<< Prev Question Next Question >>

Question 104/340

During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (340q)
Question 1: The implementation of an IT governance framework requires th...
1 commentQuestion 2: Which of the following development practices would BEST miti...
Question 3: Which of the following is an example of a corrective control...
Question 4: To protect information assets, which of the following should...
Question 5: An IS auditor is reviewing a recent security incident and is...
Question 6: When aligning IT projects with organizational objectives, it...
Question 7: Due to a recent business divestiture, an organization has li...
Question 8: An organization has outsourced the development of a core app...
Question 9: Which of the following is MOST important for an IS auditor t...
Question 10: During an audit of a disaster recovery plan (DRP) for a crit...
Question 11: During a routine check, a system administrator identifies un...
Question 12: Which of the following should an IS auditor expect to find w...
Question 13: Which of the following is the BEST method to prevent wire tr...
Question 14: An IS auditor is reviewing a sample of production incidents ...
Question 15: When performing a post-implementation review, the adequacy o...
Question 16: Which of the following should be the PRIMARY audience for a ...
Question 17: An information systems security officer's PRIMARY responsibi...
Question 18: An IS auditor has completed an audit on the organization's I...
Question 19: Which of the following is the MOST important prerequisite fo...
Question 20: Which of the following is MOST important for an IS auditor t...
Question 21: Which of the following should be the PRIMARY consideration f...
Question 22: During which IT project phase is it MOST appropriate to cond...
Question 23: Which of the following is the MOST important feature of acce...
Question 24: Which of the following is the BEST way to address potential ...
Question 25: The BEST way to prevent fraudulent payments is to implement ...
Question 26: Which of the following controls is BEST implemented through ...
Question 27: servDuring an internal audit review of a human resources (HR...
Question 28: Which of the following BEST helps to identify errors during ...
Question 29: Which of the following is MOST important for an IS auditor t...
Question 30: Which of the following should be an IS auditor's GREATEST co...
Question 31: Which of the following should be included in a business impa...
Question 32: An IS auditor is reviewing environmental controls and finds ...
Question 33: Which of the following MOST efficiently protects computer eq...
Question 34: Which of the following is the BEST guidance from an IS audit...
Question 35: An IT organization's incident response plan is which type of...
Question 36: An employee has accidentally posted confidential data to the...
Question 37: Which of the following types of firewalls provide the GREATE...
Question 38: Which of the following is the MOST effective sampling method...
1 commentQuestion 39: The FIRST course of action an investigator should take when ...
Question 40: Which of the following will BEST help to ensure that an in-h...
Question 41: An IS auditor noted that a change to a critical calculation ...
Question 42: Which of the following MUST be completed before selecting an...
Question 43: Following a significant merger and acquisition, which of the...
1 commentQuestion 44: An auditor is creating an audit program in which the objecti...
Question 45: Which of the following is the MOST effective way to maintain...
Question 46: Which of the following is the BEST control to prevent the tr...
1 commentQuestion 47: An organization maintains an inventory of the IT application...
Question 48: An organization allows employees to retain confidential data...
Question 49: Which of the following would be the MOST effective method to...
Question 50: Regression testing should be used during a system developmen...
Question 51: An IS auditor finds that the process for removing access for...
Question 52: An organization's software developers need access to persona...
Question 53: In a typical network architecture used for e-commerce a load...
Question 54: The objective of a vulnerability identification step in a ri...
Question 55: A characteristic of a digital signature is that it:...
Question 56: Which of the following BEST indicates that an organization h...
Question 57: Spreadsheets are used to calculate project cost estimates To...
Question 58: An advantage of object-oriented system development is that i...
1 commentQuestion 59: A review of an organization's IT portfolio revealed several ...
Question 60: IS management has recently disabled certain referential inte...
Question 61: Which of the following communication modes should be of GREA...
Question 62: Which of the following is the BEST way to ensure payment tra...
Question 63: Which of the following must be in place before an IS auditor...
2 commentQuestion 64: The performance, risks, and capabilities of an IT infrastruc...
Question 65: An organization transmits large amount of data from one inte...
Question 66: Which of the following should occur EARLIEST in a business c...
Question 67: An IS auditor is evaluating a virtual server environment and...
