A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
What is the MAIN purpose of an organization ' s internal IS audit function?
Which of the following BEST helps monitor and manage operational logs to create value for an organization?
An IS auditor is reviewing a medical device that is attached to a patient’s body, which automatically takes and uploads measurements to a cloud server. Treatment may be updated based on the measurements. Which of the following should be the auditor ' s PRIMARY focus?
Which of the following is the MOST important regulatory consideration for an organization determining whether to use its customer data to train AI algorithms?
Which of the following operational log management considerations is MOST important for an organization undergoing a digital transformation?
A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor ' s GREATEST concern?
A source code repository should be designed to:
Which of the following is the BEST way to ensure an organization ' s data classification policies are preserved during the process of data transformation?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
Which of the following presents the GREATEST risk to an organization ' s ability to manage quality control (QC) processes?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following responsibilities associated with a disaster recovery plan (DRP) can be outsourced to a Disaster Recovery as a Service (DRaaS) provider?
Which of the following BEST demonstrates alignment of the IT department with the corporate mission?
Which of the following should be the role of internal audit in an organization’s move to the cloud?
The PRIMARY reason to assign data ownership for protection of data is to establish:
Which of the following non-audit activities may impair an IS auditor ' s independence and objectivity?
Which of the following should be the PRIMARY objective of a disaster recovery plan (DRP)?
An organization plans to replace its nightly batch processing backup to magnetic tape with real-time replication to a second data center. Which of the following is the GREATEST risk associated with this change?
The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:
Following an IT audit, management has decided to accept the risk highlighted in the audit report. Which of the following would provide the MOST assurance to the IS auditor that management
is adequately balancing the needs of the business with the need to manage risk?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
Which of the following audit procedures would provide the BEST assurance that an application program is functioning as designed?
Which of the following should be the PRIMARY focus for any network design that deploys a Zero Trust architecture?
Having knowledge in which of the following areas is MOST relevant for an IS auditor reviewing public key infrastructure (PKI)?
Which of the following is MOST likely to be a project deliverable of an agile software development methodology?
Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan?
An IS auditor reviewing the system development life cycle (SDLC) finds there is no requirement for business cases. Which of the following should be offGREATEST concern to the organization?
Which of the following is the GREATEST risk associated with utilizing spreadsheets for financial reporting in end-user computing (EUC)?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the
associated risk?
Which of the following should an IS auditor do FIRST when auditing a robotics process automation (RPA) implementation?
During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?
Upon completion of audit work, an IS auditor should:
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
When assessing a proposed project for the two-way replication of a customer database with a remote call center, the IS auditor should ensure that:
If enabled within firewall rules, which of the following services would present the GREATEST risk?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following is BEST supported by enforcing data definition standards within a database?
An organization has moved all of its infrastructure to the cloud. Which of the following would be an IS auditor’s GREATEST concern related to the organization’s ability to continue operations in case of a disaster?
What is the PRIMARY reason for an organization to classify the data stored on its internal networks?
The PRIMARY advantage of object-oriented technology is enhanced:
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor ' s NEXT step should be to:
An IS auditor is reviewing an organization ' s business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
A disaster recovery plan (DRP) should include steps for:
An IS auditor has traced the source of a transaction fraud to the desktop system of an e-business staff member who is on leave. Which of the following is the BEST way for the auditor to ensure the success of the investigation?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization ' s enterprise architecture (EA) program?