<< Prev Question Next Question >>

Question 197/214

Which of the following poses the GREATEST risk to a company that allows employees to use personally owned devices to access customer files on the company's network?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (214q)
Question 1: Which of the following should be of concern to an IS auditor...
Question 2: When evaluating database management practices, which of the ...
Question 3: The PRIMARY objective of IT service level management is to....
Question 4: Which of the following is the PRIMARY purpose of quality ass...
Question 5: The recovery time objective (RTO) is normally determined on ...
Question 6: During a privileged access review, an IS auditor observes ma...
Question 7: An IS auditor will be testing accounts payable controls by p...
Question 8: Which of the following is the GREATEST concern when an organ...
Question 9: Which of the following is the role of audit leadership in en...
Question 10: A company is using a software developer for a project. At wh...
Question 11: The BEST method an organization can employ to align its busi...
Question 12: An organization plans to eliminate pilot releases and instea...
Question 13: In an organization that has a staff-rotation policy, the MOS...
Question 14: Which of the following is MOST likely to be detected by an I...
Question 15: Which of the following is the BEST way for an IS auditor to ...
Question 16: Which of the following is MOST critical to include when deve...
Question 17: Which of the following would BEST manage the risk of changes...
Question 18: A project team evaluated vendor responses to a request for p...
Question 19: What is the MOST important business concern when an organiza...
Question 20: An organization is within a jurisdiction where new regulatio...
Question 21: Which of the following controls will BEST ensure that the bo...
Question 22: Which of the following is the PRIMARY objective of implement...
Question 23: Which of the following group is MOST likely responsible for ...
Question 24: What is the BEST control to address SQL injection vulnerabil...
Question 25: Which of the following should be the FIRST step in an organi...
Question 26: An IS auditor is reviewing the change management process in ...
Question 27: Which of the following should be an IS auditor's GREATEST co...
Question 28: Which of the following is an IS auditor s GREATEST concern w...
Question 29: Which of the following should an IS auditor recommend to red...
Question 30: Which of the following should be a concern to an IS auditor ...
Question 31: An emergency power-off switch should:...
Question 32: When engaging services from external auditors, which of the ...
Question 33: Which of the following provides the BEST evidence of the eff...
Question 34: After the release of an application system, an IS auditor wa...
Question 35: Which of the following an IS auditor assurance that the inte...
Question 36: Which of the following observations should be of GREATEST co...
Question 37: Which of the following is a directive control?...
1 commentQuestion 38: An IS auditor is planning on utilizing attribute sampling to...
Question 39: Which of the following provides an IS auditor the MOST assur...
Question 40: Which of the following would be a result of utilizing a top-...
Question 41: In planning a major system development project, function poi...
Question 42: Which of the following will BEST help to ensure that an in-h...
Question 43: A senior auditor is reviewing work papers prepared by a juni...
Question 44: Management has decided to include a compliance manager in th...
Question 45: When an IS auditor evaluates key performance indicators (KPl...
Question 46: An IS auditor finds that firewalls are outdated and not supp...
Question 47: An IS auditor reviewing the use of encryption finds that the...
Question 48: Which of the following is the BEST development methodology t...
Question 49: An IS audit manager finds that data manipulation logic devel...
Question 50: A legacy application is running on an operating system that ...
Question 51: Which of the following should be the PRIMARY objective of a ...
Question 52: Which of the following is the PRIMARY reason for using a dig...
Question 53: An IS auditor is planning to audit an organization's infrast...
Question 54: During a disaster recovery audit, an IS auditor finds that a...
Question 55: An organization's security policy mandates that all new empl...
Question 56: When developing metrics to measure the contribution of IT to...
Question 57: Which of the following BEST minimizes performance degradatio...
Question 58: Which of the following would be MOST important to update onc...
Question 59: Which of the following should an IS auditor expect to find w...
Question 60: The PRIMARY reason to follow up on prior-year audit reports ...
Question 61: An IS auditor has been asked to assess the security of a rec...
Question 62: Which of the following is the BEST indicator of the effectiv...
Question 63: Which of the following would be the MOST significant factor ...
Question 64: An IS auditor previously worked in an organization s IT depa...
Question 65: Which type of control is being implemented when a biometric ...
Question 66: When determining which IS audits to conduct during the upcom...
Question 67: Which of the following is a PRIMARY role of an IT steering c...
Question 68: At what point in software development should the user accept...
Question 69: Which of the following is the MOST important reason to use s...
