<< Prev Question Next Question >>

Question 30/99

An IS auditor is examining a front-end sub ledger and a main ledger Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (99q)
Question 1: What should be the PRIMARY basis for scheduling a follow-up ...
Question 2: The practice of periodic secure code reviews is which type o...
Question 3: What is BEST for an IS auditor to review when assessing the ...
Question 4: Which of the following features can be provided only by asym...
Question 5: When evaluating the recent implementation of an intrusion de...
Question 6: An IS auditor finds the timeliness and depth of information ...
Question 7: Which of the following is the BEST control to mitigate the m...
Question 8: Audit management has just completed the annual audit plan fo...
Question 9: Which of the following attacks would MOST likely result in t...
Question 10: A legacy application is running on an operating system that ...
Question 11: Which of the following is the MOST significant risk associat...
Question 12: Which of the following is the PRIMARY purpose of quality ass...
Question 13: An audit has identified that business units have purchased c...
Question 14: On a public-key cryptosystem when there is no previous knowl...
Question 15: Which of the following is the MOST important issue for an IS...
Question 16: Which of the following is the PRIMARY advantage of using vir...
Question 17: Which of the following audit procedures would be MOST conclu...
Question 18: After the release of an application system, an IS auditor wa...
Question 19: Which of the following is an IS auditor's BEST course of act...
Question 20: Due to budget restraints, an organization is postponing the ...
Question 21: Both statistical and nonstatistical sampling techniques:...
Question 22: An IS audit manager finds that data manipulation logic devel...
Question 23: Which of the following is the PRIMARY reason for an IS audit...
Question 24: To ensure the integrity of a recovered database, which of th...
Question 25: Which of the following would an IS auditor PRIMARILY review ...
Question 26: Which of the following is the PRIMARY concern when negotiati...
Question 27: Which of the following should be of MOST concern lo an IS au...
Question 28: Which of the following is an IS auditor s GREATEST concern w...
Question 29: What is the BEST control to address SOL injection vulnerabil...
Question 30: An IS auditor is examining a front-end sub ledger and a main...
Question 31: An IS auditor reviewing the use of encryption finds that the...
Question 32: When reviewing a contract for a disaster recovery hot site, ...
Question 33: Which of the following would an IS auditor recommend as the ...
Question 34: Which of the following is MOST important for an IS auditor t...
Question 35: Capacity management enables organizations to:...
Question 36: The MOST important function of a business continuity plan (B...
Question 37: Which of the following is the PRIMARY reason for an organiza...
Question 38: An IS auditor has been asked to assess the security of a rec...
Question 39: Which of the following would be of GREATEST concern to an IS...
1 commentQuestion 40: planning an end-user computing (EUC) audit, it is MO ST impo...
Question 41: An IS auditor will be testing accounts payable controls by p...
Question 42: When reviewing an organization's data protection practices, ...
Question 43: In assessing the priority given to systems covered in an org...
Question 44: Which of the following is the MOST likely cause of a success...
Question 45: Which of the following is the GREATEST security risk associa...
Question 46: A user of a telephone banking system has forgotten his perso...
Question 47: Which of the following is the BEST way to detect system secu...
Question 48: The GREATEST risk of database denormalization is:...
Question 49: Which of the following is MOST likely to result from complia...
Question 50: An IS auditor intends to accept a management position in the...
Question 51: The BEST way to prevent fraudulent payments is to implement ...
Question 52: Post-implementation testing is an example of which of the fo...
1 commentQuestion 53: An IS department is evaluated monthly on its cost-revenue ra...
Question 54: Which of the following is the MOST important difference betw...
Question 55: A warehouse employee of a retail company has been able to co...
Question 56: A project team evaluated vendor responses to a request for p...
Question 57: Which of the following is the GREATEST concern when an organ...
Question 58: Which of the following BEST measures project progress?...
Question 59: Which control type would provide the MOST useful input to a ...
Question 60: Which of the following demonstrates the use of data analytic...
Question 61: The purpose of data migration testing is to validate data:...
1 commentQuestion 62: During the implementation of an upgraded enterprise resource...
Question 63: An IS auditor is a member of an application development team...
Question 64: Which of the following physical controls will MOST effective...
Question 65: Which of the following is the BEST way to minimize the impac...
Question 66: Which of the following is the client organization's responsi...
Question 67: Which of the following is MOST critical to include when deve...
Question 68: Which of the following is MOST important for an IS auditor t...
Question 69: Which of the following should be of MOST concern to an IS au...
1 commentQuestion 70: An IS auditor finds that periodic reviews of read-only users...
Question 71: Which of the following is the PRIMARY protocol for protectin...
Question 72: What would be of GREATEST concern to an IS auditor observing...
1 commentQuestion 73: Which of the following should be the FIRST step in an organi...
Question 74: Which of the following is the MOST important consideration w...
Question 75: An organization is deciding whether to outsource its custome...
Question 76: An IS auditor is reviewing a network diagram. Which of the f...
Question 77: Which of the following BEST ensures the quality and integrit...
Question 78: What is the PRIMARY reason for conducting a risk assessment ...
Question 79: Due to a high volume of customer orders, an organization pla...
1 commentQuestion 80: A new application will require multiple interfaces. Which of...
Question 81: What information within change records would provide an IS a...
3 commentQuestion 82: Which of the following would provide the BEST evidence of th...
Question 83: An IS auditor reviewing a purchase accounting system notices...
Question 84: Which of the following should be of concern to an IS auditor...
Question 85: Which of the following is the GREATEST benefit of implementi...
Question 86: A vulnerability in which of the following virtual systems wo...
Question 87: Which of the following is the PRIMARY reason an IS auditor s...
Question 88: An organization wants to replace its suite of legacy applica...
Question 89: When reviewing an organization's information security polici...
Question 90: An IS auditor is reviewing a recent security incident and is...
2 commentQuestion 91: Which of the following should be an IS auditor's PRIMARY con...
Question 92: Which of the following should an IS auditor expect to see in...
Question 93: Which of the following is the MAIN purpose of an information...
Question 94: internal IS auditor recommends that incoming accounts payabl...
Question 95: An IS auditor attempts to sample for variables in a populati...
Question 96: An IS auditor is testing employee access to a large financia...
1 commentQuestion 97: When evaluating an IT organizational structure, which of the...
Question 98: Which of the following findings should be of GREATEST concer...
Question 99: Which of the following will MOST likely compromise the contr...