<< Prev Question Next Question >>

Question 85/309

Which of the following is the PRIMARY objective of baselining the IT control environment?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (309q)
Question 1: Reconciliations have identified data discrepancies between a...
Question 2: Which of the following are BEST suited for continuous auditi...
Question 3: When conducting a requirements analysis for a project the BE...
Question 4: Due to a global pandemic, a health organization has instruct...
Question 5: Which of the following should an IS auditor validate FIRST w...
Question 6: Which of the following MOST effectively mitigates the risk o...
Question 7: A manager identifies active privileged accounts belonging to...
Question 8: Which of the following is a directive control?...
Question 9: Which of the following should be of GREATEST concern to an I...
Question 10: An IS auditor is planning on utilizing attribute sampling to...
Question 11: Which of the following is the GREATEST risk associated with ...
Question 12: An organization plans to receive an automated data feed into...
Question 13: What is the PRIMARY benefit of prototyping as a method of sy...
Question 14: An IS auditor finds that an organization's data toss prevent...
Question 15: Data analytics Tools are BEST suited for which of the follow...
Question 16: Which of the following controls BEST ensures appropriate seg...
Question 17: Which of the following should be included in a business impa...
Question 18: Which of the following control techniques BEST ensures the i...
Question 19: To create a digital signature in a message using asymmetric ...
Question 20: Within the context of an IT-related governance framework, wh...
Question 21: What is the BEST justification for allocating more funds to ...
Question 22: An IS auditor has completed an audit on the organization's I...
Question 23: To ensure efficient and economic use of limited resources in...
Question 24: An IS auditor is using data analytics in an audit and has ob...
Question 25: An organization is deciding whether to outsource its custome...
Question 26: An IS auditor is evaluating the risk associated with moving ...
Question 27: Which of the following is the PRIMARY purpose of quality ass...
Question 28: When evaluating the recent implementation of an intrusion de...
Question 29: An IS auditor is evaluating a virtual server environment and...
Question 30: During recent post-implementation reviews, an IS auditor has...
Question 31: Which of the following is the MAIN risk associated with addi...
Question 32: Which of the following is MOST important for an IS auditor t...
Question 33: Which of the following should be the PRIMARY objective of a ...
Question 34: During a follow-up audit, an IS auditor finds that some crit...
Question 35: Which of the following is MOST important for an IS auditor t...
Question 36: Which of the following should be defined in an audit chatter...
Question 37: Compared to developing a system in-house, acquiring a softwa...
Question 38: Which of the following is a concern associated with virtuali...
Question 39: Following the sale of a business division, employees will be...
Question 40: An IS auditor will be testing accounts payable controls by p...
Question 41: Which of the following would BEST facilitate the detection o...
Question 42: Which of the following should be the PRIMARY basis for prior...
Question 43: Which of the following would BEST provide executive manageme...
Question 44: Which of the following provides the BEST evidence of the eff...
Question 45: In a situation where the recovery point objective (RPO) is 0...
Question 46: What is the BEST population to select from when testing that...
Question 47: Which of the following would be the MOST effective method to...
Question 48: An effective implementation of security roles and responsibi...
Question 49: Which of the following is MOST likely to result from complia...
Question 50: Which of the following network management toots should an IS...
Question 51: Which of the following would be the MOST significant factor ...
Question 52: Which of the following should be done FIRST to effectively d...
Question 53: During a review of a production schedule, an IS auditor obse...
Question 54: When determining whether a project in the design phase will ...
Question 55: An IS auditor finds the timeliness and depth of information ...
Question 56: Which of the following is MOST important lo have in place fo...
Question 57: An IS auditor intends to accept a management position in the...
Question 58: Which of the following is the BEST incident of an effective ...
Question 59: An IS auditor finds that corporate mobile devices used by em...
Question 60: The information security function in a large organization is...
Question 61: Which of the following BEST demonstrates the degree of align...
Question 62: An organization has recently implemented a Voice-over IP (Vo...
Question 63: Which of the following is the BEST way to mitigate the impac...
Question 64: An organization's security policy mandates that all new empl...
Question 65: An organization processing high volumes of financial transac...
Question 66: An organization is planning to re-purpose workstations mat w...
Question 67: An information systems security officer's PRIMARY responsibi...
Question 68: An organization has agreed to perform remediation related to...
Question 69: Which of the following is the BEST sampling method when perf...
Question 70: Which of the following is the BEST way to mitigate risk to a...
Question 71: Which of the following should occur EARLIEST in a business c...
Question 72: An organization has replaced all of the storage devices at i...
Question 73: A bank recently experienced fraud where unauthorized payment...
Question 74: An IS auditor is reviewing an industrial control system (ICS...
Question 75: An organization's business function wants to capture custome...
