<< Prev Question Next Question >>

Question 295/333

A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor's MOST appropriate course of action?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (333q)
Question 1: Which of the following should an IS auditor do FIRST when as...
Question 2: Which of the following is the MOST important prerequisite fo...
Question 3: The BEST way to prevent fraudulent payments is to implement ...
Question 4: An online retailer is receiving customer complaints about re...
Question 5: During an audit, which of the following would be MOST helpfu...
Question 6: A client/server configuration will:...
Question 7: Which of the following is MOST important for an effective co...
Question 8: Which of the following areas of responsibility would cause t...
Question 9: Which of the following is the MOST effective way to identify...
Question 10: During a review of a production schedule, an IS auditor obse...
Question 11: An organization has recently converted its infrastructure to...
Question 12: Which of the following would lead an IS auditor to conclude ...
Question 13: An IS audit team s evaluating the documentation related to t...
Question 14: Which of the following provides the MOST reliable audit evid...
Question 15: An IS audit reveals an organization's IT department reports ...
Question 16: An employee approaches an IS auditor and expresses concern a...
Question 17: Which of the following provides the BEST evidence of the eff...
Question 18: During a business process re-engineering (BPR) program, IT c...
Question 19: A USB device containing sensitive production data was lost b...
Question 20: Which of the following is the MOST effective way to reduce r...
Question 21: What is the BEST way to control updates to the vendor master...
Question 22: Which of the following metrics would BEST measure the agilit...
Question 23: Which of the following findings should be of MOST concern to...
Question 24: Which of the following features can be provided only by asym...
Question 25: An IS auditor has completed an audit on the organization's I...
Question 26: Which of the following is MOST influential when defining dis...
Question 27: Which of the following would provide an IS auditor with the ...
Question 28: chain management processes Customer orders are not being ful...
Question 29: Which of the following is the MAIN risk associated with addi...
Question 30: The BEST method an organization can employ to align its busi...
Question 31: Which of the following is the MOST important consideration f...
Question 32: A review of IT interface controls finds an organization does...
Question 33: During which phase of the incident management life cycle sho...
Question 34: A warehouse employee of a retail company has been able to co...
Question 35: Which control type would provide the MOST useful input to a ...
Question 36: An IS auditor assessing the controls within a newly implemen...
Question 37: Which of the following is the PRIMARY purpose for external a...
Question 38: An IS auditor is verifying the adequacy of an organization's...
Question 39: Which of the following system conversion strategies provides...
Question 40: Which of the following poses the GREATEST security risk when...
Question 41: An organization uses multiple offsite data center facilities...
Question 42: Which of the following is the BEST sampling method when perf...
Question 43: An auditor is creating an audit program in which the objecti...
Question 44: A software development organization with offshore personnel ...
Question 45: Which of the following would BEST detect unauthorized modifi...
Question 46: Which of the following BEST measures project progress?...
Question 47: Due to budget restraints, an organization is postponing the ...
Question 48: When reviewing an organization's information security polici...
Question 49: Which of the following is the BEST way for an IS auditor to ...
Question 50: An organization plans to launch a social media presence as p...
Question 51: Which of the following is the BEST way for an IS auditor to ...
Question 52: Which of the following is the GREATEST threat to Voice-over ...
Question 53: Which of the following is the MOST effective means of helpin...
Question 54: Which of the following would provide the BEST evidence for u...
Question 55: Which of the following processes BEST addresses the risk ass...
Question 56: An IS auditor is reviewing an organization's information ass...
Question 57: Which of the following measures BEST mitigates the risk of e...
Question 58: During a project meeting for the implementation of an enterp...
Question 59: An IS auditor is reviewing an enterprise database platform. ...
Question 60: Which of the following is MOST important to review when eval...
Question 61: Which of the following provides for the GREATEST cost reduct...
Question 62: Which of the following would be the MOST significant factor ...
Question 63: An IS auditor performing an application development review a...
Question 64: The activation of a pandemic response plan has resulted in a...
Question 65: Which of the following should an IS auditor expect to see in...
Question 66: An IS auditor reviewing a checkpoint/restart procedure shoul...