Question 68: Which of the following metrics would be MOST useful to an IS...
Question 69: When conducting a requirements analysis for a project, the B...
Question 70: An IS auditor finds that an organization's data toss prevent...
Question 71: Which of the following projects would be MOST important to r...
Question 72: Which of the following MOST effectively mitigates the risk o...
Question 73: During a review of operations, it is noted that during a bat...
1 commentQuestion 74: Which of the following is found in an audit charter?...
Question 75: An organization is disposing of a system containing sensitiv...
Question 76: When measuring the effectiveness of a security awareness pro...
Question 77: While conducting a review of project plans related to a new ...
Question 78: Which of the following is the PRIMARY reason for an organiza...
1 commentQuestion 79: Which of the following is the BEST point in time to conduct ...
Question 80: The operations team of an organization has reported an IS se...
Question 81: An organization's security policy mandates that all new empl...
Question 82: Which of the following is the BEST way to mitigate the risk ...
Question 83: An organization has implemented periodic reviews of logs sho...
Question 84: Which of the following should an IS auditor be MOST concerne...
Question 85: Which of the following conditions would be of MOST concern t...
Question 86: Which of the following focus areas is a responsibility of IT...
Question 87: An internal audit department recently established a quality ...
Question 88: Which of the following is MOST important for an IS auditor t...
Question 89: The maturity level of an organization s problem management s...
Question 90: Which of the following is an IS auditor's BEST recommendatio...
Question 91: The use of symmetric key encryption controls to protect sens...
Question 92: Which of the following is a preventive control related to ch...
Question 93: Which of the following is MOST important for an IS auditor t...
Question 94: An IS audit reveals that many of an organization's Internet ...
Question 95: Which of the following is the BEST way for an IS auditor to ...
Question 96: What is the PRIMARY benefit of prototyping as a method of sy...
Question 97: A third-party service provider is hosting a private cloud fo...
Question 98: Which of the following is the GREATEST benefit of implementi...
Question 99: An organization's IT security policy requires annual securit...
Question 100: During a systems development project, participation in which...
Question 101: Which of the following reports would provide the GREATEST as...
Question 102: Which of the following is the PRIMARY reason an IS auditor s...
Question 103: The GREATEST benefit of using a prototyping approach in soft...
Question 104: During the implementation of an upgraded enterprise resource...
Question 105: An external IS auditor has been engaged to determine the org...
Question 106: Which of the following documents would be MOST useful in det...
Question 107: Which of the following is MOST likely to be detected by an I...
Question 108: When reviewing backup policies, an IS auditor MUST verify th...
Question 109: When responding to an ongoing Daniel of service (DoS) attack...
Question 110: Which of the following provides an IS auditor the MOST assur...
Question 111: An IS audit found that malware entered the organization thro...
Question 112: Which of the following should be an IS auditor's GREATEST co...
Question 113: An IS auditor is reviewing the business requirements for the...
Question 114: A company uses a standard form to document and approve all c...
Question 115: During a review of the IT strategic plan, an IS auditor find...
Question 116: Which of the following should be an IS auditor's BEST recomm...
1 commentQuestion 117: Which of the following would be the MOST useful metric for m...
Question 118: Which of the following is MOST appropriate for measuring a b...
Question 119: Which of the following is the role of audit leadership in en...
Question 120: An IS auditor plans to review all access attempts to a video...
Question 121: Which of the following is MOST important to ensure during co...
Question 122: On a public-key cryptosystem when there is no previous knowl...
Question 123: The IS quality assurance (OA) group is responsible for...
Question 124: An IS auditor is conducting a pre-implementation review to d...
Question 125: Which of the following is the BEST source of information for...
Question 126: Which of the following BEST facilitates the management of as...
1 commentQuestion 127: Which of the following should be the MOST important consider...
Question 128: An organization has recently implemented a Voice-over IP (Vo...
Question 129: Which of the following types of testing would BEST mitigate ...
Question 130: Which of the following is the PRIMARY reason to adopt a capa...
Question 131: After an external IS audit, which of the following should be...
Question 132: Which of the following is the MOST significant operational r...
Question 133: Which of the following is an example of a preventive control...
Question 134: A 5 year audit plan provides for general audits every year a...
