CISA Certified Information Systems Auditor Questions and Answers
in a post-implantation Nation review of a recently purchased system it is MOST important for the iS auditor to determine whether the:
Having knowledge in which of the following areas is MOST relevant for an IS auditor reviewing public key infrastructure (PKI)?
An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?
A sample for testing must include the 80 largest client balances and a random sample of the rest. What should the IS auditor recommend?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
Which of the following backup methods is MOST appropriate when storage space is limited?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
An IS auditor reviewing database security should be MOST concerned if the database administrator (DBA):
An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?
Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization ' s goals?
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
Which of the following BEST Indicates that an incident management process is effective?
Which of the following is the BEST source of information to determine the required level of data protection on a file server?
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
An organization has an acceptable use policy in place, but users do not formally acknowledge the policy. Which of the following is the MOST significant risk from this finding?
In an organization ' s feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
An IS auditor is preparing for a review of controls associated with a manufacturing plant ' s implementation of industrial Internet of Things (loT) infrastructure Which of the following vulnerabilities would present the GREATEST security risk to the organization?
Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
An organization used robotic process automation (RPA) technology to develop software bots that extract data from various sources for input into a legacy financial application. Which of the following should be of GREATEST concern to an IS auditor when reviewing the software bot job scheduling and production process automation?
Which of the following should be used to evaluate an IT development project before an investment is committed?
A small business unit is implementing a control self-assessment (CSA) program and leveraging the internal
audit function to test its internal controls annually. Which of the following is the MOST significant benefit of
this approach?
Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?
What would be an IS auditor ' s BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?
A new regulation has been enacted that mandates specific information security practices for the protection of customer data. Which of the following is MOST useful for an IS auditor to review when auditing against the regulation?
Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?
Which of the following methods would MOST effectively provide positive authentication for physical access?
An external audit firm was engaged to perform a validation and verification review for a systems implementation project. The IS auditor identifies that regression testing is not part of the project plan and was not performed by the systems implementation team. According to the team, the parallel testing being performed is sufficient, making regression testing unnecessary. What should be the auditor’s NEXT step?
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:
An IS auditor is reviewing a client ' s outsourced payroll system to assess whether the financial audit team can rely on the application. Which of the following findings would be the auditor ' s
GREATEST concern?
Which of the following BEST demonstrates alignment of the IT department with the corporate mission?
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?
Which of the following should be the GREATEST concern for an IS auditor reviewing recent disaster recovery operations?
For security awareness training to be MOST effective, management should ensure the training:
An organization uses public key infrastructure (PKI) to provide email security. Which of the following would be the MOST efficient method to determine whether email messages have been modified in transit?
An organization using a cloud provider for its online billing system requires the website to be accessible to customers at all times. What is the BEST way to verify the organization ' s business requirements are met?
During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor ' s NEXT step should be to:
Which of the following is the BEST indication that there are potential problems within an organization ' s IT service desk function?
Management receives information indicating a high level of risk associated with potential flooding near the organization ' s data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
An IS auditor requests direct access to data required to perform audit procedures instead of asking management to provide the data Which of the following is the PRIMARY advantage of this approach?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following is the PRIMARY benefit of introducing business impact analyses (BIAs) to business resiliency strategies?
In reviewing the IT strategic plan, the IS auditor should consider whether it identifies the:
Which of the following is the PRIMARY objective of performing quality assurance (QA) in a system development process?
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
Which of the following should be the FIRST step in managing the impact of recently discovered zero-day vulnerabilities?
Retention periods and conditions for the destruction of personal data should be determined by the.
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
Which of the following should be done FIRST following an incident that has caused internal servers to be inaccessible, disrupting normal business operations?
Which of the following provides the BEST assurance that vendor-supported software remains up to date?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
An organization has moved all of its infrastructure to the cloud. Which of the following would be an IS auditor’s GREATEST concern related to the organization’s ability to continue operations in case of a disaster?
Which of the following tasks would cause the GREATEST segregation of duties (SoD) concern if performed by the person who reconciles the organization ' s device inventory?
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
In a large organization, IT deadlines on important projects have been missed because IT resources are not prioritized properly. Which of the following is the BEST recommendation to address this problem?
Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan?
In an online application, which of the following would provide the MOST information about the transaction audit trail?
In a review of the organization standards and guidelines for IT management, which of the following should be included in an IS development methodology?
Which of the following findings from a network security review presents the GREATEST risk to the organization?
Which of the following BEST helps monitor and manage operational logs to create value for an organization?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
An IS auditor is reviewing a data conversion project. Which of the following is the auditor ' s BEST recommendation prior to go-live?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the
auditor ' s BEST recommendation to help prevent unauthorized access?
Which of the following poses the GREATEST risk to an organization related to system interfaces?
IT management has accepted the risk associated with an IS auditor ' s finding due to the cost and complexity of the corrective actions. Which of the following should be the auditor ' s NEXT course of action?
An IS auditor is evaluating an organization ' s IT strategy and plans. Which of the following would be of GREATEST concern?
At the conclusion of an audit, but before issuing the final report, the auditor should:
When reviewing hard disk utilization reports, an IS auditor observes that utilization is routinely above 95%. Which of the following should be the GREATEST concern to the IS auditor?
Which of the following is PRIMARILY used in blockchain technology to create a distributed immutable ledger?
Which of the following system redundancy configurations BEST improves system resiliency and reduces the possibility of a single cause of failure impacting system dependability?
Which of the following is MOST important to consider when reviewing an organization ' s defined data backup and restoration procedures?
Which of the following measures BEST mitigates the risk of data exfiltration during a cyberattack?
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor ' s BEST recommendation to facilitate compliance with the regulation?
After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?
An organization is enhancing the security of a client-facing web application following a proposal to acquire personal information for a business purpose. Which of the following is MOST important to review before implementing this initiative?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
A financial accounting system audit determined that audit logging of transactions had been disabled by a finance employee. The IS auditor recommended that finance personnel no longer have the capability to change audit logging settings. Which of the following is MOST important to verify during the follow-up?
Which of the following is the BEST indicator for measuring performance of IT help desk function?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
Which of the following is the BEST way to ensure an organization ' s data classification policies are preserved during the process of data transformation?
Which of the following is the PRIMARY reason an IS auditor should recommend that management create an IT risk register?
Which of the following technology trends can lead to more robust data loss prevention (DLP) tools?
Which of the following would an IS auditor find to be the GREATEST risk associated with the server room in a remote office location?
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
Which of the following is an IS auditor’s MOST important step in a privacy audit?
Which of the following findings would be of GREATEST concern to an IS auditor reviewing the security architecture of an organization that has just implemented a Zero Trust solution?
Which of the following is the PRIMARY advantage of a decentralized database architecture over a centralized architecture?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor ' s PRIMARY concern would be:
An IS auditor has identified deficiencies within the organization ' s software development life cycle policies. Which of the following should be done NEXT?
A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?
Which of the following should an IS auditor use when verifying a three-way match has occurred in an enterprise resource planning (ERR) system?
Which type of attack poses the GREATEST risk to an organization ' s most sensitive data?
Which of the following key performance indicators (KPIs) provides stakeholders with the MOST useful information about whether information security risk is being managed?
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
The GREATEST concern for an IS auditor reviewing vulnerability assessments by the auditee would be if the assessments are:
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
Which of the following should be of GREATEST concern to an IS auditor when using data analytics?
Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor ' s BEST course of action?
An IS auditor is reviewing an artificial intelligence (Al) and expert system application. The system has produced several critical errors with severe impact. Which of the following should the IS auditor do NEXT to understand the cause of the errors?
Which of the following should be the FIRST step when planning an IS audit of a third-party service provider that monitors network activities?
Which of the following is the MOST important consideration to facilitate prosecution of a perpetrator after a cybercrime?
A global company has been using a publicly available AI tool to obtain information about global laws and regulations that could impact the business. Which of the following should be of MOST concern to an IS auditor?
Which of the following helps to ensure the integrity of data for a system interface?
An organization wants to classify database tables according to its data classification scheme From an IS auditor ' s perspective the tables should be classified based on the:
Which of the following would be of GREATEST concern when reviewing an organization ' s security information and event management (SIEM) solution?