Question 67: Which of the following should be of MOST concern to an IS au...
1 commentQuestion 68: Which of the following is the PRIMARY purpose of conducting ...
Question 69: An IS auditof notes the transaction processing times in an o...
Question 70: When conducting a post-implementation review of a new softwa...
Question 71: An organization is shifting to a remote workforce. In prepar...
Question 72: During an audit of identity and access management, an IS aud...
Question 73: Which of the following is MOST important for an IS auditor t...
Question 74: The decision to accept an IT control risk related to data qu...
Question 75: When developing a business continuity plan (BCP), which of t...
Question 76: The GREATEST benefit of using a prototyping approach in soft...
Question 77: An IS auditor is performing a follow-up audit for findings i...
Question 78: An IS auditor finds the log management system is overwhelmed...
Question 79: Which of the following would BEST indicate the effectiveness...
Question 80: Which of the following is the MOST effective approach in ass...
Question 81: Which of the following is the BEST detective control for a j...
Question 82: An incorrect version of source code was amended by a develop...
Question 83: Which of the following security assessment techniques attemp...
Question 84: Which of the following would be of GREATEST concern to an IS...
Question 85: Which of the following is a determine security control that ...
Question 86: Which of the following should be of GREATEST concern to an I...
Question 87: Which of the following should be the PRIMARY audience for a ...
Question 88: When engaging services from external auditors, which of the ...
Question 89: Due to system limitations, segregation of duties (SoD) canno...
Question 90: Which of the following should be included in emergency chang...
Question 91: An IS auditor finds that one employee has unauthorized acces...
Question 92: A data center's physical access log system captures each vis...
Question 93: An IS auditor should ensure that an application's audit trai...
1 commentQuestion 94: Which of the following would an IS auditor PRIMARILY review ...
Question 95: The PRIMARY advantage of object-oriented technology is enhan...
Question 96: An IS auditor is reviewing environmental controls and finds ...
Question 97: Which of the following would be MOST helpful in ensuring sec...
Question 98: Which of the following should an IS auditor be MOST concerne...
Question 99: Which of the following is a corrective control?...
Question 100: Which of the following control techniques BEST ensures the i...
Question 101: Which of the following would be of GREATEST concern to an IS...
Question 102: Which of the following is the MOST important feature of acce...
Question 103: Which of the following projects would be MOST important to r...
Question 104: A characteristic of a digital signature is that it:...
Question 105: During a review of an application system, an IS auditor iden...
Question 106: During an audit of a disaster recovery plan (DRP) for a crit...
Question 107: When performing a post-implementation review, the adequacy o...
Question 108: An organization has implemented a quarterly job schedule to ...
Question 109: A banking organization has outsourced its customer data proc...
Question 110: An IS audit reveals that many of an organization's Internet ...
Question 111: An IS auditor reviewing a project to acquire an IT-based sol...
Question 112: What is the PRIMARY benefit of prototyping as a method of sy...
Question 113: In the case of a disaster where the data center is no longer...
Question 114: An e-commerce enterprise's disaster recovery (DR) site has 3...
Question 115: Which of the following is a PRIMARY role of an IS auditor in...
Question 116: Which of the following is the PRIMARY purpose of quality ass...
Question 117: AN IS auditor has been asked to perform an assurance review ...
Question 118: Which of the following is the BEST reason to utilize blockch...
Question 119: During a review, an IS auditor discovers that corporate user...
Question 120: Batch processes running in multiple countries are merged to ...
Question 121: Which of the following should be the FIRST step to help ensu...
Question 122: Which of the following is the BEST way to mitigate the risk ...
Question 123: An IS auditor finds that needed security patches cannot be a...
Question 124: An IS auditor finds that a document related to a client has ...
Question 125: Which of the following is the PRIMARY reason an IS auditor s...
Question 126: Which of the following techniques would provide the BEST ass...
Question 127: Which of the following is the PRIMARY reason for an IS audit...
Question 128: Which of the following should be an IS auditor's GREATEST co...
Question 129: Which of the following is MOST important for an IS auditor t...
Question 130: Which of the following would an IS auditor consider the GREA...
