Which of the following is the MOST important responsibility of data owners when implementing a data classification process?
Which of the following provides the BEST assurance of data integrity after file transfers?
Which of the following concerns is MOST effectively addressed by implementing an IT framework for alignment between IT and business objectives?
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
An IS auditor is reviewing the service agreement with a technology company that provides IT help desk services to the organization. Which of the following monthly performance
metrics is the BEST indicator of service quality?
Which of the following findings would be of GREATEST concern to an IS auditor reviewing firewall security for an organization ' s corporate network?
Which of the following protocols should be used when transferring data via the internet?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
An IS auditor has been tasked with auditing the inventory control process for a large organization that processes millions of data transactions. Which of the following is the BEST testing strategy to adopt?
Which of the following controls is MOST effective at preventing system failures when implementing a new web application?
Which of the following types of firewalls provides the GREATEST degree of control against hacker intrusion?
In which phase of the audit life cycle process should an IS auditor initially discuss observations with management?
Which of the following biometric access controls has the HIGHEST rate of false negatives?
A small IT department has embraced DevOps, which allows members of this group to deploy code to production and maintain some development access to automate releases. Which of the following is the MOST effective control?
When planning a review of IT governance, an IS auditor is MOST likely to:
An IS auditor is reviewing a data conversion project. Which of the following is the auditor ' s BEST recommendation prior to go-live?
An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization ' s payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management
experience. What is the BEST course of action?
Which of the following should be the PRIMARY consideration when incorporating user training and awareness into a data loss prevention (DLP) strategy?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
Which of the following methods will BEST reduce the risk associated with the transition to a new system using technologies that are not compatible with the old system?
An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?
Which of the following is the PRIMARY reason for an airline ' s IT management to continuously monitor the controls for a critical integrated flight schedule and payment application?
An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?
Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?
Which of the following is the GREATEST risk associated with lack of IT involvement in the organization ' s strategic planning initiatives?
For security awareness training to be MOST effective, management should ensure the training:
To protect the organization from malware transmitted by physical media, IT administrators have disabled USB access for storage devices. Which of the following BEST describes this type of control?
An IS auditor wants to gain a better understanding of an organization’s selected IT operating system software. Which of the following would be MOST helpful to review?
An IS auditor evaluating the change management process must select a sample from the change log. What is the BEST way to the auditor to confirm the change log is complete?
Which of the following should an IS auditor recommend be done FIRST when an organization is made aware of a new regulation that is likely to impact IT security requirements?
Which of the following is the BEST way to mitigate risk to an organization ' s network associated with devices permitted under a bring your own device (BYOD) policy?
During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor ' s BEST course of action?
Which of the following should be restricted from a network administrator ' s privileges in an adequately segregated IT environment?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
Which of the following BEST supports an organization ' s objective of restricting the use of removable storage devices by users?
An organization ' s software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
During an audit of an organization ' s risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?
Which of the following is the MOST important consideration when establishing operational log management?
Which of the following BEST mitigates the risk associated with the deployment of a new production system?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
Which of the following tasks would cause the GREATEST segregation of duties (SoD) concern if performed by the person who reconciles the organization ' s device inventory?
Visitors to a data center are required to present an ID and pre-approved documents. Which type of control has been implemented?
An IS auditor is reviewing an organization ' s system development life cycle (SDLC) Which of the following MUST be included in the review?
Which of the following should an IS auditor perform FIRST when auditing an outsourced human resource application?
Which of the following applications should an IS auditor consider to be the HIGHEST priority when reviewing disaster recovery planning (DRP) tests for an commerce company?
Which of the following is a social engineering attack method?
Which of the following is an organization ' s BEST defense against malware?