<< Prev Question Next Question >>

Question 27/249

Which of the following is MOST important for an IS auditor to confirm when conducting a review of an active-active application cluster configuration?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (249q)
Question 1: When developing a business continuity plan (BCP), which of t...
Question 2: Which of the following is the BEST way to sanitize a hard di...
Question 3: For an organization that has plans to implement web-based tr...
Question 4: An IS audit team is evaluating the documentation related to ...
Question 5: When reviewing the functionality of an intrusion detection s...
Question 6: Which of the following is an advantage of using agile softwa...
Question 7: The use of cookies constitutes the MOST significant security...
Question 8: Prior to the of acquired software into production, it is MOS...
Question 9: Which of the following is the MOST important determining fac...
Question 10: An organization is considering allowing users to conned pers...
Question 11: While auditing a small organization's data classification pr...
Question 12: An IS auditor would MOST likely recommend that IT management...
Question 13: Which of the following is the MOST important benefit of Invo...
Question 14: Which of the following is the PRIMARY reason to follow a con...
Question 15: As part of an audit response, an auditee has concerns with t...
Question 16: Which of the following is the MOST useful information for an...
Question 17: An accounting department uses a spreadsheet lo calculate sen...
Question 18: Invoking a business continuity plan (BCP) is demonstrating w...
Question 19: Which of the following is MOST important for an IS auditor t...
Question 20: Which of the following is the BEST way to mitigate the risk ...
Question 21: An IS auditor is reviewing the release management process fo...
Question 22: Which of the following is the GREATEST concern associated wi...
1 commentQuestion 23: An IS auditor performing an application development review a...
Question 24: Which of the following is MOST useful for determining whethe...
Question 25: An algorithm in an email program analyzes traffic to quarant...
Question 26: Which of the following would provide the MOST important inpu...
Question 27: Which of the following is MOST important for an IS auditor t...
Question 28: Which of the following provides the BEST evidence of the eff...
Question 29: Which of the following observations noted during a review of...
Question 30: Winch of the following MOST effectively minimizes downtime d...
Question 31: When auditing the alignment of IT to the business strategy, ...
Question 32: Which of the following should be the FRST step when developi...
Question 33: An IS auditor reviewing a project to acquire an IT-based sol...
Question 34: Which of the following would be MOST time and cost efficient...
Question 35: During the implementation of a new system, an IS auditor mus...
Question 36: Which of the following is the MOST effective control for pro...
Question 37: An organization was recently notified by its regulatory body...
Question 38: A small startup organization does not have the resources to ...
Question 39: An IS auditor is reviewing an organization's primary router ...
Question 40: An IS auditor Is reviewing an organization's business contin...
Question 41: Which of the following Is a challenge in developing a servic...
Question 42: Which of the following security risks can be reduced by a pr...
Question 43: What is the PRIMARY reason to adopt a risk-based IS audit st...
Question 44: Which of the following is me GREATE ST impact as a result of...
Question 45: Code changes are compiled and placed in a change folder by t...
Question 46: What IS the GREATEST concern for an IS auditor reviewing con...
Question 47: An IS auditor identifies that a legacy application to be dec...
Question 48: An IS auditor is planning an audit of an organization's acco...
Question 49: An organization has developed mature risk management practic...
Question 50: Which of the following approaches would BEST ensure that dat...
Question 51: The use of which of the following would BEST enhance a proce...
Question 52: Which of the following observations would an IS auditor cons...
Question 53: Which of the following establishes the role of the internal ...
Question 54: Which of the following is the BEST way to mitigate the impac...
Question 55: Which of the following is MOST important for an IS auditor t...
Question 56: During a review of IT service desk practices, an IS auditor ...
Question 57: An IS auditor is evaluating the risk associated with moving ...
Question 58: A manager identifies active privileged accounts belonging to...
Question 59: Which of the following indicates that an internal audit orga...
