<< Prev Question Next Question >>

Question 126/230

An IS auditor concludes that a local area network's (LAN's) access security is satisfactory. In reviewing the work, the audit manager should:

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (230q)
Question 1: Which of the following is the GREATEST risk posed by denial-...
Question 2: Which of the following controls will MOST effectively detect...
Question 3: Which of the following is the GREATEST concern with conducti...
Question 4: Which of the following would be an auditor's GREATEST concer...
Question 5: To preserve chain-of-custody following an internal server co...
Question 6: Which of the following should the IS auditor use to BEST det...
Question 7: ..risk that the IS auditor will not find an error that has o...
Question 8: Which of the following provides the BEST evidence of the eff...
Question 9: Which of the following is the BEST type of backup to minimiz...
Question 10: An organization uses two data centers. Which of the followin...
Question 11: Which of the following is the BEST way to control the concur...
Question 12: After an external IS audit, which of the following should be...
Question 13: While reviewing similar issues in an organization s help des...
Question 14: Spreadsheets are used to calculate project cost estimates To...
Question 15: When reviewing a disaster recovery plan (DRP) an IS auditor ...
Question 16: An IS auditor has discovered that a cloud-based application ...
Question 17: During an audit, which of the following would be MOST helpfu...
Question 18: Which of the following should be reviewed as part of a data ...
Question 19: During an audit of a mission-critical system hosted in an ou...
Question 20: Documentation of workaround processes to keep a business fun...
Question 21: An IS auditor conducts a review of a third-party vendor's re...
Question 22: An IS auditor learns a server administration team regularly ...
Question 23: The BEST way to prevent fraudulent payments is to implement ...
Question 24: Which of the following scenarios would enable a forensic inv...
Question 25: The BEST method an organization can employ to align its busi...
Question 26: Which of the following should be an IS auditor's PRIMARY foc...
Question 27: Which type of risk would MOST influence the selection of a s...
Question 28: mission-critical applications with a low recovery time objec...
Question 29: Which of the following could be determined by an entity-rela...
Question 30: The MAJOR reason for segregating test programs from producti...
Question 31: While reviewing an organization s business continuity plan (...
Question 32: The maturity level of an organization s problem management s...
Question 33: An IS auditor is involved in the user testing phase of a dev...
Question 34: An IS auditor discovered abnormalities in a monthly report g...
Question 35: During the planning stage of compliance audit, an IS auditor...
Question 36: Due to cost restraints, a company defers the replacement of ...
Question 37: What is an IS auditor's BEST recommendation for management i...
Question 38: An is auditor discovers a recurring software control process...
Question 39: A CIO has asked an IS to implement several security controls...
Question 40: An organization allows its employees to use personal mobile ...
Question 41: Both statistical and nonstatistical sampling techniques:...
Question 42: Which of the following features can be provided only by asym...
Question 43: During a network security review the system log indicates an...
Question 44: During an ERP post-implementation review, it was noted that ...
Question 45: Which of the following procedures should be implemented prio...
Question 46: An IS auditor has been asked to advise on the design and imp...
Question 47: Which of the following is MOST important for an IS auditor t...
Question 48: Which of the following would be MOST important for an IS aud...
Question 49: Which of the following is the MOST likely cause of a success...
Question 50: An organization has purchased a replacement mainframe comput...
Question 51: Before concluding that internal controls can be relied upon,...
Question 52: An IS auditor has been asked to audit the proposed acquisiti...
Question 53: Which of the following is the BEST indication of an effectiv...
Question 54: Which of the following is MOST likely to be prevented by a f...
Question 55: An organization considers implementing a system that uses a ...
Question 56: While reviewing the project plan for a new system prior to g...
Question 57: Which of the following is MOST likely to enable a hacker to ...
Question 58: Which of the following is MOST important to consider when cr...
Question 59: Which of the following controls is MOST appropriate against ...
Question 60: Which of the following should be the PRIMARY consideration f...
Question 61: Which of the following is a key success factor for implement...
Question 62: IT service engineers at a large organization are unable to e...
Question 63: An organization has implemented a control to help ensure dat...
Question 64: An IS auditor finds that periodic reviews of read-only users...
Question 65: The scheduling of audit follow-ups should be based PRIMARILY...
Question 66: The quality assurance (QA) function should be prevented from...
Question 67: An IS auditor observes an organization is performing data ba...
Question 68: An IS audit manager finds that data manipulation logic devel...
Question 69: Which of the following provides an IS auditor the MOST assur...
Question 70: Which of the following is the BEST detective control for a j...
Question 71: Which of the following is the MOST effective control to ensu...
Question 72: Which of the following should be of concern to an IS auditor...
Question 73: Which of the following is MOST likely to result from complia...
Question 74: What is the PRIMARY benefit of prototyping as a method of sy...