Question 135: Which of the following is MOST important for an IS auditor t...
Question 136: A manufacturing company is implementing application software...
Question 137: An IS auditor is asked to provide feedback on the systems op...
Question 138: A bank is relocating its servers to a vendor that provides d...
Question 139: Which of the following Is a challenge in developing a servic...
Question 140: Which of the following should be done FIRST to effectively d...
Question 141: Which of the following governance functions is responsible f...
Question 142: During an audit of a financial application, it was determine...
Question 143: What is the MAIN purpose of an organization's internal IS au...
1 commentQuestion 144: In a typical system development life cycle (SDLC), which gro...
Question 145: The PRIMARY advantage of object-oriented technology is enhan...
Question 146: Which of the following is the PRIMARY purpose of quality ass...
Question 147: Which of the following is a corrective control that reduces ...
Question 148: Malicious program code was found in an application and corre...
Question 149: Which of the following is the MOST reliable way for an IS au...
Question 150: Following an IS audit, which of the following types of risk ...
Question 151: As part of business continuity planning, which of the follow...
Question 152: These members of an emergency incident response team should ...
Question 153: An organization has adopted a backup and recovery strategy t...
1 commentQuestion 154: Which of the following would provide the BEST evidence of th...
Question 155: Which of the following BEST ensures the confidentiality of s...
Question 156: An online retailer is receiving customer complaints about re...
Question 157: Which of the following should be defined in an audit chatter...
Question 158: An IS auditor has obtained a large complex data set for anal...
Question 159: The BEST way to validate whether a malicious act has actuall...
Question 160: Which of the following is a corrective control?...
Question 161: An IT governance body wants to determine whether IT service ...
Question 162: Which of the following demonstrates the use of data analytic...
Question 163: Which of the following would BEST indicate the effectiveness...
Question 164: During an IT operations audit multiple unencrypted backup ta...
Question 165: Which of the following validation techniques would BEST prev...
Question 166: Which of the following are examples of detective controls?...
Question 167: Data anonymizabon helps to prevent which types of attacks in...
Question 168: Which of the following evidence-gathering techniques will pr...
Question 169: Which of the following is the MOST effective control for pro...
Question 170: When an organization introduces virtualization into its arch...
Question 171: Which of the following is MOST important for an IS auditor t...
Question 172: When reviewing an organization's data protection practices, ...
Question 173: For an organization that has plans to implement web-based tr...
Question 174: Which of the following is the GREATEST risk associated with ...
Question 175: An IS auditor Is reviewing an organization's business contin...
Question 176: During an audit of identity and access management, an IS aud...
Question 177: Which of the following provides an IS auditor with the BEST ...
Question 178: Which of the following is the BEST sampling method to ensure...
Question 179: The use of control totals reduces the risk of...
Question 180: Which of the following should be of GREATEST concern to an I...
Question 181: What is the BEST control to address SQL injection vulnerabil...
Question 182: When assessing whether an organization's IT performance meas...
Question 183: An IS auditor is reviewing database log settings and notices...
Question 184: An organization offers an online information security awaren...
Question 185: Which sampling method should an IS auditor employ when the l...
Question 186: Which of the following cloud deployment models would BEST me...
Question 187: Which of the following is a benefit of the DevOps developmen...
Question 188: Which of the following physical controls will MOST effective...
Question 189: Which of the following information security requirements BES...
Question 190: An IS audit reveals an organization's IT department reports ...
Question 191: To BEST evaluate the effectiveness of a disaster recovery pl...
Question 192: An IS auditor is assessing the results of an organization's ...
Question 193: An organization's IT security policy states that user ID's m...
Question 194: Which of the following is the GREATEST concern associated wi...
Question 195: chain management processes Customer orders are not being ful...
Question 196: Which of the following is the MOST important step in the dev...
Question 197: Which cloud deployment model is MOST likely to be limited in...
Question 198: When is the BEST time to commence continuity planning for a ...
Question 199: Which of the following provides for the GREATEST cost reduct...
Question 200: Which of the following is the MOST effective way to minimize...
Question 201: Which of the following should an IS auditor review FIRST whe...
Question 202: An organization plans to launch a social media presence as p...
Question 203: Which of the following is the MOST effective way to identify...
