Valid CISA Dumps shared by ExamDiscuss.com for Helping Passing CISA Exam! ExamDiscuss.com now offer the newest CISA exam dumps, the ExamDiscuss.com CISA exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com CISA dumps with Test Engine here:

Access CISA Dumps Premium Version
(1435 Q&As Dumps, 35%OFF Special Discount Code: freecram)

<< Prev Question Next Question >>

Question 59/624

Which of the following is MOST important to include in a data retention policy to reduce legal liabilities associated with information life cycle management?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (624q)
Question 1: Which of the following would be of GREATEST concern to an IS...
Question 2: Which of the following BEST enables an organization to impro...
Question 3: An organization has implemented a distributed security admin...
Question 4: An IS auditor observes that a business-critical application ...
Question 5: An organization has outsourced the maintenance of its custom...
Question 6: The FIRST step in auditing a data communication system is to...
Question 7: The PRIMARY benefit to using a dry-pipe fire-suppression sys...
Question 8: Which of the following are used in a firewall to protect the...
Question 9: Which of the following is MOST important for an IS auditor t...
Question 10: Which of the following attack techniques will succeed becaus...
Question 11: Which of the following is the BEST way to ensure payment tra...
Question 12: Which of the following is MOST important for an IS auditor t...
Question 13: Using swipe cards to limit employee access to restricted are...
Question 14: An IS auditor is reviewing documentation of application syst...
Question 15: An IS auditor performing an audit of backup procedures obser...
Question 16: Which type of threat can utilize a large group of automated ...
Question 17: The use of which of the following is an inherent risk in the...
Question 18: Which of the following is a concern associated with virtuali...
Question 19: An organization has recently become aware of a pervasive chi...
Question 20: The PRIMARY reason for an IS auditor to use data analytics t...
Question 21: Which of the following should be an IS auditor's GREATEST co...
Question 22: A small startup organization does not have the resources to ...
Question 23: Which of the following is the MOST important prerequisite fo...
Question 24: An IS auditor is reviewing enterprise governance and finds t...
Question 25: During which phase of a system development project should ke...
Question 26: Which of the following should an IS auditor be MOST concerne...
Question 27: Which of the following fire suppression systems needs to be ...
Question 28: An IS auditor finds that a key Internet-facing system is vul...
Question 29: After the release of an application system, an IS auditor wa...
Question 30: An IS auditor is following up on prior period items and find...
Question 31: During an IS audit, it is discovered that data classificatio...
Question 32: A finance department has a multi-year project to upgrade the...
Question 33: Which of the following would lead an IS auditor to conclude ...
Question 34: Which of the following should an IS auditor be MOST concerne...
Question 35: An auditee disagrees with a recommendation for corrective ac...
Question 36: Which of the following is MOST important to include within a...
Question 37: Which of the following BEST indicates that the effectiveness...
Question 38: Which of the following provides a new IS auditor with the MO...
Question 39: An IS auditor has found that an organization is unable to ad...
Question 40: Which of the following is the GREATEST risk related to the u...
Question 41: An IS auditor has been tasked to review the processes that p...
Question 42: Which of the following BEST describes the role of a document...
Question 43: When evaluating evidence as part of an IS audit, which of th...
Question 44: How does a switched network reduce the risk of network sniff...
Question 45: Which of the following is the MOST reliable way for an IS au...
Question 46: Which of the following is a PRIMARY benefit of using risk as...
Question 47: Which of the following methods would BEST help detect unauth...
Question 48: Which of the following is MOST important for an IS auditor t...
Question 49: Which of the following is the MOST important determining fac...
Question 50: Which of the following data would be used when performing a ...
Question 51: Which of the following provides the MOST comprehensive descr...
Question 52: Which of the following is the PRIMARY advantage of parallel ...
Question 53: Which of the following should be the FIRST consideration whe...
Question 54: Which of the following audit procedures would provide the BE...
Question 55: Which of the following would MOST effectively ensure the int...
Question 56: An IS auditor reviewing the physical access section of a sec...
Question 57: Which of the following is the GREATEST risk associated with ...
Question 58: Which of the following is the MOST appropriate and effective...
Question 59: Which of the following is MOST important to include in a dat...
Question 60: Which of the following should be the FIRST step to successfu...
Question 61: Which of the following is MOST critical for the effective im...
Question 62: Which of the following would be MOST useful to an IS auditor...
Question 63: When auditing the alignment of IT to the business strategy, ...
Question 64: Which is not a purpose of risk analysis?...
Question 65: Which of the following would be of GREATEST concern if noted...
Question 66: A help desk has been contacted regarding a lost business mob...
Question 67: Which of the following metrics is the BEST indicator of the ...
Question 68: IT governance should be driven by:...
Question 69: Which of the following responsibilities of an organization's...
Question 70: An organization is considering using production data for tes...
Question 71: A new system development project is running late against a c...
