<< Prev Question Next Question >>

Question 266/320

Which of the following practices BEST ensures that archived electronic information of permanent importance is accessible over time?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (320q)
Question 1: Which of the following is the BEST way to achieve high avail...
Question 2: An organization is planning to re-purpose workstations mat w...
Question 3: Which of the following should be the PRIMARY consideration f...
Question 4: Which of the following poses the GREATEST security risk when...
Question 5: What is the BEST way (or an IS auditor to assess the adequac...
Question 6: An IS auditor is reviewing a network diagram. Which of the f...
Question 7: Which of the following should be of GREATEST concern to an I...
Question 8: Which of the following is the MOST effective sampling method...
Question 9: The use of control totals reduces the risk of...
Question 10: An IS auditor is reviewing a data conversion project Which o...
Question 11: Which of the following BEST enables an organization to quant...
Question 12: Which of the following is the GREATEST risk associated with ...
Question 13: During an ongoing audit management requests a briefing on th...
Question 14: Which of the following is the GREATEST benefit of implementi...
Question 15: While conducting a review of project plans related to a new ...
Question 16: Which of the following are examples of detective controls?...
Question 17: An organization plans to implement a virtualization strategy...
Question 18: In a high-volume, real-time system, the MOST effective techn...
Question 19: Which of the following types of testing would BEST mitigate ...
Question 20: Which of the following should be of concern to an IS auditor...
Question 21: Which of the following is necessary for effective risk manag...
Question 22: Which of the following is the client organization's responsi...
Question 23: An IS auditor finds that one employee has unauthorized acces...
Question 24: An IS auditor is reviewing an industrial control system (ICS...
Question 25: Which of the following is the MOST important process to ensu...
Question 26: Which of the following reports would provide the GREATEST as...
Question 27: What is the BEST way to control updates to the vendor master...
Question 28: During the planning stage of a compliance audit an IS audito...
Question 29: internal IS auditor recommends that incoming accounts payabl...
Question 30: An IS auditor has been asked to perform a post-Implementatio...
Question 31: Which of the following is the PRIMARY reason an IS auditor s...
Question 32: The PRIMARY benefit of information asset classification is t...
Question 33: Malicious program code was found in an application and corre...
Question 34: A PRIMARY benefit derived by an organization employing contr...
Question 35: Which of the following is the PRIMARY reason for an organiza...
Question 36: An organization plans to launch a social media presence as p...
Question 37: Which of the following is a preventive control related to ch...
Question 38: Which of the following is the BEST way to loster continuous ...
Question 39: Which of the following is the MOST important factor when an ...
Question 40: Which of the following is the GREATEST risk associated with ...
Question 41: An IS auditor is planning on utilizing attribute sampling to...
Question 42: Which of the following should be of GREATEST concern for an ...
Question 43: Which of the following is a determine security control that ...
Question 44: A sales representative is reviewing the organization's feedb...
Question 45: An IS auditor finds that an organization's data toss prevent...
Question 46: An IS auditor is asked to provide feedback on the systems op...
Question 47: Which of the following BEST helps to identify errors during ...
Question 48: An IS auditor has obtained a large complex data set for anal...
Question 49: When auditing the closing stages of a system development pro...
Question 50: A senior auditor is reviewing work papers prepared by a juni...
Question 51: An organization that has suffered a cyber attack is performi...
Question 52: Which of the following BEST describes the relationship betwe...
Question 53: Which of the following is the GREATEST risk associated with ...
Question 54: Which of the following provides an IS auditor with the BEST ...
Question 55: Which of the following is MOST important for an IS auditor t...
Question 56: A help desk has been contacted regarding a lost business mob...
Question 57: A banking organization has outsourced its customer data proc...
Question 58: Which of the following are BEST suited for continuous auditi...
Question 59: An IS auditor learns a server administration team regularly ...
Question 60: Which of the following security testing techniques is MOST e...
Question 61: Which of the following is the BEST way to mitigate risk to a...
