Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization ' s patch management process?
IT disaster recovery time objectives (RTOs) should be based on the:
Which of the following is an example of a preventive control for physical access?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor ' s NEXT step should be to:
Which of the following methods would MOST effectively provide positive authentication for physical access?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor ' s BEST course of action?
Which of the following is the MOST likely root cause of shadow IT in an organization?
What is the PRIMARY purpose of performing a parallel run of a now system?
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
How is nonrepudiation supported within a public key infrastructure (PKI) environment?
An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?
Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
Which of the following demonstrates the use of data analytics for a loan origination process?
An IS auditor is reviewing the system development practices of an organization that is about to move from a Waterfall to an Agile approach. Which of the following is MOST important for the auditor to focus on as a result of this move?
An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?
Which of the following BEST indicates to an IS auditor that an organization handles emergency changes appropriately and transparently?
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
An organization is ready to implement a new IT solution consisting of multiple modules. The last module updates the processed data into the database. Which of the following findings should be of MOST concern to the IS auditor?
Controls related to authorized modifications to production programs are BEST tested by:
Which of the following poses the GREATEST risk to an organization related to system interfaces?
To confirm integrity for a hashed message, the receiver should use:
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
A system performance dashboard indicates several application servers are reaching the defined threshold for maximum CPU allocation. Which of the following would be the IS auditor ' s BEST recommendation for the IT department?
Which of the following BEST guards against the risk of attack by hackers?
Which of the following BEST enables an IS auditor to prioritize financial reporting spreadsheets for an end-user computing (EUC) audit?
A staff accountant regularly uploads spreadsheets with inventory levels to the organization ' s financial reporting system. The transfers are executed through a customized interface created by an in-house developer. Which of the following is MOST important for the IS auditor to confirm during a review of the interface?
Which of the following BEST enables an organization to standardize its IT infrastructure to align with business goals?
Which of the following BEST enables alignment of IT with business objectives?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
Which of the following job scheduling schemes for operating system updates is MOST likely to adequately balance protection of workstations with user requirements?
A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?
An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor ' s NEXT action1?
An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated. Which of the following should be of
MOST concern?
The PRIMARY objective of a privacy protection policy is to increase awareness of:
Which of the following criteria is MOST important for the successful delivery of benefits from an IT project?
Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
An IS auditor is reviewing the security of a web-based customer relationship management (CRM) system that is directly accessed by customers via the Internet, which of the following should be a concern for the auditor?
Which of the following can only be provided by asymmetric encryption?
While auditing a small organization ' s data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?
Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?
During the review of a system disruption incident, an IS auditor notes that IT support staff were put in a position to make decisions beyond their level of authority.
Which of the following is the BEST recommendation to help prevent this situation in the future?
An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor ' s time would be to review and evaluate:
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization ' s vulnerability scanning program ' '
IT management has accepted the risk associated with an IS auditor ' s finding due to the cost and complexity of the corrective actions. Which of the following should be the auditor ' s NEXT course of action?
Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?