Question 72: Which of the following should be the FIRST step in a data mi...
Question 73: An IS auditor reviewing a job scheduling tool notices perfor...
Question 74: Which of the following is a social engineering attack method...
Question 75: What is the BEST way to reduce the risk of inaccurate or mis...
Question 76: Which of the following is the MOST important action to ensur...
Question 77: Which of the following issues associated with a data center'...
Question 78: Which of the following is the GREATEST risk associated with ...
Question 79: Which of the following is the GREATEST impact as a result of...
Question 80: An IS auditor is reviewing security controls related to coll...
Question 81: An organization needs to comply with data privacy regulation...
Question 82: An IS auditor discovers that due to resource constraints, a ...
Question 83: An IS auditor finds a high-risk vulnerability in a public-fa...
Question 84: During a database management evaluation, an IS auditor disco...
Question 85: Which of the following BEST facilitates strategic program ma...
Question 86: Which of the following is the GREATEST risk associated with ...
Question 87: A firewall between internal network segments improves securi...
Question 88: Which of the following activities provides an IS auditor wit...
Question 89: Which of the following is MOST likely to increase if an orga...
Question 90: An IS auditor observes that each department follows a differ...
Question 91: While evaluating the data classification process of an organ...
Question 92: Which of the following would present the GREATEST concern du...
Question 93: An IS auditor finds a segregation of duties issue in an ente...
Question 94: An organization's security policy mandates that all new empl...
Question 95: Due to limited storage capacity, an organization has decided...
Question 96: During an audit of an organization's financial statements, a...
Question 97: Which of the following would the IS auditor MOST likely revi...
Question 98: Which of the following types of testing would BEST mitigate ...
Question 99: On a public-key cryptosystem when there is no previous knowl...
Question 100: As part of the architecture of virtualized environments, in ...
Question 101: As part of the risk management process, threats and vulnerab...
Question 102: A network review is being undertaken to evaluate security ri...
Question 103: Which of the following BEST demonstrates to senior managemen...
Question 104: An IS auditor has been asked to audit the proposed acquisiti...
Question 105: Which of the following would BEST enable an organization to ...
Question 106: An organization is developing data classification standards ...
Question 107: Which of the following should be done FIRST to protect evide...
Question 108: Which feature associated with an Infrastructure as a Service...
Question 109: Of the following, who are the MOST appropriate staff for ens...
Question 110: An internal audit department reports directly to the chief f...
Question 111: An IS auditor finds that a recently deployed application has...
Question 112: Which of the following should an IS auditor recommend be per...
Question 113: Which of the following should be an IS auditor's PRIMARY foc...
Question 114: Which of the following is MOST helpful for understanding an ...
Question 115: Which of the following BEST enables an organization to verif...
Question 116: Which of the following BEST enables an organization to ident...
Question 117: When planning an audit to assess application controls of a c...
Question 118: If enabled within firewall rules, which of the following ser...
Question 119: Which of the following is the BEST recommendation to prevent...
Question 120: The PRIMARY benefit of a risk-based audit methodology is to:...
Question 121: An IS auditor assessing an organization's information system...
Question 122: An IS auditor observes that a bank's web page address is pre...
Question 123: Which of the following would BEST manage the risk of changes...
Question 124: Which of the following observations should be of GREATEST co...
Question 125: An employee loses a mobile device resulting in loss of sensi...
Question 126: Which of the following approaches will ensure recovery time ...
Question 127: When protecting mobile devices, which of the following is th...
Question 128: Which of the following cloud deployment models would BEST me...
Question 129: Which of the following backup schemes is the BEST option whe...
Question 130: Which of the following should be the PRIMARY basis for prior...
Question 131: During the discussion of a draft audit report, IT management...
Question 132: Which of the following is MOST important for an IS auditor t...
Question 133: Which of the following would be the MOST significant factor ...
Question 134: Which of the following is the MOST important outcome of an i...
Question 135: The members of an emergency incident response team should be...
Question 136: One advantage of monetary unit sampling is the fact that...
Question 137: When testing the adequacy of tape backup procedures, which s...
Question 138: A confidential file was sent to a legal entity, and hashing ...
Question 139: Which of the following is MOST important for an effective co...
Question 140: The IS quality assurance (QA) group is responsible for:...
Question 141: Which of the following would an IS auditor consider the GREA...
Question 142: Which of the following is the GREATEST risk when using appli...
Question 143: Which of the following is the BEST reason for an organizatio...
Question 144: An IS auditor reviewing a financial organization's identity ...
Question 145: Which of the following should be of GREATEST concern to an I...
Question 146: Which of the following is the PRIMARY objective of enterpris...
Question 147: An IS auditors reviewing the perimeter security design of a ...
Question 148: Which of the following is MOST important to include in a fea...
Question 149: The MOST appropriate person to chair the steering committee ...
