<< Prev Question Next Question >>

Question 62/75

During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (75q)
Question 1: Which of the following is the BEST data integrity check?...
Question 2: A new regulation in one country of a global organization has...
Question 3: What is the BEST control to address SQL injection vulnerabil...
Question 4: An IT balanced scorecard is the MOST effective means of moni...
Question 5: An IS auditor is examining a front-end subledger and a main ...
Question 6: Which of the following is the BEST source of information tor...
Question 7: An IS auditor is conducting a post-implementation review of ...
Question 8: Which of the following is MOST important for an IS auditor t...
Question 9: In an online application which of the following would provid...
Question 10: An IS auditor notes that several employees are spending an e...
Question 11: When implementing Internet Protocol security (IPsec) archite...
Question 12: Which of the following would BEST determine whether a post-i...
Question 13: Which of the following is MOST important with regard to an a...
Question 14: Which of the following findings from an IT governance review...
Question 15: During the planning stage of a compliance audit, an IS audit...
Question 16: The PRIMARY benefit lo using a dry-pipe fire-suppression sys...
Question 17: During an IT governance audit, an IS auditor notes that IT p...
Question 18: Which of the following is the BEST justification for deferri...
Question 19: An organization is considering allowing users to connect per...
Question 20: Which of the following access rights presents the GREATEST r...
Question 21: An organization has outsourced its data processing function ...
Question 22: An organizations audit charier PRIMARILY:...
Question 23: Which of the following should be an IS auditor's GREATEST co...
Question 24: An IS auditor finds that a key Internet-facing system is vul...
Question 25: An IS auditor discovers that validation controls m a web app...
Question 26: When reviewing an organization's information security polici...
Question 27: The performance, risks, and capabilities of an IT infrastruc...
Question 28: Which of the following occurs during the issues management p...
Question 29: Which of the following is the BEST method to prevent wire tr...
Question 30: Which of the following is the MOST important consideration f...
Question 31: When determining whether a project in the design phase will ...
Question 32: Which of the following is the GREATEST risk associated with ...
Question 33: To enable the alignment of IT staff development plans with I...
Question 34: The GREATEST benefit of using a polo typing approach in soft...
Question 35: An organization conducted an exercise to test the security a...
Question 36: An internal audit department recently established a quality ...
Question 37: Spreadsheets are used to calculate project cost estimates. T...
Question 38: An organization has recently implemented a Voice-over IP (Vo...
Question 39: Which of the following BEST ensures the quality and integrit...
Question 40: A manager Identifies active privileged accounts belonging to...
Question 41: Which of the following is the PRIMARY role of the IS auditor...
Question 42: Which of the following is MOST important for an IS auditor t...
Question 43: An IS auditor is reviewing security controls related to coll...
Question 44: When auditing the alignment of IT to the business strategy, ...
Question 45: An organization has developed mature risk management practic...
Question 46: Which of the following is an example of a preventative contr...
Question 47: Which of the following is the MOST important consideration f...
Question 48: Which of the following is the BEST recommendation to prevent...
Question 49: The PRIMARY focus of a post-implementation review is to veri...
Question 50: Which of the following will MOST likely compromise the contr...
Question 51: Cross-site scripting (XSS) attacks are BEST prevented throug...
Question 52: An IS auditor will be testing accounts payable controls by p...
Question 53: During the evaluation of controls over a major application d...
Question 54: Which of the following is MOST important to ensure when plan...
Question 55: Which of the following is the BEST control to mitigate the m...
Question 56: During the discussion of a draft audit report. IT management...
Question 57: Which of the following activities provides an IS auditor wit...
Question 58: The PRIMARY advantage of object-oriented technology is enhan...
Question 59: An organization is planning an acquisition and has engaged a...
Question 60: An IS auditor is analyzing a sample of accesses recorded on ...
Question 61: What should be the PRIMARY basis for selecting which IS audi...
Question 62: During the design phase of a software development project, t...
Question 63: During a new system implementation, an IS auditor has been a...
Question 64: The implementation of an IT governance framework requires th...
Question 65: Which of the following should be an IS auditor's PRIMARY foc...
Question 66: Which of the following is the PRIMARY concern when negotiati...
Question 67: Which of the following types of firewalls provide the GREATE...
Question 68: Which of the following concerns is BEST addressed by securin...
Question 69: Which of the following documents would be MOST useful in det...
Question 70: Which of the following is an audit reviewer's PRIMARY role w...
Question 71: An IS auditor suspects an organization's computer may have b...
Question 72: An IS auditor notes that IT and the business have different ...
Question 73: An organization with many desktop PCs is considering moving ...
Question 74: When auditing the security architecture of an online applica...
Question 75: An IS auditor concludes that an organization has a quality s...