Question 76: An employee approaches an IS auditor and expresses concern a...
Question 77: Which of the following is the BEST way to achieve high avail...
Question 78: Which of the following should be an IS auditor's PRIMARY foc...
Question 79: An IS auditor attempts to sample for variables in a populati...
Question 80: An IS auditor performs a follow-up audit and learns the appr...
Question 81: Which of the following is a detective control that can be us...
Question 82: The activation of a pandemic response plan has resulted in a...
Question 83: Which of the following is an IS auditor's BEST recommendatio...
Question 84: An organization's software developers need access to persona...
Question 85: Which of the following is the PRIMARY objective of baselinin...
Question 86: Which of the following is the BEST indication of the complet...
Question 87: To BEST evaluate the effectiveness of a disaster recovery pl...
Question 88: Which of the following is the MOST significant operational r...
Question 89: Which of the following approaches provides the BEST assuranc...
Question 90: A legacy application is running on an operating system that ...
Question 91: Which of the following validation techniques would BEST prev...
Question 92: Which of the following poses the GREATEST security risk when...
Question 93: Which of the following should be of GREATEST concern to an I...
Question 94: After an employee termination, a network account was removed...
Question 95: Which of the following controls is BEST implemented through ...
Question 96: Which of the following is the PRIMARY role of key performanc...
Question 97: When engaging services from external auditors, which of the ...
Question 98: Following a breach, what is the BEST source 10 determine the...
Question 99: Which of the following is a determine security control that ...
Question 100: Secure code reviews as part of a conbnuous deployment progra...
Question 101: An organization wants to change its project methodology to a...
Question 102: Which of the following is a PRIMARY role of an IS auditor in...
Question 103: Which of the following is the BEST way to address ongoing co...
Question 104: A month after a company purchased and implemented system and...
Question 105: The PRIMARY objective of value delivery in reference to IT g...
Question 106: During a security audit, an IS auditor is tasked with review...
Question 107: Which of the following BEST indicates that an organization h...
Question 108: Following a significant merger and acquisition, which of the...
Question 109: An IS auditor is performing a follow-up audit for findings i...
Question 110: Which of the following provides the BEST method for maintain...
Question 111: An organization that has suffered a cyber attack is performi...
Question 112: An IS auditor noted that a change to a critical calculation ...
Question 113: When determining which IS audits to conduct during the upcom...
Question 114: An algorithm in an email program analyzes traffic to quarant...
Question 115: An IS auditor should ensure that an application's audit trai...
Question 116: Which of the following features can be provided only by asym...
Question 117: Which of the following provides an IS auditor the MOST assur...
Question 118: Which of the following observations should be of GREATEST co...
Question 119: Which of the following metrics is MOST useful to an IS audit...
Question 120: Which of the following is the GREATEST security risk associa...
Question 121: Which of the following human resources management practices ...
Question 122: Which of the following group is MOST likely responsible for ...
Question 123: During a routine check, a system administrator identifies un...
Question 124: During which IT project phase is it MOST appropriate to cond...
Question 125: The CIO of an organization is concerned that the information...
Question 126: What is the MAIN purpose of an organization's internal IS au...
Question 127: Management has decided to include a compliance manager in th...
Question 128: IS management has recently disabled certain referential inte...
Question 129: During an audit of an access control system an IS auditor fi...
Question 130: An existing system is being replaced with a new application ...
Question 131: An IS auditor finds that the process for removing access for...
Question 132: Which of the following measures BEST mitigates the risk of e...
Question 133: The PRIMARY reason to follow up on prior-year audit reports ...
Question 134: Which of the following is an objective of data transfer cont...
Question 135: An organization wants to replace its suite of legacy applica...
Question 136: The use of cookies constitutes the MOST significant security...
Question 137: Which of the following is the GREATEST concern when using a ...
Question 138: When aligning IT projects with organizational objectives, it...
Question 139: A new application will require multiple interfaces. Which of...
Question 140: When reviewing backup policies, an IS auditor MUST verify th...
Question 141: Which of the following poses the GREATEST risk to a company ...
Question 142: An IS auditor has assessed a payroll service provider's secu...
Question 143: After an external IS audit, which of the following should be...
Question 144: Which of the following procedures for testing a disaster rec...
Question 145: Which of the following provides the MOST reliable audit evid...
Question 146: Which of the following cloud deployment models would BEST me...
Question 147: Which of the following is the MOST significant risk associat...
Question 148: An IS auditor finds that terminated users have access to fin...
Question 149: A system development project is experiencing delays due to o...
Question 150: An organization is in the process of deciding whether to all...
Question 151: Which of the following BEST demonstrates that IT strategy is...
Question 152: An IS auditor is reviewing the implementation of an internat...
Question 153: An organization maintains an inventory of the IT application...
