<< Prev Question Next Question >>

Question 12/87

Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (87q)
Question 1: When implementing Internet Protocol security (IPsec) archite...
Question 2: During a review of a production schedule, an IS auditor obse...
Question 3: Which of the following should be the MOST important consider...
Question 4: Which of the following is the MOST important prerequisite fo...
Question 5: An IS auditor concludes that an organization has a quality s...
Question 6: Which of the following tests would provide the BEST assuranc...
Question 7: Which of the following is the PRIMARY reason to follow a con...
Question 8: An IS audit reveals that an organization is not proactively ...
Question 9: Which of the following is the MOST effective control to miti...
Question 10: Which of the following is the MOST effective way to maintain...
Question 11: Cross-site scripting (XSS) attacks are BEST prevented throug...
Question 12: Which of the following is the BEST compensating control when...
Question 13: The decision to accept an IT control risk related to data qu...
Question 14: In a 24/7 processing environment, a database contains severa...
Question 15: Which of the following is the MOST important benefit of invo...
Question 16: During a new system implementation, an IS auditor has been a...
Question 17: Which of the following should be an IS auditor's GREATEST co...
Question 18: Which of the following is MOST important to consider when sc...
Question 19: Which of the following controls BEST ensures appropriate seg...
Question 20: Which of the following security risks can be reduced by a pr...
Question 21: The BEST way to determine whether programmers have permissio...
Question 22: IS management has recently disabled certain referential inte...
Question 23: From an IS auditor's perspective, which of the following wou...
Question 24: To enable the alignment of IT staff development plans with I...
Question 25: In an online application which of the following would provid...
Question 26: An IS auditor will be testing accounts payable controls by p...
Question 27: Which audit approach is MOST helpful in optimizing the use o...
Question 28: An IS auditor is analyzing a sample of accesses recorded on ...
Question 29: An IS auditor is evaluating an organization's IT strategy an...
Question 30: An IS auditor finds that a key Internet-facing system is vul...
Question 31: An IS auditor suspects an organization's computer may have b...
Question 32: An organization's software developers need access to persona...
Question 33: During an incident management audit, an IS auditor finds tha...
Question 34: An information systems security officer's PRIMARY responsibi...
Question 35: Which of the following is the BEST data integrity check?...
Question 36: Which of the following strategies BEST optimizes data storag...
Question 37: During an ongoing audit, management requests a briefing on t...
Question 38: Which of the following would BEST facilitate the successful ...
Question 39: Which of the following BEST demonstrates that IT strategy Is...
Question 40: Which of the following documents would be MOST useful in det...
Question 41: Which of the following findings from an IT governance review...
Question 42: An IS auditor notes that IT and the business have different ...
Question 43: Which of the following would be an IS auditor's GREATEST con...
Question 44: Which of the following is an audit reviewer's PRIMARY role w...
Question 45: When testing the adequacy of tape backup procedures, which s...
Question 46: Which of the following would BEST demonstrate that an effect...
Question 47: Which of the following is MOST important to include in foren...
Question 48: Which of the following is MOST important for an effective co...
Question 49: Which of the following is the BEST reason for an organizatio...
Question 50: Which of the following BEST guards against the risk of attac...
Question 51: Which of the following provides the MOST reliable audit evid...
Question 52: Which of the following Is the BEST way to ensure payment tra...
Question 53: Documentation of workaround processes to keep a business fun...
Question 54: Which of the following would be to MOST concern when determi...
Question 55: Which of the following MOST effectively minimizes downtime d...
Question 56: The PRIMARY focus of a post-implementation review is to veri...
Question 57: An incorrect version of source code was amended by a develop...
Question 58: What is MOST important to verify during an external assessme...
Question 59: Which of the following is an example of a preventative contr...
Question 60: Which of the following is the BEST indicator of the effectiv...
Question 61: Prior to a follow-up engagement, an IS auditor learns that m...
Question 62: When auditing the alignment of IT to the business strategy, ...
Question 63: Which of the following would MOST likely impair the independ...
Question 64: Coding standards provide which of the following?...
Question 65: Management is concerned about sensitive information being in...
Question 66: An IS auditor found that a company executive is encouraging ...
Question 67: During the discussion of a draft audit report. IT management...
Question 68: Which of the following is the BEST source of information tor...
Question 69: Which of the following is the GREATEST risk associated with ...
Question 70: Which of the following components of a risk assessment is MO...
Question 71: Which of the following is the BEST recommendation to prevent...
Question 72: To develop meaningful recommendations 'or findings, which of...
Question 73: Which of the following BEST Indicates that an incident manag...
Question 74: Which of the following is the BEST control to prevent the tr...
Question 75: Following a security breach in which a hacker exploited a we...
Question 76: Which of the following activities provides an IS auditor wit...
1 commentQuestion 77: Which of the following is MOST important to verify when dete...
Question 78: A new system is being developed by a vendor for a consumer s...
Question 79: Which of the following access rights presents the GREATEST r...
Question 80: A proper audit trail of changes to server start-up procedure...
Question 81: Which of the following is the MOST effective control for pro...
Question 82: Which of the following findings should be of GREATEST concer...
Question 83: Due to limited storage capacity, an organization has decided...
Question 84: Which of the following is the PRIMARY reason for an IS audit...
Question 85: Which of the following should an IS auditor be MOST concerne...
Question 86: Which of the following BEST minimizes performance degradatio...
Question 87: Which of the following should be GREATEST concern to an IS a...