<< Prev Question Next Question >>

Question 23/299

Which of the following would be of MOST concern during an audit of an end-user computing system containing sensitive information?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (299q)
Question 1: The PRIMARY purpose of an internal audit department's qualit...
Question 2: An IS auditor has assessed a payroll service provider's secu...
Question 3: Which of the following is the BEST way to reduce the risk of...
Question 4: Privileged account access is require to start an ad hoc batc...
Question 5: An IS auditor discovers that validation controls in a web ap...
Question 6: When reviewing the effectiveness of data center operations, ...
Question 7: Which of the following should be reviewed as part of a data ...
Question 8: Which of the following is the BEST reason to utilize blockch...
Question 9: Which of the following would BEST detect logic bombs in new ...
Question 10: An IS auditor is asked to review a large organization's chan...
Question 11: An organization using instant messaging to communicate with ...
Question 12: An IS auditor is analysing a sample of assesses recorded on ...
Question 13: An IS auditor is conducting a pre-implementation review to d...
Question 14: Which of the following would BEST enable effective IT resour...
Question 15: Which of the following is the MOST significant concerns when...
Question 16: Buffer overflow in an Internet environment is of particular ...
Question 17: Which of the following is an example of audit risk?...
Question 18: Which of the following BEST describes a common risk in imple...
Question 19: In a small organization, an IS auditor finds that security a...
Question 20: Two organizations will share ownership of a new enterprise r...
Question 21: Which of the following access control situations represents ...
Question 22: Following the sale of a business division, employees will be...
Question 23: Which of the following would be of MOST concern during an au...
Question 24: The CIO of an organization is concerned that the information...
Question 25: Which of the following activities is MOST important to consi...
Question 26: Which of the following is a substantive test procedure?...
Question 27: An IS audit report highlighting inadequate network internal ...
Question 28: Which of the following would be the MOST effective method to...
Question 29: When testing segregation of duties, which of the following a...
Question 30: The objectives of business process improvement should PRIMAR...
Question 31: Which of the following would BEST assist senior management i...
Question 32: Which of the following is an IS auditor's BEST course of act...
Question 33: In assessing the priority given to systems covered in an org...
Question 34: Which of the following should be the PRIMARY consideration f...
Question 35: A technology service organization has recently acquired a ne...
Question 36: Which of the following is the BEST detective control for a j...
Question 37: What is an IS auditor's BEST recommendation to management if...
Question 38: When conducting a post implementation review which of the fo...
Question 39: Which of the following would provide the MOST assurance that...
Question 40: Which of the following sampling techniques is commonly used ...
Question 41: Which of the following BEST determines if a batch update job...
Question 42: Which of the following is the BEST source for describing the...
Question 43: Which of the following stakeholders should be PRIMARILY resp...
Question 44: When developing a business continuity plan (BCP), which of t...
Question 45: Which of the following is MOST important for an IS auditor t...
Question 46: Which of the following should be of GREATEST concern to an I...
Question 47: Which of the following would provide the BEST evidence for u...
Question 48: Which of the following activities should an IS auditor perfo...
Question 49: When reviewing business continuity plan (BCP) test results, ...
Question 50: Which of the following access rights in the production envir...
Question 51: An organization using development operations (DevOps) proces...
Question 52: An IS auditor discovers instances where software with the sa...
Question 53: Which of the following is MOST important for the successful ...
Question 54: Within a payroll department, which of the following responsi...
Question 55: Which of the following is the GREATEST risk posed by denial-...
Question 56: A security review reveals an organization b struggling with ...
Question 57: Which the following is MOST critical for the effective imple...
Question 58: The performance of an order-processing system can be measure...
Question 59: An organization recently experienced a phishing attack that ...
Question 60: Which of the following would be MOST helpful when assessing ...
Question 61: Reorganization of databases is undertaken PRIMARILY to:...
Question 62: When developing a business continuity plan (BCP) business un...
Question 63: Which of the following controls MOST effectively reduces the...
Question 64: A company laptop has been stolen and all photos on the lapto...
Question 65: During an audit, which of the following would be MOST helpfu...
Question 66: An organization has agreed to perform remediation related to...
Question 67: A company has implemented an IT segregation of duties policy...
Question 68: Which of the following is MOST likely to be prevented by a f...
Question 69: Which of the following BEST supports an organization's plann...
Question 70: An accounts receivable data entry routine prevents the entry...
Question 71: Which of the following should the IS auditor do FIRST to ens...
Question 72: What is the MOST difficult aspect of access control in a mul...
Question 73: When preparing to evaluate the effectiveness of an organizat...
