Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
Retention periods and conditions for the destruction of personal data should be determined by the.
The following findings are the result of an IS auditor's post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?
Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization's patch management process?
An IS auditor is reviewing an organization's business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor's GREATEST concern?
A database administrator (DBA) should be prevented from having end user responsibilities:
An IT balanced scorecard is PRIMARILY used for:
Which of the following is an IS auditor's BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?
Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?
Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:
Which of the following should an IS auditor recommend be done FIRST when an organization is made aware of a new regulation that is likely to impact IT security requirements?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?
Which of the following is MOST effective for controlling visitor access to a data center?
When is it MOST important for an IS auditor to apply the concept of materiality in an audit?
An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS
What is the MOST effective way to detect installation of unauthorized software packages by employees?
An IS department is evaluated monthly on its cost-revenue ratio user satisfaction rate, and computer downtime This is BEST zed as an application of.
Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?
When assessing a proposed project for the two-way replication of a customer database with a remote call center, the IS auditor should ensure that:
Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls?
Which of the following should an organization do to anticipate the effects of a disaster?
Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD)
policy to help prevent data leakage?
An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?
Which of the following is the BEST methodology to use for estimating the complexity of developing a large business application?
Which of the following is the BEST testing approach to facilitate rapid identification of application interface errors?
When classifying information, it is MOST important to align the classification to:
Which of the following provides the MOST useful information regarding an organization's risk appetite and tolerance?
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following
is the auditor’s BEST recommendation to prevent unauthorized access?
Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?
What is the BEST way to reduce the risk of inaccurate or misleading data proliferating through business intelligence systems?
Which of the following is the BEST indicator for measuring performance of IT help desk function?
As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:
Which of the following is the BEST way to minimize sampling risk?
Which of the following can only be provided by asymmetric encryption?
Which of the following is the BEST reason for an IS auditor to emphasize to management the importance of using an IT governance framework?
In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?
Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?
Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?
Which of the following would BEST help to ensure that an incident receives attention from appropriate personnel in a timely manner?
A new system development project is running late against a critical implementation deadline Which of the following is the MOST important activity?
Which of the following is MOST important during software license audits?
Which type of device sits on the perimeter of a corporate of home network, where it obtains a public IP address and then generates private IP addresses internally?
Which of the following is the MOST important responsibility of user departments associated with program changes?
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?