Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
Before the release of a new application into an organization’s production environment, which of the following should be in place to ensure that proper testing has occurred and rollback plans are in place?
A configuration management audit identified that predefined automated procedures are used when deploying and configuring application infrastructure in a cloud-based
environment. Which of the following is MOST important for the IS auditor to review?
Which of the following is the BEST compensating control against separation of duties conflicts in new code development?
An IS auditor is reviewing a data conversion project Which of the following is the auditor ' s BEST recommendation prior to go-live?
In a data center audit, an IS auditor finds that the humidity level is very low. The IS auditor would be MOST concerned because of an expected increase in:
If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:
During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility Which of the following is the IS auditor ' s BEST course of action?
Which of the following is the MOST important regulatory consideration for an organization determining whether to use its customer data to train AI algorithms?
An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
Which of the following would be the GREATEST concern for an IS auditor conducting a pre-implementation review of a data loss prevention (DLP > tool?
With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
Which of the following provides the MOST assurance of the integrity of a firewall log?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
Which of the following should be of MOST concern to an IS auditor reviewing an organization’s business impact analysis (BIA)?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
Which of the following BEST indicates that the effectiveness of an organization ' s security awareness program has improved?
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
Which of the following is an audit reviewer ' s PRIMARY role with regard to evidence?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor ' s FIRST action should be to:
The FIRST step in an incident response plan is to:
An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?
Which of the following BEST describes the concept of fault tolerance in system resiliency?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
which of the following is a core functionality of a configuration and release management system?
In order to be useful, a key performance indicator (KPI) MUST
Which of the following BEST Indicates that an incident management process is effective?
Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?
Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?
The PRIMARY benefit of automating application testing is to:
Which of the following is MOST useful for determining the strategy for IT portfolio management?
Which of the following is the BEST way to ensure email confidentiality in transit?
During which process is regression testing MOST commonly used?
An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?
To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?
In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?
Which of the following should be an IS auditor ' s GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?
To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
Capacity management enables organizations to:
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization ' s plans to implement robotic process automation (RPA > to automate routine business tasks?
An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?
If concurrent update transactions to an account are not processed properly, which of the following will be affected?
Capacity management tools are PRIMARILY used to ensure that:
TESTED 15 Apr 2026