<< Prev Question Next Question >>

Question 160/363

An IS auditor is reviewing an organization's implementation of a bring your own device (BYOD) program.
Which of the following would be the BEST recommendation to help ensure sensitive data is protected if a device is in the possession of an unauthorized individual?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (363q)
Question 1: Which of the following reports can MOST effectively be used ...
Question 2: Which of the following it BEST enabled by following a config...
Question 3: Which of the following is the BEST way to help ensure the se...
Question 4: Which of the following would be an auditor's GREATEST concer...
Question 5: Which of the following should be an IS auditor's GREATEST co...
Question 6: A recent audit identified duplicate software licenses and te...
Question 7: In an IS auditor's review of an organization s configuration...
1 commentQuestion 8: Which of the following communication modes should be of GREA...
Question 9: At which stage of the software development life cycle should...
Question 10: A technology service organization has recently acquired a ne...
Question 11: An IS auditor is reviewing an organization's method to trans...
Question 12: Which of the following should an IS auditor recommend to fac...
Question 13: Audit software designed to detect invalid data, extreme valu...
Question 14: A start-up company acquiring for its order-taking system is ...
Question 15: An auditor is creating an audit program in which the objecti...
Question 16: A recent audit concluded that an organization's information ...
Question 17: To help ensure the organization s information assets are ade...
Question 18: A post-implementation review of a system implementation has ...
Question 19: An organization has agreed to perform remediation related to...
Question 20: An audit group is conducting a risk assessment as part of a ...
Question 21: An IS auditor learns that after each scheduled batch process...
Question 22: An enterprise receiving email should have procedures to cont...
Question 23: Of the following procedures for testing a disaster recovery ...
Question 24: An organization was recently notified by its regulatory body...
Question 25: Which of the following should be restricted from a network a...
Question 26: An IS auditor reviewing a new application for compliance wit...
Question 27: Which of the following is MOST likely to improve the portabi...
Question 28: An IS auditor reviewing a recently implemented virtual envir...
Question 29: When introducing a maturity model to the IT management proce...
Question 30: Which of the following would BEST enable an IS auditor to pe...
Question 31: Which of the following would BEST deter the theft of corpora...
Question 32: During an audit of information security procedures of a larg...
Question 33: Which the following is MOST critical for the effective imple...
Question 34: An IS auditor is assigned to review the IS department's qual...
Question 35: Which of the following is the MOST effective control for a u...
Question 36: Which of the following is the BEST recommendation for the es...
Question 37: Which of the following is the BEST guidance from an IS audit...
Question 38: Which of the following is the GREATEST risk associated with ...
Question 39: Which of the following is the PRIMARY reason for an IS audit...
Question 40: A review of Internet security disclosed that users have indi...
Question 41: Which of the following will BEST protect the confidentiality...
Question 42: Based on the Guidance of internal audit, an IT steering comm...
Question 43: Which of the following factors will BEST promote effective i...
Question 44: While reviewing similar issues in an organization s help des...
Question 45: Before concluding that internal controls can be relied upon,...
Question 46: Which of the following is the MOST important difference betw...
Question 47: Which of the following BEST ensures that only authorized sof...
Question 48: Which of the following is the MOST effective way to identify...
Question 49: Which of the following is the BEST way to evaluate the effec...
Question 50: Which of the following controls MOST effectively reduces the...
Question 51: The demilitarized zone (DMZ) is the part of a network where ...
Question 52: When an intrusion into an organizations network is detected,...
Question 53: An IT governance body wants to determine whether IT service ...
Question 54: Which of the following would be considered the BEST compensa...
Question 55: To protect information assets, which of the following should...
Question 56: The grants management system is used to calculate grant paym...
Question 57: Which of the following would BEST enable effective IT resour...
Question 58: A PRIMARY benefit derived by an organization employing contr...
Question 59: Which of the following is the FIRST consideration when devel...
Question 60: When planning for the implementation of a new system, an org...
Question 61: Which of the following is the MOST likely cause of a success...
Question 62: Which of the following is the PRIMARY objective of the IS au...
Question 63: An IS auditor is planning to audit an organization's infrast...
Question 64: An IS auditor is evaluating the risks and controls associate...
Question 65: An IS auditor reviewing security incident processes realizes...
Question 66: The MOST important reason for documenting all aspects of a d...
Question 67: To confirm integrity for a hashed message, the receiver shou...
Question 68: Which of the following should be the MOST important consider...
Question 69: The GREATEST risk of database renormalization is:...
