An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
Which of the following is an IS auditor’s BEST recommendation after identifying that HR staff create new employees in the payroll system as well as process payroll due to limited staffing?
Which of the following should an IS auditor recommend be done FIRST when an organization is planning to implement an IT compliance program?
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
Which of the following BEST describes the role of the IS auditor in a control self-assessment (CSA)?
Which of the following should be the PRIMARY objective of conducting an audit follow-up of management action plans?
Which of the following would BEST protect the confidentiality of sensitive data in transit between multiple offices?
Which of the following is the MOST important outcome of an information security program?
Which of the following is the BEST reason to implement a data retention policy?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
An organization ' s information security policies should be developed PRIMARILY on the basis of:
Which of the following is a PRIMARY benefit of an integrated audit?
Which of the following is the BEST indication that an information security awareness program is effective?
An organization performs virtual machine (VM) replication instead of daily backups of its critical servers. Which of the following is MOST important to validate when evaluating the adequacy of recovery procedures?
An IS auditor noted a recent production incident in which a teller transaction system incorrectly charged fees to customers due to a defect from a recent release. Which of the following should be the auditor ' s NEXT step?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor ' s FIRST action should be to:
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
An IS auditor is performing a follow-up audit and notes that some critical deficiencies have not been addressed. The auditor ' s BEST course of action is to:
Which of the following is a concern associated with virtualization?
In a Zero Trust architecture, which element is MOST important for an IS auditor to evaluate to ensure that resources are accessed securely?
Which of the following is MOST critical to the success of an information security program?
Which of the following is MOST helpful for an IS auditor to review when evaluating an organizations business process that are supported by applications and IT systems?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor ' s BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following is MOST important for the successful establishment of a security vulnerability management program?
An organization ' s business continuity plan (BCP) should be:
Which of the following is the BEST control to mitigate attacks that redirect internet traffic to an unauthorized website?
An IS auditor finds that a recently deployed application has a number of developers with inappropriate update access left over from the testing environment. Which of the following would have BEST prevented the update access from being migrated?
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization ' s data loss prevention (DLP) controls?
Which of the following is the BEST source of organizational direction on when to use cloud services?
Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor ' s BEST recommendation?
During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?
In continuous delivery, the critical connector between development and production is:
In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?
Which of the following is MOST important when defining the IS audit scope?
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
Which of the following is MOST important to include in a business case for an IT-enabled investment?
An IS auditor discovers from patch logs that some in-scope systems are not compliant with the regular patching schedule. What should the auditor do NEXT?
When is it MOST important for an IS auditor to apply the concept of materiality in an audit?
When selecting a new data loss prevention (DLP) solution, the MOST important consideration is that the solution:
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor ' s BEST recommendation for the organization?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
Which of the following should be the GREATEST concern for an IS auditor assessing an organization ' s disaster recovery plan (DRP)?