Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
Which of the following should be an IS auditor's GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
Which of the following would be MOST useful when analyzing computer performance?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
Which of the following is a corrective control?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
The PRIMARY role of a control self-assessment (CSA) facilitator is to:
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
PDF + Testing Engine
|
---|
$99.6 |
Testing Engine
|
---|
$90 |
PDF (Q&A)
|
---|
$79.6 |
Isaca Free Exams |
---|
![]() |