An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be the GREATEST concern?
Which of the following applications has the MOST inherent risk and should be prioritized during audit planning?
The charging method that effectively encourages the MOST efficient use of IS resources is:
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
How is nonrepudiation supported within a public key infrastructure (PKI) environment?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
Which of the following system attack methods is executed by entering malicious code into the search box of a vulnerable website, causing the server to reveal restricted information?
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
A national bank recently migrated a large number of business-critical applications to the cloud. Which of the following is MOST important to ensuring the resiliency of the applications?
An IS auditor discovers that backups of critical systems are not being performed in accordance with the recovery point objective (RPO) established in the business continuity plan (BCP). What should the auditor do NEXT?
Which of the following is the BEST reason for an organization to use clustering?
Which of the following occurs during the issues management process for a system development project?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
Which of the following is the MOST important reason for an IS auditor to examine the results of a post-incident review performed after a security incident?
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
Which of following is MOST important to determine when conducting a post-implementation review?
An IS auditor notes that the previous year ' s disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor ' s NEXT course of action?
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization ' s objectives?
A global bank plans to use a cloud provider for backup of customer financial data. Which of the following should be the PRIMARY focus of this project?
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?
Which of the following is the BEST way to ensure a vendor complies with system security requirements?
Which of the following provides the MOST useful information regarding an organization ' s risk appetite and tolerance?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
What should an IS auditor ensure when a financial organization intends to utilize production data in the testing environment?
An IS auditor noted a recent production incident in which a teller transaction system incorrectly charged fees to customers due to a defect from a recent release. Which of the following should be the auditor ' s NEXT step?
Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?
A startup organization wants to develop a data loss prevention (DLP) program. The FIRST step should be to implement:
An IS auditor is reviewing an organization ' s incident management processes and procedures. Which of the following observations should be the auditor ' s GREATEST concern?
Which of the following BEST supports an organization ' s objective of restricting the use of removable storage devices by users?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?
An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?
A bank has a combination of corporate customer accounts (higher monetary value) and small business accounts (lower monetary value) as part of online banking. Which of the following is the BEST sampling approach for an IS auditor to use for these accounts?
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management ' s decision. Which of the following should be the IS auditor ' s NEXT course of action?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
When developing customer-facing IT applications, in which stage of the system development life cycle (SDLC) is it MOST beneficial to consider data privacy principles?
Which of the following is the MOST effective control when granting access to a service provider for a ctoud-6ased application?
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
Which of the following should be an IS auditor ' s GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
In an area susceptible to unexpected increases in electrical power, which of the following would MOST effectively protect the system?
An IS auditor finds that irregularities have occurred and that auditee management has chosen to ignore them. If reporting to external authorities is required which of the following is the BEST action for the IS auditor to take?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
Which of the following is the MOST important prerequisite for implementing a data loss prevention (DLP) tool?
Which of the following provides the BE ST method for maintaining the security of corporate applications pushed to employee-owned mobile devices?
When protecting the confidentiality of information assets, the MOST effective control practice is the:
Which type of control has been established when an organization implements a security information and event management (SIEM) system?
Reviewing which of the following would provide the BEST indication that a project is progressing as planned?
While reviewing the effectiveness of an incident response program, an IS auditor notices a high number of reported incidents involving malware originating from removable media found by employees. Which of the following is the MOST appropriate recommendation to management?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
Which of the following MUST be completed as part of the annual audit planning process?
A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed Which of the following is the MOST important requirement to include In the vendor contract to ensure continuity?
Which of the following is the PRIMARY objective of enterprise architecture (EA)?
Which of the following BEST enables an IS auditor to combine and compare access control lists from various applications and devices?
During an audit of payment services of a branch based in a foreign country, a large global bank ' s audit team identifies an opportunity to use data analytics techniques to identify abnormal payments. Which of the following is the team ' s MOST important course of action?
Management has decided to accept a risk in response to a draft audit recommendation. Which of the following should be the IS auditor’s NEXT course of action?
Based on best practices, which types of accounts should be disabled for interactive login?