Question 150: An IS auditor who was instrumental in designing an applicati...
Question 151: An IS auditor observes a system performance monitoring too t...
Question 152: Which of the following would BEST integrate multiple data wa...
Question 153: Which of the following methods will BEST reduce the risk ass...
Question 154: Which of the following BEST enables a benefits realization p...
Question 155: Which of the following approaches provides the BEST assuranc...
Question 156: The MOST important reason why an IT risk assessment should b...
Question 157: Which of the following BEST protects an organization's propr...
Question 158: What should an IS auditor do FIRST when management responses...
Question 159: Which of the following findings should be of GREATEST concer...
Question 160: Which of the following incident response team activities con...
Question 161: An audit of environmental controls at a data center could in...
Question 162: What is MOST important to verify during an external assessme...
Question 163: Which of the following is the BEST way to prevent social eng...
Question 164: Which of the following management decisions presents the GRE...
Question 165: Which of the following is the BEST way to mitigate the risk ...
Question 166: Which of the following is the BEST control to minimize the r...
Question 167: An organization that has suffered a cyberattack is performin...
Question 168: Which of the following should be of GREATEST concern to an I...
Question 169: During an access review, an IS auditor observes a workstatio...
Question 170: Which of the following is a core functionality of a configur...
Question 171: An employee transfers from an organization's risk management...
Question 172: An IS auditor notes that several employees are spending an e...
Question 173: Which of the following is MOST important for an IS auditor t...
Question 174: An IS auditor is evaluating an organization's IT strategy an...
Question 175: A sample for testing must include the 80 largest client bala...
Question 176: An IS audit reveals that an organization operating in busine...
Question 177: An organization allows employees to retain confidential data...
Question 178: Which of the following is a threat to IS auditor independenc...
Question 179: An IS audit review identifies inconsistencies in privacy req...
Question 180: When auditing an organization's software acquisition process...
Question 181: Which of the following software versions would an IS auditor...
Question 182: Which of the following is the BEST way to verify the effecti...
Question 183: An IS auditor should ensure that an application's audit trai...
Question 184: Which of the following ensures components of an IT system ar...
Question 185: What is the purpose of the audit charter?...
Question 186: Which of the following is the BEST indication that there are...
Question 187: In a typical system development life cycle (SDLC), which gro...
Question 188: Which of the following features of a library control softwar...
Question 189: Which of the following is the BEST evidence that an organiza...
Question 190: Which of the following is the BEST way for an IS auditor to ...
Question 191: Which of the following BEST facilitates compliance with requ...
Question 192: When reviewing a business case for a proposed implementation...
Question 193: An IS auditor has been tasked with auditing the inventory co...
Question 194: As part of business continuity planning, which of the follow...
Question 195: Which of the following BEST enables an IS auditor to combine...
Question 196: Which of the following is MOST important for an IS auditor t...
Question 197: An organization wants an independent measure of an outsource...
Question 198: A matrix showing the current state and challenges of an orga...
Question 199: Which of the following provides the MOST reliable method of ...
Question 200: What should an IS auditor do FIRST upon discovering that a s...
Question 201: Which of the following should be the MOST important consider...
Question 202: Which of the following is the BEST indication that an IT ser...
Question 203: An IS auditor has been asked to advise on measures to improv...
Question 204: An IS auditor is executing a risk-based IS audit strategy to...
Question 205: Which of the following is MOST important when defining the I...
Question 206: Which of the following statements appearing in an organizati...
Question 207: When reviewing past results of a recurring annual audit, an ...
Question 208: Which of the following is the MOST important advantage of pa...
Question 209: Which of the following is the MOST appropriate indicator of ...
Question 210: When planning an audit, it is acceptable for an IS auditor t...
Question 211: An IS auditor follows up on a recent security incident and f...
Question 212: Management has learned the implementation of a new IT system...
Question 213: Which of the following is the BEST way to identify whether t...
Question 214: Which of the following controls associated with software dev...
Question 215: Which of the following is MOST important when implementing a...
Question 216: An IS auditor has identified deficiencies within the organiz...
Question 217: An organization has an acceptable use policy in place, but u...
Question 218: Which of the following is the BEST indication that a softwar...
Question 219: Which of the following is the BEST way to determine whether ...
Question 220: Which of the following business continuity activities priori...
Question 221: Which of the following should be responsible for verifying c...
Question 222: The PRIMARY benefit of information asset classification is t...
Question 223: Which of the following is the BEST source of information for...
Question 224: In reviewing the IT strategic plan, the IS auditor should co...
Question 225: Which of the following is MOST important for an IS auditor t...
Question 226: Which of the following should be of GREATEST concern to an I...
Question 227: Which of the following is the MOST effective control to miti...
Question 228: Which of the following should be considered when examining f...
Question 229: Which of the following should be reviewed FIRST when assessi...
Question 230: The MOST important function of a business continuity plan (B...