Question 62: Capacity management enables organizations to:...
Question 63: Which of the following provides the MOST assurance that new ...
Question 64: A financial institution has a system interface that is used ...
Question 65: The BEST way to determine whether programmers have permissio...
Question 66: Which of the following is the BEST development methodology t...
Question 67: Which of the following MOST effectively mitigates the risk o...
Question 68: Which of the following is the PRIMARY reason an IS auditor s...
Question 69: A bank is relocating its servers to a vendor that provides d...
Question 70: An IS audit manager is preparing the starling plan for an au...
Question 71: Which of the following is the MOST likely cause of a success...
Question 72: During an audit of identity and access management, an IS aud...
Question 73: Which of the following is MOST important for an IS auditor t...
Question 74: An organization is using a single account shared by personne...
Question 75: What is the BEST control to address SQL injection vulnerabil...
Question 76: Secure code reviews as part of a conbnuous deployment progra...
Question 77: Which of the following is a preventive control that can be u...
Question 78: An IS auditor is reviewing the installation of a new server....
Question 79: As part of business continuity planning, which of the follow...
Question 80: Due to budget restraints, an organization is postponing the ...
Question 81: Which of the following should be reviewed FIRST when assessi...
Question 82: An organization seeks to control costs related to storage me...
Question 83: During a review of a production schedule, an IS auditor obse...
Question 84: Which of the following is MOST critical for the effective im...
Question 85: Which of the following metrics is MOST useful to an IS audit...
Question 86: Which of the following should be a concern to an IS auditor ...
Question 87: Which of the following should be the PRIMARY basis for prior...
Question 88: Using swipe cards to limit employee access to restricted are...
1 commentQuestion 89: Which of the following is the BEST indication of the complet...
Question 90: An IS auditor is a member of an application development team...
Question 91: An organization has recently implemented a Voice-over IP (Vo...
Question 92: An organization's strategy to source certain IT functions fr...
Question 93: Which of the following would provide the BEST evidence for u...
Question 94: Batch processes running in multiple countries are merged to ...
Question 95: When evaluating information security governance within an or...
Question 96: An organization decides to establish a formal incident respo...
Question 97: Which of the following should be included in emergency chang...
Question 98: Which of the following provides the MOST comprehensive under...
Question 99: An IS auditor plans to review all access attempts to a video...
Question 100: Which of the following would be the BEST indicator of the ef...
Question 101: Which of the following is the MOST significant risk associat...
Question 102: Which of the following implementation strategies for new app...
Question 103: Which of the following is the PRIMARY benefit of continuous ...
Question 104: When determining which IS audits to conduct during the upcom...
Question 105: A month after a company purchased and implemented system and...
Question 106: Which of the following is the MAIN purpose of an information...
Question 107: A third-party service provider is hosting a private cloud fo...
Question 108: An online retailer is receiving customer complaints about re...
Question 109: Which of the following is the BEST way to mitigate the impac...
Question 110: When a firewall is subjected to a probing attack, the MOST a...
Question 111: When reviewing an organization's IT governance processes, wh...
Question 112: In an environment that automatically reports all program cha...
Question 113: An IS auditor finds that application servers had inconsisten...
Question 114: Which of the following is the GREATEST advantage of applicat...
Question 115: Which of the following should be done FIRST when developing ...
Question 116: The use of cookies constitutes the MOST significant security...
Question 117: Which of the following findings should be of MOST concern to...
Question 118: When an IS auditor evaluates key performance indicators (KPl...
Question 119: Which of the following would be of MOST concern during an au...
Question 120: Which of the following is a detective control that can be us...
Question 121: An IS auditor is observing transaction processing and notes ...
Question 122: Which of the following is an example of a control that is bo...
Question 123: To help determine whether a controls-reliant approach to aud...
Question 124: A manufacturing company is implementing application software...
Question 125: An organization has agreed to perform remediation related to...
Question 126: Which of the following is the BEST way to detect system secu...
