<< Prev Question Next Question >>

Question 24/362

Which of the following is the KST source of information for assessing the effectiveness of IT process monitoring?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (362q)
Question 1: An IS auditor is conducting a review of a healthcare organiz...
Question 2: During audit planning, an IS auditor walked through the desi...
Question 3: Which of the following access rights in the production envir...
Question 4: An IS auditor has assessed a payroll service provider's secu...
Question 5: Which of the following should occur EARLIEST in a business c...
Question 6: An IS auditor is planning on utilizing attribute sampling to...
Question 7: Which of the following is the BCST way to determine the effe...
Question 8: When replacing a critical software application, which of the...
Question 9: internal IS auditor recommends that incoming accounts payabl...
Question 10: During a review of a production schedule, an IS auditor obse...
Question 11: Which of the following is the MOST significant risk associat...
Question 12: Which of the following is the BEST compensating control for ...
Question 13: Which of the following is BEST addressed when using a timest...
Question 14: Which of the following is MOST likely to be included in a po...
Question 15: An IS auditor is examining a front-end sub ledger and a main...
Question 16: Which of the following are BEST suited for continuous auditi...
Question 17: An organization uses two data centers. Which of the followin...
Question 18: Which type of control is being implemented when a biometric ...
Question 19: Which of the following is the BEST approach for performing a...
Question 20: When reviewing an organization s IT governance processes, wh...
Question 21: Which of the following is the MOST important determining fac...
Question 22: The PRIMARY reason an IS department should analyze past inci...
Question 23: An IS auditor observes an organization is performing data ba...
Question 24: Which of the following is the KST source of information for ...
Question 25: Which of the following would be the PRIMARY benefit of repla...
Question 26: During a post-implementation review, a step in determining w...
Question 27: A stockbroker accepts orders over the Internet. Which of the...
Question 28: An audit of a database management system found the audit log...
Question 29: During an audit, the client learns that the IS auditor has r...
Question 30: During an audit of an organization s incident management pro...
Question 31: Which of the following is the GREATEST advantage of implemen...
Question 32: Which of the following reflects inadequate segregation of du...
Question 33: Which of the following is MOST important for an IS auditor t...
Question 34: As part of a follow-up of a previous year's audit, an IS aud...
Question 35: Which of the following is the PRIMARY objective of using a c...
Question 36: An IS auditor observes that an organization s critical IT sy...
Question 37: Which of the following BEST supports an organization's plann...
Question 38: In a follow-up audit, an IS auditor notes that management ha...
Question 39: Which procedure provides the GREATEST assurance that correct...
Question 40: Which of the following projects would be MOST important to r...
Question 41: Which of the following BEST helps to identify errors during ...
Question 42: An organization's IT security policy requires annual securit...
Question 43: An IS auditor determines that a business impact analysis (BI...
Question 44: The drives of a tile server are backed up at a hot site. Whi...
Question 45: Performance monitoring tools report that servers are signifi...
Question 46: These members of an emergency incident response team should ...
Question 47: Following an IS audit recommendation, all Telnet and File Tr...
Question 48: Which of ihe following BEST indicates a need to review an or...
Question 49: During a follow-up audit, an IS auditor finds that some crit...
Question 50: Which of the following BEST enables an audit department to i...
Question 51: Which of the following is the GREATEST cause for concern whe...
Question 52: An IS auditor reviews change control tickets and finds an em...
Question 53: An IS auditor finds that confidential company data has been ...
Question 54: During an IS audit, it is discovered that security configura...
Question 55: Requiring that passwords contain a combination of numeric an...
Question 56: The BEST way to evaluate a shared control environment is to ...
Question 57: Which of the following findings would have the GREATEST impa...
Question 58: Which of the following helps to ensure the integrity of data...
Question 59: Which of the following would BEST deter the theft of corpora...
Question 60: Which of the following sampling techniques is commonly used ...
Question 61: Which of the following is the MOST important consideration w...
Question 62: Which of the following firewall technologies involves examin...
Question 63: To effectively classify data, which of the following MUST be...
Question 64: Which of the following would be MOST critical for an IS audi...
Question 65: To preserve chain-of-custody following an internal server co...
Question 66: When reviewing user access to an application containing sens...
Question 67: A PRIMARY benefit derived by an organization employing contr...
Question 68: A review of an organization's IT portfolio revealed several ...
Question 69: Which of the following access control situations represents ...
