Which of the following should be the FIRST step in a data migration project?
Which of the following is the BEST testing approach to facilitate rapid identification of application interface errors?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
An organization ' s sensitive data is stored in a cloud computing environment and is encrypted. Which of the following findings should be of GREATEST concern to an IS auditor?
A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?
Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?
A bank wants to outsource a system to a cloud provider residing in another country. Which of the following would be the MOST appropriate IS audit recommendation?
The MOST important objective of a post-implementation audit is to:
When designing metrics for information security, the MOST important consideration is that the metrics:
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor ' s FIRST course of action should be to:
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
Which of the following is an IS auditor ' s BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?
In order for a firewall to effectively protect a network against external attacks, what fundamental practice must be followed?
Which of the following is MOST important to consider when developing a service level agreement (SLAP)?
Which of the following network topologies will provide the GREATEST fault tolerance?
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor ' s BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
An organization ' s strategy to source certain IT functions from a Software as a Service (SaaS) provider should be approved by the:
Data from a system of sensors located outside of a network is received by the open ports on a server. Which of the following is the BEST way to ensure the integrity of the data being collected from the sensor system?
Which of the following is MOST important for an IS auditor to verify when evaluating tne upgrade of an organization ' s enterprise resource planning (ERP) application?
Which of the following security risks can be reduced by a property configured network firewall?
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the
auditor ' s BEST recommendation to help prevent unauthorized access?
Which of the following is the PRIMARY reason that asset classification is vital to an information security program?
Which of the following is the BEST disposal method for flash drives that previously stored confidential data?
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following would a digital signature MOST likely prevent?
Which of the following BEST describes the process of creating a digital envelope?
An IS auditor is reviewing an IT project and finds that an earned value analysis (EVA) is not regularly performed as part of project status reporting. Which of the following is the GREATEST risk resulting from this situation?
Which of the following would be a result of utilizing a top-down maturity model process?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
Which of the following is the GREATEST benefit of an effective data classification process?
Which of the following metrics is MOST helpful for evaluating the effectiveness of problem management practices?
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?
Which of the following is an IS auditor ' s BEST recommendation to mitigate the risk of eavesdropping
associated with an application programming interface (API) integration implementation?
Which of the following is MOST important to the effectiveness of smoke detectors installed in a data processing facility?
During an audit which of the following would be MOST helpful in establishing a baseline for measuring data quality?
An IS auditor determines elevated administrator accounts for servers that are not properly checked out and then back in after each use. Which of the following is the MOST appropriate sampling technique to determine the scope of the problem?
Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization ' s privacy policy?
At the conclusion of an audit, but before issuing the final report, the auditor should:
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
Which of the following is the PRIMARY role of the release plan?
When drafting a disaster recovery strategy, what should be the MOST important outcome of a business impact analysis (BIA)?
An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?
Which of the following is the PRIMARY reason for an organization to implement a configuration management database (CMDB)?
An organization used robotic process automation (RPA) technology to develop software bots that extract data from various sources for input into a legacy financial application. Which of the following should be of GREATEST concern to an IS auditor when reviewing the software bot job scheduling and production process automation?
When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;
Audit frameworks cart assist the IS audit function by: