<< Prev Question Next Question >>

Question 18/117

Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (117q)
Question 1: An organization plans to receive an automated data feed into...
Question 2: Which of the following documents would be MOST useful in det...
Question 3: During a review of a production schedule, an IS auditor obse...
Question 4: Which of the following components of a risk assessment is MO...
Question 5: In response to an audit finding regarding a payroll applicat...
Question 6: In data warehouse (DW) management, what is the BEST way to p...
Question 7: A manager identifies active privileged accounts belonging to...
Question 8: In a 24/7 processing environment, a database contains severa...
Question 9: Which of the following BEST protects an organization's propr...
Question 10: An organization with many desktop PCs is considering moving ...
Question 11: An IS auditor notes that IT and the business have different ...
Question 12: During a follow-up audit, an IS auditor finds that some crit...
Question 13: An IS auditor finds the log management system is overwhelmed...
Question 14: An IS auditor concludes that an organization has a quality s...
Question 15: An organization that has suffered a cyber attack is performi...
Question 16: An IS auditor wants to determine who has oversight of staff ...
Question 17: Which of the following is necessary for effective risk manag...
Question 18: Management has requested a post-implementation review of a n...
Question 19: During a follow-up audit, an IS auditor learns that some key...
Question 20: An organization recently implemented a cloud document storag...
Question 21: An information systems security officer's PRIMARY responsibi...
Question 22: A new system is being developed by a vendor for a consumer s...
Question 23: Which of the following would be an appropriate rote of inter...
Question 24: When implementing Internet Protocol security (IPsec) archite...
Question 25: An IS auditor is following up on prior period items and find...
Question 26: An IS auditor is planning an audit of an organization's acco...
Question 27: What is MOST important to verify during an external assessme...
Question 28: A new regulation in one country of a global organization has...
Question 29: During a security audit, an IS auditor is tasked with review...
Question 30: Which of the following is the MOST important consideration f...
Question 31: The PRIMARY benefit of information asset classification is t...
Question 32: Which of the following observations would an IS auditor cons...
Question 33: Which of the following is the BEST indicator of the effectiv...
Question 34: Which of the following is MOST important to ensure that elec...
Question 35: Which of the following features of a library control softwar...
Question 36: A new regulation requires organizations to report significan...
Question 37: Which of the following is MOST important for an IS auditor t...
Question 38: Which of the following is a social engineering attack method...
Question 39: Which of the following is MOST important to determine during...
Question 40: An organization allows employees to retain confidential data...
Question 41: Which of the following BEST enables the timely identificatio...
Question 42: When planning an audit to assess application controls of a c...
Question 43: Which of the following would BEST enable an organization to ...
Question 44: Cross-site scripting (XSS) attacks are BEST prevented throug...
Question 45: An organization has recently acquired and implemented intell...
Question 46: Which of the following is the BEST reason for an organizatio...
Question 47: The IS quality assurance (OA) group is responsible for:...
Question 48: Which of the following will BEST ensure that a proper cutoff...
Question 49: An employee loses a mobile device resulting in loss of sensi...
Question 50: An organizations audit charier PRIMARILY:...
Question 51: Which of the following is the PRIMARY concern when negotiati...
Question 52: Following a security breach in which a hacker exploited a we...
Question 53: While executing follow-up activities, an IS auditor is conce...
Question 54: A warehouse employee of a retail company has been able to co...
Question 55: Which of the following is the BEST method to prevent wire tr...
Question 56: Which of the following should an IS auditor be MOST concerne...
Question 57: Which of the following is the BEST way to ensure that busine...
Question 58: For an organization that has plans to implement web-based tr...
Question 59: An IS auditor has found that an organization is unable to ad...
Question 60: Which of the following is the MOST effective control to miti...
Question 61: An organization conducted an exercise to test the security a...
Question 62: Which of the following weaknesses would have the GREATEST im...
Question 63: Which of the following IT service management activities is M...
Question 64: An organization allows its employees lo use personal mobile ...
Question 65: An IS auditor suspects an organization's computer may have b...
Question 66: Which of the following is the MAIN purpose of an information...
Question 67: The due date of an audit project is approaching, and the aud...
Question 68: Which of the following is MOST important for an effective co...
Question 69: An organization has outsourced its data processing function ...
Question 70: An organization has assigned two now IS auditors to audit a ...
Question 71: Which of the following is the PRIMARY reason to follow a con...
Question 72: Which of the following would MOST likely impair the independ...
Question 73: An IS auditor notes that several employees are spending an e...
Question 74: Malicious program code was found in an application and corre...
Question 75: Capacity management enables organizations to:...
Question 76: Which of the following is MOST important to ensure when plan...
Question 77: Which of the following security risks can be reduced by a pr...
Question 78: Which of the following would provide an IS auditor with the ...
Question 79: An IS auditor finds that the process for removing access for...
Question 80: An IS auditor notes the transaction processing times in an o...
Question 81: In a RAO model, which of the following roles must be assigne...
Question 82: Which of the following would be of MOST concern for an IS au...
Question 83: What is the BEST control to address SQL injection vulnerabil...
Question 84: An IS auditor is analyzing a sample of accesses recorded on ...
Question 85: An IS auditor is reviewing an industrial control system (ICS...
Question 86: During an exit interview, senior management disagrees with s...
Question 87: Which of the following is an audit reviewer's PRIMARY role w...
Question 88: An IS auditor is reviewing the release management process fo...
Question 89: Which of the following should be the MOST important consider...
Question 90: An IS auditor is reviewing an organization's primary router ...
Question 91: When auditing the security architecture of an online applica...
Question 92: Which of the following would BEST help lo support an auditor...
Question 93: Which of the following concerns is BEST addressed by securin...
Question 94: An IS auditor should ensure that an application's audit trai...
Question 95: Which of the following should be of GREATEST concern to an I...
Question 96: In a small IT web development company where developers must ...
Question 97: Which of the following is the BEST control to prevent the tr...
Question 98: What is the MAIN reason to use incremental backups?...
Question 99: An organization's software developers need access to persona...
Question 100: What is the PRIMARY purpose of documenting audit objectives ...
Question 101: During an audit of a financial application, it was determine...
Question 102: Which of the following is MOST important to consider when sc...
Question 103: Which of the following is MOST important for an IS auditor t...
Question 104: Which of the following findings from an IT governance review...
Question 105: In order to be useful, a key performance indicator (KPI) MUS...
Question 106: When an IS audit reveals that a firewall was unable to recog...
Question 107: Which of the following is MOST helpful for measuring benefit...
Question 108: Which of the following issues associated with a data center'...
Question 109: Due to system limitations, segregation of duties (SoD) canno...
Question 110: Which of the following documents should specify roles and re...
Question 111: An organization is planning an acquisition and has engaged a...
Question 112: During a disaster recovery audit, an IS auditor finds that a...
Question 113: Which of the following is an executive management concern th...
Question 114: Which of the following is a challenge in developing a servic...
1 commentQuestion 115: Which of the following are BEST suited for continuous auditi...
Question 116: Which of the following activities would allow an IS auditor ...
Question 117: When an intrusion into an organization network is deleted, w...