Audit frameworks cart assist the IS audit function by:
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
An IT balanced scorecard is PRIMARILY used for:
Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?
During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor's BEST course of action?
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
Which of the following is MOST important for an IS auditor to validate when auditing network device management?
An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?
Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?
An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?
One advantage of monetary unit sampling is the fact that
During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?
The PRIMARY purpose of requiring source code escrow in a contractual agreement is to:
Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?
A web proxy server for corporate connections to external resources reduces organizational risk by:
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?
Email required for business purposes is being stored on employees' personal devices.
Which of the following is an IS auditor's BEST recommendation?
An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
When auditing the feasibility study of a system development project, the IS auditor should:
Which of the following is the MOST important outcome of an information security program?
In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?
An IS auditor engaged in developing the annual internal audit plan learns that the chief information officer (CIO) has requested there be no IS audits in the upcoming year as more time is needed to address a large number of recommendations from the previous year. Which of the following should the auditor do FIRST
An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?
Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?
An IS auditor evaluating the change management process must select a sample from the change log. What is the BEST way to the auditor to confirm the change log is complete?
Which of the following should an organization do to anticipate the effects of a disaster?
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
An IS auditor requests direct access to data required to perform audit procedures instead of asking management to provide the data Which of the following is the PRIMARY advantage of this approach?
An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?
Which of the following is MOST important to consider when developing a service level agreement (SLAP)?
Capacity management tools are PRIMARILY used to ensure that:
An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?
Which of the following is an IS auditor's BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?
When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?
Which of the following strategies BEST optimizes data storage without compromising data retention practices?
The PRIMARY advantage of object-oriented technology is enhanced:
Which of the following should be done FIRST when planning a penetration test?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
A proper audit trail of changes to server start-up procedures would include evidence of:
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
Which of the following would be a result of utilizing a top-down maturity model process?