Question 131: Which of the following should an IS auditor recommend to red...
Question 132: An organization implemented a cybersecurity policy last year...
Question 133: When reviewing an organization's IT governance processes, wh...
Question 134: An advantage of object-oriented system development is that i...
Question 135: An IS auditor conducting a follow-up audit learns that previ...
Question 136: An organization is disposing of a system containing sensitiv...
Question 137: Which type of control is in place when an organization requi...
Question 138: An IS auditor is reviewing a sample of production incidents ...
Question 139: When deciding whether a third party can be used in resolving...
Question 140: An organization seeks to control costs related to storage me...
Question 141: Which of the following MOST efficiently protects computer eq...
Question 142: For an organization that has plans to implement web-based tr...
Question 143: An IS auditor has obtained a large complex data set for anal...
Question 144: Which of the following is an IS auditor's BEST recommendatio...
Question 145: An organization recently implemented a cloud document storag...
Question 146: servDuring an internal audit review of a human resources (HR...
Question 147: Which of the following is the BEST recommendation to prevent...
Question 148: When is it MOST important for an IS auditor to apply the con...
Question 149: An IS auditor evaluating a three-tier client/server architec...
Question 150: Which of the following types of environmental equipment will...
Question 151: Which of the following poses the GREATEST risk to a company ...
Question 152: An organization allows employees to use personally owned mob...
Question 153: Which of the following should be an IS auditor's GREATEST co...
Question 154: The CIO of an organization is concerned that the information...
Question 155: An organization experienced a domain name system (DNS) attac...
Question 156: An organization needs to comply with data privacy regulation...
Question 157: Which of the following is the BEST incident of an effective ...
Question 158: An IS auditor determines that a business continuity plan has...
Question 159: Which of the following is an example of a preventive control...
Question 160: An IS auditor s role in privacy and security is to:...
Question 161: Which of the following should be of concern to an IS auditor...
Question 162: Which of the following validation techniques would BEST prev...
Question 163: During an exit interview senior management disagrees with so...
Question 164: Which of the following fire suppression systems needs to be ...
Question 165: When of the following is to MOST important consideration whe...
Question 166: An organization's enterprise architecture (EA) department de...
Question 167: An IS auditor is using data analytics in an audit and has ob...
Question 168: An organization's IT security policy states that user ID's m...
Question 169: As part of an audit response, an auditee has concerns with t...
Question 170: Which of the following should be included in a business impa...
Question 171: Which of the following documents would be MOST useful in det...
Question 172: The PRIMARY purpose of running a new system In parallel is t...
Question 173: When using a wireless device, which of the following BEST en...
Question 174: Which of the following would provide the BEST evidence of th...
Question 175: Which of the following is a characteristic of a single mirro...
Question 176: Which of the following are BEST suited for continuous auditi...
Question 177: Which of the following BEST indicates that an organization h...
Question 178: Which of the following indicates that an internal audit orga...
Question 179: Segregation of duties would be compromised if:...
Question 180: During an audit, the client learns that the IS auditor has r...
Question 181: Which of the following should be of GREATEST concern to an I...
Question 182: An organization decides to establish a formal incident respo...
Question 183: Which of the following is an example of a preventative contr...
Question 184: To help ensure the accuracy and completeness of end-user com...
Question 185: When classifying information, it is MOST important to align ...
Question 186: Which of the following BEST demonstrates that IT strategy is...
Question 187: When assessing whether an organization's IT performance meas...
Question 188: Which of the following is the GREATEST advantage of applicat...
Question 189: When an organization introduces virtualization into its arch...
Question 190: During an audit of an organization's financial statements, a...
Question 191: An IS auditor is executing a risk-based IS audit strategy to...
Question 192: Which of the following BEST ensures the confidentiality of s...
Question 193: An IS auditor reviewing the database controls for a new e-co...
Question 194: Which of the following is the MOST important benefit of invo...
Question 195: An IS auditor is a member of an application development team...
Question 196: What would be an IS auditor's BEST recommendation upon findi...
Question 197: Which of the following conditions would be of MOST concern t...
Question 198: A month after a company purchased and implemented system and...
