<< Prev Question Next Question >>

Question 92/194

An organization's IT security policy states that user ID's must uniquely identify individual's and that user should not disclose their passwords. An IS auditor discovers that several generic user ID's are being used. Which of the following is the MOST appropriate course of action for the auditor?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (194q)
Question 1: Which of the following should be the PRIMARY consideration f...
Question 2: To develop a robust data security program, the FIRST course ...
Question 3: Which of the following would BEST provide executive manageme...
Question 4: Which of the following presents the GREATEST concern when im...
Question 5: Which of the following factors constitutes a strength in reg...
Question 6: Which of the following is the GREATEST advantage of vulnerab...
Question 7: Which of the following is MOST important for an effective co...
Question 8: Which of the following focus areas is a responsibility of IT...
Question 9: During data migration, which of the following BEST prevents ...
Question 10: A database audit reveals an issue with the way data ownershi...
Question 11: Which of the following is the BEST way for an IS auditor to ...
Question 12: An IS auditor has assessed a payroll service provider's secu...
Question 13: An organization has outsourced its data leakage monitoring t...
Question 14: An IS auditor identifies key controls that have been overrid...
Question 15: Which of the following is MOST important for the successful ...
Question 16: Which of the following is an IS auditor's BEST course of act...
Question 17: An IS auditor reviewing a purchase accounting system notices...
Question 18: Which of the following will BEST help to ensure that an in-h...
Question 19: Which of the following would be the MOST appropriate reason ...
Question 20: An organization that has suffered a cyber attack is performi...
Question 21: Of the following, who should approve a release to a critical...
Question 22: Which of the following is the BEST way for an IS auditor to ...
Question 23: Which of the following is the BEST IS audit strategy?...
Question 24: Which of the following is the GREATEST concern when an organ...
Question 25: Which of the following is the BEST compensating control for ...
Question 26: Which of the following should be of GREATEST concern to an I...
Question 27: An organization with high availability resource requirements...
Question 28: An organization issues digital certificates to employees to ...
Question 29: An organization plans to launch a social media presence as p...
Question 30: An IS auditor has completed an audit on the organization's I...
Question 31: Which of the following is the PRIMARY advantage of using vir...
Question 32: Which of the following is the MOST effective means of helpin...
Question 33: The purpose of data migration testing is to validate data:...
Question 34: Which of the following is MOST likely to be detected by an I...
Question 35: Which control type would provide the MOST useful input to a ...
Question 36: Which of the following should be the PRIMARY audience for a ...
Question 37: An organization wants to replace its suite of legacy applica...
Question 38: Which of the following cloud deployment models would BEST me...
Question 39: An IS auditor reviewing a checkpoint/restart procedure shoul...
Question 40: The GREATEST benefit of using a prototyping approach in soft...
Question 41: An internal audit department recently established a quality ...
Question 42: An IS auditor finds that periodic reviews of read-only users...
Question 43: What is the MOST critical finding when reviewing an organiza...
Question 44: Which of the following would BEST manage the risk of changes...
Question 45: An IS auditor notes that IT and the business have different ...
Question 46: Which of the following should an IS auditor review FIRST whe...
Question 47: An employee has accidentally posted confidential data to the...
Question 48: Which of the following would be of GREATEST concern to an IS...
Question 49: An IS auditor is using data analytics in an audit and has ob...
Question 50: Which of the following would BEST enable an IS auditor to pe...
Question 51: Which of the following strategies BEST optimizes data storag...
Question 52: During an audit, the client learns that the IS auditor has r...
Question 53: When evaluating an IT organizational structure, which of the...
Question 54: Which of the following is MOST important to ensure when revi...
Question 55: Which of the following is the BEST way to mitigate the risk ...
Question 56: Which of the following validation techniques would BEST prev...
Question 57: When determining which IS audits to conduct during the upcom...
1 commentQuestion 58: A manager identifies active privileged accounts belonging to...
Question 59: The PRIMARY role of a control self-assessment (CSA) facilita...
Question 60: An organization plans to receive an automated data feed into...