Question 60: In the case of a disaster where the data center is no longer...
Question 61: Which of the following is MOST important to include within a...
Question 62: An organization has recently implemented a Voice-over IP (Vo...
Question 63: Which cloud deployment model is MOST likely to be limited in...
Question 64: Due to system limitations, segregation of duties (SoD) canno...
Question 65: An IS auditor following up on prior period items and finds m...
Question 66: Which of the following would be MOST useful to an IS auditor...
Question 67: During the planning phase of a data loss prevention (DLP) au...
Question 68: Which of the following would be of MOST concern when determi...
Question 69: Which of the following is the MOST important consideration f...
Question 70: An organization shares some of its customers' personally Ide...
Question 71: According to the three lines of defense model for risk manag...
Question 72: Which of the following is the BEST way to address potential ...
Question 73: Which of the following is MOST appropriate to prevent unauth...
Question 74: The MOST important function of a business continuity plan (B...
Question 75: During an exit interview, senior management disagrees with s...
Question 76: Which of the following would be MOST useful to an organizati...
Question 77: An IS auditor finds that the process for removing access for...
Question 78: Which type of attack poses the GREATEST risk to an organizat...
Question 79: Which of the following BEST minimizes performance degradatio...
Question 80: Which of the following should be of GREATEST concern to an I...
Question 81: Which of the following areas of responsibility would cause t...
Question 82: Which of the following should be done by an IS auditor durin...
Question 83: An IS auditor notes that not all security tests were complet...
Question 84: Which of the following security assessment techniques attemp...
Question 85: During an IT governance audit, an IS auditor notes that IT p...
Question 86: An IS auditor observes that a business-critical application ...
Question 87: AN IS auditor has been asked to perform an assurance review ...
Question 88: Which of the following would be of GREATEST concern to an IS...
Question 89: Which of the following is the PRIMARY protocol for protectin...
Question 90: To confirm integrity for a hashed message the receiver shoul...
Question 91: Which of the following provides the MOST useful information ...
Question 92: Which of the following would be MOST useful when analyzing c...
Question 93: An IS auditor finds that capacity management for a key syste...
Question 94: The BEST way to determine whether programmers have permissio...
Question 95: Which of the following would MOST effectively help to reduce...
Question 96: An IS auditor has completed the fieldwork phase of a network...
Question 97: An audit has identified that business units have purchased c...
Question 98: The risk of communication failure in an e-commerce environme...
Question 99: An advantage of object-oriented system development is that i...
Question 100: An organization allows its employees to use personal mobile ...
Question 101: In data warehouse (DW) management, what is the BEST way to p...
Question 102: Which of the following is MOST helpful in preventing a syste...
Question 103: In an environment where development and IT operations teams ...
Question 104: When conducting a post-implementation review of a new softwa...
Question 105: Which of the following is MOST important to review when plan...
Question 106: An IS auditor is asked to review a large organization's chan...
Question 107: Which of the following BEST helps to ensure data integrity a...
Question 108: Which of the following is the BEST indicator that an applica...
Question 109: During an audit of identity and access management, an IS aud...
Question 110: To lest the integrity of the data in the accounts receivable...
Question 111: An IS auditor is reviewing an organization's information ass...
Question 112: Which of the following provides the MOST reliable audit evid...
Question 113: A new regulation requires organizations to report significan...
Question 114: An organization has begun using social media to communicate ...
Question 115: Which of the following is necessary for effective risk manag...
Question 116: Which of the following would BEST determine whether a post-i...
Question 117: Which of the following should be done FIRST when developing ...
Question 118: What would be an IS auditor's BEST recommendation upon findi...
Question 119: Which of the following is the BEST source of information for...
Question 120: An organization's software developers need access to persona...
Question 121: Stress testing should ideally be carried out under a:...
Question 122: Which of the following is the MOST effective way to maintain...
Question 123: Which of the following concerns is BEST addressed by securin...