The business case for an information system investment should be available for review until the:
Which of the following MOST effectively minimizes downtime during system conversions?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
At the end of each business day, a business-critical application generates a report of financial transac-tions greater than a certain value, and an employee
then checks these transactions for errors. What type of control is in place?
The use of control totals satisfies which of the following control objectives?
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor ' s BEST recommendation for a compensating control?
Which of the following management decisions presents the GREATEST risk associated with data leakage?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
Data from a system of sensors located outside of a network is received by the open ports on a server. Which of the following is the BEST way to ensure the integrity of the data being collected from the sensor system?
When designing metrics for information security, the MOST important consideration is that the metrics:
Which of the following findings would be of GREATEST concern when reviewing project risk management practices?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
An IS auditor is planning an audit of an organization ' s risk management practices. Which of the following would provide the MOST useful information about
risk appetite?
An IS auditor is performing a follow-up audit and notes that some critical deficiencies have not been addressed. The auditor ' s BEST course of action is to:
An organization ' s enterprise architecture (EA) department decides to change a legacy system ' s components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
Which of the following should an IS auditor perform FIRST when auditing an outsourced human resource application?
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
Which of the following concerns is BEST addressed by securing production source libraries?
Which of the following should an IS auditor recommend be done FIRST when an organization is planning to implement an IT compliance program?
An organization is ready to implement a new IT solution consisting of multiple modules. The last module updates the processed data into the database. Which of the following findings should be of MOST concern to the IS auditor?
An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?
Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization ' s disaster recovery plan (DRP)?
An IS auditor finds that while an organization ' s IT strategy is heavily focused on research and development, the majority of protects n the IT portfolio focus on operations and maintenance. Which of the Mowing is the BEST recommendation?
The use of which of the following is an inherent risk in the application container infrastructure?
The process of applying a hash function to a message and obtaining and ciphering a digest refers to:
An IS auditor is reviewing an organization ' s business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
Which of the following would be the BEST process for continuous auditing to a large financial Institution?
An IS auditor is reviewing security controls related to collaboration tools for a business unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?
An IS auditor is reviewing desktop software profiles and notes that a user has downloaded and installed several games that are not approved by the company. Which of the following is the MOST significant risk that could result from this situation?
During the forensic investigation of a cyberattack involving credit card data, which of the following is MOST important to ensure?
An organization is planning to implement a control self-assessment (CSA) program for selected business processes. Which of the following should be the role of the internal audit team for this program?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?
Which of the following is MOST important to the effectiveness of smoke detectors installed in a data processing facility?
Which of the following is MOST important when implementing a data classification program?
When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;
Which of the following provides the BEST evidence of effective IT portfolio managements?
An IS auditor is auditing the operating effectiveness of weekly user access reviews. Of the five weekly reviews sampled, one has not been signed or dated. What is the MAIN reason to note this observation as a finding?
Which of the following is the MOST important success factor for implementing a data loss prevention (DLP) tool?
Which of the following should be the IS auditor ' s PRIMARY focus, when evaluating an organization ' s offsite storage facility?
An IS auditor has traced the source of a transaction fraud to the desktop system of an e-business staff member who is on leave. Which of the following is the BEST way for the auditor to ensure the success of the investigation?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
Which of the following user actions poses the GREATEST risk for inadvertently introducing malware into a local network?
An IS auditor is reviewing an organization ' s primary router access control list. Which of the following should result in a finding?
Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
What is the MOST effective way to manage contractors ' access to a data center?
An IS auditor learns that a business owner violated the organization ' s security policy by creating a web page with access to production data. The auditor ' s NEXT step should be to:
An IS auditor learns of a new regulation which imposes penalties based on the number of individuals whose personally identifiable information (PII) is exposed by a security breach. What would be the BEST recommendation to help the organization limit the liability associated with a breach to its customer information database?
An IS auditor is planning a review of an organizations cybersecurity incident response maturity Which of the following methodologies would provide the MOST reliable conclusions?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
Which of the following is the BEST way to determine the adequacy of controls for detecting inappropriate network activity in an organization?
When planning an internal penetration test, which of the following is the MOST important step prior to finalizing the scope of testing?