Question 75: A sales representative is reviewing the organization's feedb...
Question 76: Management decided to accept the residual risk of an audit f...
Question 77: Loss-site scripting (XSS) attacks are BEST prevented through...
Question 78: Which of the following will BEST protect the confidentiality...
Question 79: Which of the following is the PRIMARY role of an IS auditor ...
Question 80: To ensure efficient and economic use of limited resources in...
Question 81: To create a digital signature in a message using asymmetric ...
Question 82: Which of the following is MOST important to ensure when plan...
Question 83: The IS auditor's PRIMARY role in control self-assessment (CS...
Question 84: Which of the following BEST provides continuous availability...
Question 85: Digital signatures are an effective control method for infor...
Question 86: An organization has established hiring policies and procedur...
Question 87: A typical network architecture used for e-commerce, a load b...
Question 88: When designing metrics for information security, the MOST im...
Question 89: Which of the following provides the GREATEST assurance that ...
Question 90: During audit planning, an IS auditor walked through the desi...
Question 91: An IS auditor is evaluating the log management system for an...
Question 92: An IS auditor has found that a vendor has gone out of busine...
Question 93: Which of the following is a detective control?...
Question 94: To confirm integrity for a hashed message, the receiver shou...
Question 95: An IS auditor can BEST help management fulfill risk manageme...
Question 96: An organization has implemented an automated match between p...
Question 97: Which of the following IS audit findings should be of GREATE...
Question 98: An intruder accesses an application server and makes changes...
Question 99: A vulnerability in which of the following virtual systems wo...
Question 100: Which of the following methodologies is MOST appropriate to ...
Question 101: An organization allows employees to use personally owned mob...
Question 102: Which of the following would an IS auditor recommend as the ...
Question 103: Which of the following is MOST important for an IS auditor t...
Question 104: Which of the following is a reason for implementing a decent...
Question 105: An organization was recently notified by its regulatory body...
Question 106: Which of the following group is MOST likely responsible for ...
Question 107: Capacity management enables organizations to:...
Question 108: Which of the following is the GREATEST risk resulting from c...
Question 109: Which of the following is corrective control?...
Question 110: A PRIMARY benefit derived by an organization employing contr...
Question 111: Due to the small size of the payroll department, an organiza...
Question 112: Which of the following is BEST addressed when using a timest...
Question 113: An IS auditor has completed a review of an outsourcing agree...
Question 114: Which of the following is a directive control?...
Question 115: Which of the following is the BEST way to facilitate proper ...
Question 116: Which of the following is MOST important for an IS auditor t...
Question 117: Which of the following is the BEST reason for an organizatio...
Question 118: When introducing a maturity model to the IT management proce...
Question 119: Nonrepudiation of the client for e-commerce transactions is ...
Question 120: What is the MOST important business concern when an organiza...
Question 121: A company has implemented an IT segregation of duties policy...
Question 122: An organization offers an online information security awaren...
Question 123: The demilitarized zone (DMZ) is the part of a network where ...
Question 124: Which of the following is MOST important to include in a bus...
Question 125: At a project steering committee meeting, it is stated that a...
Question 126: An IS auditor concludes that a local area network's (LAN's) ...
Question 127: Which of the following would BEST indicate the effectiveness...
Question 128: An employee transfers from an organization's risk management...
Question 129: Which of the following should be an IS auditor's PRIMARY con...
Question 130: A review of an organization's IT portfolio revealed several ...
Question 131: During an audit, it is discovered that several suppliers wit...
Question 132: During an audit of a data center, an IS auditor's BEST way t...
Question 133: A large insurance company is about to replace a major financ...
Question 134: Which of the following entities is BEST suited to define the...
Question 135: Which of the following is the BEST approach to identify whet...
Question 136: Which of the following BEST determines if a batch update job...
Question 137: On a daily basis, an in-house development team moves duplica...
Question 138: Which of the following controls should be implemented to BES...
Question 139: Which of the following should be of GREATEST concern to an I...
Question 140: MOST critical security weakness of a packet level firewall i...
Question 141: A user of a telephone banking system has forgotten his perso...
Question 142: An auditor is creating an audit program in which the objecti...
Question 143: Which of the following is the BEST source of information whe...
Question 144: An organization implements a data loss prevention tool as a ...
Question 145: An organization wants to test business continuity using a sc...
Question 146: Software quality assurance (QA) reviews are planned as part ...
Question 147: The BEST data backup strategy for mobile users is to:...
Question 148: Which of the following controls would BEST ensure that payro...
Question 149: To BEST evaluate the effectiveness of a disaster recovery pl...
1 commentQuestion 150: The GREATEST risk of database renormalization is:...
Question 151: An employee loses a mobile device resulting in loss of sensi...
Question 152: The objectives of business process improvement should PRIMAR...