Question 61: Which of the following is the client organization's responsi...
Question 62: Which of the following BEST demonstrates that IT strategy is...
Question 63: Which of the following is the BEST justification for deferri...
Question 64: The maturity level of an organization s problem management s...
Question 65: When evaluating a protect immediately prior to implementatio...
Question 66: During a systems development project, participation in which...
Question 67: During an audit of a financial application, it was determine...
Question 68: An IS auditor begins an assignment and identifies audit comp...
Question 69: A CIO has asked an IS auditor to implement several security ...
Question 70: A security company and service provider have merged and the ...
Question 71: Which of the following control checks would utilize data ana...
Question 72: During a security audit, an IS auditor is tasked with review...
Question 73: An IS auditor's PRIMARY objective when examining problem rep...
Question 74: An IS auditor is reviewing an enterprise database platform. ...
Question 75: Audit management has just completed the annual audit plan fo...
Question 76: An organization recently implemented a cloud document storag...
Question 77: The information security function in a large organization is...
Question 78: Which of the following should be the FIRST step when draftin...
Question 79: A legacy application is running on an operating system that ...
Question 80: An organization's business function wants to capture custome...
Question 81: An internal audit department recently established a quality ...
Question 82: Which of the following is a corrective control that reduces ...
Question 83: What would be an IS auditors GREATEST concern when using a t...
Question 84: A client/server configuration will:...
Question 85: A company converted its payroll system from an external serv...
Question 86: A month after a company purchased and implemented system and...
Question 87: Which of the following is the MOST effective way to minimize...
Question 88: An IS auditor reviewing a high-risk business application has...
Question 89: An organization allows its employees to use personal mobile ...
Question 90: Which of the following human resources management practices ...
Question 91: During a routine check, a system administrator identifies un...
Question 92: An organization's IT security policy states that user ID's m...
Question 93: Which of the following is the BEST recommendation to prevent...
Question 94: Which of the following backup schemes is the BEST option whe...
Question 95: During an IT governance audit, an IS auditor notes that IT p...
Question 96: Upon completion of audit work, an IS auditor should:...
Question 97: An IS auditor is planning on utilizing attribute sampling to...
Question 98: An emergency power-off switch should:...
Question 99: A senior auditor is reviewing work papers prepared by a juni...
Question 100: Which of the following is the BEST way to mitigate the risk ...
Question 101: Which of the following sampling techniques is BEST to use wh...
Question 102: An organization is running servers with critical business ap...
Question 103: During a business process re-engineering (BPR) program, IT c...
Question 104: Which of the following should be reviewed FIRST when assessi...
Question 105: During a review of operations, it is noted that during a bat...
Question 106: Data analytics Tools are BEST suited for which of the follow...
Question 107: Which of the following is the MOST effective way to identify...
Question 108: The BEST method an organization can employ to align its busi...
Question 109: An organization has recently converted its infrastructure to...
Question 110: Which of the following should be of concern to an IS auditor...
Question 111: Which of the following is the MOST likely cause of a success...
Question 112: Which of the following is the BEST way to achieve high avail...
Question 113: Which of the following is MOST important for an IS auditor t...
Question 114: Which of the following practices BEST ensures that archived ...
Question 115: Which of the following features can be provided only by asym...
Question 116: An IS auditor learns the organization has experienced severa...
Question 117: The recovery time objective (RTO) is normally determined on ...
Question 118: Post-implementation testing is an example of which of the fo...
Question 119: Which of the following is the MOST reliable network connecti...
Question 120: An organization is developing a web portal using some extern...
Question 121: An IS auditor is evaluating the risk associated with moving ...
Question 122: An IS auditor is assigned to review the development of a spe...
Question 123: Which of the following would an IS auditor recommend as the ...
Question 124: The decision to accept an IT control risk related to data qu...
Question 125: Which of the following Is the MOST effective way for an IS a...
Question 126: Which of the following should be included in a business impa...
Question 127: While reviewing similar issues in an organization s help des...
Question 128: One advantage of monetary unit sampling is the fact that:...
