Which of the following BEST facilitates the legal process in the event of an incident?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
Which of the following would be MOST useful when analyzing computer performance?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
Which of the following BEST enables the timely identification of risk exposure?
Which of the following documents should specify roles and responsibilities within an IT audit organization?
Which of the following is an example of a preventative control in an accounts payable system?
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?
In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
Which of the following should an IS auditor consider FIRST when evaluating firewall rules?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?
During the planning stage of a compliance audit, an IS auditor discovers that a bank's inventory of compliance requirements does not include recent regulatory changes related to managing data risk. What should the auditor do FIRST?
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor's GREATEST concern?
In an online application which of the following would provide the MOST information about the transaction audit trail?
An IS auditor is evaluating the risk associated with moving from one database management system (DBMS) to another. Which of the following would be MOST helpful to ensure the integrity of the system throughout the change?
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed Which of the following is the MOST important requirement to include In the vendor contract to ensure continuity?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
Providing security certification for a new system should include which of the following prior to the system's implementation?
During an audit of a multinational bank's disposal process, an IS auditor notes several findings. Which of the following should be the auditor's GREATEST concern?
Which of the following is MOST helpful for measuring benefits realization for a new system?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?
Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
Which of the following BEST Indicates that an incident management process is effective?
Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization's security policy?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
In an online application, which of the following would provide the MOST information about the transaction audit trail?
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
The GREATEST benefit of using a polo typing approach in software development is that it helps to:
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
Which of the following is the GREATEST risk associated with storing customer data on a web server?
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
An information systems security officer's PRIMARY responsibility for business process applications is to:
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?
Which of the following is the BEST reason for an organization to use clustering?
During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?
Secure code reviews as part of a continuous deployment program are which type of control?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?
Which of the following would be a result of utilizing a top-down maturity model process?
An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization's goals?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
A bank wants to outsource a system to a cloud provider residing in another country. Which of the following would be the MOST appropriate IS audit recommendation?
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
Which of the following helps to ensure the integrity of data for a system interface?
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls?
Which of the following would provide management with the MOST reasonable assurance that a new data warehouse will meet the needs of the
organization?
Which type of attack poses the GREATEST risk to an organization's most sensitive data?
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?
An IS auditor should be MOST concerned if which of the following fire suppression systems is utilized to protect an asset storage closet?
The BEST way to evaluate the effectiveness of a newly developed application is to:
Which of the following is MOST important for the successful establishment of a security vulnerability management program?
A small business unit is implementing a control self-assessment (CSA) program and leveraging the internal
audit function to test its internal controls annually. Which of the following is the MOST significant benefit of
this approach?
In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?
Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
Which of the following BEST enables an organization to improve the effectiveness of its incident response team?
A bank performed minor changes to the interest calculation computer program. Which of the following techniques would provide the STRONGEST evidence to determine whether the interest calculations are correct?
An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?
Which of the following metrics is the BEST indicator of the performance of a web application
Which of the following should be identified FIRST during the risk assessment process?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
Which of the following controls is MOST important for ensuring the integrity of system interfaces?
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor's NEXT step should be to:
The use of which of the following would BEST enhance a process improvement program?
Which of the following is the PRIMARY basis on which audit objectives are established?
Which of the following is MOST critical to the success of an information security program?
An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data
classification in this project?
Which of the following is the MAIN responsibility of the IT steering committee?
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?
Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?
Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?
Which of the following is MOST critical to the success of an information security program?
What is the PRIMARY reason for an organization to classify the data stored on its internal networks?
An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor's independence?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
Which of the following is MOST useful when planning to audit an organization's compliance with cybersecurity regulations in foreign countries?
A global organization's policy states that all workstations must be scanned for malware each day. Which of the following would provide an IS auditor with the BEST evidence of continuous compliance with this policy?
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
Which of the following is MOST important to include in security awareness training?
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization's patch management process?
Which of the following is the MOST significant risk when an application uses individual end-user accounts to access the underlying database?
Which of the following is the MOST important consideration for a contingency facility?
Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?
Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?
In a large organization, IT deadlines on important projects have been missed because IT resources are not prioritized properly. Which of the following is the BEST recommendation to address this problem?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
An IS auditor is reviewing the service agreement with a technology company that provides IT help desk services to the organization. Which of the following monthly performance
metrics is the BEST indicator of service quality?
While evaluating the data classification process of an organization, an IS auditor's PRIMARY focus should be on whether:
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''
An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?
What should an IS auditor do FIRST when a follow-up audit reveals some management action plans have not been initiated?
Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
Which type of device sits on the perimeter of a corporate of home network, where it obtains a public IP address and then generates private IP addresses internally?
The charging method that effectively encourages the MOST efficient use of IS resources is:
Which of the following should an IS auditor review when evaluating information systems governance for a large organization?
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
An IS auditor notes that not all security tests were completed for an online sales system recently promoted to production. Which of the following is the auditor's BEST course of action?
Which of the following is the BEST performance indicator for the effectiveness of an incident management program?
The use of which of the following is an inherent risk in the application container infrastructure?
What would be an IS auditor's BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?
An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?
An IS auditor engaged in developing the annual internal audit plan learns that the chief information officer (CIO) has requested there be no IS audits in the upcoming year as more time is needed to address a large number of recommendations from the previous year. Which of the following should the auditor do FIRST
An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?
Which of the following technologies has the SMALLEST maximum range for data transmission between devices?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?
Management has learned the implementation of a new IT system will not be completed on time and has requested an audit. Which of the following audit findings should be of GREATEST concern?
Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?
Which of following is MOST important to determine when conducting a post-implementation review?
When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?
Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?
An IS auditor is asked to review an organization's technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
Afire alarm system has been installed in the computer room The MOST effective location for the fire alarm control panel would be inside the
During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor's BEST course of action?
An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be the GREATEST concern?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization's information cannot be accessed?
Which of the following is MOST important for an IS auditor to review when determining whether IT investments are providing value to tie business?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following
is the auditor’s BEST recommendation to prevent unauthorized access?
An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?
Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?
Controls related to authorized modifications to production programs are BEST tested by:
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
An IS auditor conducts a review of a third-party vendor's reporting of key performance indicators (KPIs) Which of the following findings should be of MOST concern to the auditor?
Which of the following would protect the confidentiality of information sent in email messages?
Which of the following management decisions presents the GREATEST risk associated with data leakage?
During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?
Which of the following are used in a firewall to protect the entity's internal resources?
An IS auditor evaluating the change management process must select a sample from the change log. What is the BEST way to the auditor to confirm the change log is complete?
When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider’s external audit report on service level management when the
Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls?
An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?
Which of the following is MOST effective for controlling visitor access to a data center?
Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program'?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?
Which of the following presents the GREATEST risk associated with end-user computing (EUC) applica-tions over financial reporting?
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
Who should be the FIRST to evaluate an audit report prior to issuing it to the project steering committee?
During an organization's implementation of a data loss prevention (DLP) solution, which of the following activities should be completed FIRST?
How is nonrepudiation supported within a public key infrastructure (PKI) environment?
An organization offers an e-commerce platform that allows consumer-to-consumer transactions. The platform now uses blockchain technology to ensure the parties are unable to deny the transactions. Which of the following attributes BEST describes the risk element that this technology is addressing?
An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?
An IS auditor reviewing an information processing environment decides to conduct external penetration testing. Which of the following is MOST appropriate to include in the audit scope for the organization to distinguish between the auditor's penetration attacks and actual attacks?
An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process. Which of the following is the MOST appropriate population to sample from
when testing for remediation?
Which of the following controls helps to ensure that data extraction queries run by the database administrator (DBA) are monitored?
Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?
An organization's sensitive data is stored in a cloud computing environment and is encrypted. Which of the following findings should be of GREATEST concern to an IS auditor?
An organization has implemented a new data classification scheme and asks the IS auditor to evaluate its effectiveness. Which of the following would be of
GREATEST concern to the auditor?