Question 199: Which of the following is the MOST effective way to verify a...
Question 200: Which of the following is the BEST way to mitigate the risk ...
Question 201: An IS auditor performing an audit of backup procedures obser...
Question 202: When developing metrics to measure the contribution of IT to...
Question 203: Which of the following falls within the scope of an informat...
Question 204: Which of the following should be of GREATEST concern for an ...
Question 205: Which of the following is the GREATEST concern when an organ...
Question 206: To ensure efficient and economic use of limited resources in...
Question 207: In an IT organization where many responsibilities are shared...
Question 208: Which of the following an IS auditor assurance that the inte...
Question 209: An IS auditor finds the timeliness and depth of information ...
Question 210: Which of the following evidence-gathering techniques will pr...
Question 211: Which of the following BEST demonstrates the degree of align...
Question 212: An IS auditor is assigned to review the IS departments quali...
Question 213: Which of the following should be of GREATEST concern to an I...
Question 214: Due to a high volume of customer orders, an organization pla...
Question 215: An internal audit department recently established a quality ...
Question 216: After delivering an audit report, the audit manager discover...
Question 217: What should be the PRIMARY basis for scheduling a follow-up ...
Question 218: Which of the following provides the MOST comprehensive under...
Question 219: Which of the following is MOST important when planning a net...
Question 220: Both statistical and nonstatistical sampling techniques:...
Question 221: Which of the following is the MAIN advantage of using one-ti...
Question 222: When reviewing a contract for a disaster recovery hot site, ...
Question 223: The maturity level of an organization s problem management s...
Question 224: What is the BEST justification for allocating more funds to ...
Question 225: A security company and service provider have merged and the ...
Question 226: A bank's web-hosting provider has just completed an internal...
Question 227: Which of the following is MOST important to include within a...
Question 228: Which of the following BEST enables an organization to quant...
Question 229: An IS auditor is reviewing an industrial control system (ICS...
Question 230: An organization is developing a web portal using some extern...
Question 231: An IS auditor finds that application servers had inconsisten...
Question 232: Which of the following is an IS auditor s GREATEST concern w...
Question 233: The BEST way to preserve data integrity through all phases o...
Question 234: An IS auditor previously worked in an organization s IT depa...
Question 235: Which of the following communication modes should be of GREA...
Question 236: Which of the following is the MOST important consideration f...
Question 237: Following the discovery of inaccuracies in a data warehouse,...
Question 238: Tunneling provides additional security for connecting one ho...
Question 239: During a review, an IS auditor notes that an organization's ...
Question 240: One advantage of monetary unit sampling is the fact that:...
Question 241: When auditing the alignment of IT to the business strategy, ...
Question 242: An audit of environmental controls at a data center could in...
Question 243: Which of the following is MOST important to consider when as...
Question 244: What is the PRIMARY purpose of performing a parallel run of ...
Question 245: An IS auditor is reviewing documentation of application syst...
Question 246: When auditing the closing stages of a system development pro...
Question 247: An IS auditor has found that an organization is unable to ad...
Question 248: Which of the following should be the MOST important consider...
Question 249: An IS auditor notes that application super-user activity was...
Question 250: An accounts receivable data entry routine prevents the entry...
Question 251: Which of the following statements appearing in an organizati...
Question 252: The purpose of data migration testing is to validate data:...
Question 253: Which of the following should be of GREATEST concern to an I...
Question 254: Which of the following is the PRIMARY concern when negotiati...
Question 255: A manager identifies active privileged accounts belonging to...
Question 256: Which of the following should be done FIRST to effectively d...
Question 257: An IS auditor concludes that an organization has a quality s...
Question 258: Which of the following is the MOST important issue for an IS...
Question 259: Which of the following is MOST important to ensure during co...
Question 260: Which of the following is found in an audit charter?...
Question 261: Which of the following backup schemes is the BEST option whe...
Question 262: Which of the following is the BEST way to mitigate risk to a...
Question 263: When evaluating an IT organizational structure, which of the...
Question 264: Which of the following is the MOST effective control against...
Question 265: Which of the following would be an IS auditor's GREATEST con...