Question 129: Which of the following should an IS auditor expect to see in...
Question 130: Which of the following is the BEST control to mitigate the m...
Question 131: To address issues related to privileged users identified in ...
Question 132: In a database management system (DBMS) normalization is used...
Question 133: During an audit of an access control system an IS auditor fi...
Question 134: What is the MOST important business concern when an organiza...
Question 135: Which of the following MOST efficiently protects computer eq...
Question 136: An IT governance framework provides an organization with:...
Question 137: An IT organization's incident response plan is which type of...
Question 138: To help ensure the accuracy and completeness of end-user com...
Question 139: planning an end-user computing (EUC) audit, it is MO ST impo...
Question 140: Which of the following should be of GREATEST concern to an I...
Question 141: Spreadsheets are used to calculate project cost estimates To...
Question 142: Which of the following is a benefit of the DevOps developmen...
Question 143: Which of the following should be of MOST concern to an IS au...
Question 144: Which of the following techniques would provide the BEST ass...
Question 145: Which of the following is the PRIMARY benefit of using a cap...
Question 146: An IS auditor is reviewing environmental controls and finds ...
Question 147: An internal audit department recently established a quality ...
Question 148: Which of the following is the MOST important operational asp...
Question 149: Which of the following is MOST critical to include when deve...
Question 150: The PRIMARY advantage of object-oriented technology is enhan...
Question 151: What is the BEST population to select from when testing that...
Question 152: An organization is within a jurisdiction where new regulatio...
Question 153: When using a wireless device, which of the following BEST en...
Question 154: An IS auditor reviewed the business case for a proposed inve...
Question 155: Which of the following are examples of detective controls?...
Question 156: Which of the following BEST minimizes performance degradatio...
Question 157: In planning a major system development project, function poi...
Question 158: When aligning IT projects with organizational objectives, it...
Question 159: Which of the following should the IS auditor do FIRST to ens...
Question 160: An organization seeks to control costs related to storage me...
Question 161: An IS auditor noted that a change to a critical calculation ...
Question 162: Which of the following is the GREATEST benefit of utilizing ...
Question 163: An IS auditor notes that application super-user activity was...
Question 164: Which of the following should an IS auditor validate FIRST w...
Question 165: Which of the following BEST describes the relationship betwe...
Question 166: Within the context of an IT-related governance framework, wh...
Question 167: Which of the following is the BEST indicator of the effectiv...
Question 168: Which of the following should an IS auditor expect to find w...
Question 169: Which of the following should be the FIRST step in an organi...
Question 170: Which of the following should be a concern to an IS auditor ...
Question 171: A company laptop has been stolen and all photos on the lapto...
Question 172: Which of the following must be in place before an IS auditor...
Question 173: Which of the following should an IS auditor recommend to red...
Question 174: Which of the following BEST indicates that an organization h...
Question 175: Which of the following should be an IS auditor's PRIMARY foc...
Question 176: An IS auditor finds that terminated users have access to fin...
Question 177: After an employee termination, a network account was removed...
Question 178: When evaluating the recent implementation of an intrusion de...
Question 179: Which of the following is MOST appropriate for measuring a b...
Question 180: When reviewing an organization's information security polici...
Question 181: A multinational organization is integrating its existing pay...
Question 182: An organization s audit charter PRIMARILY:...
Question 183: An IS auditor notes that help desk personnel are required to...
Question 184: Which of the following would provide the BEST evidence for u...
Question 185: When reviewing a contract for a disaster recovery hot site, ...
Question 186: An IS auditor is reviewing the installation of a new server....
Question 187: The activation of a pandemic response plan has resulted in a...
Question 188: When developing a business continuity plan (BCP), which of t...
Question 189: An IS auditor is reviewing an industrial control system (ICS...
Question 190: Which of the following should be the PRIMARY objective of a ...
Question 191: The MOST important reason why an IT risk assessment should b...
Question 192: An IS auditor finds a number of system accounts that do not ...
Question 193: Which of the following provides an IS auditor the MOST assur...
Question 194: The application systems quality assurance (QA) function shou...