<< Prev Question Next Question >>

Question 135/362

Which of the following is the MOST significant concerns when backup tapes are encrypted?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (362q)
Question 1: An IS auditor has observed gaps in the data available to the...
Question 2: An IS auditor finds that a company is using a payroll provid...
Question 3: Which of the following is MOST important when an incident ma...
Question 4: Which of the following is the FIRST step when conducting a b...
Question 5: Which of the following would help to ensure the completeness...
Question 6: Which of the following would be the MOST effective method to...
Question 7: The MOST efficient way to confirm that an ERP system being i...
Question 8: Which of the following is an advantage of decentralized secu...
Question 9: Which of the following is an IS auditor's BEST recommendatio...
Question 10: Which of the following BEST supports an organization's plann...
Question 11: In a small organization, an IS auditor finds that security a...
Question 12: Which of the following stakeholders should be PRIMARILY resp...
Question 13: Which of the following is the BEST way to facilitate proper ...
Question 14: An organization plans to receive an automated data feed into...
Question 15: Which of the following should be of MOST concern to an IS au...
Question 16: Which of the following would an IS auditor consider to be th...
Question 17: To BEST determine if a project is successfully addressing bu...
Question 18: Communicating which of the following would BEST encourage ma...
Question 19: Within a payroll department, which of the following responsi...
Question 20: Which of the following are BEST suited for continuous auditi...
Question 21: Which of the following should be restricted from a network a...
Question 22: An IS auditor is evaluating the access controls at a multina...
Question 23: Which of the following is the MOST important reason to use s...
Question 24: An organization that has suffered a cyber attack is performi...
Question 25: The prioritization of incident response actions should be PR...
Question 26: An IT management group has developed a standardized security...
Question 27: A user of a telephone banking system has forgotten his perso...
Question 28: Which of the following would BEST facilitate the successful ...
Question 29: The PRIMARY purpose for an IS auditor to review previous aud...
Question 30: To test the integrity of the data in the accounts receivable...
Question 31: What is an IS auditor's BEST recommendation for management i...
Question 32: An IS auditor has discovered that a cloud-based application ...
Question 33: The scheduling of audit follow-ups should be based PRIMARILY...
Question 34: Which of the following MOST efficiently protects computer eq...
Question 35: A typical network architecture used for e-commerce, a load b...
Question 36: Which of the following would be the MOST effective control t...
Question 37: The demilitarized zone (DMZ) is the part of a network where ...
Question 38: An advantage of installing a thin client architecture in a l...
Question 39: Which of the following BEST provides audit management with a...
Question 40: Which of the following projects would be MOST important to r...
Question 41: An IS auditor finds that a mortgage origination team receive...
Question 42: An internal audit has revealed a large number of incidents f...
Question 43: Software quality assurance (QA) reviews are planned as part ...
Question 44: Which of the following is an indication of possible hacker a...
Question 45: Which function in the purchasing module of an enterprise res...
Question 46: Based on the Guidance of internal audit, an IT steering comm...
Question 47: Which of the following should be an IS auditor's FIRST activ...
Question 48: Stress testing should ideally be carried out under a:...
Question 49: While following up on a prior audit report, an IS auditor de...
Question 50: Which of the following would provide the BEST evidence of su...
Question 51: Which of the following is the BEST source for describing the...
Question 52: While evaluating an organization's program for tracking syst...
Question 53: An IS auditor finds that periodic reviews of read-only users...
Question 54: Which of the following is the MOST significant risk associat...
Question 55: One advantage of monetary unit sampling is the fact that:...
Question 56: During a disaster recovery audit, an IS auditor finds that a...
Question 57: A CIO has asked an IS auditor to implement several security ...
Question 58: Which of the following controls should be implemented to BES...
Question 59: Which of the following is MOST important for an IS auditor t...
Question 60: Which of the following is MOST important for successful inci...
Question 61: During audit planning, an IS auditor walked through the desi...
Question 62: Which of the following should be of GREATEST concern to an I...
Question 63: An IS auditor can BEST help management fulfill risk manageme...
Question 64: A region where an organization conducts business has announc...
Question 65: When connecting to an organization's intranet from the Inter...
Question 66: An IS auditor finds multiple situations where the help desk ...
Question 67: Which of the following is the BEST physical security solutio...
Question 68: What is the MOST difficult aspect of access control in a mul...
Question 69: To preserve chain-of-custody following an internal server co...
Question 70: Reviewing which of the following would be MOST helpful in as...