Question 204: Which of the following is the BEST way for an IS auditor to ...
Question 205: Which of the following is MOST critical to include when deve...
Question 206: An organization has established hiring policies and procedur...
Question 207: Which of the following is the BEST way to determine il IT is...
Question 208: When auditing the alignment of IT to the business strategy, ...
Question 209: Which of the following is the MOST important process to ensu...
Question 210: When developing customer-tearing IT applications, in which s...
Question 211: During recent post-implementation reviews, an IS auditor has...
Question 212: An IS auditor reviewing the database controls for a new e-co...
Question 213: The PRIMARY focus of audit follow-up reports should be to:...
Question 214: An IS auditor finds that needed security patches cannot be a...
Question 215: Which of the following is MOST important when duties in a sm...
Question 216: An existing system is being replaced with a new application ...
Question 217: A financial institution is launching a mobile banking servic...
Question 218: During the design phase of a software development project, t...
Question 219: Which of the following is MOST important to have in place to...
Question 220: Which of the following responsibilities of an organization's...
Question 221: An organization is developing data classification standards ...
Question 222: To develop a robust data security program, the FIRST course ...
Question 223: External experts were used on a recent IT audit engagement W...
Question 224: Which of the following technologies has the SMALLEST maximum...
Question 225: An IS auditor reviewing the system development life cycle (S...
Question 226: What would be an IS auditors GREATEST concern when using a t...
Question 227: An IS auditor has been asked to assess the security of a rec...
Question 228: Which of the following is the PRIMARY reason that asset clas...
Question 229: Which of the following falls within the scope of an informat...
Question 230: Which of the following would be an IS auditor's GREATEST con...
Question 231: An organization has implemented a quarterly job schedule to ...
Question 232: Which of the following control testing approaches is BEST us...
Question 233: An IS auditor reviewing a purchase accounting system notices...
Question 234: Which of the following is the GREATEST concern associated wi...
Question 235: An application used at a financial services organization tra...
Question 236: Which of the following should be the FIRST step in an organi...
Question 237: When determining which IS audits to conduct during the upcom...
Question 238: Which of the following access rights presents the GREATEST r...
Question 239: While conducting a system architecture review, an IS auditor...
Question 240: Which of the following is the MOST likely cause of a success...
Question 241: Which of the following should be of GREATEST concern for an ...
Question 242: When classifying information, it is MOST important to align ...
Question 243: Disciplinary policies are BEST classified as....
Question 244: An IS auditor finds that corporate mobile devices used by em...
Question 245: The BEST indicator of an optimized quality management system...
Question 246: In a 24/7 processing environment, a database contains severa...
Question 247: Which of the following is the GREATEST security risk associa...
Question 248: Which of the following is the MOST effective control against...
Question 249: An organization has decided to implement a third-party syste...
Question 250: Tunneling provides additional security for connecting one ho...
Question 251: Which of the following is the MOST important determining fac...
Question 252: Which of the following is MOST likely to be included in comp...
Question 253: An organization has recently converted its infrastructure to...
Question 254: Which of the following is MOST important to consider when as...
Question 255: When deploying an application that was created using the pro...
Question 256: When is it MOST important for an IS auditor to apply the con...
Question 257: Which of the following is the GREATEST advantage of applicat...
Question 258: Which of the following is the BEST way to enforce the princi...
Question 259: Which of the following is the GREATEST concern when using a ...
Question 260: During a post-implementation review, a step in determining w...
Question 261: Which of the following should be of GREATEST concern to an I...
Question 262: Which of the following development practices would BEST miti...
Question 263: An e-commerce enterprise's disaster recovery (DR) site has 3...
Question 264: An organization's business function wants to capture custome...
Question 265: An organization wants to change its project methodology to a...
Question 266: In an environment that automatically reports all program cha...
Question 267: Which of the following is an IS auditor's BEST recommendatio...
Question 268: Segregation of duties would be compromised if:...
Question 269: When conducting a post-implementation review of a new softwa...
Question 270: An organization allows its employees to use personal mobile ...
Question 271: An organization plans to eliminate pilot releases and instea...
Question 272: Which of the following metrics is MOST useful to an IS audit...
Question 273: Capacity management enables organizations to:...
