<< Prev Question Next Question >>

Question 111/194

A company laptop has been stolen and all photos on the laptop have been published on social media. Which of the following is the IS auditor's BEST course of action?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (194q)
Question 1: Which of the following is MOST important for the improvement...
Question 2: An organization has installed blade server technology in its...
Question 3: Which of the following is the MOST effective way to identify...
Question 4: Which of the following access control situations represents ...
Question 5: Which of the following is a detective control?...
Question 6: Two organizations will share ownership of a new enterprise r...
Question 7: Which of the following is the PRIMARY reason for database op...
Question 8: Adopting a service-oriented architecture would MOST likely:...
Question 9: An organization uses two data centers. Which of the followin...
Question 10: Which of the following would be an appropriate role of inter...
Question 11: An IS auditor has observed gaps in the data available to the...
Question 12: An IS auditor has been asked to advise on the design and imp...
Question 13: An organization was recently notified by its regulatory body...
Question 14: A company has implemented an IT segregation of duties policy...
Question 15: Which of the following would BEST enable an IS auditor to pe...
Question 16: During a review of an application system, an IS auditor iden...
Question 17: Loss-site scripting (XSS) attacks are BEST prevented through...
Question 18: Which of the following will BEST ensure that a proper cutoff...
Question 19: Which of the following is the GREATEST risk posed by denial-...
Question 20: During business process reengineering (BPR) of a bank's tell...
Question 21: An IT management group has developed a standardized security...
Question 22: When conducting a post implementation review which of the fo...
Question 23: Which of the following BEST enables timely detection of chan...
Question 24: When an organization is having new software implemented unde...
Question 25: What is the MOST important business concern when an organiza...
Question 26: Which of the following should the IS auditor use to BEST det...
Question 27: A user of a telephone banking system has forgotten his perso...
Question 28: Which of the following is the MOST important reason to use s...
Question 29: Which of the following could be used to evaluate the effecti...
Question 30: Which of the following should be an IS auditor's PRIMARY foc...
Question 31: Which of the following would be MOST important for an IS aud...
Question 32: A stockbroker accepts orders over the Internet. Which of the...
Question 33: During a review of a production schedule, an IS auditor obse...
Question 34: Which of the following is the BEST way to control the concur...
Question 35: During an audit of the organization's data privacy policy, t...
Question 36: internal IS auditor recommends that incoming accounts payabl...
Question 37: Which of the following is the MOST significant driver of eff...
Question 38: select a sample for testing, which must include the 80 large...
Question 39: An organization is developing data classification standards ...
Question 40: What is the MOST important role of a certificate authority (...
Question 41: Which of the following would be MOST helpful in ensuring sec...
Question 42: The objectives of business process improvement should PRIMAR...
Question 43: Both statistical and nonstatistical sampling techniques:...
Question 44: An organization uses electronic funds transfer (EFT) to pay ...
Question 45: Which of the following procedures would BEST contribute to t...
Question 46: What is the PRIMARY benefit of prototyping as a method of sy...
Question 47: An IS auditor performing an audit of backup procedures obser...
Question 48: Which of the following would an IS auditor consider to be th...
Question 49: Which of the following would represent an acceptable test of...
Question 50: During a software acquision review, an IS auditor should rec...
Question 51: An IS auditor is evaluating the log management system for an...
Question 52: Which of the following is the MOST critical characteristic o...
Question 53: An employee transfers from an organization's risk management...
Question 54: An organization s data retention policy states that all data...
Question 55: Which of the following is the MOST important process to ensu...
Question 56: An IS auditor notes that help desk personnel are required to...
Question 57: What is the GREASTEST concern for an IS auditory reviewing c...
Question 58: What is an IS auditor's BEST recommendation for management i...
Question 59: During audit planning, an IS auditor walked through the desi...
Question 60: Which of the following is the BEST indication of an effectiv...
Question 61: Which of the following would be of MOST concern during an au...
Question 62: Which of the following is a key success factor for implement...
Question 63: Due to the small size of the payroll department, an organiza...
