<< Prev Question Next Question >>

Question 77/199

Which of the following should an IS auditor review FIRST when evaluating a business process for auditing?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (199q)
Question 1: Which of the following is the PRIMARY advantage of using vir...
Question 2: Which of the following processes BEST addresses the risk ass...
Question 3: Which of the following is the MOST reliable network connecti...
Question 4: Which of the following should be of MOST concern to an IS au...
Question 5: What would be an IS auditor's BEST recommendation upon findi...
Question 6: During an audit, which of the following would be MOST helpfu...
Question 7: An IS auditor finds that the process for removing access for...
Question 8: A company laptop has been stolen and all photos on the lapto...
Question 9: The PRIMARY benefit of information asset classification is t...
Question 10: Which of the following is the BEST control to mitigate the m...
Question 11: The PRIMARY focus of audit follow-up reports should be to:...
Question 12: Which of the following should an IS auditor recommend to red...
Question 13: Which of the following should be of concern to an IS auditor...
Question 14: Which of the following is the BEST way for an IS auditor to ...
Question 15: Which of the following is an objective of data transfer cont...
Question 16: Which of the following is necessary for effective risk manag...
Question 17: An IS auditor is reviewing an industrial control system (ICS...
Question 18: The PRIMARY reason an IS department should analyze past inci...
Question 19: When reviewing a project to replace multiple manual data ent...
Question 20: Which of the following techniques would provide the BEST ass...
Question 21: A post-implementation review of a development project conclu...
Question 22: Which of the following is the GREATEST risk associated with ...
Question 23: An IS auditor's PRIMARY objective when examining problem rep...
Question 24: Which of the following BEST enables alignment of IT with bus...
Question 25: Which of the following is MOST helpful for an IS auditor to ...
Question 26: Which of the following should be the PRIMARY consideration f...
Question 27: An organization's business function wants to capture custome...
Question 28: The application systems quality assurance (QA) function shou...
Question 29: Which of the following BEST minimizes performance degradatio...
Question 30: An internal audit department recently established a quality ...
Question 31: A company converted its payroll system from an external serv...
Question 32: Which of the following would BEST provide executive manageme...
Question 33: Which of the following is the BEST justification for deferri...
Question 34: Which of the following is the BEST reason to utilize blockch...
Question 35: When a firewall is subjected to a probing attack, the MOST a...
Question 36: Which of the following is the BEST way to ensure payment tra...
Question 37: A bank is relocating its servers to a vendor that provides d...
Question 38: Which of the following is the BEST way to reduce sampling ri...
Question 39: A bank has implemented a new accounting system. Which of the...
Question 40: Post-implementation testing is an example of which of the fo...
Question 41: As part of a follow-up of a previous year's audit, an IS aud...
Question 42: An IS auditor has completed an audit of an organization's ac...
Question 43: Which type of control is being implemented when a biometric ...
Question 44: Which of the following is the BEST indication of the complet...
Question 45: During the design phase of a software development project, t...
Question 46: Which of the following BEST measures project progress?...
Question 47: Which of the following is the GREATEST advantage of applicat...
Question 48: Which of the following is the BEST approach to identify whet...
Question 49: An emergency power-off switch should:...
Question 50: Which of the following is MOST critical to include when deve...
Question 51: The PRIMARY reason for an IS auditor to use data analytics t...
Question 52: A financial institution has a system interface that is used ...
Question 53: Which of the following would provide an IS auditor with the ...
Question 54: Which of the following would BEST facilitate the detection o...
Question 55: Which of the following is a directive control?...
Question 56: Which of the following BEST demonstrates the degree of align...
Question 57: A review of IT interface controls finds an organization does...
Question 58: An IS auditor finds that a document related to a client has ...
Question 59: A CIO has asked an IS auditor to implement several security ...
Question 60: Which of the following communication modes should be of GREA...
Question 61: Which of the following is an IS auditor's BEST guidance rega...
Question 62: Which of the following must be in place before an IS auditor...
Question 63: The BEST way to prevent fraudulent payments is to implement ...
Question 64: An organization wants to replace its suite of legacy applica...
Question 65: Which of the following is the BEST compensating control for ...
