When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
Which of the following should be restricted from a network administrator's privileges in an adequately segregated IT environment?
An organization's IT risk assessment should include the identification of:
Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?
Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?
Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?
One advantage of monetary unit sampling is the fact that
Which of the following provides the MOST reliable method of preventing unauthonzed logon?
A computer forensic audit is MOST relevant in which of the following situations?
An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:
An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?
Which of the following is an IS auditor's BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?
An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?
Which of the following should an organization do to anticipate the effects of a disaster?
The charging method that effectively encourages the MOST efficient use of IS resources is:
An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?
With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?
Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?
When assessing whether an organization's IT performance measures are comparable to other organizations in the same industry, which of the following would be MOST helpful to review?
An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?
What is the MOST effective way to detect installation of unauthorized software packages by employees?
An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?
Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?
Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?
Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?
A characteristic of a digital signature is that it
An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application's operating system?
A database administrator (DBA) should be prevented from having end user responsibilities:
When is it MOST important for an IS auditor to apply the concept of materiality in an audit?
What is the BEST way to reduce the risk of inaccurate or misleading data proliferating through business intelligence systems?
Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?
Which of the following is the MAJOR advantage of automating internal controls?
During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?
An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''
Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?
Which of the following is the PRIMARY reason to perform a risk assessment?
Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?
Which of the following provides the BEST assurance of data integrity after file transfers?
Backup procedures for an organization's critical data are considered to be which type of control?
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
What is the PRIMARY purpose of performing a parallel run of a now system?
Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan?
PDF + Testing Engine
|
---|
$87.15 |
Testing Engine
|
---|
$78.75 |
PDF (Q&A)
|
---|
$69.65 |
Isaca Free Exams |
---|
![]() |