Question 231: During the post-implementation review of an application that...
Question 232: Which of the following is the BEST method to delete sensitiv...
Question 233: Following a security breach in which a hacker exploited a we...
Question 234: An IS auditor is performing an integrated audit covering pay...
Question 235: Which of the following is the BEST way to sanitize a hard di...
Question 236: Which of the following is MOST important with regard to an a...
Question 237: Which of the following is the BEST way to ensure email confi...
Question 238: An IS auditor discovers a box of hard drives in a secured lo...
Question 239: Who would provide an IS auditor with the MOST helpful input ...
Question 240: During a routine internal software licensing review, an IS a...
Question 241: An organization has recently implemented a Voice-over IP (Vo...
Question 242: The BEST indicator of an optimized quality management system...
Question 243: An IS auditor finds a computer that is suspected to have bee...
Question 244: Which of the following observations should be of GREATEST co...
Question 245: Which of the following MOST effectively minimizes downtime d...
Question 246: To develop meaningful recommendations for findings, which of...
Question 247: Which of the following findings from an IT governance review...
Question 248: During an IT governance audit, an IS auditor notes that IT p...
Question 249: An IS auditor discovers from patch logs that some in-scope s...
Question 250: What is the principal issue surrounding the use of CAAT tool...
Question 251: Which of the following should be an IS auditor's PRIMARY foc...
Question 252: Which of the following is the BEST way to address segregatio...
Question 253: Aligning IT strategy with business strategy PRIMARILY helps ...
Question 254: What is the PRIMARY benefit of an audit approach which requi...
Question 255: An organization allows its employees to use personal mobile ...
Question 256: After delivering an audit report, the audit manager discover...
Question 257: Which of the following would provide multi-factor authentica...
Question 258: During a follow-up audit, an IS auditor learns that some key...
Question 259: Which of the following network topologies will provide the G...
Question 260: Which of the following is MOST important when evaluating the...
Question 261: Which of the following indicates that an internal audit orga...
Question 262: Which of the following is the MOST important issue for an IS...
Question 263: Which of the following would be of GREATEST concern to an IS...
Question 264: When evaluating the design of controls related to network mo...
Question 265: An organization's information security department has recent...
Question 266: Which type of framework is BEST suited to illustrate the tra...
Question 267: Which of the following would provide the BEST evidence of an...
Question 268: An IS auditor discovers an option in a database that allows ...
Question 269: During the review of a data conversion process for a retail ...
Question 270: Which of the following is an IS auditor's GREATEST concern w...
Question 271: What is the definition of a work breakdown structure?...
Question 272: Which of the following is a PRIMARY benefit of a maturity mo...
Question 273: Which of the following is the MOST important responsibility ...
Question 274: An IS auditor previously worked in an organization's IT depa...
Question 275: When is the BEST time to commence continuity planning for a ...
Question 276: Which of the following is MOST helpful to a data owner when ...
Question 277: During an incident management audit, an IS auditor finds tha...
Question 278: Which of the following is MOST important for an organization...
Question 279: Which of the following will BEST help detect software licens...
Question 280: When reviewing a data classification scheme, it is MOST impo...
Question 281: Which of the following is MOST useful for matching records o...
Question 282: Which of the following is the BEST way to mitigate risk to a...
Question 283: Which of the following is the MAIN purpose of an information...
Question 284: An external IS auditor has been engaged to determine the org...
Question 285: Which of the following is the MOST effective way to assess t...
Question 286: Which of the following is the BEST way for an IS auditor to ...
Question 287: What is a PRIMARY benefit of using Transport Layer Security ...
Question 288: Which of the following should be an IS auditor's PRIMARY con...
Question 289: Which of the following BEST enables system resiliency for an...
Question 290: Which type of review is MOST important to conduct when an IS...
Question 291: Which of the following BEST demonstrates alignment of the IT...
Question 292: An IS auditor is reviewing the maturity of a large organizat...
Question 293: Which of the following would BEST indicate the effectiveness...
Question 294: Which of the following is critical to the successful establi...
Question 295: What is the BEST method to determine if IT resource spending...
Question 296: Which of the following should be the FIRST step in managing ...
Question 297: The PRIMARY focus of a post-implementation review is to veri...
Question 298: Which of the following is the PRIMARY purpose of conducting ...
Question 299: Which of the following is the BEST detective control for a j...
Question 300: The decision to accept an IT control risk related to data qu...
Question 301: An organization is enhancing the security of a client-facing...
Question 302: Which of the following areas of responsibility would cause t...
Question 303: Which of the following provides IS audit professionals with ...
Question 304: Which of the following should be the PRIMARY objective of an...
Question 305: Which of the following is MOST important to verify when dete...
Question 306: Which of the following would BEST determine whether a post-i...
Question 307: Which of the following observations noted by an IS auditor r...