Question 70: Outsourcing the development of business systems is MOST like...
Question 71: Which of the following is the BEST detective control for a j...
Question 72: Which of the following is the MOST important activity to und...
Question 73: An organization with high security requirements is evaluatin...
Question 74: Management decided to accept the residual risk of an audit f...
Question 75: A new regulatory standard for data privacy requires an organ...
Question 76: Which of the following is the MAIN purpose of implementing a...
Question 77: A manufacturing company is implementing application software...
Question 78: Which of the following is the BEST method to assess the adeq...
Question 79: To test the integrity of the data in the accounts receivable...
Question 80: Which of the following is an advantage of using electronic d...
Question 81: mission-critical applications with a low recovery time objec...
Question 82: Which of the following is the PRIMARY advantage of using vir...
Question 83: Which of the following would be the MOST effective control t...
Question 84: The quality assurance (QA) function should be prevented from...
Question 85: An IS auditor is analysing a sample of assesses recorded on ...
Question 86: When developing metrics to measure the contribution of IT to...
Question 87: During a vulnerability assessment, an IS auditor finds a hig...
Question 88: In an online application, which of the following would provi...
Question 89: The MOST efficient way to confirm that an ERP system being i...
Question 90: During an audit of an organization s incident management pro...
Question 91: Internal audit reports should be PRIMARILY written for and c...
Question 92: The business owner's approval of software changes being move...
Question 93: Which of the following provides for the GREATEST cost reduct...
Question 94: Which of the following is the MOST efficient solution for a ...
Question 95: After the release of an application system, an IS auditor wa...
Question 96: What is the BEST population to select from when testing that...
Question 97: What is the PRIMARY advantage of prototyping as part of syst...
Question 98: When evaluating the recent implementation of an intrusion de...
Question 99: During an audit, it is discovered that several suppliers wit...
Question 100: Which of the following is the GREATEST benefit of implementi...
Question 101: Which of the following should be an IS auditor's FIRST actio...
Question 102: Which of the following should be reviewed as part of a data ...
Question 103: Which of the following is the BEST point in time to conduct ...
Question 104: Which of the following is the BEST reason to utilize blockch...
Question 105: An IS auditor notes that help desk personnel are required to...
Question 106: Which of the following is MOST likely to be spoofed in an em...
Question 107: An IS auditor has discovered that unauthorized customer mana...
Question 108: Which of the following audit procedures would assist an IS a...
Question 109: When connecting to an organization's intranet from the Inter...
Question 110: An IS auditor is performing a post-implementation review of ...
Question 111: What is an IS auditor's BEST course of action if informed by...
Question 112: Which of the following are BEST suited for continuous auditi...
Question 113: Which of the following would provide management with the MOS...
Question 114: Which of the following is the GREATEST risk associated with ...
Question 115: An IS auditor is evaluating the access controls at a multina...
Question 116: An organization has outsourced its data processing function ...
Question 117: Which of the following would be MOST important for an IS aud...
Question 118: Which of the following is the MOST effective way to assess w...
Question 119: Which of the following is an effective way to ensure the int...
Question 120: Which of the following should be the PRIMARY consideration w...
Question 121: Which of the following is the MOST important determining fac...
Question 122: Which of the following is MOST important to ensure when plan...
Question 123: .. Implementing which of the following would BEST address is...
Question 124: A previously agreed-upon recommendation was not implemented ...
Question 125: An organization with high availability resource requirements...
Question 126: Which of the following is the BEST way to help ensure new IT...
Question 127: Privileged account access is require to start an ad hoc batc...
Question 128: Which of the following is a detective control?...
Question 129: Loading of illegal software packages onto a network by an em...
Question 130: Which of the following would be considered a corrective cont...
Question 131: An IS audit manager finds that data manipulation logic devel...
Question 132: The MAIN objective of incident management is to:...
Question 133: The BEST reason for implementing a virtual private network (...
Question 134: During a post-incident review of a security breach, what typ...
Question 135: An IS audit report highlighting inadequate network internal ...
Question 136: Stress testing should ideally be carried out under a:...
Question 137: An internal audit has revealed a large number of incidents f...
Question 138: Due to cost restraints, a company defers the replacement of ...
Question 139: The information security function in a large organization is...
Question 140: Which of the following is the MOST important consideration w...
Question 141: An IS auditor is conducting a review of an organization s in...
Question 142: An organization allows employees to use personally owned mob...
Question 143: An IS auditor identifies key controls that have been overrid...
Question 144: An operations manager has recently moved to internal audit W...