Question 70: An IS audit reveals that an organization is not proactively ...
Question 71: Which of the following sampling methods is the BEST approach...
Question 72: An IS auditor is reviewing the process followed in identifyi...
Question 73: An IS auditor concludes that a local area network's (LAN's) ...
Question 74: An organization plans to launch a social media presence as p...
Question 75: Which of the following is the PRIMARY reason for an IS audit...
Question 76: An IS auditor is assessing an organization's data loss preve...
Question 77: Which of the following is the BEST source of information whe...
Question 78: Which of the following is the BEST type of backup to minimiz...
Question 79: When reviewing a disaster recovery plan (DRP) an IS auditor ...
Question 80: Which of the following roles is ULTIMATELY accountable for t...
Question 81: An IT steering committee assists the board of directors to f...
Question 82: Which of the following is the PRIMARY reason for an IS audit...
Question 83: An audit report that specifies responsibility for the closur...
Question 84: An IS auditor determines that an online retailer processing ...
Question 85: The BEST access strategy while configuring a firewall would ...
Question 86: Which of the following will enable a customer to authenticat...
Question 87: An organization is replacing its financial processing system...
Question 88: Following an acquisition, it was decided that legacy applica...
Question 89: Which of the following management decisions presents the GRE...
Question 90: Which of the following is MOST important to include in a bus...
Question 91: During the evaluation of a firm's newly established whistleb...
Question 92: A CIO has asked an IS to implement several security controls...
Question 93: An internal audit has revealed a large number of incidents f...
Question 94: Which of the following should be of GREATEST concern when co...
Question 95: The IS auditor of a power company finds that the radio link ...
Question 96: Which of the following is the BEST way for an IT forensics i...
Question 97: An organization has outsourced its data processing function ...
Question 98: Which of the following is the MOST efficient solution for a ...
Question 99: An organization performs nightly backups but does not have a...
Question 100: An IS auditor reviewing a new application for compliance wit...
Question 101: Which of the following is the BEST indication of control mat...
Question 102: When removing a financial application system from production...
Question 103: An IS auditor is evaluating the access controls at a multina...
Question 104: To ensure the integrity of a recovered database, which of th...
Question 105: Which function in the purchasing module of an enterprise res...
Question 106: During the implementation of an upgraded enterprise resource...
Question 107: Which of the following would be the MOST effective control t...
Question 108: Which of the following test approaches would utilize data an...
Question 109: Which of the following roles combined with the role of a dat...
Question 110: An IS auditor has completed a service level management audit...
Question 111: Which of the following is MOST important for the IS auditor ...
Question 112: Which of the following would be of concern when determining ...
Question 113: Which of the following is the BEST method for converting a f...
Question 114: When conducting a follow-up audit on an organization s firew...
Question 115: An IS auditor is analysing a sample of assesses recorded on ...
Question 116: Which of the following would MOST effectively and executive ...
Question 117: Which of the following should be the PRIMARY reason to estab...
Question 118: An IS auditor is assessing a recent migration of mission cri...
Question 119: To achieve desired objectives, which of the following is MOS...
Question 120: Which of the following will MOST effectively help to manage ...
Question 121: Which of the following key performance indicators (KPIs) pro...
Question 122: An IS auditor is planning a risk-based audit of the human re...
Question 123: Which of the following is the MAIN purpose of implementing a...
Question 124: Which of the following would be MOST important to include in...
Question 125: A typical network architecture used for e-commerce, a load b...
Question 126: Two servers are deployed in a cluster to run a mission-criti...
Question 127: A risk analysis is MOST useful when applied during which pha...
Question 128: An IS auditor suspects an organization's computer may have b...
Question 129: A sales representative is reviewing the organization's feedb...
Question 130: What should be the PRIMARY basis for scheduling a follow-up ...
Question 131: When reviewing the effectiveness of data center operations, ...
Question 132: Which of the following should be an IS auditor's FIRST activ...
Question 133: Which of the following would help to ensure the completeness...
Question 134: Which of the following tools is MOST helpful in estimating b...
Question 135: Which of the following is the MOST critical characteristic o...
Question 136: Which of the following is the GREATEST benefit of implementi...
Question 137: Which of the following would BEST prevent data from being or...
Question 138: An IS auditor auditing the effectiveness of utilizing a hot ...
Question 139: Which of the following would provide the MOST assurance that...
Question 140: An IS auditor is involved in the user testing phase of a dev...
