The PRIMARY reason for an IS auditor to perform a functional walk-through of a business process during the preliminary phase of an audit assignment is to:
Which of the following should be done FIRST following an incident that has caused internal servers to be inaccessible, disrupting normal business operations?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor’s test data set to include?
Which of the following would BEST prevent an arbitrary application of a patch?
Which of the following technologies is BEST suited to fulfill a business requirement for nonrepudiation of business-to-business transactions with external parties without the need for a mutually trusted entity?
Which of the following would be of MOST concern to an IS auditor reviewing a data loss prevention (DLP) solution implementation for endpoints?
During the audit of an enterprise resource planning (ERP) system, an IS auditor found an applicationpatch was applied to the production environment. It is MOST
important for the IS auditor to verify approval from the:
Which of the following should an organization do FIRST when an employee is terminated for fraudulent activity?
An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?
Which of the following will invalidate the authenticity of digital evidence in a forensic investigation?
Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?
Secure code reviews as part of a continuous deployment program are which type of control?
Which of the following is the BEST indication that a software development project is on track to meet its completion deadline?
During an audit of a financial application, it was determined that many terminated users ' accounts were not disabled. Which of the following should be the IS auditor ' s NEXT step?
Which of the following represents the HIGHEST level of maturity of an information security program?
Which of the following would an IS auditor find to be the GREATEST risk associated with the server room in a remote office location?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
Which of the following is the PRIMARY reason for using a digital signature?
What would be an IS auditor ' s BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
In which data loss prevention (DLP) deployment model is data inspection and policy enforcement performed at the organization ' s perimeter or gateway?
An IS auditor engaged in developing the annual internal audit plan learns that the chief information officer (CIO) has requested there be no IS audits in the upcoming year as more time is needed to address a large number of recommendations from the previous year. Which of the following should the auditor do FIRST
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users ' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?
Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?
A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:
In a public key cryptographic system, which of the following is the PRIMARY requirement to address the risk of man-in-the-middle attacks through spoofing?
Which of the following is MOST important to ensure when planning a black box penetration test?
Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
The PRIMARY advantage of using open-source-based solutions is that they:
Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
The FIRST step in auditing a data communication system is to determine:
How would an IS auditor BEST determine the effectiveness of a security awareness program?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:
Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor ' s NEXT course of action?
Which of the following is the MOST important consideration when relying on the work of the prior auditor?
Which of the following activities should be separated in an organization’s incident management processes?