<< Prev Question Next Question >>

Question 13/198

A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system. Which of the following is.........

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (198q)
Question 1: When a firewall is subjected to a probing attack, the MOST a...
Question 2: The application systems quality assurance (QA) function shou...
Question 3: During a review of an application system, an IS auditor iden...
Question 4: An e-commerce enterprise's disaster recovery (DR) site has 3...
Question 5: Which of the following would BEST provide executive manageme...
Question 6: What would be of GREATEST concern to an IS auditor observing...
Question 7: A company converted its payroll system from an external serv...
Question 8: Which of the following should be the PRIMARY concern of an I...
Question 9: Which of the following is MOST important for an IS auditor t...
Question 10: Which of the following provides for the GREATEST cost reduct...
Question 11: Which of the following techniques would provide the BEST ass...
Question 12: During a post-implementation review, a step in determining w...
Question 13: A review of IT interface controls finds an organization does...
Question 14: Spreadsheets are used to calculate project cost estimates To...
Question 15: Which of the following is MOST important for an IS auditor t...
Question 16: During a security audit, an IS auditor is tasked with review...
Question 17: The GREATEST benefit of using a prototyping approach in soft...
Question 18: Which of the following would be an appropriate role of inter...
Question 19: Which of the following is a PRIMARY role of an IS auditor in...
Question 20: What is the purpose of a hypervisor?...
Question 21: Which of the following network management toots should an IS...
Question 22: Which of the following sampling techniques is BEST to use wh...
Question 23: An IS auditor has completed an audit on the organization's I...
Question 24: Capacity management enables organizations to:...
Question 25: Which of the following is MOST critical to include when deve...
Question 26: Which of the following is a corrective control that reduces ...
Question 27: When evaluating the management practices at a third-party or...
Question 28: An IS auditor finds that periodic reviews of read-only users...
Question 29: The PRIMARY role of a control self-assessment (CSA) facilita...
Question 30: Which of the following clauses is MOST important to include ...
Question 31: Which of the following BEST determines if a batch update job...
Question 32: Which of the following is the BEST preventive control to ens...
Question 33: Which of the following would be the MOST appropriate reason ...
Question 34: An IS auditor is planning an audit of an organization's acco...
Question 35: An organization has outsourced its data leakage monitoring t...
Question 36: Which of the following findings should be of GREATEST concer...
Question 37: What is the MOST critical finding when reviewing an organiza...
Question 38: What is the MOST important business concern when an organiza...
Question 39: An IS auditor is conducting a pre-implementation review to d...
Question 40: Which of the following MOST effectively mitigates the risk o...
Question 41: Management has decided to include a compliance manager in th...
Question 42: Which of the following would provide an IS auditor with the ...
Question 43: Which of the following should MOST concern an IS auditor rev...
Question 44: Which of the following is the BEST way to mitigate the risk ...
Question 45: Which of the following MOST efficiently protects computer eq...
Question 46: Which of the following is MOST important for an IS auditor t...
Question 47: During the post-implementation review of an application that...
Question 48: The BEST way to preserve data integrity through all phases o...
Question 49: Which of the following should be done FIRST when planning a ...
Question 50: Which of the following is the PRIMARY reason an IS auditor s...
Question 51: Which of the following would BEST enable an IS auditor to pe...
Question 52: During a review of operations, it is noted that during a bat...
Question 53: In an organization that has a staff-rotation policy, the MOS...
Question 54: Code changes are compiled and placed in a change folder by t...
Question 55: Which of the following observations would an IS auditor cons...
Question 56: Which of the following is the MAIN purpose of data classific...
Question 57: During a review of the IT strategic plan, an IS auditor find...
Question 58: The PRIMARY advantage of object-oriented technology is enhan...
Question 59: What is the BEST justification for allocating more funds to ...
Question 60: An IS auditor is evaluating a virtual server environment and...
Question 61: The BEST method an organization can employ to align its busi...
Question 62: An IS auditor is evaluating the risk associated with moving ...
Question 63: An application used at a financial services organization tra...
Question 64: When reviewing an organization's data protection practices, ...