Question 145: Which of the following should MOST concern an IS auditor rev...
Question 146: Which of the following would provide the BEST evidence for u...
Question 147: Which of the following would be the MOST appropriate reason ...
Question 148: Documentation of workaround processes to keep a business fun...
Question 149: Which of the following should be performed immediately after...
Question 150: What is an IS auditor's BEST recommendation for management i...
Question 151: Due to the small size of the payroll department, an organiza...
Question 152: Which of the following is the BEST approach to help ensure e...
Question 153: An IS auditor notes that several of a client's servers are v...
Question 154: During an audit of a reciprocal disaster recovery agreement ...
Question 155: Which of the following control? MOST efficiently ensures tha...
Question 156: Which of the following should an IS auditor expect to find i...
Question 157: An organization has recently acquired and implemented intell...
Question 158: Which of the following observations noted during a review of...
Question 159: Which of the following is the BEST way to reduce the risk of...
Question 160: An IS auditor is reviewing an organization's implementation ...
Question 161: An IS auditor auditing the effectiveness of utilizing a hot ...
Question 162: During the procurement process which of the following would ...
Question 163: An organization's audit charter should:...
Question 164: The BEST data backup strategy for mobile users is to:...
Question 165: When auditing the effectiveness of a biometric system, which...
Question 166: A security administrator should have read-only access for wh...
Question 167: During the evaluation of a firm's newly established whistleb...
Question 168: Which of the following is the BEST way for an IT forensics i...
Question 169: At a project steering committee meeting, it is stated that a...
Question 170: Which of the following requires a consensus by key stakehold...
Question 171: What should be the PRIMARY basis for scheduling a follow-up ...
Question 172: After an external IS audit, which of the following should be...
Question 173: Which of the following would represent an acceptable test of...
Question 174: Which of the following is a directive control?...
Question 175: Which of the following types of controls would BEST facilita...
Question 176: Which of the following is the BEST source for describing the...
Question 177: An organization is replacing a mission-critical system. Whic...
Question 178: The PRIMARY purpose of an internal audit department's qualit...
Question 179: An IS auditor plans to review all access attempts to a video...
Question 180: An IS auditor is planning on utilizing attribute sampling to...
Question 181: An IS auditor conducting audit follow-up activities learns t...
Question 182: Which of the following controls is MOST appropriate against ...
Question 183: During a review of an application system, an IS auditor iden...
Question 184: Which of the following would be of GREATEST concern to an IS...
Question 185: Following a security breach, in which a hacker exploited a w...
Question 186: Which of the following should be performed FIRST when prepar...
Question 187: While executing follow-up activities, an IS auditor is conce...
Question 188: When reviewing a disaster recovery plan (DRP) an IS auditor ...
Question 189: A company has located its computer center on a moderate eart...
Question 190: When reviewing user access to an application containing sens...
Question 191: An IS auditor is reviewing the results of a business process...
Question 192: An IS auditor finds that firewalls are outdated and not supp...
Question 193: Which of the following is the MOST important consideration w...
Question 194: Which of the following roles combined with the role of a dat...
Question 195: Which of the following is MOST helpful in preventing a syste...
Question 196: internal IS auditor recommends that incoming accounts payabl...
Question 197: An IS auditor observed that most users do not comply with ph...
Question 198: An IS auditor is observing transaction processing and notes ...
Question 199: A new regulation in one country of a global organization has...
Question 200: Which of the following is the BEST IS audit strategy?...
Question 201: An IS auditor performing an application development review a...
Question 202: What is the purpose of a hypervisor?...
Question 203: Which of the following is the MOST important reason to class...
Question 204: An IS auditor is mapping controls to risk for an accounts pa...
Question 205: Which of the following is the MOST effective means of helpin...
Question 206: Which of the following should be of GREATEST concern to an I...
Question 207: An IT service desk has recorded several incidents related to...
Question 208: In attribute sampling, what is the relationship between expe...
Question 209: Which of the following would provide the MOST assurance that...
Question 210: Which of the following should be of GREATEST concern to an I...
Question 211: Which of the following would be the MOST effective method to...
Question 212: An IS auditor discovered that a firewall has more services t...
Question 213: Which of the following is the BEST indication of an effectiv...
Question 214: Which of the following is the BEST way to transmit documents...
Question 215: Which of the following is MOST important for an IS auditor t...
Question 216: Which of the following control checks would utilize data ana...
Question 217: Which of the following is the BEST indication that an inform...
