Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?
Which of the following provides the MOST protection against emerging threats?
Which of the following is the MOST important consideration for patching mission critical business application servers against known vulnerabilities?
An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?
Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?
Stress testing should ideally be carried out under a:
A small IT department has embraced DevOps, which allows members of this group to deploy code to production and maintain some development access to automate releases. Which of the following is the MOST effective control?
Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?
Which of the following is the MOST important advantage of participating in beta testing of software products?
Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?
Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?
Which of the following physical controls provides the GREATEST assurance that only authorized individuals can access a data center?
Which of the following is MOST important for the successful establishment of a security vulnerability management program?
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
A small business unit is implementing a control self-assessment (CSA) program and leveraging the internal
audit function to test its internal controls annually. Which of the following is the MOST significant benefit of
this approach?
In a large organization, IT deadlines on important projects have been missed because IT resources are not prioritized properly. Which of the following is the BEST recommendation to address this problem?
Which of the following is the BEST indication of effective governance over IT infrastructure?
Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization's disaster recovery plan (DRP)?
Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
An IS auditor should be MOST concerned if which of the following fire suppression systems is utilized to protect an asset storage closet?
Which of the following is the GREATEST advantage of outsourcing the development of an e-banking solution when in-house technical expertise is not available?
An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data
classification in this project?
During the review of a system disruption incident, an IS auditor notes that IT support staff were put in a position to make decisions beyond their level of authority.
Which of the following is the BEST recommendation to help prevent this situation in the future?
Which of the following is the MOST important consideration for a contingency facility?
An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?
During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)
agreement. What should the auditor do NEXT?
An organization's IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?
An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
Which of the following is MOST helpful for an IS auditor to review when evaluating an organizations business process that are supported by applications and IT systems?
Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics
system?
In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
When reviewing a business case for a proposed implementation of a third-party system, which of the following should be an IS auditor's GREATEST concern?
Which of the following biometric access controls has the HIGHEST rate of false negatives?
The PRIMARY purpose of an incident response plan is to:
A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?
The record-locking option of a database management system (DBMS) serves to.
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality
within the organization. Which of the following should be recommended as the PRIMARY factor to
determine system criticality?
During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?
When planning an internal penetration test, which of the following is the MOST important step prior to finalizing the scope of testing?
Which type of attack poses the GREATEST risk to an organization's most sensitive data?
A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?
Which of the following is the BEST reason to implement a data retention policy?
The use of which of the following would BEST enhance a process improvement program?
An organization considering the outsourcing of a business application should FIRST:
Which of the following BEST supports the effectiveness of a compliance program?