Question 65: Which of the following BEST guards against the risk of attac...
Question 66: The risk of communication failure in an e-commerce environme...
Question 67: When performing a post-implementation review, the adequacy o...
1 commentQuestion 68: Which of the following application input controls would MOST...
Question 69: An IS auditor identifies key controls that have been overrid...
Question 70: Which of the following is the PRIMARY risk when business uni...
Question 71: An organization allows its employees to use personal mobile ...
Question 72: In planning a major system development project, function poi...
Question 73: The BEST way to validate whether a malicious act has actuall...
Question 74: A multinational organization is integrating its existing pay...
Question 75: A banking organization has outsourced its customer data proc...
Question 76: Which of the following is the role of audit leadership in en...
Question 77: An IS auditor reviewing a purchase accounting system notices...
Question 78: Which of the following is the BEST way to ensure that busine...
Question 79: Which of the following technologies has the SMALLEST maximum...
Question 80: Segregation of duties would be compromised if:...
Question 81: Which of the following presents the GREATEST concern when im...
Question 82: An IS auditor begins an assignment and identifies audit comp...
Question 83: An IS auditor has found that an organization is unable to ad...
Question 84: An organization is within a jurisdiction where new regulatio...
Question 85: planning an end-user computing (EUC) audit, it is MO ST impo...
Question 86: An IS auditor reviewing the system development life cycle (S...
Question 87: Which of the following is a benefit of the DevOps developmen...
Question 88: An IS auditor finds that terminated users have access to fin...
Question 89: An organization is deciding whether to outsource its custome...
Question 90: Which of the following would an IS auditor PRIMARILY review ...
Question 91: In a high-volume, real-time system, the MOST effective techn...
Question 92: Which of the following is the MOST effective means of helpin...
Question 93: When an IS auditor evaluates key performance indicators (KPl...
Question 94: Which of the following validation techniques would BEST prev...
Question 95: To BEST evaluate the effectiveness of a disaster recovery pl...
Question 96: Following a significant merger and acquisition, which of the...
Question 97: In a situation where the recovery point objective (RPO) is 0...
Question 98: Which of the following is the PRIMARY purpose of conducting ...
Question 99: A financial institution suspects that a manager has been cre...
Question 100: Which of the following should be a concern to an IS auditor ...
Question 101: Which of the following is an example of a control that is bo...
Question 102: Which of the following is the MOST likely reason an organiza...
Question 103: The PRIMARY benefit of using secure shell (SSH) to access a ...
Question 104: Compared to developing a system in-house, acquiring a softwa...
Question 105: Which of the following is MOST appropriate for measuring a b...
Question 106: Which of the following is the MOST important consideration f...
Question 107: Which of the following should be of concern to an IS auditor...
Question 108: An organization's business function wants to capture custome...
Question 109: An IS auditor notes that help desk personnel are required to...
Question 110: When reviewing a project to replace multiple manual data ent...
Question 111: Which of the following provides the MOST assurance over the ...
Question 112: To address issues related to privileged users identified in ...
Question 113: A software development organization with offshore personnel ...
Question 114: Which of the following should be the PRIMARY audience for a ...
Question 115: Disciplinary policies are BEST classified as....
Question 116: Which of the following observations noted during a review of...
Question 117: Which of the following is the GREATEST security risk associa...
Question 118: Which of the following is the MOST important operational asp...
Question 119: Which of the following is the MOST important step in the dev...
Question 120: During an audit, which of the following would be MOST helpfu...
Question 121: Which of the following is MOST important to ensure when plan...
Question 122: Which of the following would BEST help prioritize various pr...
Question 123: The FIRST course of action an investigator should take when ...
Question 124: Which of the following is the MOST important reason to use s...
Question 125: Which of the following is the BEST sampling method to ensure...
Question 126: Which of the following is the MAIN advantage of using one-ti...
Question 127: Post-implementation testing is an example of which of the fo...
Question 128: Which of the following demonstrates the use of data analytic...
Question 129: An organization has recently converted its infrastructure to...
Question 130: An IS auditors independence with respect to the audit of an ...
Question 131: An IS auditor is planning to audit an organization's infrast...