Question 308: Which of the following is the BEST reason to implement a dat...
Question 309: Which of the following is the MOST effective method to ident...
Question 310: Which of the following provides the BEST audit evidence that...
Question 311: A CFO has requested an audit of IT capacity management due t...
Question 312: Which of the following should an IS auditor review FIRST whe...
Question 313: An organization considers implementing a system that uses a ...
Question 314: Which of the following MUST be completed as part of the annu...
Question 315: Which of the following should be of GREATEST concern to an I...
Question 316: When evaluating an information security risk assessment, wha...
Question 317: When determining whether a project in the design phase will ...
Question 318: Which of the following yields the HIGHEST level of system av...
Question 319: A warehouse employee of a retail company has been able to co...
Question 320: An IS auditor is assigned to perform a post-implementation r...
Question 321: When implementing a new IT maturity model, which of the foll...
Question 322: Which of the following responses to risk associated with seg...
Question 323: A computer forensic audit is MOST relevant in which of the f...
Question 324: During a security audit, an IS auditor is tasked with review...
Question 325: An organization has implemented segregation of duties with a...
Question 326: Which of the following should be done FIRST to ensure that a...
Question 327: Which of the following would BEST detect that a distributed ...
Question 328: During a software acquisition review, an IS auditor should r...
Question 329: During audit fieldwork, an IS auditor learns that employees ...
Question 330: Which of the following is the MOST important activity in the...
Question 331: When auditing the closing stages of a system development pro...
Question 332: One benefit of return on investment (ROI) analysis in IT dec...
Question 333: An IS auditor discovers that validation controls in a web ap...
Question 334: Which of the following BEST protects private health informat...
Question 335: An IS auditor suspects an organization's computer may have b...
Question 336: Due to a recent business divestiture, an organization has li...
Question 337: Which of the following would be MOST time and cost efficient...
Question 338: Which of the following controls provides the MOST protection...
Question 339: For the implementation of a program change in a production e...
Question 340: Which of the following risks is BEST mitigated by implementi...
Question 341: Which of the following should be the FIRST step when plannin...
Question 342: Which of the following should be the FIRST step when develop...
Question 343: Which of the following is the BEST way for an IS auditor to ...
Question 344: During an audit of an access control system, an IS auditor f...
Question 345: Which of the following is a detective control?...
Question 346: Which of the following BEST enables an IS auditor to priorit...
Question 347: Which of the following controls is BEST implemented through ...
Question 348: Which of the following is the BEST way to reduce the attack ...
Question 349: Which of the following is the MOST important responsibility ...
Question 350: Which of the following will MOST likely compromise the contr...
Question 351: A secure server room has a badge reader system that records ...
Question 352: Which of the following is MOST important to consider when as...
Question 353: Which of the following is MOST important for the effective i...
Question 354: During a project meeting for the implementation of an enterp...
Question 355: Which of the following provides the BEST evidence of effecti...
Question 356: Which of the following BEST minimizes performance degradatio...
Question 357: What are the proper names of the four methods of risk respon...
Question 358: An IT steering committee assists the board of directors in f...
Question 359: Which of the following should be done FIRST when planning to...
Question 360: Which of the following is the GREATEST benefit to an organiz...
Question 361: An organization with many desktop PCs is considering moving ...
Question 362: An IS auditor is planning an audit of an organization's risk...
Question 363: Which of the following is the MOST important consideration f...
Question 364: Which of the following findings related to an organization's...
Question 365: An IS auditor should be MOST concerned with the placement of...
Question 366: Which of the following organizational functions is MOST appr...
Question 367: During a review of an organization's technology policies, wh...
Question 368: Which of the following is the BEST indication that an organi...
Question 369: An IS auditor has learned that access privileges are not per...
Question 370: Which of the following is an IS auditor's BEST recommendatio...
Question 371: An IS auditor observes that exceptions have been approved fo...
Question 372: Which of the following is the GREATEST advantage of agile de...
Question 373: During an exit interview, senior management disagrees with s...
Question 374: Which of the following is the PRIMARY benefit of performing ...
Question 375: Who should issue the organizational policies?...
Question 376: During a review of an organization's network threat response...
Question 377: An IS auditor performing an application development review a...
Question 378: Which of the following is MOST likely to be detected by an I...
Question 379: Which of the following BEST ensures the quality and integrit...
Question 380: Which of the following would be the BEST process for continu...
Question 381: Which of the following is the BEST use of a maturity model i...
Question 382: Which of the following should be the IS auditor's PRIMARY fo...
Question 383: Which of the following would protect the confidentiality of ...
Question 384: An IS auditor has completed the fieldwork phase of a network...
Question 385: A small financial institution is preparing to implement a ch...
Question 386: An IS audit manager is reviewing workpapers for a recently c...
Question 387: Which of the following key performance indicators (KPIs) pro...
Question 388: An organization is planning to hire a third party to develop...
