<< Prev Question Next Question >>

Question 98/194

An emergency power-off switch should:

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (194q)
Question 1: Which of the following should be the PRIMARY consideration f...
Question 2: To develop a robust data security program, the FIRST course ...
Question 3: Which of the following would BEST provide executive manageme...
Question 4: Which of the following presents the GREATEST concern when im...
Question 5: Which of the following factors constitutes a strength in reg...
Question 6: Which of the following is the GREATEST advantage of vulnerab...
Question 7: Which of the following is MOST important for an effective co...
Question 8: Which of the following focus areas is a responsibility of IT...
Question 9: During data migration, which of the following BEST prevents ...
Question 10: A database audit reveals an issue with the way data ownershi...
Question 11: Which of the following is the BEST way for an IS auditor to ...
Question 12: An IS auditor has assessed a payroll service provider's secu...
Question 13: An organization has outsourced its data leakage monitoring t...
Question 14: An IS auditor identifies key controls that have been overrid...
Question 15: Which of the following is MOST important for the successful ...
Question 16: Which of the following is an IS auditor's BEST course of act...
Question 17: An IS auditor reviewing a purchase accounting system notices...
Question 18: Which of the following will BEST help to ensure that an in-h...
Question 19: Which of the following would be the MOST appropriate reason ...
Question 20: An organization that has suffered a cyber attack is performi...
Question 21: Of the following, who should approve a release to a critical...
Question 22: Which of the following is the BEST way for an IS auditor to ...
Question 23: Which of the following is the BEST IS audit strategy?...
Question 24: Which of the following is the GREATEST concern when an organ...
Question 25: Which of the following is the BEST compensating control for ...
Question 26: Which of the following should be of GREATEST concern to an I...
Question 27: An organization with high availability resource requirements...
Question 28: An organization issues digital certificates to employees to ...
Question 29: An organization plans to launch a social media presence as p...
Question 30: An IS auditor has completed an audit on the organization's I...
Question 31: Which of the following is the PRIMARY advantage of using vir...
Question 32: Which of the following is the MOST effective means of helpin...
Question 33: The purpose of data migration testing is to validate data:...
Question 34: Which of the following is MOST likely to be detected by an I...
Question 35: Which control type would provide the MOST useful input to a ...
Question 36: Which of the following should be the PRIMARY audience for a ...
Question 37: An organization wants to replace its suite of legacy applica...
Question 38: Which of the following cloud deployment models would BEST me...
Question 39: An IS auditor reviewing a checkpoint/restart procedure shoul...
Question 40: The GREATEST benefit of using a prototyping approach in soft...
Question 41: An internal audit department recently established a quality ...
Question 42: An IS auditor finds that periodic reviews of read-only users...
Question 43: What is the MOST critical finding when reviewing an organiza...
Question 44: Which of the following would BEST manage the risk of changes...
Question 45: An IS auditor notes that IT and the business have different ...
Question 46: Which of the following should an IS auditor review FIRST whe...
Question 47: An employee has accidentally posted confidential data to the...
Question 48: Which of the following would be of GREATEST concern to an IS...
Question 49: An IS auditor is using data analytics in an audit and has ob...
Question 50: Which of the following would BEST enable an IS auditor to pe...
Question 51: Which of the following strategies BEST optimizes data storag...
Question 52: During an audit, the client learns that the IS auditor has r...
Question 53: When evaluating an IT organizational structure, which of the...
Question 54: Which of the following is MOST important to ensure when revi...
Question 55: Which of the following is the BEST way to mitigate the risk ...
Question 56: Which of the following validation techniques would BEST prev...
Question 57: When determining which IS audits to conduct during the upcom...
1 commentQuestion 58: A manager identifies active privileged accounts belonging to...
Question 59: The PRIMARY role of a control self-assessment (CSA) facilita...
Question 60: An organization plans to receive an automated data feed into...
Question 61: Which of the following is the client organization's responsi...
Question 62: Which of the following BEST demonstrates that IT strategy is...
