<< Prev Question Next Question >>

Question 2/100

A company laptop has been stolen and all photos on the laptop have been published on social media. Which of the following is the IS auditor's BEST course of action?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (100q)
Question 1: Which of the following would an IS auditor recommend as the ...
Question 2: A company laptop has been stolen and all photos on the lapto...
Question 3: An organization has established three IS processing environm...
Question 4: Which of the following provides the BEST evidence of the eff...
Question 5: Which of the following is the BEST approach for performing a...
Question 6: MOST critical security weakness of a packet level firewall i...
Question 7: An IS auditor is conducting a review of an organization s in...
Question 8: A security review reveals an organization b struggling with ...
Question 9: Which of the following should the IS auditor use to BEST det...
Question 10: IS management has decided to rewrite a legacy customer relat...
Question 11: Which of the following is the BEST time for an IS auditor to...
Question 12: What is the MOST important business concern when an organiza...
Question 13: An IS auditor is conducting a review of a healthcare organiz...
Question 14: Which of the following a recent internal data breach, an IS ...
Question 15: Which of the following is the MOST effective control for a u...
Question 16: A bank is relocating its servers to a vendor that provides d...
Question 17: Which of the following communication modes should be of GREA...
Question 18: Which of the following provides an IS auditor the MOST assur...
Question 19: Which of the following is the MOST important determining fac...
Question 20: An IS auditor has found that a vendor has gone out of busine...
Question 21: A recent audit identified duplicate software licenses and te...
Question 22: Which of the following procedures would BEST contribute to t...
Question 23: The IS auditor's PRIMARY role in control self-assessment (CS...
Question 24: The CIO of an organization is concerned that the information...
Question 25: What is the BEST population to select from when testing that...
Question 26: MOST effective way to determine if IT is meeting business re...
Question 27: Requiring that passwords contain a combination of numeric an...
Question 28: When migrating critical systems to a cloud provider, the GRE...
Question 29: Which audit technique provides the GREATEST assurance that i...
Question 30: Which of the following is the PRIMARY advantage of using vir...
Question 31: Which of the following IS audit findings should be of GREATE...
Question 32: Which of the following would BEST indicate the effectiveness...
Question 33: An organization has software that is not compliant with data...
Question 34: Following the sale of a business division, employees will be...
Question 35: When conducting a follow-up audit on an organization s firew...
Question 36: Which of the following is the BEST approach to identify whet...
Question 37: Documentation of workaround processes to keep a business fun...
Question 38: The MOST important reason for documenting all aspects of a d...
Question 39: Which of the following is the BCST way to determine the effe...
Question 40: Which of the following should be an IS auditor's PRIMARY con...
Question 41: After an IS auditor has identified threats and potential imp...
Question 42: Which of the following is the BEST source of information whe...
Question 43: An IS auditor is observing transaction processing and notes ...
Question 44: The BEST way to prevent fraudulent payments is to implement ...
Question 45: Which of the following would be the PRIMARY benefit of repla...
Question 46: During a review of information security procedures for disab...
Question 47: What is the primary objective of a control self-assessment (...
Question 48: Structured programming is BEST described as a technique that...
Question 49: An organization has implemented a control to help ensure dat...
Question 50: Which of the following is the BEST reason for an organizatio...
Question 51: A stockbroker accepts orders over the Internet. Which of the...
Question 52: The use of a GANTT chart can:
Question 53: Which of the following would be an IS auditor's GREATEST con...
Question 54: Which of the following is a passive attack on a network?...
Question 55: Management decided to accept the residual risk of an audit f...
Question 56: In a public key infrastructure (PKI), the authority responsi...
Question 57: Which of the following is MOST likely to be prevented by a f...
Question 58: The BEST way to evaluate the effectiveness of a newly develo...
Question 59: An organization offers an online information security awaren...
Question 60: A security regulation requires the disabling of direct admin...
Question 61: Which of the following is the MOST important process to ensu...
Question 62: Which of the following would be the MOST likely reason for a...
Question 63: Both statistical and nonstatistical sampling techniques:...
Question 64: A typical network architecture used for e-commerce, a load b...
Question 65: An IS auditor finds that firewalls are outdated and not supp...
Question 66: Which of the following projects would be MOST important to r...
Question 67: Which of the following will BEST help to ensure that an in-h...
Question 68: To develop a robust data security program, the FIRST course ...
Question 69: Which of the following could be determined by an entity-rela...
Question 70: Which of the following metrics would be MOST helpful to an I...
Question 71: A company has implemented an IT segregation of duties policy...
Question 72: Which of the following is the BEST source for describing the...
Question 73: Which of the following would be the MOST efficient audit app...
Question 74: Which of the following systems-based approaches would a fina...
Question 75: IS auditors are MOST likely to perform compliance tests of i...
Question 76: The information security function in a large organization is...
Question 77: select a sample for testing, which must include the 80 large...
Question 78: These members of an emergency incident response team should ...
Question 79: An organization plans to launch a social media presence as p...
Question 80: Who is ultimately accountable for the development of an IS s...
Question 81: The PRIMARY advantage of object-oriented technology is enhan...
Question 82: Which of the following would BEST detect logic bombs in new ...
Question 83: Which of the following is the GREATEST risk posed by denial-...
Question 84: An organization is replacing a mission-critical system. Whic...
Question 85: An IS auditor is a member of an application development team...
Question 86: Two organizations will share ownership of a new enterprise r...
Question 87: A LAN administrator normally would be restricted from:...
Question 88: In an EDI process, the device which transmits and receives e...
Question 89: Which of the following should be done FIRST when planning a ...
Question 90: A number of system failures are occurring when corrections t...
Question 91: While reviewing similar issues in an organization s help des...
Question 92: Which of the following would be MOST helpful when assessing ...
Question 93: A critical function of a firewall is to act as a:...
Question 94: An effective implementation of security roles and responsibi...
Question 95: Which of the following would be an appropriate role of inter...
Question 96: The grants management system is used to calculate grant paym...
Question 97: Which of the following is the GREATEST risk of cloud computi...
Question 98: An organization implements a data loss prevention tool as a ...
Question 99: An advantage of installing a thin client architecture in a l...
Question 100: Following an unauthorized disclosure of data, an organizatio...