Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD)
policy to help prevent data leakage?
Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?
Which of the following should be the FIRST step when planning an IS audit of a third-party service provider that monitors network activities?
When auditing the feasibility study of a system development project, the IS auditor should:
Which of the following are used in a firewall to protect the entity's internal resources?
An IS auditor is assessing backup performance and observes that the system administrator manually initiates backups during unexpected peak usage. Which of the following is the auditor's BEST course of action?
An organization offers an e-commerce platform that allows consumer-to-consumer transactions. The platform now uses blockchain technology to ensure the parties are unable to deny the transactions. Which of the following attributes BEST describes the risk element that this technology is addressing?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
Which of the following is the MOST important consideration of any disaster response plan?
An IS auditor is reviewing a network diagram. Which of the following would be the BEST location for placement of a firewall?
The PRIMARY advantage of using open-source-based solutions is that they:
Which of the following is the MAIN objective of enterprise architecture (EA) governance?
Which of the following security measures is MOST important for protecting Internet of Things (IoT) devices from potential cyberattacks?
Which of the following risk scenarios is BEST mitigated through the use of a data loss prevention (DLP) tool?
Which of the following should be the PRIMARY consideration when incorporating user training and awareness into a data loss prevention (DLP) strategy?
An IS auditor is reviewing the service management of an outsourced help desk. Which of the following is the BEST indicator of how effectively the service provider is performing this function?
Which of the following is the PRIMARY purpose of conducting a control self-assessment (CSA)?
What should be an IS auditor's PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?
An IS auditor is reviewing how password resets are performed for users working remotely. Which type of documentation should be requested to understand the detailed steps required for this activity?
Which of the following is the MOST important success factor for implementing a data loss prevention (DLP) tool?
An IS auditor observes that an organization's systems are being used for cryptocurrency mining on a regular basis. Which of the following is the auditor's FIRST course of action?
After areas have been appropriately scoped, what is the IS auditor's NEXT step in the selection for sampling?
Which of the following is the PRIMARY function of an internal IS auditor when the organization acquires a new IT system to support its business strategy?
Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?
Which of the following is the GREATEST benefit of adopting an Agile audit methodology?
Which of the following is the BEST metric to measure the quality of software developed in an organization?
In reviewing the IT strategic plan, the IS auditor should consider whether it identifies the:
Management has decided to accept a risk in response to a draft audit recommendation. Which of the following should be the IS auditor’s NEXT course of action?
An IS auditor finds ad hoc vulnerability scanning is in place with no clear alignment to the organization's wider security threat and vulnerability management program.
Which of the following would BEST enable the organization to work toward improvement in this area?
The PRIMARY objective of a follow-up audit is to:
Management has agreed to move the organization's data center due to recent flood map changes in its current location. Which risk response has been adopted?
Which of the following should be done FIRST when creating a data protection program?
Which of the following provides the BEST assurance that vendor-supported software remains up to date?
An external audit firm was engaged to perform a validation and verification review for a systems implementation project. The IS auditor identifies that regression testing is not part of the project plan and was not performed by the systems implementation team. According to the team, the parallel testing being performed is sufficient, making regression testing unnecessary. What should be the auditor’s NEXT step?
An organization used robotic process automation (RPA) technology to develop software bots that extract data from various sources for input into a legacy financial application. Which of the following should be of GREATEST concern to an IS auditor when reviewing the software bot job scheduling and production process automation?
Which of the following should be the GREATEST concern for an IS auditor assessing an organization's disaster recovery plan (DRP)?
Which of the following procedures for testing a disaster recovery plan (DRP) is MOST effective?
Which of the following technologies BEST assists in protection of digital evidence as part of forensic investigation acquisition?
Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?
Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?
Which of the following measures BEST mitigates the risk of data exfiltration during a cyberattack?
An IS auditor is reviewing an organizations release management practices and observes inconsistent and inaccurate estimation of the size and complexity of business application development projects. Which of the following should the auditor recommend to address this issue?
Who is accountable for an organization's enterprise risk management (ERM) program?
An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated. Which of the following should be of
MOST concern?
Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?
An IS auditor is reviewing documentation from a change that was applied to an application. Which of the following findings would be the GREATEST concern?
Which of the following BEST enables an organization to verify whether an encrypted message sent by a client has been altered?
Which of the following is the PRIMARY reason an IS auditor should recommend that management create an IT risk register?
Which of the following is the GREATEST advantage of maintaining an internal IS audit function within an organization?
A post-implementation audit has been completed for the deployment of a sophisticated job scheduling tool Which of the following observations would be of GREATEST concern?