Question 63: Which of the following is the BEST justification for deferri...
Question 64: The maturity level of an organization s problem management s...
Question 65: When evaluating a protect immediately prior to implementatio...
Question 66: During a systems development project, participation in which...
Question 67: During an audit of a financial application, it was determine...
Question 68: An IS auditor begins an assignment and identifies audit comp...
Question 69: A CIO has asked an IS auditor to implement several security ...
Question 70: A security company and service provider have merged and the ...
Question 71: Which of the following control checks would utilize data ana...
Question 72: During a security audit, an IS auditor is tasked with review...
Question 73: An IS auditor's PRIMARY objective when examining problem rep...
Question 74: An IS auditor is reviewing an enterprise database platform. ...
Question 75: Audit management has just completed the annual audit plan fo...
Question 76: An organization recently implemented a cloud document storag...
Question 77: The information security function in a large organization is...
Question 78: Which of the following should be the FIRST step when draftin...
Question 79: A legacy application is running on an operating system that ...
Question 80: An organization's business function wants to capture custome...
Question 81: An internal audit department recently established a quality ...
Question 82: Which of the following is a corrective control that reduces ...
Question 83: What would be an IS auditors GREATEST concern when using a t...
Question 84: A client/server configuration will:...
Question 85: A company converted its payroll system from an external serv...
Question 86: A month after a company purchased and implemented system and...
Question 87: Which of the following is the MOST effective way to minimize...
Question 88: An IS auditor reviewing a high-risk business application has...
Question 89: An organization allows its employees to use personal mobile ...
Question 90: Which of the following human resources management practices ...
Question 91: During a routine check, a system administrator identifies un...
Question 92: An organization's IT security policy states that user ID's m...
Question 93: Which of the following is the BEST recommendation to prevent...
Question 94: Which of the following backup schemes is the BEST option whe...
Question 95: During an IT governance audit, an IS auditor notes that IT p...
Question 96: Upon completion of audit work, an IS auditor should:...
Question 97: An IS auditor is planning on utilizing attribute sampling to...
Question 98: An emergency power-off switch should:...
Question 99: A senior auditor is reviewing work papers prepared by a juni...
Question 100: Which of the following is the BEST way to mitigate the risk ...
Question 101: Which of the following sampling techniques is BEST to use wh...
Question 102: An organization is running servers with critical business ap...
Question 103: During a business process re-engineering (BPR) program, IT c...
Question 104: Which of the following should be reviewed FIRST when assessi...
Question 105: During a review of operations, it is noted that during a bat...
Question 106: Data analytics Tools are BEST suited for which of the follow...
Question 107: Which of the following is the MOST effective way to identify...
Question 108: The BEST method an organization can employ to align its busi...
Question 109: An organization has recently converted its infrastructure to...
Question 110: Which of the following should be of concern to an IS auditor...
Question 111: Which of the following is the MOST likely cause of a success...
Question 112: Which of the following is the BEST way to achieve high avail...
Question 113: Which of the following is MOST important for an IS auditor t...
Question 114: Which of the following practices BEST ensures that archived ...
Question 115: Which of the following features can be provided only by asym...
Question 116: An IS auditor learns the organization has experienced severa...
Question 117: The recovery time objective (RTO) is normally determined on ...
Question 118: Post-implementation testing is an example of which of the fo...
Question 119: Which of the following is the MOST reliable network connecti...
Question 120: An organization is developing a web portal using some extern...
Question 121: An IS auditor is evaluating the risk associated with moving ...
Question 122: An IS auditor is assigned to review the development of a spe...
Question 123: Which of the following would an IS auditor recommend as the ...
Question 124: The decision to accept an IT control risk related to data qu...
Question 125: Which of the following Is the MOST effective way for an IS a...
Question 126: Which of the following should be included in a business impa...
Question 127: While reviewing similar issues in an organization s help des...
Question 128: One advantage of monetary unit sampling is the fact that:...
Question 129: Which of the following should an IS auditor expect to see in...