Question 124: An IS auditor is reviewing security controls related to coll...
Question 125: Which of the following is the BEST data integrity check?...
Question 126: During the implementation of an enterprise resource planning...
Question 127: During the implementation of an upgraded enterprise resource...
Question 128: Which of the following weaknesses would have the GREATEST im...
Question 129: Which of the following is the BEST source of Information for...
Question 130: During an operational audit of a biometric system used to co...
Question 131: Which of the following should an IS auditor expect to see in...
Question 132: A review of Internet security disclosed that users have indi...
Question 133: What is the BEST control to address SQL injection vulnerabil...
Question 134: After the merger of two organizations, which of the followin...
Question 135: Which of the following types of firewalls provide the GREATE...
Question 136: An IS auditor suspects an organization's computer may have b...
Question 137: In an online application, which of the following would provi...
Question 138: Which of the following is the GREATEST risk if two users hav...
Question 139: During the evaluation of controls over a major application d...
Question 140: Which of the following business continuity activities priori...
Question 141: An IS auditor is executing a risk-based IS audit strategy to...
Question 142: An IS auditor finds that capacity management key a key syste...
Question 143: Management has decided to include a compliance manager in th...
Question 144: Which of the following is the BEST indicator of the effectiv...
Question 145: During an audit of an organization's risk management practic...
Question 146: Which of the following is an example of a preventative contr...
Question 147: A system administrator recently informed the IS auditor abou...
Question 148: Documentation of workaround processes to keep a business fun...
Question 149: When reviewing tin organization's information security polic...
Question 150: Which of the following would be MOST effective to protect in...
Question 151: Which of the following system conversion strategies provides...
Question 152: Which of the following is the PRIMARY purpose of conducting ...
Question 153: Which of the following is the MOST important issue for an IS...
Question 154: What is BEST for an IS auditor lo review when assessing the ...
Question 155: Which of the following is MOST important when implementing a...
Question 156: Which of the following is the BEST reason for an organizatio...
Question 157: Which type of losing BEST determines whether a now system me...
Question 158: As part of business continuity planning, which of the follow...
Question 159: Which of the following is The BEST use of a maturity model i...
Question 160: Which type of control has been established when an organizat...
Question 161: Which of the following is the PRIMARY benefit of performing ...
Question 162: When implementing a new IT maturity model which of the follo...
Question 163: The PRIMARY purpose of requiring source code escrow in a con...
Question 164: Which of the following metrics would BEST measure the agilit...
Question 165: When an IS audit reveals that a firewall was unable to recog...
Question 166: Which of the following is MOST important for an IS auditor t...
Question 167: A warehouse employee of a retail company has been able to co...
Question 168: Following the sale of a business division, employees will be...
Question 169: Which of the following should be the PRIMARY basis for proce...
Question 170: An IS auditor is analysing a sample of assesses recorded on ...
Question 171: Which of the following is MOST important for an IS auditor t...
Question 172: During a security audit, an IS auditor is tasked with review...
Question 173: Of the following, who are the MOST appropriate staff for ens...
Question 174: Batch processes running in multiple countries are merged to ...
Question 175: Which of the following is the MOST likely reason an organiza...
Question 176: To enable the alignment of IT staff development plans with I...
Question 177: Which of the following provides the MOST comprehensive descr...
Question 178: Which of the following is MOST important for an IS auditor t...
Question 179: An IS auditor notes that several employees are spending an e...
Question 180: Due to tented storage capacity, an organization has decided ...
Question 181: An IS auditor reviewing the database controls for a new e-co...
Question 182: The PRIMARY objective of value delivery in reference to IT g...
Question 183: An IS auditor who was instrumental m designing an applicatio...
Question 184: Which of the following is the MOST appropriate control to en...
Question 185: Which of lite following components of a risk assessment is M...
Question 186: Which of the following provides IS audit professionals with ...