Question 141: Which of the following is the PRIMARY responsibility of an i...
Question 142: Which of the following presents the GREATEST security risk t...
Question 143: Which of the following is the MOST important consideration f...
Question 144: Which the following is MOST critical for the effective imple...
Question 145: An organization has purchased a replacement mainframe comput...
Question 146: A security review reveals an organization b struggling with ...
Question 147: An organization's plans to implement a virtualization strate...
Question 148: An effective implementation of security roles and responsibi...
Question 149: Which of the following is the BEST guidance from an IS audit...
Question 150: A large insurance company is about to replace a major financ...
Question 151: A company uses a standard form to document and approve all c...
Question 152: Due to the increasing size of a database, user access times ...
Question 153: Which of the following is MOST important for an IS auditor t...
Question 154: An organization outsourced its IS functions. To meet its res...
Question 155: A post-implementation review of a system implementation has ...
Question 156: Which of the following presents the GREATEST concern when im...
Question 157: An IS audit had identified that default passwords for a newl...
Question 158: An IS auditor is performing a routine procedure to test for ...
Question 159: A user of a telephone banking system has forgotten his perso...
Question 160: Which of the following should an IS auditor expect to find w...
Question 161: Which of the following should be of GREATEST concern to an o...
Question 162: Which of the following is MOST likely to enable a hacker to ...
Question 163: Which of the following provides the BEST evidence that netwo...
Question 164: Which of the following functions is MOST likely to be perfor...
Question 165: Assessments of critical information systems are based on a c...
Question 166: Which of the following is the MOST effective control to miti...
Question 167: To restore service at a large processing facility after a di...
Question 168: An organization migrated most of its physical servers to vir...
Question 169: Which of the following is the PRIMARY benefit of implementin...
Question 170: Which of the following is the BEST approach to help ensure e...
Question 171: During a network security review the system log indicates an...
Question 172: Which of the following controls MOST effectively reduces the...
Question 173: Which of the following occurs during the issues management p...
Question 174: A recent audit concluded that an organization's information ...
Question 175: When physical destruction is not practical, which of the fol...
Question 176: A 5 year audit plan provides for general audits every year a...
Question 177: An organization has established three IS processing environm...
Question 178: Which of the following BEST enables an IS auditor to identif...
Question 179: Which of the following should be restricted from a network a...
Question 180: A company has located its computer center on a moderate eart...
Question 181: An IS auditor is a member of an application development team...
Question 182: Which of the following would be considered the BEST compensa...
Question 183: Which of the following should be of GREATEST concern to an I...
Question 184: An organization wants to test business continuity using a sc...
Question 185: Which of the following would BEST enable effective IT resour...
Question 186: Which of the following would BEST help in classifying an org...
Question 187: An organization considers implementing a system that uses a ...
Question 188: An IT management group has developed a standardized security...
Question 189: Which of the following activities is MOST important to consi...
Question 190: Which of the following is MOST important in the audit qualit...
Question 191: Which of the following is the MOST important difference betw...
Question 192: Which of the following methodologies is MOST appropriate to ...
Question 193: Which of the following is MOST important for an IS auditor t...
Question 194: An organization recently implemented an industry-recognized ...
Question 195: Which of the following would be of MOST concern during an au...
Question 196: An IS auditor reviewing the acquisition of new equipment wou...
Question 197: An IS auditor finds that the process for removing access for...
Question 198: Which of the following BEST provides continuous availability...
Question 199: Which of the following is the GREATEST risk posed by denial-...
Question 200: Which of the following would provide the MOST important inpu...
Question 201: During an audit of a reciprocal disaster recovery agreement ...
Question 202: An organization is developing data classification standards ...
Question 203: The MAJOR reason for replacing checks with electronic funds ...
Question 204: An IS auditor has been asked to perform a post-implementatio...
Question 205: An organization's audit charter should:...
Question 206: Management decided to accept the residual risk of an audit f...
Question 207: Which of the following validation techniques would BEST prev...
Question 208: The IS auditor has identified a potential fraud perpetrated ...
Question 209: An organization is running servers with critical business ap...
Question 210: An IS auditor identifies key controls that have been overrid...
Question 211: During a software acquision review, an IS auditor should rec...
Question 212: Which of the following would BEST enable an IS auditor to pe...
Question 213: An organization has suffered a number of incidents in which ...
Question 214: During an audit of a payroll system, an IS auditor identifie...
Question 215: Which of the following should be performed immediately after...