Question 130: Which of the following is the BEST control to mitigate the m...
Question 131: To address issues related to privileged users identified in ...
Question 132: In a database management system (DBMS) normalization is used...
Question 133: During an audit of an access control system an IS auditor fi...
Question 134: What is the MOST important business concern when an organiza...
Question 135: Which of the following MOST efficiently protects computer eq...
Question 136: An IT governance framework provides an organization with:...
Question 137: An IT organization's incident response plan is which type of...
Question 138: To help ensure the accuracy and completeness of end-user com...
Question 139: planning an end-user computing (EUC) audit, it is MO ST impo...
Question 140: Which of the following should be of GREATEST concern to an I...
Question 141: Spreadsheets are used to calculate project cost estimates To...
Question 142: Which of the following is a benefit of the DevOps developmen...
Question 143: Which of the following should be of MOST concern to an IS au...
Question 144: Which of the following techniques would provide the BEST ass...
Question 145: Which of the following is the PRIMARY benefit of using a cap...
Question 146: An IS auditor is reviewing environmental controls and finds ...
Question 147: An internal audit department recently established a quality ...
Question 148: Which of the following is the MOST important operational asp...
Question 149: Which of the following is MOST critical to include when deve...
Question 150: The PRIMARY advantage of object-oriented technology is enhan...
Question 151: What is the BEST population to select from when testing that...
Question 152: An organization is within a jurisdiction where new regulatio...
Question 153: When using a wireless device, which of the following BEST en...
Question 154: An IS auditor reviewed the business case for a proposed inve...
Question 155: Which of the following are examples of detective controls?...
Question 156: Which of the following BEST minimizes performance degradatio...
Question 157: In planning a major system development project, function poi...
Question 158: When aligning IT projects with organizational objectives, it...
Question 159: Which of the following should the IS auditor do FIRST to ens...
Question 160: An organization seeks to control costs related to storage me...
Question 161: An IS auditor noted that a change to a critical calculation ...
Question 162: Which of the following is the GREATEST benefit of utilizing ...
Question 163: An IS auditor notes that application super-user activity was...
Question 164: Which of the following should an IS auditor validate FIRST w...
Question 165: Which of the following BEST describes the relationship betwe...
Question 166: Within the context of an IT-related governance framework, wh...
Question 167: Which of the following is the BEST indicator of the effectiv...
Question 168: Which of the following should an IS auditor expect to find w...
Question 169: Which of the following should be the FIRST step in an organi...
Question 170: Which of the following should be a concern to an IS auditor ...
Question 171: A company laptop has been stolen and all photos on the lapto...
Question 172: Which of the following must be in place before an IS auditor...
Question 173: Which of the following should an IS auditor recommend to red...
Question 174: Which of the following BEST indicates that an organization h...
Question 175: Which of the following should be an IS auditor's PRIMARY foc...
Question 176: An IS auditor finds that terminated users have access to fin...
Question 177: After an employee termination, a network account was removed...
Question 178: When evaluating the recent implementation of an intrusion de...
Question 179: Which of the following is MOST appropriate for measuring a b...
Question 180: When reviewing an organization's information security polici...
Question 181: A multinational organization is integrating its existing pay...
Question 182: An organization s audit charter PRIMARILY:...
Question 183: An IS auditor notes that help desk personnel are required to...
Question 184: Which of the following would provide the BEST evidence for u...
Question 185: When reviewing a contract for a disaster recovery hot site, ...
Question 186: An IS auditor is reviewing the installation of a new server....
Question 187: The activation of a pandemic response plan has resulted in a...
Question 188: When developing a business continuity plan (BCP), which of t...
Question 189: An IS auditor is reviewing an industrial control system (ICS...
Question 190: Which of the following should be the PRIMARY objective of a ...
Question 191: The MOST important reason why an IT risk assessment should b...
Question 192: An IS auditor finds a number of system accounts that do not ...
Question 193: Which of the following provides an IS auditor the MOST assur...
Question 194: The application systems quality assurance (QA) function shou...