Question 127: In the case of a disaster where the data center is no longer...
Question 128: Which of the following is the BEST way to determine il IT is...
Question 129: Which of the following is MOST influential when defining dis...
Question 130: What is the BEST population to select from when testing that...
Question 131: A bank has implemented a new accounting system. Which of the...
Question 132: Which of the following findings should be of GREATEST concer...
Question 133: When implementing a new IT maturity model which of the follo...
Question 134: Which of the following documents would be MOST useful in det...
Question 135: Of the following, who should approve a release to a critical...
Question 136: Which of the following is the MOST effective way to identify...
Question 137: An organization has installed blade server technology in its...
Question 138: Which of the following should be the PRIMARY objective of a ...
Question 139: An IS auditor attempts to sample for variables in a populati...
Question 140: During a review of an application system, an IS auditor iden...
Question 141: Which of the following control techniques BEST ensures the i...
Question 142: Which of the following development practices would BEST miti...
Question 143: Which of the following is MOST important for an IS auditor t...
Question 144: Which of the following is MOST helpful for an IS auditor to ...
Question 145: An organization performs both full and incremental database ...
Question 146: The PRIMARY role of a control self-assessment (CSA) facilita...
Question 147: Which of the following conditions would be of MOST concern t...
Question 148: Which of the following is MOST important when implementing a...
Question 149: Which of the following validation techniques would BEST prev...
Question 150: Which of the following is MOST important for an IS auditor t...
Question 151: An IS auditor finds that the process for removing access for...
Question 152: Which of the following is the PRIMARY reason for an IS audit...
Question 153: Which of the following approaches would BEST ensure that dat...
Question 154: When reviewing backup policies, an IS auditor MUST verify th...
Question 155: The decision to accept an IT control risk related to data qu...
Question 156: During business process reengineering (BPR) of a bank's tell...
Question 157: An IS auditor is following up on prior period items and find...
Question 158: An organization plans to receive an automated data feed into...
Question 159: Which of the following applications has the MOST inherent ri...
Question 160: The GREATEST risk of database denormalization is:...
Question 161: Which of the following is MOST likely to be included in comp...
Question 162: Which of the following is the MOST effective control against...
Question 163: An IS auditor performing a review of a newly purchased softw...
Question 164: An organization is shifting to a remote workforce. In prepar...
Question 165: An accounts receivable data entry routine prevents the entry...
Question 166: An organization with high availability resource requirements...
Question 167: What should be the PRIMARY basis for scheduling a follow-up ...
Question 168: An organization has established hiring policies and procedur...
Question 169: Which of the following is a corrective control that reduces ...
Question 170: A CIO has asked an IS auditor to implement several security ...
Question 171: Data analytics tools and techniques are MOST helpful to an I...
Question 172: An auditor is creating an audit program in which the objecti...
Question 173: An IS auditor reviewing the database controls for a new e-co...
Question 174: Which of the following is a characteristic of a single mirro...
Question 175: Which of the following development practices would BEST miti...
Question 176: An IS auditor is reviewing database log settings and notices...
Question 177: An IS auditor reviewed the business case for a proposed inve...
Question 178: Which of the following should be an IS auditor's PRIMARY foc...
Question 179: An IS auditor is using data analytics in an audit and has ob...
Question 180: Which of the following is the PRIMARY advantage of using vir...
Question 181: On a public-key cryptosystem when there is no previous knowl...
Question 182: Which of the following represents a potential single point o...
Question 183: Which of the following is the BEST way to mitigate the risk ...
Question 184: Which of the following establishes the role of the internal ...
Question 185: The PRIMARY reason an IS department should analyze past inci...
Question 186: Which of the following is MOST important for an IS auditor t...
Question 187: Which of the following would be an IS auditor's GREATEST con...
Question 188: Which of the following is an IS auditor's BEST recommendatio...
Question 189: A legacy application is running on an operating system that ...
Question 190: An IS auditor reviewing the use of encryption finds that the...
