Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
When planning an audit to assess controls for an application in the cloud environment, it is MOST important for an IS auditor to understand:
An organization ' s payroll department recently implemented a new Software as a Service (SaaS) tool for payment processing. Which of the following audits is MOST appropriate for an IS auditor to validate that the new tool is configured as expected to meet performance requirements?
Which of the following responses to risk associated with separation of duties would incur the LOWEST initial cost?
From a risk management perspective, which of the following is the BEST approach when implementing a large and complex data center IT infrastructure?
Which of the following is the BEST way to foster continuous improvement of IS audit processes and practices?
Which of the following approaches would present the GREATEST concern for the implementation of a quality assurance (QA) function?
An organization using a cloud provider for its online billing system requires the website to be accessible to customers at all times. What is the BEST way to verify the organization ' s business requirements are met?
The following findings are the result of an IS auditor’s post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?
In order to be useful, a key performance indicator (KPI) MUST
An information systems security officer ' s PRIMARY responsibility for business process applications is to:
Which of the following is MOST important to include in forensic data collection and preservation procedures?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following is the MOST significant risk when an application uses individual end-user accounts to access the underlying database?
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
Following a merger, a review of an international organization determines the IT steering committee ' s decisions do not extend to regional offices as required in the consolidated IT operating model. Which of the following is the IS auditor ' s BEST recommendation?
Which of the following BEST mitigates the risk of SQL injection attacks against applications exposed to the internet?
Which of the following should be a concern to an IS auditor reviewing an organization’s use of a major cloud provider for Infrastructure as a Service (IaaS)?
Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?
Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?
Which of the following is the BEST control to mitigate the risk of shadow IT?
Which of the following provides the MOST protection against emerging threats?
Which of the following controls helps to reduce fraud risk associated with robotic process automation (RPA)?
When an intrusion into an organization ' s network is detected, which of the following should be done FIRST?
Effective separation of duties in an online environment can BEST be achieved by utilizing:
Which of the following technology trends can lead to more robust data loss prevention (DLP) tools?
Which of the following security measures is MOST important for protecting Internet of Things (IoT) devices from potential cyberattacks?
Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?
An IS auditor can BEST evaluate the business impact of system failures by:
Which of the following is the MOST appropriate control to ensure integrity of online orders?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?
Which of the following findings related to segregation of duties should be of GREATEST concern to an IS auditor?
Which of the following BEST indicates that an incident management process is effective?
Which of the following is the MAJOR advantage of automating internal controls?
A current project to develop IT-based solutions will need additional funding to meet changes in business requirements. Who is BEST suited to obtain this additional funding?
Which of the following is the GREATEST concern associated with a high number of IT policy exceptions approved by management?
Which of the following is the GREATEST advantage of outsourcing the development of an e-banking solution when in-house technical expertise is not available?
The PRIMARY benefit of information asset classification is that it:
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
Which of the following is a detective control?
Which of the following BEST enables an organization to improve the effectiveness of its incident response team?
Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?
When classifying information, it is MOST important to align the classification to:
Which of the following should be done FIRST when creating a data protection program?
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization ' s information security policy?
Which of the following is MOST important to consider when defining disaster recovery strategies?
Which of the following activities is MOST likely to increase internal audit quality?