Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
Capacity management enables organizations to:
After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
While auditing a small organization's data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
Which of the following is the MOST important activity in the data classification process?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
Which of the following is MOST important when implementing a data classification program?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
Which of the following is the BEST way to foster continuous improvement of IS audit processes and practices?
An organization uses public key infrastructure (PKI) to provide email security. Which of the following would be the MOST efficient method to determine whether email messages have been modified in transit?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?
Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?
To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
Which type of attack poses the GREATEST risk to an organization's most sensitive data?
Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?
Which of the following would provide management with the MOST reasonable assurance that a new data warehouse will meet the needs of the
organization?
Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?
An IS auditor learns that an organization's business continuity plan (BCP) has not been updated in the last 18 months and that the organization recently closed a production plant. Which of the following is the auditor's BEST course of action?
An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data
classification in this project?
A bank performed minor changes to the interest calculation computer program. Which of the following techniques would provide the STRONGEST evidence to determine whether the interest calculations are correct?
Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?
An organization has an acceptable use policy in place, but users do not formally acknowledge the policy. Which of the following is the MOST significant risk from this finding?
Which of the following is the MOST important advantage of participating in beta testing of software products?
Which of the following is MOST critical to the success of an information security program?
Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization's disaster recovery plan (DRP)?
Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?
Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?
Which of the following should be the IS auditor's PRIMARY focus when evaluating an organizations offsite storage facility?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility Which of the following is the IS auditor's BEST course of action?
Which of the following should be the PRIMARY concern for the it department head when implementing operational log management?
An external audit firm was engaged to perform a validation and verification review for a systems implementation project. The IS auditor identifies that regression testing is not part of the project plan and was not performed by the systems implementation team. According to the team, the parallel testing being performed is sufficient, making regression testing unnecessary. What should be the auditor’s NEXT step?
Which of the following would be of GREATEST concern to an IS auditor reviewing the resiliency of an organizational network that has two internet connections?
Which of the following will BEST ensure that archived electronic information of permanent importance remains accessible over time?
How does a continuous integration/continuous development (CI/CD) process help to reduce software failure risk?
An IS auditor has validated that an organization's IT department runs several low-priority automated tasks Which of the following is the BEST recommendation for an automated job schedule?
When an organization conducts business process improvements, the IS auditor should be MOST concerned with the:
Which of the following is the PRIMARY purpose of batch processing monitoring?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
PDF + Testing Engine
|
---|
$99.6 |
Testing Engine
|
---|
$90 |
PDF (Q&A)
|
---|
$79.6 |
Isaca Free Exams |
---|
![]() |