Question 64: Which procedure provides the GREATEST assurance that correct...
Question 65: Which of the following is MOST important to include in foren...
Question 66: A vendor service level agreement (SLA) requires backup to be...
Question 67: Which of the following would be the GREATEST concern to an I...
Question 68: An auditor is creating an audit program in which the objecti...
Question 69: Which of the following will enable a customer to authenticat...
Question 70: Which of the following is the PRIMARY benefit of implementin...
Question 71: The operations team of an organization has reported an IS se...
Question 72: An IS auditor is performing a post-implementation review of ...
Question 73: An IS auditor reviewing the use of encryption finds that the...
Question 74: Which of the following should be of concern to an IS auditor...
Question 75: What would be an IS auditors GREATEST concern when using a t...
Question 76: Which of the following is the BCST way to determine the effe...
Question 77: During an audit, which of the following would be MOST helpfu...
Question 78: An IS auditor has completed a service level management audit...
Question 79: During the planning stage of compliance audit, an IS auditor...
Question 80: An IS auditor is conducting a pre-implementation review to d...
Question 81: Which of the following should be an IS auditor's PRIMARY con...
Question 82: A large insurance company is about to replace a major financ...
Question 83: Which of the following is the MOST important requirement for...
Question 84: Overall responsibility for approving logical access rights t...
Question 85: Which of the following is the MOST effective mechanism for e...
Question 86: An organization has established hiring policies and procedur...
Question 87: Which of the following is the MOST important consideration w...
Question 88: Which of the following would BEST assist senior management i...
Question 89: On a daily basis, an in-house development team moves duplica...
Question 90: An organization implements a data loss prevention tool as a ...
Question 91: Which of the following tasks should be performed during an o...
Question 92: An intruder accesses an application server and makes changes...
Question 93: Which of the following is MOST likely to result from complia...
Question 94: An IS auditor learns a server administration team regularly ...
Question 95: Which of the following is MOST likely to enable a hacker to ...
Question 96: An IS audit manager finds that data manipulation logic devel...
Question 97: During a security audit, which of the following is MOST impo...
Question 98: Which of the following cloud deployment models would BEST me...
Question 99: Which of the following is the FIRST step when conducting a b...
Question 100: IS audit is asked 10 explain how local area network (LAN) se...
Question 101: Which of the following should be performed immediately after...
Question 102: While reviewing a hot site, the IS auditor discovers that on...
Question 103: An IS auditor notes that application super-user activity was...
Question 104: To help ensure the accuracy and completeness of end-user com...
Question 105: Which of the following is the BEST way to facilitate proper ...
Question 106: When introducing a maturity model to the IT management proce...
Question 107: Which of the following would BEST facilitate the detection o...
Question 108: Following a breach, what is the BEST source to determine the...
Question 109: Following an IS audit recommendation, all Telnet and File Tr...
Question 110: Which of the following an IS audit, which of the following t...
Question 111: A company laptop has been stolen and all photos on the lapto...
Question 112: Which of the following is the BEST approach to verify that i...
Question 113: Which of the following should be reviewed as part of a data ...
Question 114: Which of the following is a detective control that can be us...
Question 115: To confirm integrity for a hashed message, the receiver shou...
Question 116: Which of the following procedures would BEST contribute to t...
Question 117: An IS auditor would MOST likely recommend that IT management...
Question 118: Which of the following findings would have the GREATEST impa...
Question 119: Which of the following will BEST protect the confidentiality...
Question 120: An IS auditor reviewing an incident management process ident...
Question 121: Which of the following is the BEST guidance from an IS audit...
Question 122: An is auditor discovers a recurring software control process...
Question 123: An IS auditor auditing the effectiveness of utilizing a hot ...
Question 124: Management decided to accept the residual risk of an audit f...
Question 125: An IS auditor is mapping controls to risk for an accounts pa...
Question 126: Which of the following would be MOST critical for an IS audi...
Question 127: Which of the following a recent internal data breach, an IS ...
Question 128: An organization wants to test business continuity using a sc...