Question 191: In an environment where most IT services have been outsource...
Question 192: An organization maintains an inventory of the IT application...
Question 193: Which of the following would be the MOST significant factor ...
Question 194: Which of the following is the BEST indicator of the effectiv...
Question 195: A project team evaluated vendor responses to a request for p...
Question 196: Which of the following would be the GREATEST risk associated...
Question 197: A USB device containing sensitive production data was lost b...
Question 198: During a systems development project, participation in which...
Question 199: The PRIMARY objective of IT service level management is to....
Question 200: A financial institution suspects that a manager has been cre...
Question 201: Which of the following should be of GREATEST concern to an I...
Question 202: What would be of GREATEST concern to an IS auditor observing...
Question 203: An organization recently decided to send the backup of its c...
Question 204: When removing a financial application system from production...
Question 205: Which of the following is MOST important to ensure when revi...
Question 206: Which of the following is the GREATEST concern associated wi...
Question 207: An IS auditor learns the organization has experienced severa...
Question 208: What would be an IS auditor's BEST recommendation upon findi...
Question 209: An IS auditor evaluating a three-tier client/server architec...
Question 210: A healthcare facility offers patients health tracking device...
Question 211: Which of the following must be in place before an IS auditor...
Question 212: An organization is within a jurisdiction where new regulatio...
Question 213: Which of the following is MOST important for an effective co...
Question 214: In a typical system development life cycle (SDLC), which gro...
Question 215: An IS auditor discovers a box of hard drives in a secured lo...
Question 216: Which of the following human resources management practices ...
Question 217: An IS auditor is assigned to review the IS departments quali...
Question 218: An organization recently implemented a cloud document storag...
Question 219: Which of the following is the MAIN purpose of data classific...
Question 220: An IS auditor is reviewing a banking mobile application that...
Question 221: Which of the following is the BEST incident of an effective ...
Question 222: Which of the following is MOST appropriate for measuring a b...
Question 223: Prior to the of acquired software into production, it is MOS...
Question 224: Which of the following is the MOST effective control for pro...
Question 225: Which of the following is the GREATEST security risk associa...
Question 226: Which of the following is the MOST effective control to miti...
Question 227: An IS auditor is assessing the results of an organization's ...
Question 228: During a review of operations, it is noted that during a bat...
Question 229: An organization is acquiring a new customer relationship man...
Question 230: The PRIMARY advantage of object-oriented technology is enhan...
Question 231: Which of the following is MOST important for an IS auditor t...
Question 232: Which of the following is MOST important to ensure that elec...
Question 233: An IS auditor wants to understand the collective effect of t...
Question 234: Which of the following should be defined in an audit chatter...
Question 235: When auditing the alignment of IT to the business strategy, ...
Question 236: Reviewing project plans and status reports throughout the de...
Question 237: Which of the following is the MOST likely reason an organiza...
Question 238: Which of the following should an IS auditor be MOST concerne...
Question 239: During an IT operations audit multiple unencrypted backup ta...
Question 240: An organization processing high volumes of financial transac...
Question 241: Which of the following metrics would be MOST useful to an IS...
Question 242: The results of an IS audit indicating the need to strengthen...
Question 243: To BEST evaluate the effectiveness of a disaster recovery pl...
Question 244: Which of the following fire suppression systems needs to be ...
Question 245: Which of the following processes BEST addresses the risk ass...
Question 246: An organization has begun using social media to communicate ...
Question 247: Which of the following falls within the scope of an informat...
Question 248: In a database management system (DBMS) normalization is used...
Question 249: Which of the following is the PRIMARY benefit of performing ...
Question 250: Which of the following strategies BEST optimizes data storag...
Question 251: Which of the following is MOST critical to include when deve...
Question 252: When an organization introduces virtualization into its arch...
Question 253: Which of the following would BEST indicate the effectiveness...
Question 254: Which of the following is the BEST source of information for...
Question 255: An IS auditor has discovered that unauthorized customer mana...