Question 389: What is the MAIN reason to use incremental backups?...
Question 390: An IS auditor is reviewing a contract for the outsourcing of...
Question 391: Which of the following BEST enables an organization to contr...
Question 392: Which of the following should be the GREATEST concern for an...
Question 393: An organization uses public key infrastructure (PKI) to prov...
Question 394: Which of the following would BEST detect unauthorized modifi...
Question 395: An organization sends daily backup media by courier to an of...
Question 396: An emergency power-off switch should:...
Question 397: Which of the following is an IS auditor's BEST course of act...
Question 398: Which of the following should be used to evaluate an IT deve...
Question 399: Which of the following is MOST important to include when dev...
Question 400: Which of the following would a digital signature MOST likely...
Question 401: Which of the following would be MOST effective to protect in...
Question 402: Which of the following techniques is MOST appropriate for ve...
Question 403: Which of the following is the PRIMARY reason that asset clas...
Question 404: When assessing whether an organization's IT performance meas...
Question 405: An organization has outsourced the development of a core app...
Question 406: Which of the following should be of GREATEST concern to an I...
Question 407: An IS auditor is evaluating the security of an organization'...
Question 408: Which of the following is MOST important when planning a net...
Question 409: The MOST critical security weakness of a packet level firewa...
Question 410: An IS auditor reviewing an IT organization should be MOST co...
Question 411: From an IS auditor's perspective, which of the following wou...
Question 412: An organization has implemented a quarterly job schedule to ...
Question 413: An IS auditor found that operations personnel failed to run ...
Question 414: Which of the following should be an IS auditor's GREATEST co...
Question 415: When reviewing an IT strategic plan, the GREATEST concern wo...
Question 416: Which of the following BEST supports the effectiveness of a ...
Question 417: Which of the following is the PRIMARY reason for using a dig...
Question 418: When conducting a requirements analysis for a project, the B...
Question 419: Which of the following is the PRIMARY risk when business uni...
Question 420: Which of the following strategies BEST optimizes data storag...
Question 421: Which of the following is MOST important to verify when impl...
Question 422: The record-locking option of a database management system (D...
Question 423: Which of the following BEST guards against the risk of attac...
Question 424: Which of the following is the BEST compensating control agai...
Question 425: To ensure confidentiality through the use of asymmetric encr...
Question 426: When assessing the quality of personnel data, an IS auditor ...
Question 427: Which of the following would BEST prevent the potential leak...
Question 428: Which of the following is MOST critical to the success of an...
Question 429: Which of the following should be done FIRST when a major sec...
Question 430: During an investigation, it was determined that an employee ...
Question 431: An IS auditor has been asked to investigate critical busines...
Question 432: Due to advancements in technology and electronic records, an...
Question 433: An employee has accidentally posted confidential data to the...
Question 434: The two types of tests are referred to as _________ and ____...
Question 435: Which of the following would BEST guide an IS auditor when d...
Question 436: Which of the following should be of GREATEST concern to an I...
Question 437: An IS auditor is reviewing an organization's overall inciden...
Question 438: Which of the following is an indication of possible hacker a...
Question 439: An IS auditor is performing a review of an application and f...
Question 440: Which of the following is the PRIMARY protocol for protectin...
Question 441: An IS auditor learns of a new regulation which imposes penal...
Question 442: During a review of IT service desk practices, an IS auditor ...
Question 443: In order to be useful, a key performance indicator (KPI) MUS...
Question 444: Which of the following is the BEST way for management to ens...
Question 445: Which of the following is the PRIMARY purpose for external a...
Question 446: Which of the following BEST ensures that effective change ma...
Question 447: Who is PRIMARILY responsible for the design of IT controls t...
Question 448: An organization allows employees to use personally owned mob...
Question 449: Which of the following should an IS auditor do FIRST when as...
Question 450: In a RACI model, which of the following roles must be assign...
Question 451: An IS auditor would MOST likely recommend that IT management...
Question 452: In a small IT web development company where developers must ...
Question 453: Which of the following would be of GREATEST concern to an IS...
Question 454: What is the definition of a standard as compared to a guidel...
Question 455: An IS auditor finds that capacity management for a key syste...
Question 456: Which of the following would provide management with the MOS...
Question 457: A data analytics team has developed a process automation bot...
Question 458: Which of the following is the BEST method to maintain an aud...
Question 459: For effective IT governance, it is MOST important to have an...
Question 460: Which of the following should be an IS auditor's GREATEST co...
Question 461: During an organization's implementation of a data loss preve...
Question 462: Which of the following provides the MOST useful information ...
Question 463: During a security access review, an IS auditor identifies a ...
Question 464: Which of the following is the BEST control to mitigate attac...
Question 465: An organization has engaged a third party to implement an ap...
Question 466: An organization is permanently transitioning from onsite to ...
Question 467: Which of the following is the MOST effective control for pro...
