An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
Which of the following is the STRONGEST indication of a mature risk management program?
Data from a system of sensors located outside of a network is received by the open ports on a server. Which of the following is the BEST way to ensure the integrity of the data being collected from the sensor system?
An organization has shifted from a bottom-up approach to a top-down approach in the development of IT policies. This should result in:
Which of the following should an IS auditor review when evaluating information systems governance for a large organization?
What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?
Which of the following is the MAIN objective of enterprise architecture (EA) governance?
Which of the following BEST enables an IS auditor to assess whether jobs were completed according to the job schedule?
Which of the following procedures for testing a disaster recovery plan (DRP) is MOST effective?
Which of the following is the MOST efficient way to identify fraudulent activity on a set of transactions?
Which of the following is the MOST effective control when granting access to a service provider for a ctoud-6ased application?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT-related customer service project?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
A new system development project is running late against a critical implementation deadline. Which of the following is the MOST important activity?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's mobile device policies and controls in its corporate environment?
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
When drafting a disaster recovery strategy, what should be the MOST important outcome of a business impact analysis (BIA)?
An IS auditor determines elevated administrator accounts for servers that are not properly checked out and then back in after each use. Which of the following is the MOST appropriate sampling technique to determine the scope of the problem?
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Which of the following is the BEST disposal method for flash drives that previously stored confidential data?
Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?
Which of the following would be a result of utilizing a top-down maturity model process?
An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?
An IT strategic plan that BEST leverages IT in achieving organizational goals will include:
Which of the following BEST contributes to the quality of an audit of a business-critical application?
An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor's independence?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
Which of the following should an IS auditor use when verifying a three-way match has occurred in an enterprise resource planning (ERR) system?
Which of the following should be an IS auditor's GREATEST concern when assessing an IT service configuration database?
Which of the following is the BEST way to mitigate risk to an organization's network associated with devices permitted under a bring your own device (BYOD) policy?
Which of the following should be of GREATEST concern for an IS auditor when reviewing user account policies?
Which of the following MOST effectively minimizes downtime during system conversions?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
The implementation of an IT governance framework requires that the board of directors of an organization:
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
Which of the following would provide management with the MOST reasonable assurance that a new data warehouse will meet the needs of the
organization?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?
Which of the following is the MOST effective way for an organization to project against data loss?
Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?
Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor's NEXT course of action?
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following is MOST important with regard to an application development acceptance test?
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
Which of the following data would be used when performing a business impact analysis (BIA)?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
Secure code reviews as part of a continuous deployment program are which type of control?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?
Which of the following findings from an IT governance review should be of GREATEST concern?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?
An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?
The GREATEST benefit of using a polo typing approach in software development is that it helps to:
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed?
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?
Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
Which of the following documents should specify roles and responsibilities within an IT audit organization?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
Providing security certification for a new system should include which of the following prior to the system's implementation?
In a RAO model, which of the following roles must be assigned to only one individual?
An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
Which of the following concerns is BEST addressed by securing production source libraries?
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
Which of the following is the BEST reason for an organization to use clustering?
Which of the following is the GREATEST risk associated with storing customer data on a web server?
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
Which of the following is MOST helpful for measuring benefits realization for a new system?
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
In an online application which of the following would provide the MOST information about the transaction audit trail?
The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor's NEXT course of action?
An IS auditor reviewing a job scheduling tool notices performance and reliability problems. Which of the following is MOST likely affecting the tool?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics
system?
Which of the following is the BEST performance indicator for the effectiveness of an incident management program?
When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:
The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?
Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?
Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?
Which of the following is the BEST approach for determining the overall IT risk appetite of an organization when business units use different methods formanaging IT risks?
What should an IS auditor do FIRST when a follow-up audit reveals some management action plans have not been initiated?
Which of the following is MOST important for an IS auditor to validate when auditing network device management?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?
Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?
Controls related to authorized modifications to production programs are BEST tested by:
A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
Which of the following are used in a firewall to protect the entity's internal resources?
An IS auditor conducts a review of a third-party vendor's reporting of key performance indicators (KPIs) Which of the following findings should be of MOST concern to the auditor?
Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?
Email required for business purposes is being stored on employees' personal devices.
Which of the following is an IS auditor's BEST recommendation?
An IS auditor is preparing a plan for audits to be carried out over a specified period. Which of the following activities should the IS auditor perform FIRST?
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?
An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data
classification in this project?
An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?
An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor's NEXT course of action?