Question 71: Which of the following is MOST important to include in an or...
Question 72: An IS auditor is performing a post-implementation review of ...
Question 73: A review of Internet security disclosed that users have indi...
Question 74: A security administrator should have read-only access for wh...
Question 75: Due to cost restraints, a company defers the replacement of ...
Question 76: To achieve desired objectives, which of the following is MOS...
Question 77: Which of the following is the BEST approach to identify whet...
Question 78: Management decided to accept the residual risk of an audit f...
Question 79: Which of the following would be of GREATEST concern to an IS...
Question 80: An advantage of object-oriented system development is that i...
Question 81: An organization using instant messaging to communicate with ...
Question 82: An IS auditor has performed an agreed-upon procedures engage...
Question 83: An IS auditor s role in privacy and security is to:...
Question 84: The quality assurance (QA) function should be prevented from...
Question 85: Which of the following factors constitutes a strength in reg...
Question 86: Which of the following is MOST likely to be spoofed in an em...
Question 87: An IS auditor finds that firewalls are outdated and not supp...
Question 88: An IS auditor is following upon a finding that determined el...
Question 89: When replacing a critical software application, which of the...
Question 90: Which of the following will provide the GREATEST assurance t...
Question 91: Which of the following access control situations represents ...
Question 92: Which of the following activities is MOST important to consi...
Question 93: When reviewing a newly implemented quality management system...
Question 94: Which of the following would be considered the BEST compensa...
Question 95: Which of the following findings should hr of GREATEST concer...
Question 96: Which of the following is the BEST approach for performing a...
Question 97: An IS auditor notes that several users have not logged into ...
Question 98: Which of the following is MOST helpful when establishing the...
Question 99: An IS auditor is assessing an organization's data loss preve...
Question 100: An organization has implemented a distributed security admin...
Question 101: An organization globally distributes a free phone applicatio...
Question 102: The purpose of a checksum on an amount field in an electroni...
Question 103: While reviewing a hot site, the IS auditor discovers that on...
Question 104: Which of the following IT processes is likely to have the in...
Question 105: Which of the following provides the MOST assurance that a ne...
Question 106: When reviewing a database supported by a third-party service...
Question 107: Which of the following would be of MOST concern during an au...
Question 108: Which combination of access controls provides the BEST physi...
Question 109: Which of the following should an IS auditor recommend as MOS...
Question 110: An IS Auditor is performing a business continuity plan (BCP)...
Question 111: Which of the following access fights presents the GREATEST r...
Question 112: To create a digital signature in a message using asymmetric ...
Question 113: The CIO of an organization is concerned that the information...
Question 114: Using swipe cards to limit employee access to restricted are...
Question 115: Which of ihe following is the BEST way to control scope cree...
Question 116: During an audit of an organization's financial statements, a...
Question 117: Which of the following would BEST detect that a distributed-...
Question 118: An e-commerce enterprise's disaster recovery (DR) site has 3...
Question 119: Which of the following provides the BEST evidence that netwo...
Question 120: Which of the following is MOST important when planning a net...
Question 121: Which of the following controls can BEST detect accidental c...
Question 122: An IT service desk has recorded several incidents related to...
Question 123: Which of the following procedures would BEST contribute to t...
Question 124: An audit report notes that terminated employees have been re...
Question 125: Which of the following is the BEST control to protect an org...
Question 126: Prior to the migration of acquired software into production,...
Question 127: Which of the following should MOST concern an IS auditor rev...
Question 128: An organization is replacing its financial processing system...
Question 129: Which of the following factors will BEST promote effective i...
Question 130: A company has implemented an IT segregation of duties policy...
Question 131: To ensure confidentiality through the use of asymmetric encr...
Question 132: Which of the following is MOST important for the successful ...
Question 133: Audit management has just completed the annual audit plan fo...
Question 134: Which of the following would be the MOST appropriate reason ...
Question 135: Which of the following is the MOST significant concerns when...
Question 136: A company laptop has been stolen and all photos on the lapto...
Question 137: An audit report that specifies responsibility for the closur...
Question 138: An organization wants to reuse company-provided smartphones ...
Question 139: The PRIMARY objective of parallel testing an application is ...
Question 140: During a vulnerability assessment, an IS auditor finds a hig...
Question 141: Which of the following could be determined by an entity-rela...
Question 142: Which of the following procedures should be implemented prio...
Question 143: Which of the following is the BEST key performance indicator...