Question 468: An IS audit manager finds that data manipulation logic devel...
Question 469: Which of the following is the PRIMARY reason to perform user...
Question 470: Which of the following should be the GREATEST concern for an...
Question 471: Which of the following weaknesses would have the GREATEST im...
Question 472: An IS auditor is reviewing a bank's service level agreement ...
Question 473: Which of the following BEST enables an IS auditor to underst...
Question 474: During planning for a cloud service audit, audit management ...
Question 475: An organization has decided to outsource a critical applicat...
Question 476: What should an IS auditor recommend to management as the MOS...
Question 477: Which of the following is the MOST important consideration w...
Question 478: Which of the following is the PRIMARY purpose of conducting ...
Question 479: Which of the following is the MOST cost-effective way to det...
Question 480: A credit card company has decided to outsource the printing ...
Question 481: An organization uses system interfaces to disburse money to ...
Question 482: An IS auditor is conducting a review of a data center. Which...
Question 483: A bank's web-hosting provider has just completed an internal...
Question 484: An IS auditor is performing a follow-up audit for findings i...
Question 485: During a project audit, an IS auditor notes that project rep...
Question 486: An IS auditor is evaluating the risk associated with moving ...
Question 487: During a review of a production schedule, an IS auditor obse...
Question 488: Which of the following is the PRIMARY responsibility of an i...
Question 489: Which of the following is the BEST audit procedure to determ...
Question 490: An IS auditor finds that an organization's data loss prevent...
Question 491: An IS auditor finds that irregularities have occurred and th...
Question 492: IT disaster recovery time objectives (RTOs) should be based ...
Question 493: Which of the following is the MOST significant risk associat...
Question 494: When reviewing a business impact analysis (BIA), it is MOST ...
Question 495: An organization is disposing of a system containing sensitiv...
Question 496: An IS auditor is analyzing a sample of accesses recorded on ...
Question 497: Which of the following is the BEST source of information to ...
Question 498: Which of the following would be MOST useful when analyzing c...
Question 499: Which of the following is the MOST important area of focus f...
Question 500: An IS auditor is reviewing a recent security incident and is...
Question 501: After an employee termination, a network account was removed...
Question 502: The application systems quality assurance (QA) function shou...
Question 503: Which type of control has been established when an organizat...
Question 504: An organization's IT risk assessment should include the iden...
Question 505: Which of the following is an example of personally identifia...
Question 506: What is the purpose of ISACA's professional ethics statement...
Question 507: An application development team is also promoting changes to...
Question 508: Which of the following is the BEST report for an IS auditor ...
Question 509: An organization wants to change its project methodology to a...
Question 510: A new regulation in one country of a global organization has...
Question 511: Which control classification attempts to repair the impact o...
Question 512: The BEST way to provide assurance that a project is adhering...
Question 513: A month after a company purchased and implemented system and...
Question 514: An internal audit team is deciding whether to use an audit m...
Question 515: Management states that a recommendation made during a prior ...
Question 516: Which of the following is the GREATEST benefit of adopting a...
Question 517: Which of the following is the MOST efficient way to identify...
Question 518: The BEST way to evaluate the effectiveness of a newly develo...
Question 519: Which of the following is an executive management concern th...
Question 520: Which of the following is found in an audit charter?...
Question 521: In which of the following sampling methods is the entire sam...
Question 522: Which of the following would be MOST useful to an organizati...
Question 523: Which of the following metrics would be MOST useful to an IS...
Question 524: Which of the following is the BEST way to address potential ...
Question 525: An IS auditor is concerned that unauthorized access to a hig...
Question 526: As part of a recent business-critical initiative, an organiz...
Question 527: Which of the following is the MOST effective approach in ass...
Question 528: An organization has introduced a capability maturity model t...
Question 529: Which of the following is an IS auditor's BEST approach when...
Question 530: While reviewing an organization's business continuity plan (...
Question 531: Which of the following is the PRIMARY reason an IS auditor w...
Question 532: Which of the following methods would BEST ensure that IT str...
Question 533: An organization plans to deploy a data loss prevention (DLP)...
Question 534: The PRIMARY purpose of running a new system in parallel is t...
Question 535: Which of the following indicates an effective change control...
Question 536: An IS auditor is reviewing an industrial control system (ICS...
Question 537: Which of the following approaches would BEST enable an e-com...
Question 538: Which of the following is the BEST way for an IS auditor to ...
Question 539: A web proxy server for corporate connections to external res...
Question 540: Which of the following provides the MOST assurance of the in...
Question 541: An IS auditor detects that event logging has been disabled o...
Question 542: During an operational audit on the procurement department, t...
Question 543: Many departments of an organization have not implemented aud...
Question 544: An IS auditor is observing transaction processing and notes ...
Question 545: Which of the following is the BEST use of a balanced scoreca...
Question 546: Which of the following is the MOST important environmental e...
