Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
Which of the following MUST be completed as part of the annual audit planning process?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?
What is the MAIN reason to use incremental backups?
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
Which of the following is an example of a preventative control in an accounts payable system?
What is the Most critical finding when reviewing an organization’s information security management?
An information systems security officer's PRIMARY responsibility for business process applications is to:
The GREATEST benefit of using a polo typing approach in software development is that it helps to:
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?
During an audit of a multinational bank's disposal process, an IS auditor notes several findings. Which of the following should be the auditor's GREATEST concern?
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
Which of the following BEST enables the timely identification of risk exposure?
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
Upon completion of audit work, an IS auditor should:
In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?
Which of the following findings from an IT governance review should be of GREATEST concern?
During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
Which of the following documents should specify roles and responsibilities within an IT audit organization?
Which of the following is MOST important to consider when scheduling follow-up audits?
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
Which of the following business continuity activities prioritizes the recovery of critical functions?
Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?
Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
An IS auditor requests direct access to data required to perform audit procedures instead of asking management to provide the data Which of the following is the PRIMARY advantage of this approach?
In the development of a new financial application, the IS auditor's FIRST involvement should be in the:
An IS auditor is preparing a plan for audits to be carried out over a specified period. Which of the following activities should the IS auditor perform FIRST?
Capacity management tools are PRIMARILY used to ensure that:
An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application's operating system?
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
An IS auditor is reviewing the security of a web-based customer relationship management (CRM) system that is directly accessed by customers via the Internet, which of the following should be a concern for the auditor?
An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?
A new system development project is running late against a critical implementation deadline Which of the following is the MOST important activity?
Which of the following is the BEST source of information to determine the required level of data protection on a file server?
A database administrator (DBA) should be prevented from having end user responsibilities:
A web proxy server for corporate connections to external resources reduces organizational risk by:
The PRIMARY purpose of a configuration management system is to:
Which of the following is MOST important to define within a disaster recovery plan (DRP)?