Question 216: Nonrepudiation of the client for e-commerce transactions is ...
Question 217: In a RAO model, which of the following roles must be assigne...
Question 218: Which of the following would be MOST helpful in ensuring sec...
Question 219: An IS auditor finds the timeliness and depth of information ...
Question 220: Which of the following is the GREATEST concern when an organ...
Question 221: An organization is moving its on-site application servers to...
Question 222: When conducting a post implementation review which of the fo...
Question 223: An audit committee is reviewing an annual IT risk assessment...
Question 224: During a routine check, a system administrator identifies un...
Question 225: Which of the following is BEST for providing uninterrupted s...
Question 226: During the procurement process which of the following would ...
Question 227: Which of the following would present the GREATEST risk to th...
Question 228: Which of the following procedures would BEST contribute to t...
Question 229: Which of the following would be the GREATEST concern to an I...
Question 230: The grants management system is used to calculate grant paym...
Question 231: Which of the following is MOST important for an IS auditor t...
Question 232: As part of a quality assurance initiative, an organization h...
Question 233: An organization has implemented a distributed security admin...
Question 234: When reviewing a database supported by a third-party service...
Question 235: Which of the following would BEST detect that a distributed-...
Question 236: Overall responsibility for approving logical access rights t...
Question 237: An IT department installed critical patches provided by the ...
Question 238: During a review of an insurance company s claims system, the...
Question 239: Which of the following is the GREATEST risk resulting from c...
Question 240: An IT governance framework provides an organization with:...
Question 241: A disk management system's PRIMARY function is to:...
Question 242: During a review of information security procedures for disab...
Question 243: An IS auditor discovered abnormalities in a monthly report g...
Question 244: A maturity model is useful in the assessment of IT service m...
Question 245: What is the MOST important business concern when an organiza...
Question 246: An IS auditor notes that application super-user activity was...
Question 247: During a vulnerability assessment, an IS auditor finds a hig...
Question 248: Which of the following BEST describes an audit risk?...
Question 249: An organization is replacing a mission-critical system. Whic...
Question 250: Which of the following is the BEST way to evaluate the effec...
Question 251: An IS auditor finds that firewalls are outdated and not supp...
Question 252: Which of the following activities would allow an IS auditor ...
Question 253: An organization is considering outsourcing the processing of...
Question 254: At which stage of the software development life cycle should...
Question 255: Which of the following is a distinguishing feature at the hi...
Question 256: When reviewing an organization's data protection practices, ...
Question 257: Which of the following activities should an IS auditor perfo...
Question 258: An organization has implemented application whitelisting in ...
Question 259: Reviewing which of the following would be MOST helpful in as...
Question 260: Which of the following is the MOST effective way to minimize...
Question 261: Which of the following procedures should an IS auditor compl...
Question 262: An organization is designing an application programming inte...
Question 263: The use of the Transport Layer Security (TLS) protocol enabl...
Question 264: As part of a post-implementation review, the BEST way to ass...
Question 265: Which of the following should an IS auditor expect to find i...
Question 266: Which of the following activities should occur after a busin...
Question 267: A retirement system verifies that the field for employee sta...
Question 268: On a daily basis, an in-house development team moves duplica...
Question 269: A vendor service level agreement (SLA) requires backup to be...
Question 270: Which of the following should be the PRIMARY consideration f...
Question 271: During a business process re-engineering (BPR) program, IT c...
Question 272: Which of the following is the BEST physical security solutio...
Question 273: A new regulation requires organizations to report significan...
Question 274: For an organization which uses a VoIP telephony system exclu...
Question 275: What is the BEST population to select from when testing that...
Question 276: An IS auditor is observing transaction processing and notes ...
Question 277: Following an IT audit, management has decided to accept the ...
Question 278: Which of the following is MOST important to consider when cr...
Question 279: Which of the following findings should be of MOST concern to...
Question 280: Which of the following is MOST important to the effective ma...
Question 281: While executing follow-up activities, an IS auditor is conce...
Question 282: Which of the following would BEST assist senior management i...
Question 283: The FIRST step in establishing a firewall security policy is...
Question 284: What is the BEST way for an IS auditor to address the risk a...
Question 285: Which of the following BEST helps to ensure data integrity a...
Question 286: An organization allows its employees to use personal mobile ...
Question 287: The lack of which of the following represents the GREATEST r...
Question 288: A manufacturing company is implementing application software...
