<< Prev Question Next Question >>

Question 95/154

Which of the following is the GREATEST concern associated with a high number of IT policy exceptions approved by management?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (154q)
Question 1: Which of the following should an IS auditor review FIRST whe...
Question 2: The members of an emergency modem response team should be:...
Question 3: During a review of an organization's network threat response...
1 commentQuestion 4: An IS auditor is executing a risk-based IS audit strategy to...
Question 5: Which of the following provides the BEST method for maintain...
1 commentQuestion 6: An IS auditor is reviewing security controls related to coll...
1 commentQuestion 7: When responding to an ongoing Daniel of service (DoS) attack...
Question 8: Which of the following provides the MOST comprehensive descr...
Question 9: Which of the following metrics would BEST measure the agilit...
Question 10: Which of the following reports would provide the GREATEST as...
Question 11: While planning a review of IT governance, the IS auditor is ...
Question 12: What is BEST for an IS auditor lo review when assessing the ...
Question 13: An IS auditor has discovered that unauthorized customer mana...
Question 14: An IS auditor is examining a front-end sub ledger and a main...
Question 15: During an operational audit of a biometric system used to co...
Question 16: Which of the following provides the MOST assurance over the ...
Question 17: Which of the following should be defined in an audit charter...
Question 18: The PRIMARY benefit of information asset classification is t...
Question 19: When auditing the closing stages of a system development pro...
Question 20: Code changes are compiled and placed in a change folder by t...
Question 21: Which of the following is MOST likely to be detected by an I...
Question 22: An IS auditor finds the log management system is overwhelmed...
Question 23: During a review of an organizations network threat response ...
Question 24: The PRIMARY focus of audit follow-up reports should be to:...
Question 25: An advantage of object-oriented system development is that i...
Question 26: An IS auditor is reviewing the business requirements for the...
Question 27: Which of the following should be of GREATEST concern to an I...
Question 28: Which of the following is MOST important to ensure when plan...
Question 29: When Is the BEST time to commence continuity planning for a ...
Question 30: Following an IS audit, which of the following types of risk ...
Question 31: An IS audit of notes the transaction processing times in an ...
Question 32: An IS auditor performing a review of a newly purchased softw...
Question 33: Which of the following should be done FIRST to develop an ef...
Question 34: When reviewing a data classification scheme, it is MOST impo...
Question 35: Which of the following testing methods is MOST appropriate f...
Question 36: Which of the following would be MOST time and cost efficient...
Question 37: An IS auditor is evaluating the security of an organization'...
Question 38: The MOST important function of a business continuity plan (B...
Question 39: Which cloud deployment model is MOST likely to be limited in...
Question 40: The PRIMARY benefit to using a dry-pipe fire-suppression sys...
Question 41: An organization seeks to control costs related to storage me...
Question 42: Which of the following is the PRIMARY concern when negotiati...
Question 43: Which of the following observations would an IS auditor cons...
Question 44: Which of the following is MOST important for an IS auditor t...
Question 45: Which of the following BEST enables system resiliency for an...
Question 46: To address issues related to privileged users identified in ...
Question 47: An IS auditor is reviewing documentation of application syst...
Question 48: An IS auditor is conducting a post-implementation review of ...
Question 49: Which of the following is the MOST important prerequisite fo...
Question 50: An organization is considering allowing users to conned pers...
Question 51: In the case of a disaster where the data center is no longer...
Question 52: A computer forensic audit is MOST relevant in which of the f...
Question 53: Which of the following is MOST important for an organization...
Question 54: A review of an organization's IT portfolio revealed several ...
Question 55: When reviewing tin organization's information security polic...
Question 56: As part of an audit response, an auditee has concerns with t...
Question 57: The PRIMARY role of a control self-assessment (CSA) facilita...
Question 58: Which of the following would MOST likely impair the independ...
Question 59: Which of the following is the PRIMARY advantage of using vir...
Question 60: What is the MOST critical finding when reviewing an organiza...
Question 61: IS management has recently disabled certain referential inte...
Question 62: Which of the following is the MOST important consideration f...
Question 63: To create a digital signature in a message using asymmetric ...
Question 64: A USB device containing sensitive production data was lost b...
1 commentQuestion 65: Which of the following is the PRIMARY reason for using a dig...
Question 66: Which of the following will MOST likely compromise the contr...
Question 67: Due to system limitations, segregation of duties (SoD) canno...
Question 68: Which of the following Is the BEST method to prevent wire tr...
Question 69: An organization's information security department has recent...
Question 70: An IS auditor is analysing a sample of assesses recorded on ...
Question 71: Which of the following is necessary for effective risk manag...
Question 72: An evaluation of an IT department finds that some IT goals d...
Question 73: Which of the following is the BEST use of a balanced scoreca...
Question 74: Which of the following is the BEST compensating control when...
Question 75: An organization's enterprise architecture (EA) department de...