Which of the following is the MOST effective way to detect as many abnormalities as possible during an IS audit?
Which of the following findings would be of GREATEST concern to an IS auditor reviewing firewall security for an organization's corporate network?
During an information security review, an IS auditor learns an organizational policy requires all employ-ees to attend information security training during the first week of each new year. What is
the auditor's BEST recommendation to ensure employees hired after January receive adequate guid-ance regarding security awareness?
An IS auditor has been asked to review the quality of data in a general ledger system. Which of the following would provide the auditor with the MOST meaningful results?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
An IS auditor learns that a business owner violated the organization's security policy by creating a web page with access to production data. The auditor's NEXT step should be to:
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
Which of the following is the MOST appropriate testing approach when auditing a daily data flow between two systems via an automated interface to confirm that it is complete and accurate?
Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
Which of the following is an effective way to ensure the integrity of file transfers in a peer-to-peer (P2P) computing environment?
Data from a system of sensors located outside of a network is received by the open ports on a server. Which of the following is the BEST way to ensure the integrity of the data being collected from the sensor system?
Which of the following is the PRIMARY advantage of using an automated security log monitoring tool instead of conducting a manual review to monitor the use of privileged access?
Which of the following is the GREATEST risk related to the use of virtualized environments?
Which of the following is the MOST appropriate responsibility of an IS auditor involved in a data center renovation project?
Which of the following findings related to segregation of duties should be of GREATEST concern to an IS auditor?
Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time?
Which of the following provides the BEST evidence that system requirements are met when evaluating a project before implementation?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
Which of the following observations regarding change management should be considered the MOST serious risk by an IS auditor?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system. Which of the following is the IS
auditor's BEST recommendation?
An IS auditor finds ad hoc vulnerability scanning is in place with no clear alignment to the organization's wider security threat and vulnerability management program.
Which of the following would BEST enable the organization to work toward improvement in this area?
An IS auditor discovers that a developer has used the same key to grant access to multiple applications making calls to an application programming interface (API). Which of the following is the BEST recommendation to address this situation?
In an annual audit cycle, the audit of an organization's IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
An organization's information security policies should be developed PRIMARILY on the basis of:
The PRIMARY reason to assign data ownership for protection of data is to establish:
Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?
During the audit of an enterprise resource planning (ERP) system, an IS auditor found an applicationpatch was applied to the production environment. It is MOST
important for the IS auditor to verify approval from the:
External audits have identified recurring exceptions in the user termination process, despite similar internal audits having reported no exceptions in the past. Which of the following is the IS auditor's BEST course of action to improve the internal audit process in the future?
A telecommunications company has recently created a new fraud department with three employees and acquired a fraud detection system that uses artificial intelligence (AI) modules. Which of the following would be of GREATEST concern to an IS auditor reviewing the system?
Which of the following would an IS auditor find to be the GREATEST risk associated with the server room in a remote office location?
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
An organization has decided to purchase a web-based email service from a third-party vendor and eliminate its own email server infrastructure. What type of cloud computing environment would BEST meet the organization's objective?
The business case for an information system investment should be available for review until the:
When auditing the adequacy of a cooling system for a data center, which of the following is MOST important for the IS auditor to review?
An organization is ready to implement a new IT solution consisting of multiple modules. The last module updates the processed data into the database. Which of the following findings should be of MOST concern to the IS auditor?
Which of the following should be an IS auditor's PRIMARY focus when auditing the implementation of a new IT operations performance monitoring system?
An IS auditor is reviewing a network diagram. Which of the following would be the BEST location for placement of a firewall?
A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:
An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:
An IS auditor finds that a number of key patches have not been applied in a timely manner due to re-source constraints. Which of the following is the GREATEST risk to the organization in this
situation?
Which of the following is an analytical review procedure for a payroll system?
Which of the following is the GREATEST benefit of adopting an Agile audit methodology?
Which of the following is an IS auditor's BEST recommendation for mitigating risk associated with inadvertent disclosure of sensitive information by employees?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?