Question 74: Which of the following is the PRIMARY responsibility of an o...
Question 75: An organization transmits large amount of data from one inte...
Question 76: Which of the following would be the GREATEST concern to an I...
Question 77: In reviewing the project timeline for a significant applicat...
Question 78: The MAJOR reason for segregating test programs from producti...
Question 79: An IS auditor has discovered that unauthorized customer mana...
Question 80: After the release of an application system, an IS auditor wa...
Question 81: Which of the following is MOST likely to improve the portabi...
Question 82: Which of the following would MOST effectively minimize the r...
Question 83: During an audit of an organization s incident management pro...
Question 84: An IS auditor reviews change control tickets and finds an em...
Question 85: Which of the following is a reason for implementing a decent...
Question 86: Which of the following observations should be of concern to ...
Question 87: An organization is considering replacing physical backup tap...
Question 88: Which of the following is the MOST important factor when an ...
Question 89: A review of Internet security disclosed that users have indi...
Question 90: Which of the following roles combined with the role of a dat...
Question 91: Which of the following would MOST effectively and executive ...
Question 92: In a decentralized organization, the selection and purchase ...
Question 93: Which of the following is the PRIMARY advantage of using vir...
Question 94: Which of the following is the GREATEST risk associated with ...
Question 95: The PRIMARY advantage of object oriented technology is enhan...
Question 96: Which of the following is the BEST time for an IS auditor to...
Question 97: Which of the following should an IS auditor use when verifyi...
Question 98: When conducting a follow-up audit on an organization s firew...
Question 99: An IS auditor discovers that management has created a system...
Question 100: When migrating critical systems to a cloud provider, the GRE...
Question 101: Which of the following is a key success factor for implement...
Question 102: To ensure the integrity of a recovered database, which of th...
Question 103: An IS auditor is using data analytics for an accounts payabl...
Question 104: Which of the following is the MOST appropriate document for ...
Question 105: The risk that is created if a single sign-on is implemented ...
Question 106: An IS auditor concludes that a local area network (LAN) acce...
Question 107: An organization has implemented a distributed security admin...
Question 108: Which of the following is the PRIMARY benefit of including I...
Question 109: Which of the following is MOST important for an IS auditor t...
Question 110: An audit group is conducting a risk assessment as part of a ...
Question 111: An IS auditor concludes that a local area network's (LAN's) ...
Question 112: Which of the following BEST enables an audit department to i...
Question 113: An IS auditor has completed a service level management audit...
Question 114: An organization is in the process of deciding whether to all...
Question 115: What is the BEST way for an IS auditor to address the risk a...
Question 116: Which of the following control? MOST efficiently ensures tha...
Question 117: An organization allows employees to use personally owned mob...
Question 118: As part of business continuity planning. Which of the follow...
Question 119: To test the integrity of the data in the accounts receivable...
Question 120: A bank is selecting a server for its retail accounts applica...
Question 121: When using a wireless device, which of the following BEST en...
Question 122: Which of the following it BEST enabled by following a config...
Question 123: An organization has outsourced its data leakage monitoring t...
Question 124: An IS auditor is using data analytics in an audit and has ob...
Question 125: Which of the following access fights presents the GREATEST r...
Question 126: Which of the following should an IS auditor verify when audi...
Question 127: An IS auditor learns a server administration team regularly ...
Question 128: Which of the following will BEST help to ensure that an in-h...
Question 129: Which of the following should an IS auditor recommend as MOS...
Question 130: During a follow-up audit, an IS auditor finds that some crit...
Question 131: An organization performs nightly backups but does not have a...
Question 132: Which of the following is MOST important for an IS auditor t...
Question 133: An organization s data retention policy states that all data...
Question 134: An IS auditor discovered abnormalities in a monthly report g...
Question 135: A 5 year audit plan provides for general audits every year a...
Question 136: Which of the following presents the GREATEST security risk t...
Question 137: A vendor service level agreement (SLA) requires backup to be...
Question 138: Management has agreed to perform multiple remediation action...
Question 139: Which of the following is a prerequisite to help ensure that...
Question 140: Which of the following is the MOST effective way to minimize...
Question 141: Which of the following would be MOST helpful in ensuring sec...
Question 142: During a security audit, which of the following is MOST impo...
Question 143: An organization wants to reuse company-provided smartphones ...
Question 144: An IS auditor was involved in the design phase for a new sys...
Question 145: Which of the following could be used to evaluate the effecti...
Question 146: Which of the following is the BEST time for an IS auditor to...
Question 147: Which of the following would be the MOST likely reason for a...
Question 148: Following a breach, what is the BEST source to determine the...