Question 154: Which of the following is the GREATEST benefit of utilizing ...
Question 155: After the release of an application system, an IS auditor wa...
Question 156: An IS auditor finds the log management system is overwhelmed...
Question 157: Which of the following observations noted during a review of...
Question 158: Which of the following BEST enables an IS auditor to combine...
Question 159: During a business process re-engineering (BPR) program, IT c...
Question 160: An employee has accidentally posted confidential data to the...
Question 161: When evaluating the management practices at a third-party or...
Question 162: A third-party service provider is hosting a private cloud fo...
Question 163: What should be the PRIMARY basis for scheduling a follow-up ...
Question 164: An IS auditor is conducting a post-implementation review of ...
Question 165: Which of the following should be an IS auditor's PRIMARY con...
Question 166: Which of the following development practices would BEST miti...
Question 167: An organization's IT security policy requires annual securit...
Question 168: An IS auditor notes that IT and the business have different ...
Question 169: An IS auditor is following up on prior period items and find...
Question 170: The PRIMARY benefit of using secure shell (SSH) to access a ...
Question 171: Which of the following should an IS auditor expect to find w...
Question 172: The BEST way to prevent fraudulent payments is to implement ...
Question 173: An IS auditof notes the transaction processing times in an o...
Question 174: Which of the following would be the MOST appropriate reason ...
Question 175: A client/server configuration will:...
Question 176: An IS auditor reviewing a purchase accounting system notices...
Question 177: Which of the following is the GREATEST advantage of vulnerab...
Question 178: Which of the following should be the PRIMARY basis for proce...
Question 179: Which of the following is an example of a control that is bo...
Question 180: A user of a telephone banking system has forgotten his perso...
Question 181: A software development organization with offshore personnel ...
Question 182: Which of the following development practices would BEST miti...
Question 183: Which of the following is an example of a corrective control...
Question 184: Which of the following is MOST useful for determining whethe...
Question 185: An organization has begun using social media to communicate ...
Question 186: Which of the following is the MOST effective sampling method...
Question 187: Coding standards provide which of the following?...
Question 188: Which of the following is the BEST source of information for...
Question 189: An IS audit manager has been asked to perform a quality revi...
Question 190: Which of the following should be of GREATEST concern to an I...
Question 191: Which of the following should be defined in an audit charter...
Question 192: Which control type would provide the MOST useful input to a ...
Question 193: An organization with high availability resource requirements...
Question 194: An IS auditor s role in privacy and security is to:...
Question 195: Which of the following is the MOST important determining fac...
Question 196: Which of the following security risks can be reduced by a pr...
Question 197: When is the BEST time to commence continuity planning for a ...
Question 198: When planning an end-user computing (EUC) audit, it is MOST ...
Question 199: What is the PRIMARY reason for conducting a risk assessment ...
Question 200: Which of the following situations would impair the independe...
Question 201: Which of the following is the PRIMARY objective of implement...
Question 202: In the risk assessment process, which of the following shoul...
Question 203: During a disaster recovery audit, an IS auditor finds that a...
Question 204: Which of the following access rights presents the GREATEST r...
Question 205: An organization seeks to control costs related to storage me...
Question 206: Which of the following provides an IS auditor with the BEST ...
Question 207: An IS auditor is assigned to review the development of a spe...
Question 208: Batch processes running in multiple countries are merged to ...
Question 209: What information within change records would provide an IS a...
Question 210: The operations team of an organization has reported an IS se...
Question 211: Several unattended laptops containing sensitive customer dat...
Question 212: A company converted its payroll system from an external serv...
Question 213: Which of the following is MOST important to ensure that elec...
Question 214: Which of the following is the BEST way to mitigate the risk ...
Question 215: An organization recently implemented a cloud document storag...
Question 216: Which of the following would be an IS auditor's GREATEST con...
Question 217: A USB device containing sensitive production data was lost b...
Question 218: During a review, an IS auditor notes that an organization's ...
Question 219: Which of the following is MOST important for an IS auditor t...
Question 220: An IS auditor finds that firewalls are outdated and not supp...
Question 221: During an audit of a data classification policy, an IS audit...
Question 222: Which of the following would an IS auditor consider the GREA...
Question 223: Which of the following would be MOST useful to an IS auditor...
Question 224: Which of the following should be an IS auditor's BEST recomm...
Question 225: During an audit of an organization's financial statements, a...
Question 226: Which type of attack poses the GREATEST risk to an organizat...
Question 227: Which of the following conditions would be of MOST concern t...
Question 228: Which of the following must be in place before an IS auditor...
Question 229: Which of the following is the BEST control to help prevent s...
Question 230: Which of the following would lead an IS auditor to conclude ...
Question 231: The BEST way to determine whether programmers have permissio...
