<< Prev Question Next Question >>

Question 13/260

When reviewing a database supported by a third-party service provider, an IS auditor found minor control deficiencies. The auditor should FIRST

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (260q)
Question 1: When reviewing capacity monitoring, an IS auditor notices se...
Question 2: An organization has outsourced its data leakage monitoring t...
Question 3: Which of the following access rights in the production envir...
Question 4: An internal audit has revealed a large number of incidents f...
Question 5: Which of the following cloud computing models should an orga...
Question 6: During a project meeting for the Implementation of an Enterp...
Question 7: A region where an organization conducts business has announc...
Question 8: An organization recently implemented a cloud document storag...
Question 9: An IS auditor discovered abnormalities in a monthly report g...
Question 10: The drives of a tile server are backed up at a hot site. Whi...
Question 11: An IS auditor observes that a bank's web page address is pre...
Question 12: What is the PRIMARY objective of implementing data classific...
Question 13: When reviewing a database supported by a third-party service...
Question 14: An IS auditor is reviewing the upgrading of an operating sys...
Question 15: When developing a business continuity plan (BCP), which of t...
Question 16: Which of the following are the PRIMARY considerations when d...
Question 17: During the course of an audit, an IS auditor's organizationa...
Question 18: Which of the following controls would BEST enable IT managem...
Question 19: An IS auditor is preparing a data set for a data analytics p...
Question 20: Two servers are deployed in a cluster to run a mission-criti...
Question 21: As part of a quality assurance initiative, an organization h...
Question 22: An IS auditor is conducting a pre-implementation review to d...
Question 23: Which of the following could be used to evaluate the effecti...
Question 24: With a properly implemented public key infrastructure (PKI) ...
Question 25: Which of the following roles is ULTIMATELY accountable for t...
Question 26: Which of the following is the safest means of transmitting c...
Question 27: During an audit of a mission-critical system hosted in an ou...
Question 28: Which of the following would be MOST important for an IS aud...
Question 29: Which of the following BEST ensures IT incident and problem ...
Question 30: When determining whether a project in the design phase will ...
Question 31: An IS auditor is reviewing the process followed in identifyi...
Question 32: Which of the following would BEST detect that a distributed-...
Question 33: Which of the following BEST indicates to an IS auditor that ...
Question 34: In a database management system (DBMS) normalization is used...
Question 35: Which of the following audit procedures would provide the BE...
Question 36: Which of the following will enable a customer to authenticat...
Question 37: Which of the following is the PRIMARY objective of the IS au...
Question 38: Which of the following is the BEST indication of the complet...
Question 39: Which of the following is the MOST important factor when an ...
Question 40: Which of the following should be reviewed FIRST when plannin...
Question 41: During a "clean desk" audit, a USB flash drive labeled "conf...
Question 42: When responding to an ongoing denial of service (DoS) attack...
Question 43: Which of the following would be of GREATEST concern to an IS...
Question 44: During an audit of the organization's data privacy policy, t...
Question 45: When an organization is having new software implemented unde...
Question 46: An IS auditor notes that several of a client's servers are v...
Question 47: Which of the following threats is MOST effectively controlle...
Question 48: The BEST data backup strategy for mobile users is to:...
Question 49: Which of the following should an IS auditor recommend to fac...
Question 50: Which of the following is a prerequisite to help ensure that...
Question 51: When assessing a business case as part of a post-implementat...
Question 52: Which of the following is the BEST way to transmit documents...
Question 53: Which of the following would help to ensure the completeness...
Question 54: Which of the following is the BEST audit procedure to determ...
Question 55: Which of the following is the MOST reliable network connecti...
Question 56: What is the BEST indicator of successful implementation of a...
Question 57: Which of the following is MOST important for an IS auditor t...
Question 58: A retirement system verifies that the field for employee sta...
Question 59: Which of the following conditions would be of MOST concern t...
Question 60: An IS auditor is conducting a post-implementation review of ...
Question 61: An IS auditor Is assessing risk associated with peer-to-peer...
Question 62: During an audit of a reciprocal disaster recovery agreement ...
Question 63: Which of the following provides the BEST indication that IT ...
Question 64: Which of the following has the GREATEST influence on the suc...
Question 65: Two organizations will share ownership of a new enterprise r...
Question 66: The results of an IS audit indicating the need to strengthen...
Question 67: When designing metrics for information security, the MOST im...
Question 68: An organization's sensitive data is stored in a cloud comput...
Question 69: Which of the following controls BEST mitigates the impact of...
Question 70: An IS auditor is assigned to review the development of a spe...
Question 71: Which of the following activities is MOST important to consi...
Question 72: An IS auditor reviewing a financial organization's identity ...
Question 73: Which of the following IS functions can be performed by the ...
Question 74: Which of the following is an example of a corrective control...
Question 75: In which of the following sampling methodologies does each m...
Question 76: An IS auditor has been asked to review an organization's sec...
Question 77: What would be an IS auditor's BEST course of action when a c...
Question 78: Which of the following would be MOST useful when analyzing c...
Question 79: A recent audit concluded that an organization's information ...
Question 80: Which of the following mechanisms for process improvement in...
Question 81: Which of the following is a KEY consideration to ensure the ...
Question 82: Which of the following findings is the GREATES concern when ...
Question 83: An organization using instant messaging to communicate with ...
Question 84: Which of the following is the BEST control to reduce the lik...
Question 85: Which of the following is MOST essential to quality manageme...
Question 86: When determining the specifications for a server supporting ...
Question 87: Which of the following observations should be of concern to ...
Question 88: Which of the following is MOST important with regard to an a...
Question 89: Which of the following should be the FIRST step when develop...
Question 90: An IS auditor has found that despite an increase in phishing...
Question 91: Which of the following controls would BEST decrease the expo...
Question 92: For a company that outsources payroll processing, which of t...
Question 93: An IS auditor suspects an organization's computer may have b...
Question 94: Which of the following is MOST useful for determining whethe...
Question 95: To create a digital signature in a message using asymmetric ...
Question 96: Which of the following is MOST important for the successful ...
Question 97: Which of the following system deployments requires the cloud...
Question 98: Which of the following is the GREATEST risk resulting from c...
Question 99: A legacy application is running on an operating system that ...
Question 100: A small organization does not have enough employees to imple...
Question 101: Which of the following is the BEST control to mitigate the m...
Question 102: planning an end-user computing (EUC) audit, it is MO ST impo...
Question 103: An IS auditor attempts to sample for variables in a populati...
Question 104: An organization has performance metrics to track how well IT...
Question 105: An organization is evaluating a disaster recovery testing sc...
Question 106: The process of applying a hash function to a message, and ob...
Question 107: Which of the following is the GREATEST risk of cloud computi...
Question 108: Which of the following should be included in a business impa...
Question 109: Which of the following should be of MOST concern to an IS au...
Question 110: The PRIMARY reason an IS department should analyze past inci...
Question 111: A sales representative is reviewing the organization's feedb...
Question 112: Which of the following user actions constitutes the GREATEST...
Question 113: When reviewing a disaster recovery plan (DRP) an IS auditor ...
Question 114: Which of the following is MOST influential when defining dis...
Question 115: An organization's current end-user computing practices inclu...
Question 116: When implementing a software product (middleware) to pass da...
Question 117: The MOST important reason for documenting all aspects of a d...
Question 118: What is the MOST important consideration of any disaster res...
Question 119: Which of the following would provide the BEST evidence for u...
Question 120: To restore service at a large processing facility after a di...
Question 121: A system administrator recently informed the IS auditor abou...
Question 122: In a 24/7 processing environment, a database contains severa...
Question 123: When participating as a member of a system development team,...
Question 124: Which of the following would be MOST time and cost efficient...
Question 125: Which of the following is the BEST indication that an inform...
Question 126: Which of the following is a reason for implementing a decent...
Question 127: Which of the following is the PRIMARY criterion for identify...
Question 128: An IS Auditor is performing a business continuity plan (BCP)...
Question 129: During a network security review the system log indicates an...
Question 130: An IS auditor is planning on utilizing attribute sampling to...
Question 131: Which of the following is the BEST approach to verify that i...
Question 132: In a high-volume, real-time system, the MOST effective techn...
Question 133: A typical network architecture used for e-commerce, a load b...
Question 134: Which of the following is the FIRST consideration when devel...
Question 135: Which of the following is the MOST important difference betw...
Question 136: Which of the following is the PRIMARY objective of using a c...
Question 137: While evaluating an organization's program for tracking syst...
Question 138: The PRIMARY benefit of using secure shell (SSH) to access a ...
Question 139: During the review of an organization's software development ...
Question 140: The GREATEST benefit of using a prototyping approach in soft...
Question 141: What would be an IS auditors GREATEST concern when using a t...
Question 142: An organization has purchased a replacement mainframe comput...
Question 143: An organization is including a client side software componen...
Question 144: Invoking a business continuity plan (BCP) is demonstrating w...
Question 145: When preparing to evaluate the effectiveness of an organizat...
Question 146: An organization has implemented a control to help ensure dat...
Question 147: Which of the following areas are the MOST likely cause of an...
Question 148: An IS auditor is evaluating the access controls at a multina...
Question 149: Which of the following is the MOST important metric in selec...
Question 150: Which of the following would be the MOST significant conside...
Question 151: What is the PRIMARY reason for hardening new devices before ...
Question 152: An IS auditor is planning an audit of an organization s payr...
Question 153: The MAIN reason an organization's incident management proced...
Question 154: Information security awareness programs in a large organizat...
Question 155: Code changes are compiled and placed in a change folder by t...
Question 156: An IS auditor finds that confidential company data has been ...
Question 157: Which of the following tools is MOST helpful in estimating b...
Question 158: Which of the following is the MOST important control to help...
Question 159: Which of the following is the MOST effective way to minimize...
Question 160: When creating a new risk management program, it is CRITICAL ...
Question 161: An organization s audit charter PRIMARILY:...
Question 162: Which of the following controls is MOST effective in detecti...
Question 163: Which of the following is the BEST method to assess the adeq...
Question 164: Which of the following is an IS auditor's recommendation for...
Question 165: Which of the following is a distinguishing feature at the hi...
Question 166: Following an internal audit of a database, management has co...
Question 167: An external IS auditor is reviewing the continuous monitorin...
Question 168: During a post-incident review of a security breach, what typ...
Question 169: Which of the following Is the MOST effective way for an IS a...
Question 170: What is the PRIMARY purpose of performing a parallel run of ...
Question 171: Which of the following should an IS auditor review FIRST whe...
Question 172: During the implementation of an upgraded enterprise resource...
Question 173: Which of the following stakeholders is accountable for contr...
Question 174: An organization's audit charter should:...
Question 175: IS management has decided to replace the current single-serv...
Question 176: An IS auditor previously worked in an organization s IT depa...
Question 177: An organization has begun using social media to communicate ...
Question 178: Which of the following should an IS auditor recommend to red...
Question 179: The recovery time objective (RTO) is normally determined on ...
Question 180: An IT steering committee assists the board of directors to f...
Question 181: An IS auditor who was instrumental in designing an applicati...
Question 182: Which of the following is the MAIN purpose of implementing a...
Question 183: The MOST appropriate control to ensure that all orders trans...
Question 184: What is the MOST critical finding when reviewing an organiza...
Question 185: Which of the following is the MOST effective way for an IS a...
Question 186: Which of the following is the BEST way for an IS auditor to ...
Question 187: Which type of risk has materialized when an internal IS audi...
Question 188: Which of the following is MOST important for an IS auditor t...
Question 189: An IS auditor identified hard-coded credentials within the s...
Question 190: During a help desk review, an IS auditor determines the call...
Question 191: An organization is using tunneling over an extranet. Which o...
Question 192: An IS auditor discovers that several desktop computers conta...
Question 193: The results of a feasibility study for acquiring a new syste...
Question 194: Which audit approach is MOST helpful in optimizing the use o...
Question 195: The risk that the IS auditor will not find an error that has...
Question 196: The BEST method an organization can employ to align its busi...
Question 197: In which of the following cloud service models does the user...
Question 198: An organization has outsourced its data processing function ...
Question 199: When evaluating a protect immediately prior to implementatio...
Question 200: Which of the following key performance indicators (KPIs) pro...
Question 201: During an external assessment of network vulnerability which...
Question 202: Which of the following would have the GREATEST impact on def...
Question 203: An audit report notes that terminated employees have been re...
Question 204: Which of the following would BEST indicate a mature informat...
Question 205: Which of the following would BEST provide executive manageme...
Question 206: Which of the following would provide the BEST assurance that...
Question 207: Which of the following is the MOST important determining fac...
Question 208: Which combination of access controls provides the BEST physi...
Question 209: After discussing findings with an auditee, an IS auditor is ...
Question 210: A lower recovery point objective (RPO) results In...
Question 211: Which of the following would BEST deter the theft of corpora...
Question 212: The practice of performing backups reflects which type of in...
Question 213: Which of the following key performance indicator (KPI) chang...
Question 214: When engaging services from external auditors, which of the ...
Question 215: Which of the following tools are MOST helpful for benchmarki...
Question 216: An IS auditor is reviewing standards and compliance requirem...
Question 217: A small organization is experiencing rapid growth and plans ...
Question 218: The MOST effective method for an IS auditor to determine whi...
Question 219: What should be an IS auditor s NEXT course of action when a ...
Question 220: What is an IS auditor's BEST recommendation to strengthen se...
Question 221: Which of the following factors would be GREASTEST threat to ...
Question 222: Which of the following is the BEST key performance indicator...
Question 223: The CIO of an organization is concerned that the information...
Question 224: Which of the following is the PRIMARY advantage of using an ...
Question 225: Which of the following is a benefit of using symmetric crypt...
Question 226: Which of the following backup methods is MOST appropriate wh...
Question 227: Which of the following is the MOST important audit activity ...
Question 228: Which of the following Is essential to an effective continuo...
Question 229: Which of the following would BEST indicate the independence ...
Question 230: To test the integrity of the data in the accounts receivable...
Question 231: Which of the following should be the PRIMARY reason to estab...
Question 232: Which of the following would be MOST effective to protect in...
Question 233: The lack of which of the following represents the GREATEST r...
Question 234: An IS auditor found that a company executive is encouraging ...
Question 235: During an IS audit, it is discovered that security configura...
Question 236: Which type of control is an IS auditor assessing when review...
Question 237: The BEST access strategy while configuring a firewall would ...
Question 238: A risk analysis is MOST useful when applied during which pha...
Question 239: After delivering an audit report, the audit manager discover...
Question 240: An incorrect version of source code was amended by a develop...
Question 241: Which of the following observations should be of MOST concer...
Question 242: A software development project has had a significant scope r...
Question 243: Which of the following is the BEST indication of control mat...
Question 244: An IS auditor discovers that due to resource constraints a d...
Question 245: Low humidity levels In a staffed data center are a threat be...
Question 246: A digital signature addresses which of the following concern...
Question 247: Which of the following is the BEST example of a data analyti...
Question 248: Which of the following should be the MOST important consider...
Question 249: Which of the following would provide the BEST evidence of su...
Question 250: Which of the following factors will BEST promote effective i...
Question 251: Which of the following would BEST help management maintain a...
Question 252: An IS auditor is assessing a recent migration of mission cri...
Question 253: Which of the following is the MOST important consideration w...
Question 254: When developing a disaster recovery plan (DRP). which of the...
Question 255: Which of the following findings should be of GREATEST concer...
Question 256: An organization has recently acquired and implemented intell...
Question 257: Which of the following Is MOST appropriate to prevent unauth...
Question 258: Which of the following controls will BEST ensure that the bo...
Question 259: Which of the following is the GREATEST risk of using a recip...
Question 260: Which of the following actions should an organization's secu...