Question 70: The application systems quality assurance (QA) function shou...
Question 71: Which of the following is MOST likely to be included in comp...
Question 72: Which of the following control techniques BEST ensures the i...
Question 73: What is the purpose of a hypervisor?...
Question 74: Post-implementation testing is an example of which of the fo...
Question 75: An existing system is being replaced with a new application ...
Question 76: Within the context of an IT-related governance framework, wh...
Question 77: An IS auditor is examining a front-end sub ledger and a main...
Question 78: The practice of periodic secure code reviews is which type o...
Question 79: A month after a company purchased and implemented system and...
Question 80: Which of the following is the MOST important operational asp...
Question 81: Which of the following would an IS auditor recommend as the ...
Question 82: An organization decides to establish a formal incident respo...
Question 83: In a situation where the recovery point objective (RPO) is 0...
Question 84: An organization is deciding whether to outsource its custome...
Question 85: To develop a robust data security program, the FIRST course ...
Question 86: Which of the following provides an IS auditor with the BEST ...
Question 87: Which of the following is the BEST incident of an effective ...
Question 88: Which of the following is the PRIMARY purpose of conducting ...
Question 89: Which of the following issues identified during a postmortem...
Question 90: Which of the following would provide an IS auditor with the ...
Question 91: Which of the following is the MOST effective way to identify...
Question 92: Which of the following is the BEST way to confirm that a dig...
Question 93: Which of the following is the GREATEST risk associated with ...
Question 94: During an exit interview senior management disagrees with so...
Question 95: An organization has decided to implement a third-party syste...
Question 96: When an organization introduces virtualization into its arch...
Question 97: An IS audit reveals an organization's IT department reports ...
Question 98: An IS auditor finds that needed security patches cannot be a...
Question 99: Which of the following is the PRIMARY reason an IS auditor s...
Question 100: An IS auditor reviewing the system development life cycle (S...
Question 101: Which of the following is an example of a preventative contr...
Question 102: When evaluating the ability of a disaster recovery plan (DRP...
Question 103: Which of the following is the PRIMARY reason to adopt a capa...
Question 104: Which of the following is the BEST guidance from an IS audit...
Question 105: Which of the following is a determine security control that ...
Question 106: An organization with high availability resource requirements...
Question 107: During the post-implementation review of an application that...
Question 108: Which of the following is MOST important to ensure when plan...
Question 109: When deploying an application that was created using the pro...
Question 110: The GREATEST risk of database denormalization is:...
Question 111: Which of the following is the MOST significant risk associat...
Question 112: Which of the following is the MOST reliable way for an IS au...
Question 113: Which of the following human resources management practices ...
Question 114: An organization's IT security policy states that user ID's m...
Question 115: In assessing the priority given to systems covered in an org...
Question 116: An IS auditor has found that an organization is unable to ad...
Question 117: A security company and service provider have merged and the ...
Question 118: To ensure efficient and economic use of limited resources in...
Question 119: Which of the following is the GREATEST benefit of utilizing ...
Question 120: In a virtualized environment, which of the following techniq...
Question 121: Which of the following is the MOST effective way to verify a...
Question 122: Which of the following should be of GREATEST concern to an I...
Question 123: Which of the following is MOST important to include in a con...
Question 124: As part of a follow-up of a previous year's audit, an IS aud...
Question 125: Which of the following would be MOST helpful in ensuring sec...
Question 126: Which of the following analytical methods would be MOST usef...
Question 127: Which of the following BEST demonstrates that IT strategy is...
Question 128: To address issues related to privileged users identified in ...
Question 129: An organization s audit charter PRIMARILY:...
Question 130: An IS auditor is reviewing a banking mobile application that...
Question 131: An organization's IT security policy requires annual securit...
Question 132: An IS auditor is reviewing an industrial control system (ICS...
Question 133: When reviewing backup policies, an IS auditor MUST verify th...
Question 134: When evaluating the recent implementation of an intrusion de...
Question 135: Which of the following would BEST provide executive manageme...
Question 136: An audit has identified that business units have purchased c...
Question 137: Which of the following situations would impair the independe...
Question 138: Which of the following MOST effectively mitigates the risk o...
Question 139: An e-commerce enterprise's disaster recovery (DR) site has 3...
Question 140: Which of the following is MOST important for an IS auditor t...
Question 141: During a routine check, a system administrator identifies un...
Question 142: An IS auditor's PRIMARY objective when examining problem rep...