Question 232: Data anonymizabon helps to prevent which types of attacks in...
Question 233: The use of symmetric key encryption controls to protect sens...
Question 234: An organization considers implementing a system that uses a ...
Question 235: Which of the following is MOST helpful in preventing a syste...
Question 236: An IS auditor determines that a business continuity plan has...
Question 237: When conducting a post-implementation review of a new softwa...
Question 238: The PRIMARY benefit of information asset classification is t...
Question 239: At what point in software development should the user accept...
Question 240: A financial institution suspects that a manager has been cre...
Question 241: A new regulation in one country of a global organization has...
Question 242: During data migration, which of the following BEST prevents ...
Question 243: Which of the following observations should be of GREATEST co...
Question 244: An IS auditor is performing a follow-up audit for findings i...
Question 245: Which of the following MUST be completed before selecting an...
Question 246: The MOST important reason why an IT risk assessment should b...
Question 247: Malicious program code was found in an application and corre...
Question 248: An e-commerce enterprise's disaster recovery (DR) site has 3...
Question 249: An organization has recently converted its infrastructure to...
Question 250: During a review of IT service desk practices, an IS auditor ...
Question 251: A financial institution has a system interface that is used ...
Question 252: Which of the following indicates that an internal audit orga...
Question 253: An IT governance body wants to determine whether IT service ...
Question 254: An accounts receivable data entry routine prevents the entry...
Question 255: Using swipe cards to limit employee access to restricted are...
Question 256: Which of the following should be of GREATEST concern to an I...
Question 257: In a database management system (DBMS) normalization is used...
Question 258: An IS auditor observes that exceptions have been approved (o...
Question 259: In planning a major system development project, function poi...
Question 260: The PRIMARY reason an IS department should analyze past inci...
Question 261: An organization experienced a domain name system (DNS) attac...
Question 262: An organization is migrating its human resources (HR) applic...
Question 263: Which of the following features of a library control softwar...
Question 264: A financial institution is launching a mobile banking servic...
Question 265: servDuring an internal audit review of a human resources (HR...
Question 266: What would be of GREATEST concern to an IS auditor observing...
Question 267: Which of the following would MOST likely impair the independ...
Question 268: Which of the following is a preventive control related to ch...
Question 269: Which of the following is the MOST important consideration f...
Question 270: Which of the following provides for the GREATEST cost reduct...
Question 271: An IS auditor learns a server administration team regularly ...
Question 272: An IS auditor evaluating a three-tier client/server architec...
Question 273: Which of the following communication modes should be of GREA...
Question 274: Which of the following is the BEST source of information for...
Question 275: Which of the following is the MOST important consideration w...
Question 276: To develop meaningful recommendations for findings, which of...
Question 277: Which of the following is the GREATEST concern when an organ...
Question 278: An IS auditor performing an application development review a...
Question 279: To address issues related to privileged users identified in ...
Question 280: Which of the following is the MOST important difference betw...
Question 281: Which of the following BEST enables alignment of IT with bus...
Question 282: Which of the following is MOST effective in detecting an int...
Question 283: Due to a high volume of customer orders, an organization pla...
Question 284: During the implementation of an upgraded enterprise resource...
Question 285: Internal audit is conducting an audit of customer transactio...
Question 286: Which of the following BEST enables an IS auditor to detect ...
Question 287: Which type of control is being implemented when a biometric ...
Question 288: The GREATEST benefit of using a prototyping approach in soft...
Question 289: During an audit, the client learns that the IS auditor has r...
Question 290: Which of the following analytical methods would be MOST usef...
Question 291: Which of the following would BEST enable an organization to ...
Question 292: Which of the following practices BEST ensures that archived ...
Question 293: Which of the following is the MAIN benefit of using data ana...
Question 294: Which of the following should be of GREATEST concern to an I...
Question 295: An IS auditor identifies key controls that have been overrid...
Question 296: The PRIMARY reason for an IS auditor to use data analytics t...
Question 297: An IS auditor has found that an organization is unable to ad...
Question 298: Which of the following provides the MOST useful information ...
Question 299: The members of an emergency incident response team should be...
Question 300: During a post-implementation review, an IS auditor learns th...
Question 301: Which of the following is the MOST effective control to ensu...
Question 302: An IS auditor performing an audit of backup procedures obser...
Question 303: What is the MOST critical finding when reviewing an organiza...
Question 304: What is the MOST difficult aspect of access control in a mul...
Question 305: Which of the following BEST facilitates detection of zero-da...
Question 306: Which of the following fire suppression systems needs to be ...
Question 307: The performance, risks, and capabilities of an IT infrastruc...
Question 308: A warehouse employee of a retail company has been able to co...
Question 309: Which of the following is the MAIN purpose of an information...