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization's disaster recovery plan (DRP)?
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
Which of the following is the BEST indication of effective IT investment management?
Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?
Which of the following provides the BEST assurance of data integrity after file transfers?
The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:
An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?
Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization's objectives?
Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?
An IS auditor notes that not all security tests were completed for an online sales system recently promoted to production. Which of the following is the auditor's BEST course of action?
As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (B1A)?
Which of the following provides a new IS auditor with the MOST useful information to evaluate overall IT performance?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
After delivering an audit report, the audit manager discovers that evidence was overlooked during the audit This evidence indicates that a procedural control may have failed and could contradict a conclusion of the audit Which of the following risks is MOST affected by this oversight?
When assessing whether an organization's IT performance measures are comparable to other organizations in the same industry, which of the following would be MOST helpful to review?
An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?
Which of the following technologies has the SMALLEST maximum range for data transmission between devices?
Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?
A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?
An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
An organization plans to replace its nightly batch processing backup to magnetic tape with real-time replication to a second data center. Which of the following is the GREATEST risk associated with this change?
Which of the following is the BEST way to ensure an organization's data classification policies are preserved during the process of data transformation?
Which of the following would BEST indicate the effectiveness of a security awareness training program?
An IS auditor has identified deficiencies within the organization's software development life cycle policies. Which of the following should be done NEXT?
In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?
Which of the following is MOST likely to be a project deliverable of an agile software development methodology?
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
A proper audit trail of changes to server start-up procedures would include evidence of:
Which of the following security risks can be reduced by a property configured network firewall?
Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves
for care?
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?
An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application's operating system?
The use of control totals satisfies which of the following control objectives?
When assessing a proposed project for the two-way replication of a customer database with a remote call center, the IS auditor should ensure that:
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's data conversion andinfrastructure migration plan?
An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS
An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor's NEXT action1?
An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?
Which of the following should be of GREATEST concern to an IS auditor when auditing an organization's IT strategy development process?
Which of the following is the BEST way to prevent social engineering incidents?
An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?
Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?
Which of the following should be an IS auditor's PRIMARY focus when evaluating the response process for cybercrimes?
Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
Due to advancements in technology and electronic records, an IS auditor has completed an engagement by email only. Which of the following did the IS auditor potentially compromise?
An IS auditor is asked to review an organization's technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
An IS auditor evaluating the change management process must select a sample from the change log. What is the BEST way to the auditor to confirm the change log is complete?
Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?
An IS auditor is reviewing an organization's business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor's GREATEST concern?
Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?
Which of following is MOST important to determine when conducting a post-implementation review?
In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?
Which of the following would be the BEST process for continuous auditing to a large financial Institution?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
Which of the following is the MOST important prerequisite for implementing a data loss prevention (DLP) tool?
Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?
Which of the following should be identified FIRST during the risk assessment process?
Which of the following would be an auditor's GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?
Which of the following BEST demonstrates to senior management and the board that an audit function is compliant with standards and the code of ethics?
To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization's goals and strategic objectives?
When reviewing past results of a recurring annual audit, an IS auditor notes that findings may not have been reported and independence may not have been maintained. Which of the following is the auditor's BEST course of action?
An organization considering the outsourcing of a business application should FIRST:
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
Which of the following is MOST critical to the success of an information security program?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?
Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
When reviewing a business case for a proposed implementation of a third-party system, which of the following should be an IS auditor's GREATEST concern?
When planning an internal penetration test, which of the following is the MOST important step prior to finalizing the scope of testing?
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?
An IS auditor is reviewing an organization's business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?
An organization uses public key infrastructure (PKI) to provide email security. Which of the following would be the MOST efficient method to determine whether email messages have been modified in transit?
An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
Which of the following is an example of a preventive control for physical access?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor's BEST course of action?
Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?
A national bank recently migrated a large number of business-critical applications to the cloud. Which of the following is MOST important to ensuring the resiliency of the applications?
Which of the following is the MOST important consideration when defining an operational log management strategy?
Which of the following BEST indicates to an IS auditor that an organization handles emergency changes appropriately and transparently?
Which of the following is the BEST reason for software developers to use automated testing versus manual testing?
Which of the following would BEST reduce the risk of application programming interface (API) unavailability?
A network analyst is monitoring the network after hours and detects activity that appears to be a brute-force attempt to compromise a critical server. After reviewing the alerts to ensure their accuracy, what should be done NEXT?