Question 66: An organization transmits large amount of data from one inte...
Question 67: Which of the following would be MOST important to update onc...
Question 68: Which of the following is the PRIMARY protocol for protectin...
Question 69: Which of the following is the GREATEST benefit of utilizing ...
Question 70: The practice of periodic secure code reviews is which type o...
Question 71: During a security audit, an IS auditor is tasked with review...
Question 72: When deploying an application that was created using the pro...
Question 73: Which of the following presents the GREATEST concern when im...
Question 74: Which of the following technologies has the SMALLEST maximum...
Question 75: Which of the following is the PRIMARY reason for an organiza...
Question 76: An organization's IT security policy requires annual securit...
Question 77: Which of the following should an IS auditor review FIRST whe...
Question 78: Which of the following is MOST important for an IS auditor t...
Question 79: Which of the following is an example of a preventative contr...
Question 80: Which of the following is the BEST IS audit strategy?...
Question 81: In a situation where the recovery point objective (RPO) is 0...
Question 82: Which of the following should be done FIRST when planning a ...
Question 83: Which of the following would BEST manage the risk of changes...
Question 84: What information within change records would provide an IS a...
Question 85: A banking organization has outsourced its customer data proc...
Question 86: Which of the following is the BEST guidance from an IS audit...
Question 87: An IS auditor finds that firewalls are outdated and not supp...
Question 88: Which of the following is MOST likely to enable a hacker to ...
Question 89: An IS auditor finds the timeliness and depth of information ...
Question 90: An airlines online booking system uses an automated script t...
Question 91: Which of the following should be done FIRST to effectively d...
Question 92: What is the BEST justification for allocating more funds to ...
Question 93: Which of the following observations should be of GREATEST co...
Question 94: When an organization introduces virtualization into its arch...
Question 95: An IS auditor notes that application super-user activity was...
Question 96: A company is using a software developer for a project. At wh...
Question 97: An IS audit manager has been asked to perform a quality revi...
Question 98: Which of the following should be of GREATEST concern to an I...
Question 99: An IT governance framework provides an organization with:...
Question 100: Which of the following is MOST important for an IS auditor t...
Question 101: An IS auditor finds that terminated users have access to fin...
Question 102: An IS auditor reviewed the business case for a proposed inve...
Question 103: For an organization that has plans to implement web-based tr...
Question 104: Which of the following is the MAIN risk associated with addi...
Question 105: Which of the following will BEST help to ensure that an in-h...
Question 106: Which of the following is an IS auditor s GREATEST concern w...
Question 107: Which of the following should be the PRIMARY audience for a ...
Question 108: Which of the following analytical methods would be MOST usef...
Question 109: Which of the following is the PRIMARY concern when negotiati...
Question 110: A large insurance company is about to replace a major financ...
Question 111: Which of the following is MOST important for an IS auditor t...
Question 112: When using a wireless device, which of the following BEST en...
Question 113: When measuring the effectiveness of a security awareness pro...
Question 114: Which of the following is the MOST effective way to identify...
Question 115: Which of the following is MOST important to ensure during co...
Question 116: Which of the following should occur EARLIEST in a business c...
Question 117: Which of the following poses the GREATEST risk to a company ...
Question 118: An IS auditor attempts to sample for variables in a populati...
Question 119: When evaluating an IT organizational structure, which of the...
Question 120: Which of the following should be of GREATEST concern to an I...
Question 121: Which of the following is the BEST way to confirm that a dig...
Question 122: Which of the following BEST indicates that an organization h...
Question 123: To protect information assets, which of the following should...
Question 124: An IS auditor finds that corporate mobile devices used by em...
Question 125: In the risk assessment process, which of the following shoul...
Question 126: An organization has outsourced its data leakage monitoring t...
Question 127: When reviewing an organization's data protection practices, ...
Question 128: An IS auditor reviewing a purchase accounting system notices...
Question 129: The PRIMARY role of a control self-assessment (CSA) facilita...
Question 130: The BEST way to validate whether a malicious act has actuall...
Question 131: What is the MOST critical finding when reviewing an organiza...
