Which of the following is the MOST important reason for an IS auditor to examine the results of a post-incident review performed after a security incident?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
Which of the following is MOST critical to the success of an information security program?
An IT strategic plan that BEST leverages IT in achieving organizational goals will include:
Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?
Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?
What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
An organization has an acceptable use policy in place, but users do not formally acknowledge the policy. Which of the following is the MOST significant risk from this finding?
During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?
Which of the following provides the GREATEST assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively?
Which of the following is the PRIMARY benefit of a tabletop exercise for an incident response plan?
Which of the following BEST facilitates strategic program management?
An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?
Which of the following is MOST critical to the success of an information security program?
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization's goals and strategic objectives?
To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
Which of the following provides the BE ST method for maintaining the security of corporate applications pushed to employee-owned mobile devices?
Which of the following is necessary for effective risk management in IT governance?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following would be MOST useful when analyzing computer performance?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
The PRIMARY objective of value delivery in reference to IT governance is to:
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?