Retention periods and conditions for the destruction of personal data should be determined by the.
An organization that processes credit card information employs a remote workforce. Which of the following is the MOST effective way to mitigate risk associated with data exfiltration?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
The use of control totals satisfies which of the following control objectives?
During an audit of payment services of a branch based in a foreign country, a large global bank ' s audit team identifies an opportunity to use data analytics techniques to identify abnormal payments. Which of the following is the team ' s MOST important course of action?
In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?
Which of the following would minimize the risk of losing transactions as a result of a disaster?
Which of the following is MOST helpful for measuring benefits realization for a new system?
Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?
A cloud access security broker (CASB) administers the user access of a Software as a Service {SaaS) on behalf of the customer organization. When conducting an audit of the service, which of the following is MOST important for the IS auditor to confirm?
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization ' s information security governance?
An IT balanced scorecard is PRIMARILY used for:
Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?
An IS auditor finds that the cost of developing an application is now projected to significantly exceed the budget. Which of the following is the GREATEST risk to communicate to senior management?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
What should an IS auditor evaluate FIRST when reviewing an organization ' s response to new privacy legislation?
An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?
An IS auditor determines that the vendor ' s deliverables do not include the source code for a newly acquired product. To address this issue, which of the following should the auditor recommend be included in the contract?
Backup procedures for an organization ' s critical data are considered to be which type of control?
Which of the following is the PRIMARY role of the IS auditor m an organization ' s information classification process?
An organization is implementing a data loss prevention (DLP) system in response to a new regulatory requirement Reviewing. which of the following would be MOST helpful in evaluating the system ' s design?
Which of the following is MOST important to review during the project initiation phase of developing and deploying a new application?
An IS auditor finds an IT manager recently changed a Software as a Service (SaaS) provider contract in an effort to cut costs. The new contract increases the time to resolve incidents. Which of the following should be the auditor’s GREATEST concern?
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
Which of the following is the MAIN responsibility of the IT steering committee?
Which of the following BEST addresses the availability of an online store?
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?
An organization is disposing of removable onsite media which contains sensitive information. Which of the following is the MOST effective method to prevent disclosure of sensitive data?
Which of the following occurs during the issues management process for a system development project?
An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?
Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?
Which type of control has been established when an organization implements a security information and event management (SIEM) system?
In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?
Which of the following provides the BEST evidence that all elements of a business continuity plan (BCP) are operating effectively?
In an annual audit cycle, the audit of an organization ' s IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
An IS auditor is conducting an IT governance audit and notices many initiatives are managed informally by isolated project managers. Which of the following recommendations would have the GREATEST impact on improving the maturity of the IT team?
Which of the following is an IS auditor’s BEST approach when low-risk anomalies have been identified?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization ' s business continuity plan (BCP)?
An IS auditor is assessing the adequacy of management ' s remediation action plan. Which of the following should be the MOST important consideration?
Data Loss Prevention (DLP) tools provide the MOST protection against:
An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?
An IS auditor is planning a review of an organizations robotic process automation (RPA) technology. Which of the following MUST be included in the audit work plan?