Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
Which of the following would be a result of utilizing a top-down maturity model process?
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
Which of the following demonstrates the use of data analytics for a loan origination process?
The implementation of an IT governance framework requires that the board of directors of an organization:
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
Secure code reviews as part of a continuous deployment program are which type of control?
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?
Which of the following is a detective control?
Which of the following occurs during the issues management process for a system development project?
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
Which of the following is MOST helpful for measuring benefits realization for a new system?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed Which of the following is the MOST important requirement to include In the vendor contract to ensure continuity?
Providing security certification for a new system should include which of the following prior to the system's implementation?
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
Which of the following is a social engineering attack method?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
Which of the following should an IS auditor consider FIRST when evaluating firewall rules?
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
Which of the following represents the HIGHEST level of maturity of an information security program?
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
Which of the following would be an appropriate rote of internal audit in helping to establish an organization's privacy program?
Which of the following is the MAIN purpose of an information security management system?
Which of the following concerns is BEST addressed by securing production source libraries?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
Which of the following is the GREATEST risk associated with storing customer data on a web server?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:
Which of the following security risks can be reduced by a property configured network firewall?
Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?