Question 149: When developing metrics to measure the contribution of IT to...
Question 150: As part of a post-implementation review, the BEST way to ass...
Question 151: An IS auditor finds the timeliness and depth of information ...
Question 152: The information security function in a large organization is...
Question 153: A new regulatory standard for data privacy requires an organ...
Question 154: An IS auditor discovered that a firewall has more services t...
Question 155: The objective of using coding standards for systems developm...
Question 156: Which of the following is the MOST appropriate action to for...
Question 157: A database is denormalized in order to:...
Question 158: Adopting a service-oriented architecture would MOST likely:...
Question 159: Which of the following would BEST prevent data from being or...
Question 160: An employee transfers from an organization's risk management...
Question 161: A retirement system verifies that the field for employee sta...
Question 162: When reviewing a contract for a disaster recovery hot site, ...
Question 163: An advantage of installing a thin client architecture in a l...
Question 164: Which of the following auditing techniques would be used to ...
Question 165: A maturity model can be used to aid the implementation of IT...
Question 166: An IS auditor finds that confidential company data has been ...
Question 167: During an integrated audit at a retail bank, an IS auditor i...
Question 168: Which of the following key performance indicators (KPIs) pro...
Question 169: When replacing a critical software application, which of the...
Question 170: A database administrator (DBA) extracts a user listing for a...
Question 171: Which of the following is MOST important for an IS auditor t...
Question 172: Which of the following attacks is BEST detected by an intrus...
Question 173: An organization was recently notified by its regulatory body...
Question 174: An organization has implemented application whitelisting in ...
Question 175: Which of the following should be of MOST concern to an IS au...
Question 176: Which of the following is the BEST indication of an effectiv...
Question 177: The MOST important reason for documenting all aspects of a d...
Question 178: A small organization is experiencing rapid growth and plans ...
Question 179: select a sample for testing, which must include the 80 large...
Question 180: Which of ihe following should be done FIRST to effectively d...
Question 181: An organization is currently replacing its accounting system...
Question 182: Which of the following is MOST helpful in preventing a syste...
Question 183: Which of the following would BEST facilitate the detection o...
Question 184: After an external IS audit, which of the following should be...
Question 185: While reviewing similar issues in an organization's help des...
Question 186: Which of the following components of a scheduling tool BEST ...
Question 187: Which of the following is MOST important to include in foren...
Question 188: Which of the following should be of concern to an IS auditor...
Question 189: An internal audit department recently established a quality ...
Question 190: An IS auditor is a member of an application development team...
Question 191: Assessments of critical information systems are based on a c...
Question 192: Which of the following findings should hr of GREATEST concer...
Question 193: A security company and service provider have merged and the ...
Question 194: Which of the following are BEST suited for continuous auditi...
Question 195: IT help desk statistics show a high number of recurring inci...
Question 196: Which type of control is being implemented when a biometric ...
Question 197: An IS auditor is reviewing IT policies and found that most p...
Question 198: Which of the following controls should be implemented to BES...
Question 199: An IS auditor is reviewing the upgrading of an operating sys...
Question 200: Which of the following is the PRIMARY advantage of the IT po...
Question 201: An organization is choosing key performance indicators (KPIs...
Question 202: Which of the following is MOST likely to enable a hacker to ...
Question 203: An employee loses a mobile device resulting in loss of sensi...
Question 204: Which of the following is MOST influential when defining dis...
Question 205: Which of the following is the MOST important consideration w...
Question 206: A PRIMARY benefit derived by an organization employing contr...
Question 207: Which of the following reflects inadequate segregation of du...
Question 208: Which of the following is the MOST likely cause of a success...
Question 209: The IS auditor's PRIMARY role in control self-assessment (CS...
Question 210: Which of the following is MOST important for an IS auditor t...
Question 211: An audit team has a completed schedule approved by the audit...
Question 212: During an audit of a mission-critical system hosted in an ou...
Question 213: internal IS auditor recommends that incoming accounts payabl...
Question 214: During an audit of an organization's financial statements, a...
Question 215: An IS auditor finds that the process for removing access for...
Question 216: Which of the following is the MOST effective control to mini...
Question 217: When an intrusion into an organizations network is detected,...
Question 218: An organization's IT security policy states that user ID's m...
Question 219: An IS auditor reviewing an incident management process ident...
Question 220: What is the purpose of using a write blocker during the acqu...
Question 221: During a review of system access, an IS auditor notes that a...
Question 222: Which of the following could an IS auditor recommend to impr...
Question 223: Which of the following is MOST important to the effective ma...
Question 224: Which of the following is the MOST important consideration w...
