<< Prev Question Next Question >>

Question 134/144

The PRIMARY objective of IT service level management is to.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (144q)
Question 1: An organization developed a comprehensive three-year IT stra...
Question 2: An IS auditor is planning an audit of an organization's acco...
Question 3: Which of the following would be the GREATEST risk associated...
Question 4: Which of the following should be the PRIMARY objective of co...
Question 5: Which of the following is MOST important for an IS auditor t...
Question 6: Which of the following establishes the role of the internal ...
Question 7: A checksum following is MOST important for an IS auditor to ...
Question 8: Which of the following should be an IS auditor's PRIMARY foc...
Question 9: Which of the following cloud deployment models would BEST me...
Question 10: Which of the following should be the PRIMARY basis for prior...
Question 11: Which of the following should be of GREATEST concern to an I...
Question 12: Which of the following is MOST important for an organization...
Question 13: When responding to an ongoing denial of service (DoS) attack...
Question 14: An IS department is evaluated monthly on its cost-revenue ra...
Question 15: Many departments of an organization have not implemented awa...
Question 16: An IS auditor is evaluating the security of an organization'...
Question 17: Which of the following is MOST critical for the effective im...
Question 18: Of the following, who are the MOST appropriate staff for ens...
Question 19: Which of the following is a corrective control?...
Question 20: A USB device containing sensitive production data was lost b...
Question 21: An organization has adopted a backup and recovery strategy t...
Question 22: Which of the following would be of GREATEST concern to an IS...
Question 23: After the merger of two organizations, which of the followin...
Question 24: Which of the following is the PRIMARY concern when negotiati...
Question 25: Internal audit is conducting an audit of customer transactio...
Question 26: What is the PRIMARY reason for conducting a risk assessment ...
Question 27: A bank's web-hosting provider has just completed an internal...
Question 28: Which of the following procedures for testing a disaster rec...
Question 29: An IS auditor is reviewing an organization's information ass...
Question 30: An organization implemented a cybersecurity policy last year...
Question 31: Which of the following provides the BEST evidence of the eff...
Question 32: Which of the following findings should be of GREATEST concer...
Question 33: Which of the following would BEST demonstrate that an effect...
Question 34: An IS auditor is evaluating an organization's IT strategy an...
Question 35: During an audit of a financial application, it was determine...
Question 36: Which of the following metrics would be MOST useful to an IS...
Question 37: Which of the following areas of responsibility would cause t...
Question 38: Following a recent internal data breach, an IS auditor was a...
Question 39: Which of the following is the PRIMARY reason for using a dig...
Question 40: An organization's software developers need access to persona...
Question 41: Which of the following is the BEST control to prevent the tr...
Question 42: Which of the following Is the MOST important consideration w...
Question 43: External experts were used on a recent IT audit engagement. ...
Question 44: An external IS auditor has been engaged to determine the org...
Question 45: Which of the following is MOST helpful in preventing a syste...
Question 46: Which of the following would be MOST time and cost efficient...
Question 47: An IS auditor is conducting a post-implementation review of ...
Question 48: A business unit cannot achieve desired segregation of duties...
Question 49: Which of the following controls would BEST ensure that payro...
Question 50: The members of an emergency modem response team should be:...
1 commentQuestion 51: Which of the following is an IS auditor's BEST recommendatio...
Question 52: Which of the following is the BEST way for an IS auditor to ...
Question 53: Due to a high volume of customer orders, an organization pla...
Question 54: What is the PRIMARY reason to adopt a risk-based IS audit st...
Question 55: Which of the following is the MOST important determining fac...
Question 56: Which of the following is the BEST indicator of the effectiv...
Question 57: A data analytics team has developed a process automation bot...
Question 58: Which of the following should be of GREATEST concern to an I...
Question 59: Which of the following is MOST important when implementing a...
Question 60: An organization is disposing of a system containing sensitiv...
Question 61: During an operational audit of a biometric system used to co...
Question 62: An organization's information security department has recent...
Question 63: An IS auditor reviewing the database controls for a new e-co...
Question 64: Which of the following would be of GREATEST concern if noted...
Question 65: An organization has outsourced its data processing function ...
Question 66: Which of the following should be of GREATEST concern to an I...
Question 67: Which of the following is the BEST control to help prevent s...
Question 68: Which of the following would be the MOST useful metric for m...
Question 69: Which of the following is the BEST compensating control when...
Question 70: What is the BEST method for securing credit card numbers sto...
Question 71: Which of the following is the GREATEST risk associated with ...