Question 153: Which of the following protects against the impact of tempor...
Question 154: The grants management system is used to calculate grant paym...
Question 155: Which of the following is the GREATEST concern associated wi...
Question 156: An organization has installed blade server technology in its...
Question 157: Which of the following is the MOST important consideration w...
Question 158: Which of the following should be of MOST concern to an IS au...
Question 159: Which of the following cloud deployment models would BEST me...
Question 160: While performing a risk-based audit, which of the following ...
Question 161: Which of the following a the MOST important prerequisite for...
Question 162: An IS auditor notes that the anticipated benefits from an on...
Question 163: An IS auditor has assessed a payroll service provider's secu...
Question 164: To help ensure the organization s information assets are ade...
Question 165: When engaging services from external auditors, which of the ...
Question 166: internal IS auditor recommends that incoming accounts payabl...
Question 167: Which of the following would be the PRIMARY benefit of repla...
Question 168: An organization's IT security policy requires annual securit...
Question 169: During a vulnerability assessment, an IS auditor finds a hig...
Question 170: An IS auditor is mapping controls to risk for an accounts pa...
Question 171: A 5 year audit plan provides for general audits every year a...
Question 172: An IS auditor is analysing a sample of assesses recorded on ...
Question 173: Which of the following should be of GREATEST concern to an I...
Question 174: Which of the following would be the MOST appropriate reason ...
Question 175: Which of the following is the MOST important requirement for...
Question 176: What is the FIRST step an auditor should take when beginning...
Question 177: The MOST efficient way to confirm that an ERP system being i...
Question 178: An IS auditor conducting audit follow-up activities learns t...
Question 179: Which of the following should be reviewed FIRST when plannin...
Question 180: An IS auditor is conducting a review of an organization s in...
Question 181: Which of the following IS audit recommendations would BEST h...
Question 182: Which of the following components of a scheduling tool BEST ...
Question 183: Which of the following would BEST detect logic bombs in new ...
Question 184: Which of the following are BEST suited for continuous auditi...
Question 185: When determining the specifications for a server supporting ...
Question 186: Which of the following is the PRIMARY benefit of including I...
Question 187: A legacy application is running on an operating system that ...
Question 188: Which of the following would be MOST helpful when assessing ...
Question 189: The risk that the IS auditor will not find an error that has...
Question 190: After the release of an application system, an IS auditor wa...
Question 191: Which of the following would BEST detect that a distributed-...
Question 192: The use of the Transport Layer Security (TLS) protocol enabl...
Question 193: An IS auditor is reviewing the upgrading of an operating sys...
Question 194: An organization is in the process of deciding whether to all...
Question 195: Which of the following activities is MOST important to consi...
Question 196: ..control that MOST effectively addresses the risk of piggyb...
Question 197: Which of the following sampling techniques is commonly used ...
Question 198: Which of the following would be the MOST likely reason for a...
Question 199: An IS auditor auditing the effectiveness of utilizing a hot ...
Question 200: As part of business continuity planning. Which of the follow...
Question 201: An IT governance framework provides an organization with:...
Question 202: An IS auditor has completed a service level management audit...
Question 203: Which of the following a recent internal data breach, an IS ...
Question 204: Which of the following management decisions presents the GRE...
Question 205: Which of the following is a prerequisite to help ensure that...
Question 206: Following a security breach, in which a hacker exploited a w...
Question 207: What is the GREASTEST concern for an IS auditory reviewing c...
Question 208: Which of the following findings should be of MOST concern to...
Question 209: As part of an IS audit, the auditor notes the practices list...
Question 210: A database administrator (DBA) extracts a user listing for a...
Question 211: Inherent risk rating are determined by assessing the impact ...
Question 212: An organization using instant messaging to communicate with ...
Question 213: Which of the following is the PRIMARY advantage of single si...
Question 214: An organization is replacing its financial processing system...
Question 215: An organization has decided to migrate payroll processing to...
Question 216: Which of the following is an example of audit risk?...
Question 217: When conducting a requirements analysis for a project, the B...
Question 218: Which of the following is the MOST significant concerns when...
Question 219: An airlines online booking system uses an automated script t...
Question 220: During a review of an application system, an IS auditor iden...
Question 221: Which of the following should an IS auditor be MOST concerne...
Question 222: Intrusion detection systems (IDSs) can:...
Question 223: An organization is considering replacing physical backup tap...
Question 224: When auditing a quality assurance plan, an IS auditor should...
Question 225: An IS auditor is a member of an application development team...
Question 226: An IS auditor plans to review all access attempts to a video...
Question 227: During business process reengineering (BPR) of a bank's tell...
Question 228: Which of the following would BEST assist senior management i...
Question 229: Due to the increasing size of a database, user access times ...
Question 230: Which of the following is MOST important when an incident ma...