Question 218: To create a digital signature in a message using asymmetric ...
Question 219: A large insurance company is about to replace a major financ...
Question 220: The risk that is created if a single sign-on is implemented ...
Question 221: Which of the following controls will MOST effectively detect...
Question 222: A vendor service level agreement (SLA) requires backup to be...
Question 223: Which of the following would be the MOST likely reason for a...
Question 224: The purpose of data migration testing is to validate data:...
Question 225: When auditing the IT governance of an organization planning ...
Question 226: Capacity management enables organizations to:...
Question 227: An IS auditor should ensure that an application's audit trai...
Question 228: Which of the following is a distinguishing feature at the hi...
Question 229: An IS auditor discovers that management has created a system...
Question 230: An IS auditor found that a company executive is encouraging ...
Question 231: Which of the following is the BEST sampling method to use wh...
Question 232: Which of the following access rights in the production envir...
Question 233: Which of the following is MOST important for an IS auditor t...
Question 234: Which of the following will enable a customer to authenticat...
Question 235: On a daily basis, an in-house development team moves duplica...
Question 236: An IS auditor determines that a business continuity plan has...
Question 237: An IS auditor has been asked to advise on the design and imp...
Question 238: The drives of a tile server are backed up at a hot site. Whi...
Question 239: Which of the following poses the GREATEST risk to the enforc...
Question 240: Which of the following methodologies is MOST appropriate to ...
Question 241: Both statistical and nonstatistical sampling techniques:...
Question 242: Which of the following is an IS auditor's recommendation for...
Question 243: Which of the following is an IS auditor's BEST course of act...
Question 244: Which of the following would be the MOST effective method to...
Question 245: In a typical SDLC, which group is PRIMARILY responsible for ...
Question 246: When developing a business continuity plan (BCP), which of t...
Question 247: When initiating an IT project, which of the following should...
Question 248: An IS auditor performs a follow-up audit and learns the appr...
Question 249: During a review of an insurance company s claims system, the...
Question 250: Which of the following is the BEST time for an IS auditor to...
Question 251: An IS auditor would MOST likely recommend that IT management...
Question 252: Which of the following MOST efficiently protects computer eq...
Question 253: Which of the following poses the GREATEST risk to data secur...
Question 254: Following an acquisition, it was decided that legacy applica...
Question 255: An IS auditor is conducting a review of a healthcare organiz...
Question 256: Which of the following should an IS auditor do FIRST when de...
Question 257: When creating a new risk management program, it is CRITICAL ...
Question 258: An organization migrated most of its physical servers to vir...
Question 259: An IT steering committee assists the board of directors to f...
Question 260: Which of the following validation techniques would BEST prev...
Question 261: Which of the following is the MOST important reason for upda...
Question 262: Following a breach, what is the BEST source to determine the...
Question 263: The prioritization of incident response actions should be PR...
Question 264: Which of the following should be of GREATEST concern to an I...
Question 265: Which of the following should be an IS auditor's FIRST activ...
Question 266: Following an IT audit, management has decided to accept the ...
Question 267: Which of the following tools is MOST helpful in estimating b...
Question 268: Which of the following is MOST important to helping incident...
Question 269: A stockbroker accepts orders over the Internet. Which of the...
Question 270: Which of the following is the MOST important benefit of invo...
Question 271: Which of the following could be determined by an entity-rela...
Question 272: Which of the following would provide the important input dur...
Question 273: Which of the following is the MOST effective control to miti...
Question 274: An IS auditor finds that periodic reviews of read-only users...
Question 275: An IS auditor finds ad hoc vulnerability scanning is in plac...
Question 276: Which of the following should be of GREATEST concern to an o...
Question 277: Which of the following BEST helps to identify errors during ...
Question 278: As part of business continuity planning. Which of the follow...
Question 279: When preparing to evaluate the effectiveness of an organizat...
Question 280: Which of the following is the BEST reason for an organizatio...
Question 281: Which of the following is MOST likely to be included in a po...
Question 282: Which of the following sampling techniques is commonly used ...
Question 283: Which of the following sampling methods is the BEST approach...
Question 284: While reviewing a hot site, the IS auditor discovers that on...
Question 285: A risk analysis is MOST useful when applied during which pha...
Question 286: During a review of a production schedule, an IS auditor obse...
Question 287: An IS auditor observes that an organization s critical IT sy...
Question 288: Which of the following is the MOST effective mechanism for e...
Question 289: Which of the following would MOST effectively minimize the r...
Question 290: Which of ihe following BEST indicates a need to review an or...
