The charging method that effectively encourages the MOST efficient use of IS resources is:
A computer forensic audit is MOST relevant in which of the following situations?
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?
Which of the following is the BEST indication that there are potential problems within an organization's IT service desk function?
An IS auditor is reviewing a data conversion project Which of the following is the auditor's BEST recommendation prior to go-live?
Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program'?
When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?
Which of following is MOST important to determine when conducting a post-implementation review?
Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?
An IT balanced scorecard is PRIMARILY used for:
Which of the following is MOST important during software license audits?
An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?
Which of the following is the BEST indicator for measuring performance of IT help desk function?
Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization's objectives?
When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on
When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider’s external audit report on service level management when the
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
The use of control totals satisfies which of the following control objectives?
Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?
When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
Which of the following is the BEST testing approach to facilitate rapid identification of application interface errors?
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''
The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?
Which of the following BEST addresses the availability of an online store?
Controls related to authorized modifications to production programs are BEST tested by:
An IS auditor finds that while an organization's IT strategy is heavily focused on research and development, the majority of protects n the IT portfolio focus on operations and maintenance. Which of the Mowing is the BEST recommendation?
An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?
An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?
When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?
Which of the following is the BEST indication of effective IT investment management?
The PRIMARY purpose of requiring source code escrow in a contractual agreement is to:
Which of the following should be the FIRST step to successfully implement a corporate data classification program?
Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?
An IS auditor is asked to review an organization's technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
Which of the following is the BEST indication to an IS auditor that management's post-implementation review was effective?
An IS department is evaluated monthly on its cost-revenue ratio user satisfaction rate, and computer downtime This is BEST zed as an application of.
A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves
for care?
Which of the following BEST protects evidence in a forensic investigation?
As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (B1A)?
Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?
During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?