is the MOST important advantage of participating in beta testing of software products?
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
An IS auditor determines that the vendor's deliverables do not include the source code for a newly acquired product. To address this issue, which of the following should the auditor recommend be included in the contract?
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
In a large organization, IT deadlines on important projects have been missed because IT resources are not prioritized properly. Which of the following is the BEST recommendation to address this problem?
An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor's independence?
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?
The FIRST step in an incident response plan is to:
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls?
Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
Which of the following is MOST important to ensure when developing an effective security awareness program?
Which of the following is the BEST reason to implement a data retention policy?
Which of the following BEST demonstrates to senior management and the board that an audit function is compliant with standards and the code of ethics?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
Which of the following components of a risk assessment is MOST helpful to management in determining the level of risk mitigation to apply?
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
Cross-site scripting (XSS) attacks are BEST prevented through:
Which of the following BEST guards against the risk of attack by hackers?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
Which of the following demonstrates the use of data analytics for a loan origination process?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
Which of the following is MOST important with regard to an application development acceptance test?
An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
Which of the following BEST indicates the effectiveness of an organization's risk management program?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
Which of the following is MOST important to ensure when planning a black box penetration test?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
Which of the following is the GREATEST concern associated with a high number of IT policy exceptions approved by management?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
A proper audit trail of changes to server start-up procedures would include evidence of:
Which of the following is MOST helpful to an IS auditor when assessing the effectiveness of controls?
Which of the following provides the BEST assurance of data integrity after file transfers?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's data conversion and infrastructure migration plan?
A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?
Which of the following should an IS auditor review when evaluating information systems governance for a large organization?
Which of the following BEST enables alignment of IT with business objectives?
An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?
An IS auditor is reviewing a bank's service level agreement (SLA) with a third-party provider that hosts the bank's secondary data center, which of the following findings should be of GREATEST concern to the auditor?
Which of the following would BEST help to ensure that an incident receives attention from appropriate personnel in a timely manner?
An IS auditor conducts a review of a third-party vendor's reporting of key performance indicators (KPIs) Which of the following findings should be of MOST concern to the auditor?
Which of the following is MOST important for an IS auditor to verify when reviewing the use of an outsourcer for disposal of storage media?
In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?
Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?
Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?
Which of the following BEST addresses the availability of an online store?
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
Which of the following is the BEST method to delete sensitive information from storage media that will be reused?
After delivering an audit report, the audit manager discovers that evidence was overlooked during the audit This evidence indicates that a procedural control may have failed and could contradict a conclusion of the audit Which of the following risks is MOST affected by this oversight?
A firewall between internal network segments improves security and reduces risk by:
Which of the following is the BEST indication of effective IT investment management?
The PRIMARY purpose of requiring source code escrow in a contractual agreement is to:
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
What is the PRIMARY purpose of performing a parallel run of a now system?
An IS auditor is reviewing an organization's business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor's GREATEST concern?
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization's objectives?
Which of the following can only be provided by asymmetric encryption?
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
The FIRST step in auditing a data communication system is to determine:
When classifying information, it is MOST important to align the classification to:
in a post-implantation Nation review of a recently purchased system it is MOST important for the iS auditor to determine whether the:
Which of the following is the BEST performance indicator for the effectiveness of an incident management program?
Which of the following is MOST important to consider when developing a service level agreement (SLAP)?
Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?
An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country.
What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted
application?
Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?
Which type of device sits on the perimeter of a corporate of home network, where it obtains a public IP address and then generates private IP addresses internally?
Email required for business purposes is being stored on employees' personal devices.
Which of the following is an IS auditor's BEST recommendation?
During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor's BEST course of action?
Which of the following would be the BEST process for continuous auditing to a large financial Institution?
Which of the following is an IS auditor's BEST approach when prepanng to evaluate whether the IT strategy supports the organization's vision and mission?
In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?
An IS auditor finds that while an organization's IT strategy is heavily focused on research and development, the majority of protects n the IT portfolio focus on operations and maintenance. Which of the Mowing is the BEST recommendation?
Which of the following would protect the confidentiality of information sent in email messages?
Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
Which of the following BEST protects evidence in a forensic investigation?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
An IS auditor Is renewing the deployment of a new automated system Which of the following findings presents the MOST significant risk?
Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?
In the development of a new financial application, the IS auditor's FIRST involvement should be in the:
What is the PRIMARY benefit of using one-time passwords?
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''
Which of the following is a PRIMARY responsibility of an IT steering committee?
Which of the following management decisions presents the GREATEST risk associated with data leakage?
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
Which of the following is the BEST source of information for examining the classification of new data?
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
Which of the following backup schemes is the BEST option when storage media is limited?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following is MOST important when implementing a data classification program?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
The PRIMARY benefit of information asset classification is that it:
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
The PRIMARY objective of value delivery in reference to IT governance is to:
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following is MOST important when planning a network audit?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
The PRIMARY role of a control self-assessment (CSA) facilitator is to:
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?