Question 547: Which of the following would BEST protect the confidentialit...
Question 548: To mitigate the risk of exposing data through application pr...
Question 549: An IS audit reveals that an organization is not proactively ...
Question 550: An organization relies on an external vendor that uses a clo...
Question 551: What is the BEST way to evaluate a control environment where...
Question 552: Which of the following is the BEST way to ensure an organiza...
Question 553: The FIRST step in an incident response plan is to:...
Question 554: The MAIN benefit of using an integrated test facility (ITF) ...
Question 555: An organization shares some of its customers' personally ide...
Question 556: The practice of periodic secure code reviews is which type o...
Question 557: To reduce operational costs, IT management plans to reduce t...
Question 558: An IS auditor is evaluating the access controls for a shared...
Question 559: What would be an IS auditor's BEST course of action when an ...
Question 560: An IS auditor has discovered that a cloud-based application ...
Question 561: Which of the following BEST contributes to the quality of an...
Question 562: Following the implementation of a data loss prevention (DLP)...
Question 563: Documentation of workaround processes to keep a business fun...
Question 564: Which of the following is the BEST recommendation to mitigat...
Question 565: An IS auditor noted that a change to a critical calculation ...
Question 566: What would be the PRIMARY reason for an IS auditor to recomm...
Question 567: Which of the following BEST enables an organization to balan...
Question 568: The PRIMARY objective of a control self-assessment (CSA) is ...
Question 569: Which of the following documents should specify roles and re...
Question 570: Compared to developing a system in-house, acquiring a softwa...
Question 571: Which of the following is the BEST methodology to use for es...
Question 572: An IS auditor is performing a project review and finds that ...
Question 573: An organization's strategy to source certain IT functions fr...
Question 574: Which of the following is the PRIMARY reason for an IS audit...
Question 575: What should an IS auditor review FIRST to verify that an org...
Question 576: Invoking a business continuity plan (BCP) is demonstrating w...
Question 577: A PRIMARY benefit derived by an organization employing contr...
Question 578: Which of the following is the BEST method to safeguard data ...
Question 579: Which of the following should be the PRIMARY role of an inte...
Question 580: Which of the following is MOST important when creating a for...
Question 581: An IS auditor has been asked to perform a post-implementatio...
Question 582: Which of the following is the BEST approach for determining ...
Question 583: Which of the following would be a concern of the auditor tha...
Question 584: An organization was recently notified by its regulatory body...
Question 585: Which of the following provides the BEST evidence that a thi...
Question 586: An information systems security officer's PRIMARY responsibi...
Question 587: To address issues related to privileged users identified in ...
Question 588: An IS auditor finds that the cost of developing an applicati...
Question 589: While conducting an IT operations audit, an internal IS audi...
Question 590: During a review of system access, an IS auditor notes that a...
Question 591: An IS auditor is reviewing processes for importing market pr...
Question 592: While executing follow-up activities, an IS auditor is conce...
Question 593: Which of the following provides the BEST assurance of data i...
Question 594: Which of the following BEST indicates that an organization's...
Question 595: Which of the following is MOST important to consider when de...
Question 596: A senior auditor is reviewing work papers prepared by a juni...
Question 597: Which of the following is the GREATEST risk if two users hav...
Question 598: An organization plans to replace its nightly batch processin...
Question 599: Which of the following will enable a customer to authenticat...
Question 600: Which of the following is the MOST effective control to miti...
Question 601: Which of the following is the BEST way to determine if IT is...
Question 602: Which of the following is the BEST way to mitigate the risk ...
Question 603: Which of the following application input controls would MOST...
Question 604: Which of the following is a concern when an organization's d...
Question 605: Which of the following would be MOST important to include in...
Question 606: Which of the following is the MOST effective way to identify...
Question 607: Which of the following is the MOST effective control over vi...
Question 608: When assessing a proposed project for the two-way replicatio...
Question 609: An organization's enterprise architecture (EA) department de...
Question 610: Which of the following is the BEST way for an IS auditor to ...
Question 611: An organization outsources its IT function to a third-party ...
Question 612: Which of the following should be given GREATEST consideratio...
Question 613: Which of the following governance functions is responsible f...
Question 614: Which of the following is the MOST significant issue that co...
Question 615: Following a recent internal data breach, an IS auditor was a...
Question 616: An organization is experiencing a large number of phishing a...
Question 617: A review of IT interface controls finds an organization does...
Question 618: During an audit of payment services of a branch based in a f...
Question 619: Which of the following is the ULTIMATE objective of performi...
Question 620: During a review, an IS auditor discovers that corporate user...
Question 621: Which of the following is not a type of quantitative samplin...
Question 622: Which of the following is the MOST likely reason an organiza...
Question 623: An IS auditor notes that not all security tests were complet...
Question 624: During an exit meeting, an IS auditor highlights that backup...