Question 291: Which of the following BEST demonstrates to an IS auditor th...
Question 292: An organization is developing data classification standards ...
Question 293: When using a wireless device, which of the following BEST en...
Question 294: An existing system is being replaced with a new application ...
Question 295: While planning a security audit, an IS auditor is made aware...
Question 296: Which of the following provides an IS auditor the MOST assur...
Question 297: An IS auditor has been asked to audit the proposed acquisiti...
Question 298: When planning an application audit, it is MOST important to ...
Question 299: The risk that the IS auditor will not find an error that has...
Question 300: As part of a post-implementation review, the BEST way to ass...
Question 301: What should an IS auditor do when informed that some recomme...
Question 302: Which of the following should be of GREATEST concern when co...
Question 303: Which of the following is an example of audit risk?...
Question 304: An IS auditor has performed an agreed-upon procedures engage...
Question 305: Which of the following is the BEST method for uncovering sha...
Question 306: Which of the following would BEST detect that a distributed-...
Question 307: A typical network architecture used for e-commerce, a load b...
Question 308: Which of the following activities provides an IS auditor wit...
Question 309: An IS auditor is evaluating a virtual server environment and...
Question 310: The recovery time objective (RTO) is normally determined on ...
Question 311: An IS auditor discovers that validation controls in a web ap...
Question 312: Which of the following will BEST help to ensure that an in-h...
Question 313: An IS auditor notes that the anticipated benefits from an on...
Question 314: An organization uses two data centers. Which of the followin...
Question 315: What is the FIRST step an auditor should take when beginning...
Question 316: Which of the following controls is MOST effective in detecti...
Question 317: Prior to the migration of acquired software into production,...
Question 318: An IS auditor finds that a mortgage origination team receive...
Question 319: During a post-implementation review, a step in determining w...
Question 320: Which of the following is a benefit of requiring management ...
Question 321: Which of the following BEST indicates the effectiveness of a...
Question 322: While reviewing the project plan for a new system prior to g...
Question 323: The CIO of an organization is concerned that the information...
Question 324: An IS auditor notes that several users have not logged into ...
Question 325: The PRIMARY objective of parallel testing an application is ...
Question 326: Which of the following presents the GREATEST security risk i...
Question 327: Which of the following is the MOST appropriate document for ...
Question 328: An IS auditor is assessing an organization's implementation ...
Question 329: During a review of information security procedures for disab...
Question 330: An organization has implemented an automated match between p...
Question 331: Which of the following should be reviewed FIRST when plannin...
Question 332: When reviewing backup policies, an IS auditor MUST verify th...
Question 333: An advantage of installing a thin client architecture in a l...
Question 334: Which of the following is the GREATEST cause for concern whe...
Question 335: What is the BEST indicator of successful implementation of a...
Question 336: Which of the following would an IS auditor recommend as the ...
Question 337: An organization using instant messaging to communicate with ...
Question 338: Which of the following BEST facilitates the ability to effic...
Question 339: Which of the following is the BEST type of backup to minimiz...
Question 340: What would be an IS auditors GREATEST concern when using a t...
Question 341: Which of the following is the MOST important reason to perio...
Question 342: During a help desk review, an IS auditor determines the call...
Question 343: When conducting a requirements analysis for a project, the B...
Question 344: The BEST way to assure an organization's board of directors ...
Question 345: An IS auditor s role in privacy and security is to:...
Question 346: Which of the following is the PRIMARY reason for database op...
Question 347: Which of the following is the MOST important consideration f...
Question 348: Which of the following is the PRIMARY advantage of single si...
Question 349: An IS auditor finds that a company is using a payroll provid...
Question 350: The PRIMARY reason an IS department should analyze past inci...
Question 351: An IS auditor is following upon a finding that determined el...
Question 352: In a RAO model, which of the following roles must be assigne...
Question 353: To maintain the confidentiality of information moved between...
Question 354: An IS auditor would be concerned if the quality assurance (Q...
Question 355: When an organization outsources a payroll system to a cloud ...
Question 356: An organization plans to launch a social media presence as p...
Question 357: Which of the following is the BCST way to determine the effe...
Question 358: Which of the following is the BEST physical security solutio...
Question 359: Which of the following is the PRIMARY benefit of using an in...
Question 360: Which of the following is MOST important for the IS auditor ...
Question 361: A configuration management audit identified that predefined ...
Question 362: An audit report notes that terminated employees have been re...
Question 363: Which of the following provides the GREATEST assurance that ...