Which of the following data would be used when performing a business impact analysis (BIA)?
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
Coding standards provide which of the following?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
The decision to accept an IT control risk related to data quality should be the responsibility of the:
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
Which of the following BEST indicates the effectiveness of an organization's risk management program?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?
Which of the following BEST guards against the risk of attack by hackers?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
Which of the following is the MOST effective way for an organization to project against data loss?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
The PRIMARY advantage of object-oriented technology is enhanced:
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
To confirm integrity for a hashed message, the receiver should use:
An IT balanced scorecard is the MOST effective means of monitoring:
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
Which of the following is MOST important with regard to an application development acceptance test?
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Cross-site scripting (XSS) attacks are BEST prevented through: