<< Prev Question Next Question >>

Question 182/218

Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (218q)
Question 1: To preserve chain-of-custody following an internal server co...
Question 2: An IS auditor is following upon a finding that determined el...
Question 3: An IS auditor submitted audit reports and scheduled a follow...
Question 4: When creating a new risk management program, it is CRITICAL ...
Question 5: Which of the following user actions constitutes the GREATEST...
Question 6: Audit management has just completed the annual audit plan fo...
Question 7: An IS auditor has identified that some IT staff have adminis...
Question 8: Which of the following would BEST provide executive manageme...
Question 9: A legacy application is running on an operating system that ...
Question 10: Which of the following should an IS auditor expect to see in...
Question 11: Which of the following should be an IS auditor's considerati...
Question 12: Which of the following requirements in a document control st...
1 commentQuestion 13: An IS auditor is evaluating a virtual server environment and...
Question 14: The PRIMARY objective of parallel testing an application is ...
Question 15: Following an unauthorized disclosure of data, an organizatio...
Question 16: Which of the following would represent an acceptable test of...
Question 17: Which of the following helps to ensure the integrity of data...
Question 18: Which of the following IT resource management practices is M...
Question 19: An organization recently implemented a cloud document storag...
Question 20: What is an IS auditor's BEST recommendation to strengthen se...
Question 21: An organization with high security requirements is evaluatin...
Question 22: A PRIMARY benefit derived by an organization employing contr...
Question 23: Which of the following is the MOST effective way for an IS a...
Question 24: Which the following is MOST critical for the effective imple...
Question 25: Which of the following is the BEST way to transmit documents...
Question 26: Which of the following security mechanisms should be used to...
Question 27: An audit of the quality management system (QMS) begins with ...
Question 28: The results of an IS audit indicating the need to strengthen...
Question 29: the An IS auditor is planning to review an organization's in...
1 commentQuestion 30: Which of the following cloud deployment models would BEST me...
Question 31: A database audit reveals an issue with the way data ownershi...
Question 32: Which of the following is the BEST control to detect errors ...
Question 33: During a project meeting for the Implementation of an Enterp...
Question 34: The maturity level of an organization s problem management s...
Question 35: What is the PRIMARY reason for including a clause requiring ...
1 commentQuestion 36: A retirement system verifies that the field for employee sta...
Question 37: An IS auditor is planning on utilizing attribute sampling to...
Question 38: The BEST access strategy while configuring a firewall would ...
Question 39: A system was recently promoted to the production environment...
Question 40: An organization's information security department is creatin...
Question 41: An IS auditor discovers trial a security information and eve...
1 commentQuestion 42: An IT steering committee assists the board of directors to f...
Question 43: Which of the following tasks would cause the GREATEST segreg...
Question 44: Which of the following is the BEST indication that an organi...
1 commentQuestion 45: Which of the following should be reviewed FIRST when plannin...
Question 46: A small organization does not have enough employees to imple...
Question 47: A CIO has asked an IS to implement several security controls...
Question 48: Which of the following is the BEST indication that an organi...
Question 49: Which of the following is MOST important for an IS auditor t...
Question 50: Which of the following activities should occur after a busin...
Question 51: Which of the following should be performed immediately after...
Question 52: An IS auditor notes that several of a client's servers are v...
Question 53: Which of the following would BEST detect that a distributed-...
Question 54: Which of the following is the MOST effective way to minimize...
Question 55: Which of the following is MOST important for the successful ...
Question 56: A configuration management audit identified that predefined ...
Question 57: The recovery time objective (RTO) is normally determined on ...
Question 58: The IS security group is planning to implement single sign-o...
Question 59: Which of the following BEST describes an audit risk?...
Question 60: An IS auditor Is asked to review an organization's data back...
Question 61: An IS auditor is performing a routine procedure to test for ...
Question 62: IS audit is asked 10 explain how local area network (LAN) se...
Question 63: Which of the following is the MOST likely cause of a success...
Question 64: Which of the following is MOST influential when defining dis...
Question 65: An organization s data retention policy states that all data...
Question 66: Which of the following controls will BEST ensure that the bo...
Question 67: Which of the following is the MAIN purpose of implementing a...
Question 68: An IS auditor concludes that a local area network (LAN) acce...
Question 69: What is the BEST way for an IS auditor to address the risk a...
Question 70: Which of the following is the BEST approach to verify that i...
Question 71: For an organization that has plans to implement web-based tr...
Question 72: During a vulnerability assessment, an IS auditor finds a hig...
Question 73: Which of the following should be an IS auditor's PRIMARY con...
Question 74: While following up on a prior audit report, an IS auditor de...
Question 75: Who is PRIMARILY responsible for data integrity and security...
Question 76: What is the PRIMARY reason for conducting a risk assessment ...
Question 77: With a properly implemented public key infrastructure (PKI) ...
Question 78: Which of the following is the GREATEST risk of using a recip...
Question 79: An IT balanced scorecard is MOST useful in determining the e...
Question 80: An IS auditor testing the user access management process for...
Question 81: When responding to an ongoing denial of service (DoS) attack...
Question 82: An organization has contracted with a third party to impleme...
Question 83: Which of the following would help to ensure the completeness...
Question 84: An organization is designing an application programming inte...
Question 85: The results of a feasibility study for acquiring a new syste...
Question 86: An organization has performance metrics to track how well IT...
Question 87: Which of the following will enable a customer to authenticat...
Question 88: What is the FIRST step an auditor should take when beginning...
Question 89: Which of the following is the MOST important feature of acce...
Question 90: An IS auditor Is reviewing a complete population of incident...
Question 91: Which of the following is the BEST development methodology t...
Question 92: Which of the following would BEST assist senior management i...
Question 93: The MAIN reason an organization's incident management proced...
Question 94: Which of the following would BEST help in classifying an org...
Question 95: Which of the following would BEST demonstrate that an effect...
Question 96: Which of the following is an effective way to ensure the int...
Question 97: An IT department installed critical patches provided by the ...
Question 98: When implementing a software product (middleware) to pass da...
Question 99: An IS auditor is assessing an organization's implementation ...
Question 100: Which of the following is MOST important for an IS auditor t...
Question 101: Assurance tasks required to support security accreditation/c...
Question 102: Which of the following is the BEST indication that an inform...
Question 103: While performing a risk-based audit, which of the following ...
Question 104: Which of the following could provide an organization with th...
Question 105: An organization's software developers need access to persona...
Question 106: An IS auditor finds that confidential company data has been ...
Question 107: When reviewing a database supported by a third-party service...
Question 108: An IS auditor notes that a number of application plug-ins cu...
Question 109: During the evaluation of a firm's newly established whistleb...
Question 110: During an audit of a mission-critical system hosted in an ou...
Question 111: Which of the following roles is ULTIMATELY accountable for t...
Question 112: Which of the following application input controls would MOST...
Question 113: Which of the following is the GREATEST risk associated with ...
Question 114: An audit report that specifies responsibility for the closur...
Question 115: A detailed audit of user access rights results In many high-...
Question 116: The PRIMARY purpose for an IS auditor to review previous aud...
Question 117: After an employee termination, a network account was removed...
Question 118: To mitigate the risk of exposing data through application pr...
Question 119: The purpose of data migration testing is to validate data:...
Question 120: A transaction processing system interfaces with the general ...
Question 121: Which of the following risk scenarios is BEST addressed by i...
Question 122: Which of the following observations should be of concern to ...
Question 123: Which of the following will BEST ensure that a proper cutoff...
Question 124: Which of the following should an IS auditor recommend to red...
Question 125: Which of the following is the BEST way to achieve high avail...
Question 126: An organization has begun using social media to communicate ...
Question 127: Adopting a service-oriented architecture would MOST likely:...
Question 128: Which of the following is the GREATEST risk resulting from c...
Question 129: Which of the following is MOST important to the effective ma...
Question 130: The drives of a tile server are backed up at a hot site. Whi...
Question 131: Which of the following is MOST
Question 132: Which of the following Is MOST appropriate to prevent unauth...
Question 133: To confirm integrity for a hashed message, the receiver shou...
Question 134: Which of the following BEST indicates to an IS auditor that ...
Question 135: A legacy application is running on an operating system that ...
Question 136: Which of the following is the BEST example of a data analyti...
Question 137: Which of the following is the BEST indication that an organi...
Question 138: Which of the following is MOST likely to be included in a po...
Question 139: As part of a follow-up of a previous year's audit, an IS aud...
Question 140: The lack of which of the following represents the GREATEST r...
Question 141: An organization is planning to outsource its customer relati...
Question 142: An IS auditor found that a company executive is encouraging ...
Question 143: An IS auditor is reviewing environmental controls and finds ...
Question 144: Which of the following would BEST indicate a mature informat...
Question 145: An organization is developing a web portal using some extern...
Question 146: An IS auditor identified hard-coded credentials within the s...
Question 147: What is the BEST strategy to prioritize work when planning a...
Question 148: Which of the following has the GREATEST influence on the suc...
Question 149: An IS auditor is evaluating networked devices at one of the ...
Question 150: Which of the following is MOST important to helping incident...
Question 151: An IS auditor is reviewing IT policies and found that most p...
Question 152: Which of the following is the PRIMARY responsibility of an o...
Question 153: Which of the following BEST helps to ensure data integrity a...
Question 154: What should be of MOST concern to an IS auditor reviewing an...
Question 155: The BEST data backup strategy for mobile users is to:...
Question 156: A company is using a software developer for a project. At wh...
Question 157: Which of the following IT processes is likely to have the in...
Question 158: Which of the following is MOST important for the successful ...
Question 159: Two servers are deployed in a cluster to run a mission-criti...
Question 160: Which of the following tools are MOST helpful for benchmarki...
Question 161: An organization has implemented an automated match between p...
Question 162: Which of the following Is MOST important for successful Inci...
Question 163: Which of the following controls would BEST decrease the expo...
Question 164: Which of the following is the BEST way to evaluate the effec...
Question 165: When migrating critical systems to a cloud provider, the GRE...
Question 166: What is the PRIMARY advantage of prototyping as part of syst...
Question 167: Which of the following would BEST help to ensure that an inc...
Question 168: Which of the following would be MOST time and cost efficient...
Question 169: An auditor is creating an audit program in which the objecti...
Question 170: Which of the following group is MOST likely responsible for ...
Question 171: An organization has suffered a number of incidents in which ...
Question 172: An IS auditor is reviewing an organization's implementation ...
Question 173: When reviewing a disaster recovery plan (DRP) an IS auditor ...
Question 174: An organization is planning to develop a system using rapid ...
Question 175: The MOST important reason for documenting all aspects of a d...
Question 176: To create a digital signature in a message using asymmetric ...
Question 177: An IS auditor notes that several recent incidents related to...
Question 178: Which of the following BEST demonstrates to an IS auditor th...
Question 179: Which of the following is the KST source of information for ...
Question 180: Which of the following presents the GREATEST security risk i...
Question 181: When removing a financial application system from production...
Question 182: Which of the following is the BEST control to prevent the tr...
Question 183: Which should be reviewed FIRST by an IS auditor To ensure th...
Question 184: Which of the following is the BEST control to reduce the lik...
Question 185: An IT governance framework provides an organization with:...
Question 186: Which of the following would be of concern when determining ...
Question 187: When assessing a business case as part of a post-implementat...
Question 188: Which of the following is the BEST way for an IS auditor to ...
Question 189: Which of the following is MOST essential to quality manageme...
Question 190: What is BEST for an IS auditor to review when assessing the ...
Question 191: Which type of risk has materialized when an internal IS audi...
Question 192: An IT organization has found that the effectiveness of its I...
Question 193: The information security function in a large organization is...
Question 194: To restore service at a large processing facility after a di...
Question 195: An IS auditor reviewing the acquisition of new equipment wou...
Question 196: Which of the following is the BEST audit technique to identi...
Question 197: During an audit, it is discovered that several suppliers wit...
Question 198: An IS auditor should ensure that an application's audit trai...
Question 199: Which of the following ensures components of an IT system ar...
Question 200: An IS auditor is conducting a pre-implementation review to d...
Question 201: What is an IS auditor's BEST course of action if informed by...
Question 202: Which of the following is a benefit of using symmetric crypt...
Question 203: An IS auditor finds that an employee lost a mobile device co...
Question 204: Which of the following is the BEST indication of control mat...
Question 205: Which of the following should be of GREATEST concern to an I...
Question 206: An organization has recently acquired and implemented intell...
Question 207: Which of the following is the PRIMARY responsibility of an i...
Question 208: A new regulation requires organizations to report significan...
Question 209: Which of the following documents would be MOST useful in det...
Question 210: The MAIN objective of incident management is to:...
Question 211: An IT management group has developed a standardized security...
Question 212: Which of the following is the BEST point in time to conduct ...
Question 213: Which of the following should be restricted from a network a...
Question 214: Which of the following would BEST deter the theft of corpora...
Question 215: After discussing findings with an auditee, an IS auditor is ...
Question 216: The PRIMARY reason an IS department should analyze past inci...
Question 217: An IS auditor determines that a business impact analysis (BI...
Question 218: Which of the following is an example of a corrective control...