Question 256: Which of the following is a corrective control?...
Question 257: Which of the following is the MOST effective way to maintain...
Question 258: A new regulation in one country of a global organization has...
Question 259: Which of the following would be MOST important to update onc...
Question 260: A user of a telephone banking system has forgotten his perso...
Question 261: Which of the following is the MOST important difference betw...
Question 262: Which of the following is an example of a corrective control...
Question 263: Which of the following would BEST detect unauthorized modifi...
Question 264: Which of the following provides the BEST method for maintain...
Question 265: To create a digital signature in a message using asymmetric ...
Question 266: Which of the following practices BEST ensures that archived ...
Question 267: As part of a recent business-critical initiative, an organiz...
Question 268: Which of the following is the BEST compensating control when...
Question 269: Which of the following would be of GREATEST concern to an IS...
Question 270: Following an IS audit, which of the following types of risk ...
Question 271: When is the BEST time to commence continuity planning for a ...
Question 272: An IS auditor notes that application super-user activity was...
Question 273: Which of the following is MOST important to ensure during co...
Question 274: Which of the following is MOST important to verify when impl...
Question 275: Data analytics Tools are BEST suited for which of the follow...
Question 276: Which of the following security assessment techniques attemp...
Question 277: An IS auditor concludes that an organization has a quality s...
Question 278: What information within change records would provide an IS a...
Question 279: A large insurance company is about to replace a major financ...
Question 280: An IS auditor is evaluating a virtual server environment and...
Question 281: When aligning IT projects with organizational objectives, it...
Question 282: Which of the following BEST demonstrates the degree of align...
Question 283: Which of the following should an IS auditor review FIRST whe...
Question 284: Which of the following metrics would BEST measure the agilit...
Question 285: An organization offers an online information security awaren...
Question 286: Which of the following should an IS auditor do FIRST when as...
1 commentQuestion 287: An existing system is being replaced with a new application ...
Question 288: A database audit reveals an issue with the way data ownershi...
Question 289: An IS auditor is evaluating a virtual server environment and...
Question 290: Which of the following is the MAIN benefit of using data ana...
Question 291: After the release of an application system, an IS auditor wa...
Question 292: An IS auditor s role in privacy and security is to:...
Question 293: The IS quality assurance (OA) group is responsible for...
Question 294: An organization's business function wants to capture custome...
Question 295: An IS auditor previously worked in an organization s IT depa...
Question 296: Which of the following is the FIRST step in initiating a dat...
Question 297: Which of the following is MOST important to review when eval...
Question 298: Within the context of an IT-related governance framework, wh...
Question 299: An IS auditor has been asked to assess the security of a rec...
Question 300: An IS auditor conducting a follow-up audit learns that previ...
Question 301: An IS auditor is reviewing the implementation of an internat...
Question 302: Which of the following is MOST likely to enable a hacker to ...
Question 303: In a typical network architecture used for e-commerce a load...
Question 304: An IS auditor assessing the controls within a newly implemen...
Question 305: The purpose of data migration testing is to validate data:...
Question 306: Following the discovery of inaccuracies in a data warehouse,...
Question 307: During which phase of the incident management life cycle sho...
Question 308: When reviewing an organization's information security polici...
Question 309: An IS audit reveals an organization's IT department reports ...
Question 310: An IS auditor finds that periodic reviews of read-only users...
Question 311: An organization's enterprise architecture (EA) department de...
Question 312: An organization is in the process of deciding whether to all...
Question 313: Which of the following provides the MOST assurance over the ...
Question 314: Which of the following would be an IS auditor's GREATEST con...
Question 315: Which of the following should be an IS auditor's GREATEST co...
Question 316: During an incident management audit, an IS auditor finds tha...
Question 317: A small financial institution is preparing to implement a ch...
Question 318: Which of the following is the PRIMARY purpose of using data ...
Question 319: A company uses a standard form to document and approve all c...
Question 320: Which of the following is the BEST control to prevent the tr...