Question 132: Which of the following audit procedures would be MOST conclu...
Question 133: An IS auditor is reviewing an enterprise database platform. ...
Question 134: Which of the following is the BEST way to mitigate the risk ...
Question 135: Which of the following is the MAIN benefit of using data ana...
Question 136: Disciplinary policies are BEST classified as....
Question 137: When an IS auditor evaluates key performance indicators (KPl...
Question 138: While conducting a review of project plans related to a new ...
Question 139: Which of the following should be of GREATEST concern to an I...
Question 140: Which of the following is the MOST important consideration w...
Question 141: Which of the following MUST be completed before selecting an...
Question 142: An IS auditor is planning an audit of an organization's acco...
Question 143: Which of the following is the GREATEST threat to Voice-over ...
Question 144: Which of the following is the BEST way to detect system secu...
Question 145: During a review of operations, it is noted that during a bat...
Question 146: A financial institution suspects that a manager has been cre...
Question 147: The PRIMARY benefit of using secure shell (SSH) to access a ...
1 commentQuestion 148: When evaluating a protect immediately prior to implementatio...
Question 149: An IS auditor notes that help desk personnel are required to...
Question 150: Which of the following falls within the scope of an informat...
Question 151: An audit of the quality management system (QMS) begins with ...
Question 152: Which of the following is the role of audit leadership in en...
Question 153: An IS auditor s role in privacy and security is to:...
Question 154: Which type of control is in place when an organization requi...
Question 155: An IS auditor is planning to audit an organization's infrast...
Question 156: Which of the following strategies BEST optimizes data storag...
Question 157: The information security function in a large organization is...
Question 158: The BEST method an organization can employ to align its busi...
Question 159: Regression testing should be used during a system developmen...
Question 160: Which of the following BEST facilitates the management of as...
Question 161: Which of the following is the PRIMARY purpose of using data ...
Question 162: An employee has accidentally posted confidential data to the...
Question 163: An IS auditor begins an assignment and identifies audit comp...
Question 164: An organization with high availability resource requirements...
Question 165: Which of the following is the BEST preventive control to ens...
Question 166: Which of the following should be an IS auditor's PRIMARY con...
Question 167: Which of the following is the MOST important step in the dev...
Question 168: A sales representative is reviewing the organization's feedb...
Question 169: An organization is deciding whether to outsource its custome...
Question 170: An organization has established hiring policies and procedur...
Question 171: What is the BEST population to select from when testing that...
Question 172: Which of the following is a corrective control?...
Question 173: To create a digital signature in a message using asymmetric ...
Question 174: Which of the following projects would be MOST important to r...
Question 175: Which of the following is an IS auditor's BEST course of act...
Question 176: An IS audit manager finds that data manipulation logic devel...
Question 177: When evaluating the recent implementation of an intrusion de...
Question 178: Which of the following is the MAIN advantage of using one-ti...
Question 179: In an environment where most IT services have been outsource...
Question 180: To help ensure the accuracy and completeness of end-user com...
Question 181: A financial institution is launching a mobile banking servic...
Question 182: Audit management has just completed the annual audit plan fo...
Question 183: Which of the following controls will BEST ensure that the bo...
Question 184: Which of the following findings should be of GREATEST concer...
Question 185: While conducting a system architecture review, an IS auditor...
Question 186: An organization issues digital certificates to employees to ...
Question 187: Which of the following BEST helps to identify errors during ...
Question 188: Which of the following should be of MOST concern lo an IS au...
Question 189: An organization plans to eliminate pilot releases and instea...
Question 190: Due to a global pandemic, a health organization has instruct...
Question 191: A month after a company purchased and implemented system and...
Question 192: Which of the following is the PRIMARY reason for using a dig...
Question 193: servDuring an internal audit review of a human resources (HR...
Question 194: An IS auditor noted that a change to a critical calculation ...
Question 195: Code changes are compiled and placed in a change folder by t...
Question 196: An IS auditor is assigned to review the development of a spe...
Question 197: Which of the following is a corrective control that reduces ...
Question 198: An IS auditor previously worked in an organization s IT depa...
Question 199: When aligning IT projects with organizational objectives, it...