Question 144: Which of the following sampling techniques is commonly used ...
Question 145: An organization wants to classify database tables according ...
Question 146: Which of the following metrics would BEST measure the agilit...
Question 147: What should be the PRIMARY basis for scheduling a follow-up ...
Question 148: Which of the following should be an IS auditor's GREATEST co...
Question 149: maturity model is useful in the assessment of IT service man...
Question 150: Following an acquisition, it was decided that legacy applica...
Question 151: Which of the following is MOST important for an IS auditor t...
Question 152: During an audit of a reciprocal disaster recovery agreement ...
Question 153: The performance of an order-processing system can be measure...
Question 154: Which of the following is the MOST effective control to miti...
Question 155: Which of the following tasks should be performed during an o...
Question 156: Which of the following controls will MOST effectively detect...
Question 157: During the planning stage of compliance audit, an IS auditor...
Question 158: Electrical surge protectors BEST...
Question 159: Which of the following should an IS auditor recommend to red...
Question 160: Since data storage of a critical business application is on ...
Question 161: An IS audit manager finds that data manipulation logic devel...
Question 162: When developing a risk-based IS audit plan, the PRIMARY focu...
Question 163: When reviewing an organization s IT governance processes, wh...
Question 164: Which of the following is MOST important for an IS auditor t...
Question 165: When reviewing user access to an application containing sens...
Question 166: To protect information assets, which of the following should...
Question 167: What is the MOST important role of a certificate authority (...
Question 168: An organization's IT security policy requires annual securit...
Question 169: Which of the following would BEST detect logic bombs in new ...
Question 170: Which of the following activities would allow an IS auditor ...
Question 171: Which of the following is MOST important to include in a bus...
Question 172: Which of the following is MOST important in the audit qualit...
Question 173: An employee transfers from an organization's risk management...
Question 174: ..control that MOST effectively addresses the risk of piggyb...
Question 175: Assessments of critical information systems are based on a c...
Question 176: An organization using development operations (DevOps) proces...
Question 177: A development team has designed a new application and incorp...
Question 178: Which of the following test approaches would utilize data an...
Question 179: The risk that is created if a single sign-on is implemented ...
Question 180: An organization uses two data centers. Which of the followin...
Question 181: Which of the following would be MOST important to update onc...
Question 182: An IS auditor is evaluating the log management system for an...
Question 183: Which of the following is MOST influential when defining dis...
Question 184: What should be an IS auditor s NEXT course of action when a ...
Question 185: Which of the following is the PRIMARY advantage of single si...
Question 186: In an organization that has a staff-rotation policy, the MOS...
Question 187: Spreadsheets are used to calculate project cost estimates To...
Question 188: An organization is moving its on-site application servers to...
Question 189: Two organizations will share ownership of a new enterprise r...
Question 190: Which of the following BEST enables an IS auditor to identif...
Question 191: When planning an application audit, it is MOST important to ...
Question 192: Which of the following should be an IS auditor's PRIMARY con...
Question 193: Following an IT audit, management has decided to accept the ...
Question 194: Which of the following ensures components of an IT system ar...
Question 195: Which of ihe following BEST indicates a need to review an or...
Question 196: A system administrator recently informed the IS auditor abou...
Question 197: At which stage of the software development life cycle should...
Question 198: Which of the following would provide the BEST evidence for u...
Question 199: Adopting a service-oriented architecture would MOST likely:...
Question 200: An IS auditor is planning on utilizing attribute sampling to...
Question 201: Which of the following is MOST important for an organization...
Question 202: Which of the following control? MOST efficiently ensures tha...
Question 203: Which of the following is an example of a data analytics use...
Question 204: While reviewing similar issues in an organization s help des...
Question 205: An organization was recently notified by its regulatory body...
Question 206: Which of the following findings should be of MOST concern to...
Question 207: Which of the following is the MOST important reason to perio...
Question 208: Which of the following is the MOST efficient solution for a ...
Question 209: Which of the following will enable a customer to authenticat...
Question 210: Which type of risk would MOST influence the selection of a s...
Question 211: An IS auditor is examining a front-end sub ledger and a main...
Question 212: An organization has outsourced its data leakage monitoring t...
1 commentQuestion 213: When preparing to evaluate the effectiveness of an organizat...
Question 214: Which of the following methodologies is MOST appropriate to ...
Question 215: Which of the following is the BEST reason for an organizatio...
Question 216: Which of the following procedures should an IS auditor compl...