Question 143: An IS auditor is reviewing a recent security incident and is...
Question 144: When reviewing a project to replace multiple manual data ent...
Question 145: Which of the following is a preventive control related to ch...
Question 146: An IS auditor is assessing an organization's data loss preve...
Question 147: Which of the following should be the FIRST step in a data mi...
Question 148: Which of the following is an example of a control that is bo...
Question 149: An organization issues digital certificates to employees to ...
Question 150: When a firewall is subjected to a probing attack, the MOST a...
Question 151: An IS auditor reviewing a high-risk business application has...
Question 152: Which of the following is an example of a preventive control...
Question 153: An organization is running servers with critical business ap...
Question 154: Compared to developing a system in-house, acquiring a softwa...
Question 155: Which of the following is the BEST way to mitigate the risk ...
Question 156: The PRIMARY purpose for an IS auditor to review previous aud...
Question 157: During an audit of a financial application, it was determine...
Question 158: Which of the following is the MOST likely cause of a success...
Question 159: Which of the following would provide the BEST evidence for u...
Question 160: An IS auditor notes that application super-user activity was...
Question 161: During a security audit, an IS auditor is tasked with review...
Question 162: The maturity level of an organization s problem management s...
Question 163: The PRIMARY reason an IS department should analyze past inci...
Question 164: A multinational organization is integrating its existing pay...
Question 165: Which of the following implementation strategies for new app...
Question 166: An organization recently implemented a cloud document storag...
Question 167: In an environment where most IT services have been outsource...
Question 168: An IS auditor notes that IT and the business have different ...
Question 169: Which of the following is the BEST recommendation to prevent...
Question 170: A company laptop has been stolen and all photos on the lapto...
Question 171: Which of the following BEST determines if a batch update job...
Question 172: The BEST way to preserve data integrity through all phases o...
Question 173: A CIO has asked an IS auditor to implement several security ...
Question 174: The MOST important function of a business continuity plan (B...
Question 175: The PRIMARY benefit of information asset classification is t...
Question 176: Reconciliations have identified data discrepancies between a...
Question 177: Which of the following are BEST suited for continuous auditi...
Question 178: Which of the following would an IS auditor consider to be th...
Question 179: Which of the following is a detective control that can be us...
Question 180: Which of the following is an IS auditor's BEST recommendatio...
Question 181: Which of the following is MOST important lo have in place fo...
Question 182: Which of the following is the MAIN purpose of data classific...
Question 183: An IS auditor is reviewing the installation of a new server....
Question 184: Which of the following is MOST helpful for an IS auditor to ...
Question 185: Which of the following is the BEST way to ensure that busine...
Question 186: An organization developed a comprehensive three-year IT stra...
Question 187: Which of the following should be an IS auditor's GREATEST co...
Question 188: An IS auditor reviewing a checkpoint/restart procedure shoul...
Question 189: Which of the following is the PRIMARY reason for an organiza...
Question 190: When reviewing an organization's data protection practices, ...
Question 191: An IS auditor is evaluating the risk associated with moving ...
Question 192: Which of the following should be of MOST concern to an IS au...
Question 193: An IS auditor finds the timeliness and depth of information ...
Question 194: After an external IS audit, which of the following should be...
Question 195: Due to a global pandemic, a health organization has instruct...
Question 196: A maturity model can be used to aid the implementation of IT...
Question 197: Which of the following poses the GREATEST risk to a company ...
Question 198: Which of the following should be done FIRST to effectively d...
Question 199: Which of the following control checks would utilize data ana...
Question 200: Which of the following is the PRIMARY purpose of using data ...
Question 201: An IS auditor is assigned to review the development of a spe...
Question 202: For a company that outsources payroll processing, which of t...
Question 203: Which of the following MOST efficiently protects computer eq...
Question 204: Which of the following BEST ensures the quality and integrit...
Question 205: An IS auditor is reviewing database log settings and notices...
Question 206: Which of the following is a corrective control?...
Question 207: Which of the following should be included in a business impa...
Question 208: Due to system limitations, segregation of duties (SoD) canno...
Question 209: An IS auditor intends to accept a management position in the...
Question 210: What would be an IS auditor's BEST recommendation upon findi...
Question 211: A financial institution has a system interface that is used ...
Question 212: An employee has accidentally posted confidential data to the...
Question 213: Which of the following should be of GREATEST concern to an I...
Question 214: Which of the following is the BEST approach to identify whet...