Question 289: Due to cost restraints, a company defers the replacement of ...
Question 290: A CIO has asked an IS auditor to implement several security ...
Question 291: Which of the following would MOST effectively detect a condi...
Question 292: An IS auditor is reviewing an organization's sales and purch...
Question 293: As part of a mergers and acquisitions activity, an acquiring...
Question 294: Which of the following methods should be used to effectively...
Question 295: Which of the following is MOST important for an IS auditor t...
Question 296: A maturity model can be used to aid the implementation of IT...
Question 297: During a review of system access, an IS auditor notes that a...
Question 298: Which of the following is MOST important when an incident ma...
Question 299: A development team has designed a new application and incorp...
Question 300: Due to the small size of the payroll department, an organiza...
Question 301: When auditing a quality assurance plan, an IS auditor should...
Question 302: After the release of an application system, an IS auditor wa...
Question 303: An intruder accesses an application server and makes changes...
Question 304: Which of the following factors constitutes a strength in reg...
Question 305: Which of the following reports can MOST effectively be used ...
Question 306: Which of the following is a detective control?...
Question 307: An organization offers an online information security awaren...
Question 308: What should be an IS auditor s NEXT course of action when a ...
Question 309: To create a digital signature in a message using asymmetric ...
Question 310: Which of the following is the most effective control for eme...
Question 311: When initiating an IT project, which of the following should...
Question 312: An IS auditor has observed gaps in the data available to the...
Question 313: Which of the following BEST describes a common risk in imple...
Question 314: Which of the following is the BEST reason to perform root ca...
Question 315: When evaluating whether the expected benefits of a project h...
Question 316: Which of the following should be reviewed as part of a data ...
Question 317: Which of the following should be a PRIMARY control objective...
Question 318: An information systems security officer's PRIMARY responsibi...
Question 319: Which of the following tools are MOST helpful for benchmarki...
Question 320: An IS auditor is reviewing an organization's implementation ...
Question 321: Which of the following should be the PRIMARY consideration w...
Question 322: Which of the following is MOST important to include in an or...
Question 323: Which of the following components of a scheduling tool BEST ...
Question 324: An IS auditor conducting audit follow-up activities learns t...
Question 325: Which of the following areas are the MOST likely cause of an...
Question 326: A legacy application is running on an operating system that ...
Question 327: An organization has implemented an automated match between p...
Question 328: An IS auditor notes that due to the small size of the organi...
Question 329: An IS auditor is conducting a pre-implementation review to d...
Question 330: An organization has begun using social media to communicate ...
Question 331: An organization wants to classify database tables according ...
Question 332: An employee transfers from an organization's risk management...
Question 333: Which of the following controls BEST ensures appropriate seg...
Question 334: Which of the following is MOST important for the improvement...
Question 335: Which of the following is an effective way to ensure the int...
Question 336: An organization using instant messaging to communicate with ...
Question 337: Which of the following is the MOST effective way to identify...
Question 338: In an organization that has a staff-rotation policy, the MOS...
Question 339: During a security audit, which of the following is MOST impo...
Question 340: A database is denormalized in order to:...
Question 341: A small organization is experiencing rapid growth and plans ...
Question 342: Which of the following is the MOST important consideration w...
Question 343: Which of the following is the MOST critical step prior to pe...
Question 344: Which of the following is the PRIMARY responsibility of an o...
Question 345: Which of the following should an IS auditor review FIRST whe...
Question 346: Which of the following would be an IS auditor's GREATEST con...
Question 347: Which of the following is MOST important for an organization...
Question 348: Stress testing should ideally be carried out under a:...
Question 349: Which of the following is the BEST method for uncovering sha...
Question 350: The operations team of an organization has reported an IS se...
Question 351: An organization has performance metrics to track how well IT...
Question 352: An existing system is being replaced with a new application ...
Question 353: An IS auditor learns a server administration team regularly ...
Question 354: While auditing an IT department s cloud service provider, th...
Question 355: An IS auditor is assessing an organization's implementation ...
Question 356: During an audit, it is discovered that several suppliers wit...
Question 357: Which of the following would provide the MOST reliable evide...
Question 358: A small startup organization does not have the resources to ...
Question 359: What is the FIRST step an auditor should take when beginning...
Question 360: Which of the following is a prerequisite to help ensure that...
Question 361: Which of the following access fights presents the GREATEST r...
Question 362: Which of the following should be of GREATEST concern to an I...