Question 76: During an audit of a financial application, it was determine...
Question 77: The PRIMARY objective of IT service level management is to....
Question 78: Invoking a business continuity plan (BCP) is demonstrating w...
Question 79: An organization is shifting to a remote workforce. In prepar...
Question 80: A data analytics team has developed a process automation bot...
Question 81: During a review, an IS auditor discovers that corporate user...
Question 82: An IS auditor is planning an audit of an organization's acco...
Question 83: Which of the following is a challenge in developing a servic...
Question 84: During the implementation of an enterprise resource planning...
Question 85: Which of the following would be the BEST Indicator of the ef...
Question 86: An IS auditor Is reviewing an organization's business contin...
Question 87: A bank's web-hosting provider has just completed an internal...
Question 88: An IS auditor is reviewing an industrial control system (ICS...
Question 89: After the merger of two organizations, which of the followin...
Question 90: Which of the following should be done FIRST when planning a ...
Question 91: Which of the following should be the PRIMARY role of an inte...
Question 92: Of the following, who are the MOST appropriate staff for ens...
Question 93: Which of the following should be of GREATEST concern to an I...
Question 94: Which of the following approaches would utilize data analyti...
Question 95: Which of the following is the GREATEST concern associated wi...
Question 96: An organization is running servers with critical business ap...
Question 97: An organization is disposing of a system containing sensitiv...
Question 98: Several unattended laptops containing sensitive customer dat...
Question 99: An IS auditor should ensure that an application's audit trai...
Question 100: During an audit of an access control system, an IS auditor f...
Question 101: An organization developed a comprehensive three-year IT stra...
Question 102: Which of the following is the FIRST step in initiating a dat...
Question 103: An IS auditor is reviewing the perimeter security design of ...
Question 104: During the planning stage of a compliance audit an IS audito...
Question 105: Which of the following measures BEST mitigates the risk of e...
Question 106: Which of the following is MOST critical for the effective im...
Question 107: Which of the following is MOST important to ensure when revi...
Question 108: During a project meeting for the implementation of an enterp...
Question 109: Secure code reviews as part of a continuous deployment progr...
Question 110: An organization needs to comply with data privacy regulation...
Question 111: Which of the following would be an appropriate role of inter...
Question 112: An organization wants to change its project methodology to a...
Question 113: Which of the following is the BEST control to mitigate the m...
Question 114: Which of the following should be the PRIMARY basis for proce...
Question 115: Which of the following are BEST suited for continuous auditi...
Question 116: Which of the following is the BEST source of information for...
Question 117: An organization is experiencing a large number of phishing a...
Question 118: Which of the following approaches would BEST ensure that dat...
Question 119: When evaluating the ability of a disaster recovery plan (DRP...
Question 120: Which of the following would be of GREATEST concern to an IS...
Question 121: As part of business continuity planning, which of the follow...
Question 122: Which of the following is the PRIMARY benefit of continuous ...
Question 123: During the implementation of an upgraded enterprise resource...
Question 124: Due to a high volume of customer orders, an organization pla...
Question 125: Which of the following should be of GREATEST concern for an ...
Question 126: Which of the following is the PRIMARY benefit of performing ...
Question 127: In which phase of penetration testing would host detection a...
Question 128: Which of the following is MOST important for an effective co...
Question 129: The PRIMARY advantage of object-oriented technology is enhan...
Question 130: Which of the following is MOST helpful in preventing a syste...
Question 131: Which of the following would be the MOST useful metric for m...
Question 132: Which of the following is MOST likely to ensure that an orga...
Question 133: Which of the following is MOST important when creating a for...
Question 134: Which of the following should be of GREATEST concern to an I...
Question 135: In an environment that automatically reports all program cha...
Question 136: During a follow-up audit, an IS auditor finds that some crit...
Question 137: Which of the following is the MOST effective control to miti...
Question 138: Which of the following would BEST enable an organization to ...
Question 139: Which of the following is the GREATEST risk associated with ...
Question 140: The implementation of an IT governance framework requires th...
Question 141: A company converted its payroll system from an external serv...
Question 142: Which of the following metrics would be MOST useful to an IS...
Question 143: Which of the following fire suppression systems needs to be ...
Question 144: An organization has installed blade server technology in its...
Question 145: Which of the following strategies BEST optimizes data storag...
Question 146: Which of the following is the BEST control to help prevent s...
Question 147: Which of the following is the MAIN risk associated with addi...
Question 148: A warehouse employee of a retail company has been able to co...
Question 149: What would be an IS auditor's BEST recommendation upon findi...
Question 150: Which of the following is MOST important for an IS auditor t...
Question 151: An incorrect version of source code was amended by a develop...
Question 152: When determining whether a project in the design phase will ...
Question 153: Which of the following is the BEST indication of the complet...
Question 154: An organization is acquiring a new customer relationship man...