Question 129: To effectively classify data, which of the following MUST be...
Question 130: Which of the following is the PRIMARY advantage of using vir...
Question 131: Which of the following is the BEST way to evaluate the effec...
Question 132: Which of the following would be an IS auditor's GREATEST con...
Question 133: Which of the following should be an IS auditor's GREATEST co...
Question 134: Which of the following protects against the impact of tempor...
Question 135: The MOST efficient way to confirm that an ERP system being i...
Question 136: Which of the following is the MOST important activity to und...
Question 137: An IS auditor is reviewing an organization's sales and purch...
Question 138: An IS auditor should ensure that an application's audit trai...
Question 139: Which of the following would an IS auditor recommend as the ...
Question 140: When reviewing business continuity plan (BCP) test results, ...
Question 141: Which of the following is the PRIMARY role of an IS auditor ...
Question 142: An IS audit report highlighting inadequate network internal ...
Question 143: An organization is using a single account shared by personne...
Question 144: To create a digital signature in a message using asymmetric ...
Question 145: An employee loses a mobile device resulting in loss of sensi...
Question 146: Which of the following is the MOST significant risk associat...
Question 147: When planning for the implementation of a new system, an org...
Question 148: Which of the following BEST ensures that only authorized sof...
Question 149: Which of the following is the BEST way to help ensure the se...
Question 150: The GREATEST risk of database renormalization is:...
Question 151: Which of the following is the MOST effective way to minimize...
Question 152: Which of the following projects would be MOST important to r...
Question 153: Which of the following is a reason for implementing a decent...
Question 154: When engaging services from external auditors, which of the ...
Question 155: An organization is in the process of deciding whether to all...
Question 156: Which of the following should an IS auditor verify when audi...
Question 157: When auditing a quality assurance plan, an IS auditor should...
Question 158: An IS auditor observes that an organization s critical IT sy...
Question 159: Which of the following is MOST important for an IS auditor t...
Question 160: The grants management system is used to calculate grant paym...
Question 161: The IS auditor's PRIMARY role in control self-assessment (CS...
Question 162: Since data storage of a critical business application is on ...
Question 163: To ensure efficient and economic use of limited resources in...
Question 164: An organization's IT security policy states that user ID's m...
Question 165: Which the following is MOST critical for the effective imple...
Question 166: The independence of an IS auditor auditing an application is...
Question 167: Documentation of workaround processes to keep a business fun...
Question 168: Which of the following is the KST source of information for ...
Question 169: One advantage of monetary unit sampling is the fact that:...
Question 170: Which of the following should be the PRIMARY consideration f...
Question 171: Which of the following provides the MOST comprehensive descr...
Question 172: A company uses a standard form to document and approve all c...
Question 173: Which of the following are BEST suited for continuous auditi...
Question 174: To maintain the confidentiality of information moved between...
Question 175: Which of ihe following should be done FIRST to effectively d...
Question 176: Which of the following controls will MOST effectively detect...
Question 177: Which of the following would be considered the BEST compensa...
Question 178: maturity model is useful in the assessment of IT service man...
Question 179: Which of the following should be of GREATEST concern to an I...
Question 180: An IS auditor finds that confidential company data has been ...
Question 181: Which of the following is a prerequisite to help ensure that...
Question 182: An IS auditor discovered abnormalities in a monthly report g...
Question 183: A database administrator (DBA) extracts a user listing for a...
Question 184: Which of the following should an IS auditor recommend to red...
Question 185: Which of the following would be an auditor's GREATEST concer...
Question 186: An organization has purchased a replacement mainframe comput...
Question 187: An organization allows its employees to use personal mobile ...
Question 188: An IS auditor has been asked to perform a post-implementatio...
Question 189: An organization is deciding whether to outsource its custome...
Question 190: An organization is considering outsourcing the processing of...
Question 191: An IS auditor evaluating a three-tier client/server architec...
Question 192: When an intrusion into an organizations network is detected,...
Question 193: Which of the following occurs during the issues management p...
Question 194: When designing metrics for information security, the MOST im...