A PRIMARY objective of risk management is to keep the total cost of risks below the:
When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider’s external audit report on service level management when the
Which of the following is MOST important for an IS auditor to review when determining whether IT investments are providing value to tie business?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization ' s level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor’s test data set to include?
If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:
Which of the following network communication protocols is used by network devices such as routers to send error messages and operational information indicating success or failure when communicating with another IP address?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
An IS auditor is performing a follow-up audit for findings identified in an organization ' s user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?
Which of the following can BEST reduce the impact of a long-term power failure?
An IS auditor is reviewing job scheduling software and notes instances of delayed processing time, unexpected job interruption, and out-of-sequence job execution. Which of the following should the auditor examine FIRST to help determine the reasons for these instances?
An organization ' s software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?
The decision to accept an IT control risk related to data quality should be the responsibility of the:
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization ' s information security policy?
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program ' ?
Which of the following roles is PRIMARILY responsible for mitigating the risk of benefits not being realized in an IT project?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
Upon completion of a penetration test with findings for an IT system, the NEXT step should be:
Which of the following findings related to segregation of duties should be of GREATEST concern to an IS auditor?
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
Which of the following is an IS auditor ' s BEST recommendation to help an organization increase the efficiency of computing resources?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
Which of the following BEST describes the concept of fault tolerance in system resiliency?
To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
Which of the following BEST helps to ensure data integrity across system interfaces?
Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization ' s privacy policy?
A database administrator (DBA) should be prevented from having end user responsibilities:
Which of the following provides the BEST assurance that a new database management system (DBMS) meets the requirements of local privacy regulations?
Which of the following is a PRIMARY responsibility of an IT steering committee?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
An IS auditor reviewing an organization’s IT systems finds that the organization frequently purchases systems that are incompatible with the technologies already in the organization. Which of the following is the MOST likely reason?
Which of the following should be the PRIMARY focus when communicating an IS audit issue to management?
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
Which of the following is the MOST important control for virtualized environments?
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
During an audit which of the following would be MOST helpful in establishing a baseline for measuring data quality?
During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
An organization has decided to purchase a web-based email service from a third-party vendor and eliminate its own email server infrastructure. What type of cloud computing environment would BEST meet the organization ' s objective?
An IS auditor wants to gain a better understanding of an organization’s selected IT operating system software. Which of the following would be MOST helpful to review?
Which of the following audit procedures would provide the BEST assurance that an application program is functioning as designed?
Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?
An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
Which of the following is the MOST important consideration when relying on the work of the prior auditor?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Which of the following responsibilities of an organization ' s quality assurance (QA) function should raise concern for an IS auditor?
Which of the following is MOST important to include when developing a business continuity plan (BCP)?
An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization ' s security policy?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
When reviewing an organization ' s finalized risk assessment process, what would be the MAIN reason for an IS auditor to compare acceptable risk level with residual risk?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
An organization is disposing of removable onsite media which contains sensitive information. Which of the following is the MOST effective method to prevent disclosure of sensitive data?
An IS auditor is reviewing an organization ' s business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor ' s GREATEST concern?
An IS auditor has been asked to review the integrity of data transfer between two business-critical systems that have not been tested since implementation. Which of the following would provide the MOST useful information to plan an audit?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
Which of the following is the PRIMARY purpose of a business impact analysts (BIA) in an organization ' s overall risk management strategy?
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
An IS auditor suspects an organization ' s computer may have been used to commit a crime. Which of the following is the auditor ' s BEST course of action?
Which of the following should be an IS auditor ' s GREATEST concern when a data owner assigns an incorrect classification level to data?
Which of the following techniques BEST mitigates the risk of pervasive network attacks?
Who should be the FIRST to evaluate an audit report prior to issuing it to the project steering committee?
Which of the following is MOST likely to be a project deliverable of an agile software development methodology?
Which of the following provides the GREATEST assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively?
Which of the following is MOST important for an IS auditor to determine when reviewing the design and implementation of controls?
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?
Which of the following is the BEST recommendation by an IS auditor to prevent unauthorized access to Internet of Things (loT) devices ' ?
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor ' s GREATEST concern?