Question 225: Which of the following an IS audit, which of the following t...
Question 226: A security review focused on data loss prevention (DLP) reve...
Question 227: Which of the following is the BEST physical security solutio...
Question 228: Which of the following is the BEST approach to help ensure e...
Question 229: Which of the following is the MOST significant obstacle to e...
Question 230: An information systems security officer's PRIMARY responsibi...
Question 231: Which of the following BEST ensures that only authorized sof...
Question 232: Which of the following would be an IS auditor's GREATEST con...
Question 233: Which of the following indicates the HIGHEST level of maturi...
Question 234: A system administrator recently informed the IS auditor abou...
Question 235: An operations manager has recently moved to internal audit W...
1 commentQuestion 236: An IS auditor finds ad hoc vulnerability scanning is in plac...
Question 237: During a network security review the system log indicates an...
Question 238: When auditing the effectiveness of a biometric system, which...
Question 239: During an audit of information security procedures of a larg...
Question 240: Which of the following is the BEST development methodology t...
Question 241: An IS auditor has observed gaps in the data available to the...
Question 242: While reviewing an organization s business continuity plan (...
Question 243: When reviewing user access to an application containing sens...
Question 244: An organization wants to test business continuity using a sc...
Question 245: The quality assurance (QA) function should be prevented from...
Question 246: Which of the following tasks should be performed during an o...
Question 247: Which of the following should an IS auditor be MOST concerne...
Question 248: Which of the following provides the MOST assurance that a ne...
Question 249: The maturity level of an organization s problem management s...
Question 250: An organization has software that is not compliant with data...
Question 251: Digital signatures are an effective control method for infor...
Question 252: A disk management system's PRIMARY function is to:...
Question 253: Which of the following requirements in a document control st...
Question 254: An IS auditor determines that an online retailer processing ...
Question 255: Which of the following BEST demonstrates to an IS auditor th...
Question 256: Which of the following provides the BEST evidence of the eff...
Question 257: A review of an organization's IT portfolio revealed several ...
Question 258: An IS auditor is evaluating the log management system for an...
Question 259: An organization plans to allow third parties to collect cust...
Question 260: Which of the following is the PRIMARY concern if a business ...
Question 261: Which of the following should be reviewed FIRST when plannin...
Question 262: What is an IS auditor's BEST course of action when provided ...
Question 263: Which of the following is MOST important for an IS auditor t...
Question 264: An auditor is creating an audit program in which the objecti...
Question 265: An IS auditor has discovered that a cloud-based application ...
Question 266: Which of the following should an IS auditor recommend to red...
Question 267: An IS auditor has found that an organization is unable to ad...
Question 268: Due to cost restraints, a company defers the replacement of ...
Question 269: An IS auditor is reviewing an organization's implementation ...
Question 270: Which of the following is the GREATEST concern when an organ...
Question 271: mission-critical applications with a low recovery time objec...
Question 272: Which of the following would BEST enable alignment of IT wit...
Question 273: Which of the following is MOST important to ensure when plan...
Question 274: When connecting to an organization's intranet from the Inter...
Question 275: During a vulnerability assessment, an IS auditor finds a hig...
Question 276: Which of the following should be an IS auditor's PRIMARY con...
Question 277: When evaluating the recent implementation of an intrusion de...
Question 278: Which of the following could be determined by an entity-rela...
Question 279: While planning a security audit, an IS auditor is made aware...
Question 280: To help ensure the organization s information assets are ade...
Question 281: Internal audit reports should be PRIMARILY written for and c...
Question 282: When physical destruction is not practical, which of the fol...
Question 283: Both statistical and nonstatistical sampling techniques:...
Question 284: maturity model is useful in the assessment of IT service man...
Question 285: Which of the following is MOST important for the improvement...
Question 286: When designing metrics for information security, the MOST im...
Question 287: Which of the following is MOST important for an IS auditor t...
Question 288: Which of the following should be the PRIMARY consideration w...
Question 289: An IS auditor determines that a business continuity plan has...
Question 290: Which of the following is the MOST important process to ensu...
Question 291: Which of the following projects would be MOST important to r...
Question 292: Which of the following would BEST indicate the effectiveness...
Question 293: The prioritization of incident response actions should be PR...
Question 294: As part of a mergers and acquisitions activity, an acquiring...
Question 295: A recent audit concluded that an organization's information ...
Question 296: Which of the following findings should be of MOST concern to...
Question 297: During an audit, the client learns that the IS auditor has r...
Question 298: Which procedure provides the GREATEST assurance that correct...
Question 299: Which of the following communication modes should be of GREA...