<< Prev Question

Question 155/155

An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (155q)
1 commentQuestion 1: When auditing the alignment of IT to the business strategy, ...
Question 2: Which of the following is the BEST source of information for...
Question 3: An IS auditor is reviewing an organization's information ass...
Question 4: When testing the adequacy of tape backup procedures, which s...
Question 5: Which of the following is the BEST recommendation to prevent...
Question 6: Which of the following should be of GREATEST concern to an |...
Question 7: Which of following is MOST important to determine when condu...
Question 8: Which of the following are BEST suited for continuous auditi...
Question 9: An IS auditor has completed the fieldwork phase of a network...
Question 10: An IS auditor Is renewing the deployment of a new automated ...
Question 11: Which of the following is the MOST important activity in the...
Question 12: Which of the following is MOST important for an IS auditor t...
Question 13: The PRIMARY benefit of information asset classification is t...
Question 14: Which of the following is MOST effective for controlling vis...
Question 15: The BEST way to determine whether programmers have permissio...
Question 16: Which of the following is MOST important for an IS auditor t...
Question 17: In a 24/7 processing environment, a database contains severa...
Question 18: An IS auditor is reviewing an organization's primary router ...
Question 19: An IS auditor finds that firewalls are outdated and not supp...
Question 20: Which of the following is MOST important for an IS auditor t...
Question 21: Which of the following is the PRIMARY reason to follow a con...
Question 22: Which of the following is a detective control?...
Question 23: What is the PRIMARY benefit of an audit approach which requi...
Question 24: During a follow-up audit, an IS auditor finds that some crit...
Question 25: A data breach has occurred due lo malware. Which of the foll...
Question 26: An organization has developed mature risk management practic...
Question 27: Which of the following would provide an IS auditor with the ...
Question 28: Documentation of workaround processes to keep a business fun...
Question 29: Which of the following would be an IS auditor's GREATEST con...
Question 30: Following a security breach in which a hacker exploited a we...
Question 31: An organization is planning to implement a work-from-home po...
Question 32: Which of the following is the MOST effective control to miti...
Question 33: What Is the BEST method to determine if IT resource spending...
Question 34: During audit framework. an IS auditor teams that employees a...
Question 35: Which of the following is the MOST significant risk that IS ...
Question 36: An IS auditor concludes that an organization has a quality s...
Question 37: Which of the following presents the GREATEST challenge to th...
Question 38: Which of the following should be the PRIMARY basis for prior...
Question 39: What should an IS auditor do FIRST when management responses...
Question 40: An organization's enterprise architecture (EA) department de...
Question 41: While executing follow-up activities, an IS auditor is conce...
Question 42: An IS auditor is analyzing a sample of accesses recorded on ...
Question 43: Which of the following is the BEST way to enforce the princi...
Question 44: When implementing Internet Protocol security (IPsec) archite...
Question 45: An organization has virtualized its server environment witho...
Question 46: During a follow-up audit, an IS auditor learns that some key...
Question 47: Which of the following findings should be of GREATEST concer...
Question 48: An audit has identified that business units have purchased c...
Question 49: Which of the following will be the MOST effective method to ...
Question 50: In the development of a new financial application, the IS au...
Question 51: What should an IS auditor do FIRST upon discovering that a s...
1 commentQuestion 52: An information systems security officer's PRIMARY responsibi...
Question 53: Which of the following access rights presents the GREATEST r...
Question 54: Which of the following should be GREATEST concern to an IS a...
Question 55: Which of the following is MOST important for an effective co...
Question 56: Which of the following is the BEST control to minimize the r...
Question 57: Which of the following is an advantage of using agile softwa...
Question 58: Which of the following should be an IS auditor's GREATEST co...
1 commentQuestion 59: Which of the following is the MOST effective method of destr...
Question 60: An IS auditor is evaluating an organization's IT strategy an...
Question 61: During the evaluation of controls over a major application d...
Question 62: Which of the following provides a new IS auditor with the MO...
Question 63: The PRIMARY purpose of requiring source code escrow in a con...
Question 64: The use of which of the following is an inherent risk in the...
Question 65: Which of the following is the BEST way to determine whether ...
Question 66: Which of the following would be a result of utilizing a top-...
Question 67: An auditee disagrees with a recommendation for corrective ac...
Question 68: An IS auditor reviewing the throat assessment for a data can...
Question 69: Which of the following should be an IS auditor's GREATEST co...
Question 70: An IS auditor is reviewing documentation of application syst...
Question 71: Stress testing should ideally be earned out under a:...
Question 72: Management has requested a post-implementation review of a n...
Question 73: A disaster recovery plan (DRP) should include steps for:...
Question 74: Which of the following is the MOST appropriate and effective...
Question 75: An IS auditor has discovered that a software system still in...
Question 76: Which of the following is the MOST appropriate indicator of ...