An organization plans to replace its nightly batch processing backup to magnetic tape with real-time replication to a second data center. Which of the following is the GREATEST risk associated with this change?
Which of the following should be done FIRST to minimize the risk of unstructured data?
Management has agreed to move the organization ' s data center due to recent flood map changes in its current location. Which risk response has been adopted?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
Which of the following is MOST helpful for understanding an organization’s key driver to modernize application platforms?
Which of the following is the GREATEST concern related to an organization ' s data classification processes?
Which of the following is the PRIMARY function of an internal IS auditor when the organization acquires a new IT system to support its business strategy?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
Which of the following BEST enables an IS auditor to confirm the batch processing to post transactions from an input source is successful?
In which data loss prevention (DLP) deployment model is data inspection and policy enforcement performed at the organization ' s perimeter or gateway?
In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?
An organization that has decided to approve the use of end-user computing (EUC) should FIRST ensure:
An organization is modernizing its technology policy framework to demonstrate compliance with external industry standards. Which of the following would be MOST useful to an IS auditor for validating the outcome?
An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor’s independence?
Which of the following BEST describes the process of creating a digital envelope?
Which of the following is the MOST efficient control to reduce the risk associated with a systems administrator having network administrator responsibilities?
Which of the following BEST enables an organization to standardize its IT infrastructure to align with business goals?
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
Which of the following is the MOST important Issue for an IS auditor to consider with regard to Voice-over IP (VoIP) communications?
An external IS auditor is reviewing the continuous monitoring system for a large bank and notes several potential issues. Which of the following would present the GREATEST concern regarding the reliability of the monitoring system?
Which of the following BEST supports the effectiveness of a compliance program?
Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?
During a physical security audit, an IS auditor was provided a proximity badge that granted access to three specific floors in a corporate office building. Which of the following issues should be of MOST concern?
Which of the following metrics is the BEST indicator of the performance of a web application
Which of the following is the BEST indication that a software development project is on track to meet its completion deadline?
An organization is implementing a data loss prevention (DLP) system in response to a new regulatory requirement Reviewing. which of the following would be MOST helpful in evaluating the system ' s design?
Which of the following provides re BEST evidence that outsourced provider services are being properly managed?
A network analyst is monitoring the network after hours and detects activity that appears to be a brute-force attempt to compromise a critical server. After reviewing the alerts to ensure their accuracy, what should be done NEXT?
Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?
An IS auditor is asked to provide feedback on the systems options analysis for a new project. The BEST course of action for the IS auditor would be to:
The management of a small e-commerce firm is concerned about the impact of AI adoption on its intellectual property. Which of the following BEST addresses this concern?
Which of the following poses the GREATEST potential concern for an organization that decides to consolidate mission-critical applications on a large server as part of IT capacity management?
An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
Internal audit is evaluating an organization’s IT portfolio management. Which of the following would be the BEST recommendation for prioritizing the funding of IT projects?
Who is accountable for an organization ' s enterprise risk management (ERM) program?
An IS auditor is reviewing documentation from a change that was applied to an application. Which of the following findings would be the GREATEST concern?
Which of the following would present the GREATEST risk within a release management process for a new application?
Which of the following is an IS auditor ' s BEST recommendation for mitigating risk associated with inadvertent disclosure of sensitive information by employees?
Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor ' s FIRST action should be to:
During a database security audit, an IS auditor is reviewing the process used to input data. Which of the following is the MOST significant risk area for the auditor to focus on?
Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Which of the following should be an IS auditor ' s PRIMARY focus when auditing the implementation of a new IT operations performance monitoring system?
When classifying information, it is MOST important to align the classification to:
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor ' s BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following provides the MOST reliable method of preventing unauthonzed logon?
During which phase of the software development life cycle should an IS auditor be consulted to recommend security controls?
An IS auditor is planning an audit of an organization ' s accounts payable processes. Which of the following controls is MOST important to assess in the audit?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following would be an auditor ' s GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?
In an annual audit cycle, the audit of an organization ' s IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
When assessing whether an organization ' s IT performance measures are comparable to other organizations in the same industry, which of the following would be MOST helpful to review?