Question 132: Which of the following is the BEST guidance from an IS audit...
Question 133: An IS auditor is reviewing a banking mobile application that...
Question 134: Which of the following should be an IS auditor's GREATEST co...
Question 135: An internal audit department recently established a quality ...
Question 136: A financial institution has a system interface that is used ...
Question 137: At what point in software development should the user accept...
Question 138: Which of the following is the BEST recommendation to prevent...
Question 139: Following the discovery of inaccuracies in a data warehouse,...
Question 140: An accounts receivable data entry routine prevents the entry...
Question 141: In the risk assessment process, which of the following shoul...
Question 142: Which of the following is the PRIMARY purpose of using data ...
Question 143: Which of the following is the BEST way to confirm that a dig...
Question 144: A third-party service provider is hosting a private cloud fo...
Question 145: To protect information assets, which of the following should...
Question 146: Which of the following is the MOST effective way to reduce r...
Question 147: When developing a business continuity plan (BCP), which of t...
Question 148: Which of the following would BEST facilitate the detection o...
Question 149: Which of the following BEST facilitates the management of as...
Question 150: Due to budget restraints, an organization is postponing the ...
Question 151: An emergency power-off switch should:...
Question 152: When an organization introduces virtualization into its arch...
Question 153: An IS auditor is reviewing environmental controls and finds ...
Question 154: Which of the following will MOST likely compromise the contr...
Question 155: Which of the following provides an IS auditor with the BEST ...
Question 156: For an organization that has plans to implement web-based tr...
Question 157: For a company that outsources payroll processing, which of t...
Question 158: An organization s audit charter PRIMARILY:...
Question 159: An IS auditor s role in privacy and security is to:...
Question 160: Which of the following should be of GREATEST concern to an I...
Question 161: A client/server configuration will:...
Question 162: Which of the following is MOST important for an effective co...
Question 163: Which of the following is the BEST source for describing the...
Question 164: Which of the following should be of MOST concern to an IS au...
Question 165: When reviewing an organization's information security polici...
Question 166: An IS auditor has completed an audit of an organization's ac...
Question 167: Which of the following is the PRIMARY benefit of using a cap...
Question 168: An IS department is evaluated monthly on its cost-revenue ra...
Question 169: Which of the following should be an IS auditor's PRIMARY con...
Question 170: An airlines online booking system uses an automated script t...
Question 171: To help ensure the accuracy and completeness of end-user com...
Question 172: Which of the following is the PRIMARY concern when negotiati...
Question 173: An IS auditor has assessed a payroll service provider's secu...
Question 174: Which of the following is MOST likely to be included in comp...
Question 175: Which sampling method should an IS auditor employ when the l...
Question 176: Which of the following is the BEST way to achieve high avail...
Question 177: Which of the following is the BEST IS audit strategy?...
Question 178: An IS audit manager finds that data manipulation logic devel...
Question 179: Which of the following BEST demonstrates the degree of align...
Question 180: Which of the following audit procedures would be MOST conclu...
Question 181: An IS auditor finds that a document related to a client has ...
Question 182: Which of the following is an IS auditor s GREATEST concern w...
Question 183: The PRIMARY benefit of information asset classification is t...
Question 184: Which of the following processes BEST addresses the risk ass...
Question 185: Which of the following is the MOST important issue for an IS...
Question 186: Which of the following is the MOST important difference betw...
Question 187: An organization transmits large amount of data from one inte...
Question 188: Which of the following is the GREATEST threat to Voice-over ...
Question 189: Which of the following evidence-gathering techniques will pr...
Question 190: Within the context of an IT-related governance framework, wh...
Question 191: Which of the following backup schemes is the BEST option whe...
Question 192: Which of the following observations should be of GREATEST co...
Question 193: Which of the following should be the FIRST step in an organi...
Question 194: An IS auditor notes that application super-user activity was...
Question 195: Which of the following is the BEST indicator of the effectiv...
Question 196: What information within change records would provide an IS a...
Question 197: Which of the following BEST ensures the quality and integrit...
Question 198: An IS auditor is evaluating a virtual server environment and...