During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
Which of the following is the BEST data integrity check?
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
What is the PRIMARY benefit of using one-time passwords?
Which of the following provides the MOST useful information regarding an organization's risk appetite and tolerance?
Which of the following is an IS auditor's BEST approach when prepanng to evaluate whether the IT strategy supports the organization's vision and mission?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
Which of the following would an IS auditor find to be the GREATEST risk associated with the server room in a remote office location?
Which of the following controls helps to reduce fraud risk associated with robotic process automation (RPA)?
An organization requires the use of a key card to enter its data center. Recently, a control was implemented that requires biometric authentication for each employee.
Which type of control has been added?
Which of the following observations regarding change management should be considered the MOST serious risk by an IS auditor?
Which of the following is the GREATEST risk of project dashboards being set without sufficiently defined criteria?
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
Before the release of a new application into an organization’s production environment, which of the following should be in place to ensure that proper testing has occurred and rollback plans are in place?
Which of the following metrics is the BEST indicator of the performance of a web application?
Which of the following findings would be of GREATEST concern to an IS auditor reviewing the security architecture of an organization that has just implemented a Zero Trust solution?
An IS auditor is tasked to review an organization's plan-do-check-act (PDCA) method for improving IT-related processes and wants to determine the accuracy of defined targets to be achieved. Which of the following steps in the PDCA process should the auditor PRIMARILY focus on in this situation?
A business application's database is copied to a replication server within minutes. Which of the following processes taking place during business hours will MOST benefit from this architecture?
Which of the following BEST Indicates that an incident management process is effective?
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
Which of the following is the MOST effective accuracy control for entry of a valid numeric part number?
In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?
When reviewing an IT strategic plan, the GREATEST concern would be that
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?
Retention periods and conditions for the destruction of personal data should be determined by the.
An IS auditor reviewing incident response management processes notices that resolution times for reoccurring incidents have not shown improvement. Which of the following is the auditor's BEST recommendation?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor's BEST course of action?
An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?
Which of the following should be identified FIRST during the risk assessment process?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
Which of the following is the MOST important control for virtualized environments?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
What is the Most critical finding when reviewing an organization’s information security management?
Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?
IT disaster recovery time objectives (RTOs) should be based on the:
PDF + Testing Engine
|
---|
$99.6 |
Testing Engine
|
---|
$90 |
PDF (Q&A)
|
---|
$79.6 |
Isaca Free Exams |
---|
![]() |