Which of the following is the MOST appropriate control to ensure integrity of online orders?
Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
Which of the following is the BEST indication of effective IT investment management?
Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?
An IS auditor learns that an in-house system development life cycle (SDLC) project has not met user specifications. The auditor should FIRST examine requirements from which of the following phases?
A checksum is classified as which type of control?
Which of the following is the GREATEST risk associated with hypervisors in virtual environments?
An IT balanced scorecard is PRIMARILY used for:
Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?
Which of the following is the PRIMARY objective of a control self-assessment (CSA)?
Which of the following is the GREATEST risk associated with utilizing spreadsheets for financial reporting in end-user computing (EUC)?
An IS auditor is reviewing desktop software profiles and notes that a user has downloaded and installed several games that are not approved by the company. Which of the following is the MOST significant risk that could result from this situation?
Which of the following technologies is BEST suited to fulfill a business requirement for nonrepudiation of business-to-business transactions with external parties without the need for a mutually trusted entity?
Which of the following is MOST useful for determining the strategy for IT portfolio management?
A mission-critical application utilizes a one-node database server. On multiple occasions, the database service has been stopped to perform routine patching, causing application outages. Which of the following should be the IS auditor’s GREATEST concern?
Control self-assessments (CSAs) can be used to:
Which of the following is the MOST important regulatory consideration for an organization determining whether to use its customer data to train AI algorithms?
Which of the following is the PRIMARY objective of cyber resiliency?
Which of the following controls is MOST effective at preventing system failures when implementing a new web application?
Which of the following should be of MOST concern to an IS auditor reviewing an organization's operational log management?
Which of the following would BEST protect the confidentiality of sensitive data in transit between multiple offices?
Which of the following is the GREATEST risk related to the use of virtualized environments?
An IS auditor is reviewing an organization's cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?
Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?
Which of the following poses the GREATEST risk to the use of active RFID tags?
Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?
A contract for outsourcing IS functions should always include:
The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
An organization's information security policies should be developed PRIMARILY on the basis of:
Which of the following should be the GREATEST concern for an IS auditor reviewing recent disaster recovery operations?
which of the following is a core functionality of a configuration and release management system?
Which of the following would be MOST important to include in an IS audit report?
Which of the following is the GREATEST benefit of adopting an Agile audit methodology?
Which of the following key performance indicators (KPIs) provides stakeholders with the MOST useful information about whether information security risk is being managed?
Having knowledge in which of the following areas is MOST relevant for an IS auditor reviewing public key infrastructure (PKI)?
Which of the following recommendations would BEST prevent the implementation of IT projects without collaborating with the business?
An organization plans to centrally decommission end-of-life databases and migrate the data to the latest model of hardware. Which of the following BEST ensures data integrity is preserved during the migration?
An IS auditor is reviewing an organizations release management practices and observes inconsistent and inaccurate estimation of the size and complexity of business application development projects. Which of the following should the auditor recommend to address this issue?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's mobile device policies and controls in its corporate environment?
An IS auditor has been asked to provide support to the control self-assessment (CSA) program. Which of the following BEST represents the scope of the auditor’s role in the program?
During a pre-implementation review, an IS auditor notes that some scenarios have not been tested. Management has indicated that the project is critical and cannot be postponed. Which of the following is the auditor's BEST course of action?
The PRIMARY objective of a follow-up audit is to:
Which of the following types of firewalls provides the GREATEST degree of control against hacker intrusion?
During the forensic investigation of a cyberattack involving credit card data, which of the following is MOST important to ensure?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
To confirm integrity for a hashed message, the receiver should use:
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?
PDF + Testing Engine
|
---|
$87.15 |
Testing Engine
|
---|
$78.75 |
PDF (Q&A)
|
---|
$69.65 |
Isaca Free Exams |
---|
![]() |