Question 217: An organization is running servers with critical business ap...
Question 218: While executing follow-up activities, an IS auditor is conce...
Question 219: An IS auditor plans to review all access attempts to a video...
Question 220: Which of the following BEST determines if a batch update job...
Question 221: An IS auditor is reviewing the upgrading of an operating sys...
Question 222: Which of the following is the GREATEST risk associated with ...
Question 223: As part of business continuity planning. Which of the follow...
Question 224: Of the following, who should authorize a project management ...
Question 225: Internal audit reports should be PRIMARILY written for and c...
Question 226: Which of the following should an IS auditor do FIRST when de...
Question 227: Which of the following is the BEST indication that an inform...
Question 228: An IS auditor performs a follow-up audit and learns the appr...
Question 229: An IS auditor is performing a routine procedure to test for ...
Question 230: While auditing an IT department s cloud service provider, th...
1 commentQuestion 231: An IS auditor is using data analytics in an audit and has ob...
Question 232: A PRIMARY benefit derived by an organization employing contr...
Question 233: An organization is currently replacing its accounting system...
Question 234: An IS auditor reviewing a recently implemented virtual envir...
Question 235: An organization's current end-user computing practices inclu...
Question 236: Which of the following is the MOST effective control to rest...
Question 237: A retailer normally uses a scanner to read product labels an...
Question 238: A manufacturing company is implementing application software...
Question 239: During a follow-up audit for a finding related to change man...
Question 240: Which of the following should be an IS auditor's PRIMARY foc...
Question 241: An IS auditor is conducting a review of an organization s in...
Question 242: Which of ihe following should be done FIRST to effectively d...
Question 243: Which of the following is the BEST development methodology t...
Question 244: During an external assessment of network vulnerability which...
Question 245: Which of the following is the BEST sampling method to use wh...
Question 246: Which of the following is the PRIMARY reason for an IS audit...
Question 247: An IS auditor conducts a review of a third-party vendor's re...
Question 248: An IS auditor has discovered that unauthorized customer mana...
Question 249: A database administrator (DBA) extracts a user listing for a...
Question 250: Privileged account access is require to start an ad hoc batc...
Question 251: The maturity level of an organization s problem management s...
Question 252: An IS auditor is assigned to review the development of a spe...
Question 253: Which of the following is MOST important with regard to an a...
Question 254: The BEST reason for implementing a virtual private network (...
Question 255: Which of the following is the MOST effective control to ensu...
Question 256: An IT steering committee assists the board of directors to f...
Question 257: An internal audit department recently established a quality ...
Question 258: Which of the following is a reason for implementing a decent...
Question 259: During a review of system access, an IS auditor notes that a...
Question 260: When reviewing an organization's data protection practices, ...
Question 261: Which of the following should be the PRIMARY basis for plann...
Question 262: An IS auditor has completed a service level management audit...
Question 263: In assessing the priority given to systems covered in an org...
Question 264: Which of the following is the PRIMARY benefit of including I...
Question 265: Which of the following should be of GREATEST concern to an I...
Question 266: Which of the following would be an appropriate role of inter...
Question 267: The business owner's approval of software changes being move...
Question 268: An IS auditor finds ad hoc vulnerability scanning is in plac...
Question 269: Which of the following is the BEST indicator that an applica...
Question 270: An IS auditor is assigned to review the IS department's qual...
Question 271: When an intrusion into an organizations network is detected,...
Question 272: An organization was recently notified by its regulatory body...
Question 273: Which of the following is MOST important for an IS auditor t...
Question 274: During an audit, it is discovered that several suppliers wit...
Question 275: When removing a financial application system from production...
Question 276: In an environment where most IT services have been outsource...
Question 277: Which of the following is the MOST important benefit of invo...
Question 278: An organization plans to launch a social media presence as p...
Question 279: In an IS auditor's review of an organization s configuration...
Question 280: Which of the following mechanisms for process improvement in...
Question 281: When using a wireless device, which of the following BEST en...
Question 282: Which of the following is the BEST indication that an organi...
Question 283: A maturity model can be used to aid the implementation of IT...
Question 284: Which of the following types of controls would BEST facilita...
Question 285: During a software acquision review, an IS auditor should rec...
Question 286: Which of the following helps to ensure the integrity of data...
Question 287: A post-implementation review of a system implementation has ...
Question 288: An intruder accesses an application server and makes changes...
Question 289: An auditor is creating an audit program in which the objecti...