An IS auditor is assessing the adequacy of management ' s remediation action plan. Which of the following should be the MOST important consideration?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
Which of the following is the MOST effective way to evaluate the physical security of a data center?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?
An IS auditor discovers that a developer has used the same key to grant access to multiple applications making calls to an application programming interface (API). Which of the following is the BEST recommendation to address this situation?
Which of the following is the MOST important consideration when determining how frequently to review a data protection policy?
Of the following who should be responsible for cataloging and inventorying robotic process automation (RPA) processes?
Which of the following should be given GREATEST consideration when implementing the use of an open-source product?
Which of the following would be an IS auditor ' s GREATEST concern when reviewing the early stages of a software development project?
Which of the following is the BEST evidence that an organization ' s IT strategy is aligned lo its business objectives?
Which of the following poses the GREATEST risk to the use of active RFID tags?
Which of the following is the BEST control to mitigate attacks that redirect internet traffic to an unauthorized website?
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor ' s NEXT step should be to:
An IS auditor discovers from patch logs that some in-scope systems are not compliant with the regular patching schedule. What should the auditor do NEXT?
Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?
Which of the following controls would BEST help a forensic investigator prevent modifications in digital evidence?
Which of the following would be MOST helpful to an IS auditor performing a risk assessment of an application programming interface (API) that feeds credit scores from a well-known commercial credit agency into an organizational system?
An organization uses an automated continuous integration/continuous deployment (CI/CD) tool to deploy changes to production. Which of the following would be an IS auditor ' s GREATEST concern in this situation?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization ' s website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
A post-implementation audit has been completed for the deployment of a sophisticated job scheduling tool Which of the following observations would be of GREATEST concern?
When reviewing an organization’s enterprise architecture (EA), which of the following is an IS auditor MOST likely to find within the EA documentation?
When designing a data analytics process, which of the following should be the stakeholder ' s role in automating data extraction and validation?
Which of the following is the MOST effective control to mitigate against the risk of inappropriate activity by employees?
Which of the following is the GREATEST advantage of maintaining an internal IS audit function within an organization?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor ' s PRIMARY concern?
An IS auditor is reviewing an organization that performs backups on local database servers every two weeks and does not have a formal policy to govern data backup and restoration procedures. Which of the following findings presents the GREATEST risk to the organization?
Which of the following BEST enables an organization to measure the current state of IT processes against leading practices?
An IS auditor is reviewing a data conversion project Which of the following is the auditor ' s BEST recommendation prior to go-live?
Which of the following is MOST important to include in a feasibility study when developing a business case for an IT investment?
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following observations regarding change management should be considered the MOST serious risk by an IS auditor?
During the development of a business case for a new application, the IS auditor should be PRIMARILY involved in the:
An organization produces control reports with a desktop application that accesses data in the central production database. Which of the following would give an IS auditor concern about the reliability of these reports?
Which of the following findings would be of GREATEST concern when auditing an organization ' s end-user computing (EUC)?
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor ' s BEST course of action?
Which of the following is the BEST way to mitigate risk to an organization ' s network associated with devices permitted under a bring your own device (BYOD) policy?
which of the following is a core functionality of a configuration and release management system?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
Which of the following is the MOST important regulatory consideration for an organization determining whether to use its customer data to train AI algorithms?
An IS auditor is reviewing an IT project and finds that an earned value analysis (EVA) is not regularly performed as part of project status reporting. Which of the following is the GREATEST risk resulting from this situation?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality
within the organization. Which of the following should be recommended as the PRIMARY factor to
determine system criticality?
Which of the following would be the GREATEST concern for an IS auditor conducting a pre-implementation review of a data loss prevention (DLP > tool?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
Which of the following should be done FIRST to ensure the secure configuration of new IT assets in an organization?
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor ' s BEST recommendation?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.
Which of the following is the BEST course of action to address this issue?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
Which of the following is the BEST indication that an information security awareness program is effective?
Which of the following MUST be performed by senior audit leadership prior to starting an IS audit project?
When classifying information, it is MOST important to align the classification to:
A system experiences multiple recurring processing errors. Which of the following is the PRIMARY concern for an IS auditor?