Question 187: Which of the following is MOST important for an IS auditor t...
Question 188: An IS auditor discovers an option in a database that allows ...
Question 189: Which of the following should be of GREATEST concern for an ...
Question 190: An organization allows employees to retain confidential data...
Question 191: Which of the following BEST determines if a batch update job...
Question 192: The PRIMARY benefit of information asset classification is t...
Question 193: A checksum is classified as which type of control?...
Question 194: Which of the following would an IS auditor consider the GREA...
Question 195: An IS audit reveals that an organization is not proactively ...
Question 196: Which of the following is the MOST appropriate role for an I...
Question 197: Which of the following is the PRIMARY concern when negotiati...
Question 198: An IS auditor concludes that an organization has a quality s...
Question 199: A post-implementation review was conducted by issuing a surv...
Question 200: Which of the following is the GREATEST risk associated with ...
Question 201: Which of the following BEST facilitates the legal process in...
Question 202: During an audit of an organization's financial statements, a...
Question 203: Which type of control is being implemented when a biometric ...
Question 204: An organization plans to receive an automated data feed into...
Question 205: A company converted its payroll system from an external serv...
Question 206: Which of the following is MOST important for an IS auditor t...
Question 207: Which of the following approaches will ensure recovery lime ...
Question 208: Which of the following is the BEST compensating control when...
Question 209: Which of the following should be the PRIMARY objective of co...
Question 210: Which of the following is the GREATEST security risk associa...
Question 211: Which of the following is the GREATEST risk associated with ...
Question 212: Which of the following to the MOST effective way for an IS a...
Question 213: An organization is disposing of a system containing sensitiv...
Question 214: Which of the following audit procedures would be MOST conclu...
Question 215: Which of the following would BEST help to ensure the availab...
Question 216: In order to be useful, a key performance indicator (KPI) MUS...
Question 217: Which of the following should be of MOST concern to an IS au...
Question 218: Which of the following is a characteristic of a single mirro...
Question 219: Which of the following is the PRIMARY basis on which audit o...
Question 220: An IS auditor is reviewing a recent security incident and is...
Question 221: IT disaster recovery lime objectives (RTOs) should be based ...
Question 222: Which of the following is the BEST way to determine whether ...
Question 223: Which of the following is the MOST effective approach in ass...
Question 224: Which of the following is the MOST effective control to ensu...
Question 225: An IS auditor is reviewing logical access controls for an or...
Question 226: Which of the following BEST enables system resiliency for an...
Question 227: IS management has recently disabled certain referential inte...
Question 228: Which of the following is an IS auditor's BEST recommendatio...
Question 229: Which of the following is the BEST performance indicator for...
Question 230: From an IS auditor's perspective. which of the following wou...
Question 231: An organization is shifting to a remote workforce. In prepar...
Question 232: An organization's security policy mandates that all new empl...
Question 233: When responding to an ongoing denial of service (DoS) attack...
Question 234: Which of the following is the GREATEST risk associated with ...
Question 235: Which of the following attack techniques win succeed because...
Question 236: What is the BEST method for securing credit card numbers sto...
Question 237: The PRIMARY focus of audit follow-up reports should be to:...
Question 238: An organization's strategy to source certain IT functions fr...
Question 239: The performance, risks, and capabilities of an IT infrastruc...
Question 240: Which of the following security testing techniques is MOST e...
Question 241: During a review of an organization's network threat response...
Question 242: An IS auditor will be testing accounts payable controls by p...
Question 243: An IS auditor is evaluating the access controls for a shared...
Question 244: When reviewing an organization's IT governance processes, wh...
Question 245: An organization seeks to control costs related to storage me...
Question 246: Which of the following is a corrective control?...
Question 247: An IS auditor learns the organization has experienced severa...
Question 248: When testing the adequacy of tape backup procedures which st...
Question 249: As part of a recent business-critical initiative, an organiz...