Question 72: An IS auditor discovers that due to resource constraints, a ...
Question 73: Which of the following should be done FIRST when planning a ...
Question 74: Which of the following is the GREATEST security risk associa...
Question 75: Which of the following strategies BEST optimizes data storag...
Question 76: Which of the following is MOST important for an IS auditor t...
Question 77: An IS auditor performing a review of a newly purchased softw...
Question 78: Which of the following is MOST important to ensure when plan...
Question 79: When reviewing tin organization's information security polic...
Question 80: Which of the following observations noted during a review of...
Question 81: During an ongoing audit, management requests a briefing on t...
Question 82: Which of the following Is a challenge in developing a servic...
Question 83: An organization is developing data classification standards ...
Question 84: Which of the following should be an IS auditor's GREATEST co...
Question 85: An IS auditor is reviewing security controls related to coll...
Question 86: As part of a recent business-critical initiative, an organiz...
Question 87: When developing a business continuity plan (BCP), which of t...
Question 88: An IS audit of notes the transaction processing times in an ...
Question 89: A company converted its payroll system from an external serv...
Question 90: During which phase of a system development project should ke...
Question 91: As part of an audit response, an auditee has concerns with t...
Question 92: Using swipe cards to limit employee access to restricted are...
Question 93: Which of the following would MOST likely impair the independ...
Question 94: Which of the following is the MOST important issue for an IS...
Question 95: When implementing a new IT maturity model which of the follo...
Question 96: Which of the following applications has the MOST inherent ri...
Question 97: Which of the following is the BEST way to ensure that busine...
Question 98: During a disaster recovery audit, an IS auditor finds that a...
Question 99: Which of the following is the PRIMARY purpose for external a...
Question 100: Which of the following are BEST suited for continuous auditi...
Question 101: During a post-implementation review, an IS auditor learns th...
Question 102: An emergency power-off switch should:...
Question 103: When Is the BEST time to commence continuity planning for a ...
Question 104: An IS auditor is examining a front-end sub ledger and a main...
Question 105: Which of the following is the BEST data integrity check?...
Question 106: Which of the following fire suppression systems needs to be ...
Question 107: Which of the following metrics would BEST measure the agilit...
Question 108: The use of which of the following would BEST enhance a proce...
Question 109: An IS auditor finds that one employee has unauthorized acces...
Question 110: Which of the following is the BEST source of information for...
Question 111: The implementation of an IT governance framework requires th...
Question 112: When evaluating the ability of a disaster recovery plan (DRP...
Question 113: In which phase of penetration testing would host detection a...
Question 114: Which of the following governance functions is responsible f...
Question 115: The application systems quality assurance (QA) function shou...
Question 116: Which of the following should be defined in an audit charter...
Question 117: An IS auditor is evaluating the risk associated with moving ...
Question 118: An IS auditor plans to review all access attempts to a video...
Question 119: In a 24/7 processing environment, a database contains severa...
Question 120: Which of the following should be the FIRST step when plannin...
Question 121: Code changes are compiled and placed in a change folder by t...
Question 122: Which of the following is the MOST likely reason an organiza...
Question 123: Which of the following BEST enables an organization to quant...
Question 124: A new privacy regulation requires a customer's privacy infor...
Question 125: An IS auditor is observing transaction processing and notes ...
Question 126: An organization considers implementing a system that uses a ...
Question 127: Which of the following is a characteristic of a single mirro...
Question 128: When reviewing past results of a recurring annual audit, an ...
Question 129: What would be of GREATEST concern to an IS auditor reviewing...
Question 130: The PRIMARY advantage of object-oriented technology is enhan...
Question 131: An organization recently decided to send the backup of its c...
Question 132: During an incident management audit, an IS auditor finds tha...
Question 133: Data anonymization helps to prevent which types of attacks i...
Question 134: The PRIMARY objective of IT service level management is to....
Question 135: An IS auditor is reviewing a sample of production incidents ...
Question 136: Several unattended laptops containing sensitive customer dat...
Question 137: In an IT organization where many responsibilities are shared...
Question 138: As part of business continuity planning, which of the follow...
Question 139: Which of the following approaches provides the BEST assuranc...
Question 140: An organization allows employees to retain confidential data...
Question 141: Which of the following is the BEST method to maintain an aud...
Question 142: Which of the following is MOST important for an IS auditor t...
Question 143: Which of the following is the MOST important prerequisite fo...
Question 144: Which of the following is the MOST effective way to maintain...