An IS auditor is reviewing a machine learning model that predicts the likelihood that a user will watch a certain movie. Which of the following would be of GREATEST concern to the auditor?
While reviewing the effectiveness of an incident response program, an IS auditor notices a high number of reported incidents involving malware originating from removable media found by employees. Which of the following is the MOST appropriate recommendation to management?
Which of the following is an effective way to ensure the integrity of file transfers in a peer-to-peer (P2P) computing environment?
From a risk management perspective, which of the following is the BEST approach when implementing a large and complex data center IT infrastructure?
Which of the following should an IS auditor recommend be done FIRST when an organization is planning to implement an IT compliance program?
Which of the following should be done FIRST when creating a data protection program?
An IS auditor reviewing the system development life cycle (SDLC) finds there is no requirement for business cases. Which of the following should be offGREATEST concern to the organization?
Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?
Which of the following provides the BEST assurance that vendor-supported software remains up to date?
Which of the following should an IS auditor do FIRST when auditing a robotics process automation (RPA) implementation?
A security review focused on data loss prevention (DLP) revealed the organization has no visibility to data stored in the cloud. What is the IS auditor's BEST recommendation to address this
issue?
Which of the following MOST effectively enables consistency across high-volume software changes'?
Which of the following is the PRIMARY objective of a control self-assessment (CSA)?
An organization is ready to implement a new IT solution consisting of multiple modules. The last module updates the processed data into the database. Which of the following findings should be of MOST concern to the IS auditor?
An IS auditor finds that a number of key patches have not been applied in a timely manner due to re-source constraints. Which of the following is the GREATEST risk to the organization in this
situation?
An IS auditor found that operations personnel failed to run a script contributing to year-end financial statements. Which of the following is the BEST recommendation?
Which of the following MOST effectively detects transposition and transcription errors?
Which of the following criteria is MOST important for the successful delivery of benefits from an IT project?
An IS auditor is reviewing database fields updated in real-time and displayed through other applications in multiple organizational functions. When validating business approval for these various use cases, which of the following sources of information would be the BEST starting point?
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change management process?
When reviewing the disaster recovery strategy, IT management identified an application that requires a short recovery point objective (RPO). Which of the following data restoration strategies would BEST enable the organization to meet this objective?
Which of the following is the MOST effective way to ensure adequate system resources are available for high-priority activities?
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's information security governance?
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
Which of the following would BEST prevent an arbitrary application of a patch?
Which of the following is MOST useful for determining the strategy for IT portfolio management?
Which of the following presents the GREATEST risk to an organization's ability to manage quality control (QC) processes?
An IS auditor is assessing the adequacy of management's remediation action plan. Which of the following should be the MOST important consideration?
Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?
An IS auditor is planning a review of an organizations robotic process automation (RPA) technology. Which of the following MUST be included in the audit work plan?
An IS auditor is reviewing an organization's incident management processes and procedures. Which of the following observations should be the auditor's GREATEST concern?
Which of the following should be the PRIMARY concern for the it department head when implementing operational log management?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization's enterprise architecture (EA) program?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
An organization is enhancing the security of a client-facing web application following a proposal to acquire personal information for a business purpose. Which of the following is MOST important to review before implementing this initiative?
External audits have identified recurring exceptions in the user termination process, despite similar internal audits having reported no exceptions in the past. Which of the following is the IS auditor's BEST course of action to improve the internal audit process in the future?
An IS auditor is planning a review of an organizations cybersecurity incident response maturity Which of the following methodologies would provide the MOST reliable conclusions?
Which of the following is the GREATEST risk associated with lack of IT involvement in the organization's strategic planning initiatives?
Which of the following BEST enables an IS auditor to combine and compare access control lists from various applications and devices?
During the forensic investigation of a cyberattack involving credit card data, which of the following is MOST important to ensure?
Which of the following is an IS auditor's BEST recommendation to mitigate the risk of eavesdropping associated with an application programming interface (API) integration implementation?
During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor's BEST course of action?
An external attacker spoofing an internal Internet Protocol (IP) address can BEST be detected by which of the following?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the
auditor's BEST recommendation to help prevent unauthorized access?
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following backup schemes is the BEST option when storage media is limited?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
Which of the following is MOST important when implementing a data classification program?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
Which of the following is the BEST reason to implement a data retention policy?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?
Which of the following is necessary for effective risk management in IT governance?
Which of the following would be MOST useful when analyzing computer performance?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
Which of the following BEST helps to ensure data integrity across system interfaces?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;