Which of the following is the BEST control to help ensure the completeness of outbound transactions?
Which of the following should be done FIRST to minimize the risk of unstructured data?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
In a large organization, IT deadlines on important projects have been missed because IT resources are not prioritized properly. Which of the following is the BEST recommendation to address this problem?
Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:
Which of the following MOST effectively minimizes downtime during system conversions?
When information processing has been outsourced to another organization, an IS auditor reviewing the contract should expect it to specify:
Which of the following is the BEST indication of effective IT investment management?
Which of the following BEST indicates the effectiveness of an organization ' s risk management program?
When auditing IT organizational structure, which of the following findings presents the GREATEST risk to an organization?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
Which of the following is the MOST significant risk to an organization migrating its onsite application servers to a public cloud service provider?
An IS auditor finds that some employees are using public cloud-based AI tools. Which of the following presents the GREATEST concern?
Which of the following is the PRIMARY role of key performance indicators (KPIs) in supporting business process effectiveness?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor ' s PRIMARY concern would be:
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?
An IS auditor observes that an organization ' s systems are being used for cryptocurrency mining on a regular basis. Which of the following is the auditor ' s FIRST course of action?
Which of the following is PRIMARILY used in blockchain technology to create a distributed immutable ledger?
Which of the following is the PRIMARY reason to perform a risk assessment?
Which of the following is the BEST way to ensure a vendor complies with system security requirements?
An organization is permanently transitioning from onsite to fully remote business operations. When should the existing business impact analysis (BIA) be reviewed?
As part of an audit response, an auditee has concerns with the recommendations and is hesitant to implement them. Which of the following is the BEST course of action for the IS auditor?
A telecommunications company has recently created a new fraud department with three employees and acquired a fraud detection system that uses artificial intelligence (AI) modules. Which of the following would be of GREATEST concern to an IS auditor reviewing the system?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
What is the FIRST step when creating a data classification program?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
A steering committee established to oversee an organization ' s digital transformation program is MOSTlikely to be involved with which of the following activities?
Which of the following is the BEST indicator of the effectiveness of an organization ' s incident response program?
What is the MOST effective way to manage contractors ' access to a data center?
Which of the following is the BEST method to delete sensitive information from storage media that will be reused?
Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?
Which of the following is the MOST effective method for ensuring the integrity of log data?
Which of the following is the BEST way for an IS auditor to assess the design of an automated application control?
Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?
Which of the following is an IS auditor ' s BEST course of action when the auditee indicates that a corrective action plan for a high-risk finding will take longer than expected?
Which of the following findings would be of GREATEST concern to an IS auditor reviewing the security architecture of an organization that has just implemented a Zero Trust solution?
An organization has engaged a third party to implement an application to perform business-critical calculations. Which of the following is the MOST important process to help ensure the application provides accurate calculations?
Which of the following is the PRIMARY objective of cyber resiliency?
An organization is establishing a steering committee for the implementation of a new enterprise resource planning (ERP) system that uses Agile project management methodology. What is the MOST important criterion for the makeup of this committee?
Which of the following is the MOST important consideration when defining an operational log management strategy?
When an organization conducts business process improvements, the IS auditor should be MOST concerned with the:
An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether
An organization saves confidential information in a file with password protection and the file is placed in a shared folder. An attacker has stolen this information by obtaining the password through social engineering. Implementing which of the following would BEST enable the organization to prevent this type of incident in the future?
An IS auditor notes that not all security tests were completed for an online sales system recently promoted to production. Which of the following is the auditor ' s BEST course of action?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
Which of the following should be of GREATEST concern to an IS auditor when using data analytics?
An organization wants to classify database tables according to its data classification scheme From an IS auditor ' s perspective the tables should be classified based on the:
Which of the following can BEST reduce the impact of a long-term power failure?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?