Question 77: Which of the following audit procedures would be MOST conclu...
Question 78: In order to be useful, a key performance indicator (KPI) MUS...
Question 79: An organization's security policy mandates that all new empl...
Question 80: Which of the following are used in a firewall to protect the...
Question 81: Which of the following should be done FIRST when planning a ...
Question 82: Management has learned the implementation of a new IT system...
Question 83: Which of the following is the BEST source of information for...
Question 84: An IS auditor plans to review all access attempts to a video...
Question 85: During a security audit, an IS auditor is tasked with review...
Question 86: An IS auditor notes that IT and the business have different ...
Question 87: What is the Most critical finding when reviewing an organiza...
Question 88: An organization has outsourced its data processing function ...
Question 89: Which of the following would be an appropriate role of inter...
Question 90: An organization is planning an acquisition and has engaged a...
Question 91: An organization is considering allowing users to connect per...
Question 92: Which of the following is the BEST indication to an IS audit...
Question 93: Which of the following activities would allow an IS auditor ...
Question 94: An IS auditor notes that the previous year's disaster recove...
Question 95: Which of the following should be of GREATEST concern to an I...
Question 96: Which of the following is the PRIMARY advantage of using vis...
Question 97: Which of the following should be the FRST step when developi...
Question 98: Which of the following is the BEST data integrity check?...
Question 99: Which of the following is the BEST source of information to ...
Question 100: During the discussion of a draft audit report. IT management...
Question 101: During an audit of a financial application, it was determine...
Question 102: An IS auditor is evaluating the risk associated with moving ...
Question 103: Which of the following documents should specify roles and re...
Question 104: Which of the following is necessary for effective risk manag...
Question 105: During an incident management audit, an IS auditor finds tha...
Question 106: Which of the following is the BEST compensating control when...
Question 107: Which of the following attack techniques will succeed becaus...
Question 108: Which of the following is a PRIMARY responsibility of an IT ...
Question 109: Which of the following is MOST important for an IS auditor t...
Question 110: Which of the following is MOST important to include in foren...
Question 111: An organizations audit charier PRIMARILY:...
Question 112: After the merger of two organizations, which of the followin...
Question 113: Which of the following is the BEST indicator of the effectiv...
Question 114: Which of the following should be the FIRST step to successfu...
Question 115: Which of the following is MOST important to determine during...
Question 116: An incorrect version of source code was amended by a develop...
Question 117: In which phase of the internal audit process is contact esta...
Question 118: Which of the following is MOST important when planning a net...
Question 119: When verifying the accuracy and completeness of migrated dat...
Question 120: Which of the following would BEST facilitate the successful ...
Question 121: Which of the following is MOST important for an IS auditor t...
Question 122: What is MOST important to verify during an external assessme...
Question 123: Which of the following is an audit reviewer's PRIMARY role w...
Question 124: A post-implementation review was conducted by issuing a surv...
Question 125: A new regulation in one country of a global organization has...
Question 126: Which of the following is the MOST effective way to maintain...
Question 127: Which of the following BEST guards against the risk of attac...
Question 128: Which of the following should be the FIRST step when conduct...
Question 129: A company has implemented an IT segregation of duties policy...
Question 130: An IS auditor has discovered that a software system still in...
Question 131: During a review of a production schedule, an IS auditor obse...
Question 132: Which of the following is the PRIMARY role of the IS auditor...
Question 133: An externally facing system containing sensitive data is con...
Question 134: Which of the following should an IS auditor consider FIRST w...
Question 135: An IS auditor discovers that validation controls m a web app...
Question 136: Which of the following must be in place before an IS auditor...
Question 137: A warehouse employee of a retail company has been able to co...
Question 138: The PRIMARY benefit of automating application testing is to:...
Question 139: An organization has recently acquired and implemented intell...
Question 140: The PRIMARY objective of value delivery in reference to IT g...
Question 141: Which of the following is the MOST important determining fac...
Question 142: A review of an organization's IT portfolio revealed several ...
Question 143: Which of the following BEST Indicates that an incident manag...
Question 144: An organization has outsourced the development of a core app...
1 commentQuestion 145: Which of the following is the BEST justification for deferri...
Question 146: An organization is disposing of a system containing sensitiv...
Question 147: Which of the following is the BEST way to mitigate the impac...
Question 148: Which of the following is me GREATE ST impact as a result of...
Question 149: An IS auditor has been asked to assess the security of a rec...
Question 150: Which of the following BEST demonstrates that IT strategy Is...
Question 151: Which of the following BEST enables an organization to impro...
Question 152: Which of the following should be the MOST important consider...
Question 153: An IS auditor is examining a front-end subledger and a main ...
Question 154: What is the PRIMARY purpose of documenting audit objectives ...
Question 155: An IS auditor Is reviewing a recent security incident and is...