Question 266: Disciplinary policies are BEST classified as....
Question 267: An organization issues digital certificates to employees to ...
Question 268: An organization has suffered a number of incidents in which ...
Question 269: Which of the following situations would impair the independe...
Question 270: The IS quality assurance (OA) group is responsible for...
Question 271: Which of the following would BEST help prioritize various pr...
Question 272: Which of the following is the GREATEST advantage of vulnerab...
Question 273: Which of the following group is MOST likely responsible for ...
Question 274: Which of the following practices BEST ensures that archived ...
Question 275: Which of the following human resources management practices ...
Question 276: An IS auditor is reviewing a network diagram. Which of the f...
Question 277: Which of the following would be the MOST effective method to...
Question 278: Which of the following is the MOST likely reason an organiza...
Question 279: Which of the following focus areas is a responsibility of IT...
Question 280: Which of the following observations noted during a review of...
Question 281: Which of the following is the MOST important process to ensu...
Question 282: The operations team of an organization has reported an IS se...
Question 283: A financial institution has a system interface that is used ...
Question 284: An IS auditor is observing transaction processing and notes ...
Question 285: An organization allows its employees to use personal mobile ...
Question 286: Which of the following should be defined in an audit charter...
Question 287: Which of the following should be of GREATEST concern to an I...
Question 288: A new application will require multiple interfaces. Which of...
Question 289: An IS auditor has discovered that unauthorized customer mana...
Question 290: The performance, risks, and capabilities of an IT infrastruc...
Question 291: What privilege on a server containing data with different se...
Question 292: An IS auditor is reviewing the business requirements for the...
Question 293: An organization plans to receive an automated data feed into...
Question 294: What would be of GREATEST concern to an IS auditor observing...
Question 295: A senior auditor is reviewing work papers prepared by a juni...
Question 296: Which of the following provides the BEST method for maintain...
Question 297: Which of the following should the IS auditor do FIRST to ens...
Question 298: Which of the following analytical methods would be MOST usef...
Question 299: An organization maintains an inventory of the IT application...
Question 300: To ensure the integrity of a recovered database, which of th...
Question 301: Which of the following would be of GREATEST concern to an IS...
Question 302: Which of the following should be a concern to an IS auditor ...
Question 303: Management has asked internal audit to prioritize and perfor...
Question 304: An organization recently switched vendors to perform hardwar...
Question 305: An IS auditor reviewed the business case for a proposed inve...
Question 306: Which of the following control checks would utilize data ana...
Question 307: In assessing the priority given to systems covered in an org...
Question 308: Which of the following is the MOST effective way to minimize...
Question 309: Which of the following should an IS auditor review FIRST whe...
Question 310: Which of the following security risks can be reduced by a pr...
Question 311: Which of the following is the PRIMARY purpose of conducting ...
Question 312: During an operational audit of a biometric system used to co...
Question 313: Stress testing should ideally be carried out under a:...
Question 314: Which of the following is the MOST effective control to ensu...
Question 315: An IS auditor observes that a business-critical application ...
Question 316: Which of the following is the GREATEST benefit of utilizing ...
Question 317: An organization is within a jurisdiction where new regulatio...
Question 318: An IS auditor discovers an option in a database that allows ...
Question 319: Which of the following is the BEST way to address potential ...
Question 320: An organization shares some of its customers' personally Ide...
Question 321: When evaluating a protect immediately prior to implementatio...
Question 322: An information systems security officer's PRIMARY responsibi...
Question 323: During a database security audit, an IS auditor is reviewing...
Question 324: In a situation where the recovery point objective (RPO) is 0...
Question 325: When planning an end-user computing (EUC) audit, it is MOST ...
Question 326: Which of the following is the BEST approach to identify whet...
Question 327: An organization wants to replace its suite of legacy applica...
Question 328: During which IT project phase is it MOST appropriate to cond...
Question 329: To develop meaningful recommendations for findings, which of...
Question 330: An organization has outsourced its data processing function ...
Question 331: Which of the following would be an appropriate role of inter...
Question 332: Which type of attack poses the GREATEST risk to an organizat...
Question 333: Which of the following is the BEST data integrity check?...