Question 274: Due to system limitations, segregation of duties (SoD) canno...
Question 275: Which of the following is the MAIN risk associated with addi...
Question 276: An IS auditor finds that application servers had inconsisten...
Question 277: When evaluating the ability of a disaster recovery plan (DRP...
Question 278: When of the following is to MOST important consideration whe...
Question 279: Which of the following is the BEST way to minimize the impac...
Question 280: The use of cookies constitutes the MOST significant security...
Question 281: An organization with high availability resource requirements...
Question 282: During the planning stage of a compliance audit an IS audito...
Question 283: An IS auditor is reviewing a contract for the outsourcing of...
Question 284: Which of the following should be done FIRST when developing ...
Question 285: After discussing findings with an auditee, an IS auditor is ...
Question 286: The application systems quality assurance (QA) function shou...
Question 287: Which of the following strategies BEST optimizes data storag...
Question 288: Batch processes running in multiple countries are merged to ...
Question 289: To ensure the integrity of a recovered database, which of th...
Question 290: Which of the following should be of GREATEST concern to an I...
Question 291: Which of the following should be done by an IS auditor durin...
Question 292: A CIO has asked an IS auditor to implement several security ...
Question 293: Which of the following BEST measures project progress?...
Question 294: In an organization that has a staff-rotation policy, the MOS...
Question 295: Which of the following practices BEST ensures that archived ...
Question 296: Which of the following areas of responsibility would cause t...
Question 297: Which of the following is an IS auditor's BEST course of act...
Question 298: Following the sale of a business division, employees will be...
Question 299: Which of the following is the BEST way to reduce sampling ri...
Question 300: Following a recent internal data breach, an IS auditor was a...
Question 301: Which of the following security risks can be reduced by a pr...
Question 302: Which of the following would BEST enable an IS auditor to pe...
Question 303: planning an end-user computing (EUC) audit, it is MO ST impo...
Question 304: Which of the following analytical methods would be MOST usef...
Question 305: Which of the following should an IS auditor do FIRST when as...
Question 306: Which of the following provides the MOST comprehensive descr...
Question 307: Which of the following is the BEST way to mitigate the risk ...
Question 308: A vulnerability in which of the following virtual systems wo...
Question 309: An IS auditor is analysing a sample of assesses recorded on ...
Question 310: Which of the following would be the MOST appropriate reason ...
Question 311: An algorithm in an email program analyzes traffic to quarant...
Question 312: Which of the following presents the GREATEST concern when im...
Question 313: Which of the following is the PRIMARY purpose for external a...
Question 314: A help desk has been contacted regarding a lost business mob...
Question 315: Which of the following is the GREATEST concern with conducti...
Question 316: When engaging services from external auditors, which of the ...
Question 317: An IS auditor wants to understand the collective effect of t...
Question 318: Which of the following processes BEST addresses the risk ass...
Question 319: An IS auditors independence with respect to the audit of an ...
Question 320: Which of the following is the PRIMARY advantage of using vir...
Question 321: When auditing the alignment of IT to the business strategy, ...
Question 322: The activation of a pandemic response plan has resulted in a...
Question 323: A small financial institution is preparing to implement a ch...
Question 324: An IS auditor is reviewing documentation of application syst...
Question 325: Which of the following Is the MOST effective way for an IS a...
Question 326: When determining whether a project in the design phase will ...
Question 327: An organization implemented a cybersecurity policy last year...
Question 328: A system development project is experiencing delays due to o...
Question 329: When reviewing past results of a recurring annual audit, an ...
Question 330: In an IT organization where many responsibilities are shared...
Question 331: The use of which of the following would BEST enhance a proce...
Question 332: Which of the following is the PRIMARY reason for an IS audit...
Question 333: Which of the following is a PRIMARY role of an IS auditor in...
Question 334: The IS auditor has recommended that management test a new sy...
Question 335: When evaluating database management practices, which of the ...
Question 336: Which of the following is the MAIN risk associated with addi...
Question 337: An organization decides to establish a formal incident respo...
Question 338: Which of the following findings should be of MOST concern to...
Question 339: Which of the following clauses is MOST important to include ...
Question 340: Which of the following is the BEST way for an IS auditor to ...