Question 290: Which of the following should be an IS auditor's PRIMARY con...
Question 291: Which of the following a recent internal data breach, an IS ...
Question 292: When designing metrics for information security, the MOST im...
Question 293: Which of the following findings would be of MOST concern to ...
Question 294: Which of the following should be an IS auditor's PRIMARY con...
Question 295: Which of the following would provide the useful input to IS ...
Question 296: Which of the following BEST ensures that only authorized sof...
Question 297: The operations team of an organization has reported an IS se...
Question 298: An organization has purchased a replacement mainframe comput...
Question 299: An IS auditor has found that an organization is unable to ad...
Question 300: An IS auditor is unable to directly test privacy controls fo...
Question 301: An organization offers an online information security awaren...
Question 302: Which of the following is the BEST way to address ongoing co...
Question 303: Which of the following should be performed FIRST when prepar...
Question 304: Which of the following would BEST indicate the effectiveness...
Question 305: Which of the following would BEST deter the theft of corpora...
Question 306: A design company has multiple name and address files for its...
Question 307: During an audit of the organization's data privacy policy, t...
Question 308: An IS auditor has assessed a payroll service provider's secu...
Question 309: During a help desk review, an IS auditor determines the call...
Question 310: Which of the following would provide the MOST important inpu...
Question 311: Which of the following is the GREATEST cause for concern whe...
Question 312: Buffer overflow in an Internet environment is of particular ...
Question 313: Which of the following is the MOST important step in the dev...
Question 314: An IS auditor is reviewing standards and compliance requirem...
Question 315: Which of the following is the BEST way to evaluate the effec...
Question 316: An enterprise receiving email should have procedures to cont...
Question 317: Which of the following is MOST likely to be prevented by a f...
Question 318: An organization uses electronic funds transfer (EFT) to pay ...
Question 319: An audit committee is reviewing an annual IT risk assessment...
Question 320: Which audit technique provides the GREATEST assurance that i...
Question 321: Following a security breach, in which a hacker exploited a w...
Question 322: Which the following is MOST critical for the effective imple...
Question 323: An IS auditor previously worked in an organization s IT depa...
Question 324: internal IS auditor recommends that incoming accounts payabl...
Question 325: Management has agreed to perform multiple remediation action...
Question 326: When implementing a software product (middleware) to pass da...
Question 327: Which of the following is the PRIMARY reason for database op...
Question 328: Which of the following should an IS auditor verify when audi...
Question 329: An organization has software that is not compliant with data...
Question 330: During an audit of a payroll system, an IS auditor identifie...
Question 331: Which of the following audit procedures would BEST assist an...
Question 332: An organization's IT security policy states that user ID's m...
Question 333: Which of the following is a substantive test procedure?...
Question 334: Which of the following is the MOST important reason for upda...
Question 335: Which of the following is the MOST effective way to minimize...
Question 336: Which of the following is the PRIMARY concern if a business ...
Question 337: An IS auditor attempts to sample for variables in a populati...
Question 338: An organization has implemented application whitelisting in ...
Question 339: When auditing the security architecture of an e-commerce env...
Question 340: Which of the following is the PRIMARY responsibility of an o...
Question 341: At what point in software development should the user accept...
Question 342: An IS auditor is conducting a pre-implementation review to d...
Question 343: Which of the following is the BEST guidance from an IS audit...
Question 344: The risk that the IS auditor will not find an error that has...
Question 345: An IS auditor is a member of an application development team...
Question 346: Which of the following is the GREATEST concern when an organ...
Question 347: Which of the following is the BEST indication that an organi...
Question 348: Which of the following would be MOST important for an IS aud...
Question 349: Which of the following is MOST important to include in a con...
Question 350: Which of the following areas are the MOST likely cause of an...
Question 351: The use of the Transport Layer Security (TLS) protocol enabl...
Question 352: Which of the following should an IS auditor review FIRST whe...
Question 353: Which of the following key performance indicators (KPIs) pro...
Question 354: Which of the following should be of GREATEST concern to an I...
Question 355: During a post-implementation review, a step in determining w...
Question 356: A database is denormalized in order to:...
Question 357: Which of the following will BEST help to ensure that an in-h...
Question 358: Which of the following is a detective control that can be us...
Question 359: Which of the following is the GREATEST benefit of implementi...
Question 360: In the IT department where segregation of duties is not feas...
Question 361: Which of the following is the MOST effective mechanism for e...
Question 362: Which of the following is MOST important for an IS auditor t...