<< Prev Question Next Question >>

Question 259/624

Which of the following network topologies will provide the GREATEST fault tolerance?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (624q)
Question 1: Which of the following would be of GREATEST concern to an IS...
Question 2: Which of the following BEST enables an organization to impro...
Question 3: An organization has implemented a distributed security admin...
Question 4: An IS auditor observes that a business-critical application ...
Question 5: An organization has outsourced the maintenance of its custom...
Question 6: The FIRST step in auditing a data communication system is to...
Question 7: The PRIMARY benefit to using a dry-pipe fire-suppression sys...
Question 8: Which of the following are used in a firewall to protect the...
Question 9: Which of the following is MOST important for an IS auditor t...
Question 10: Which of the following attack techniques will succeed becaus...
Question 11: Which of the following is the BEST way to ensure payment tra...
Question 12: Which of the following is MOST important for an IS auditor t...
Question 13: Using swipe cards to limit employee access to restricted are...
Question 14: An IS auditor is reviewing documentation of application syst...
Question 15: An IS auditor performing an audit of backup procedures obser...
Question 16: Which type of threat can utilize a large group of automated ...
Question 17: The use of which of the following is an inherent risk in the...
Question 18: Which of the following is a concern associated with virtuali...
Question 19: An organization has recently become aware of a pervasive chi...
Question 20: The PRIMARY reason for an IS auditor to use data analytics t...
Question 21: Which of the following should be an IS auditor's GREATEST co...
Question 22: A small startup organization does not have the resources to ...
Question 23: Which of the following is the MOST important prerequisite fo...
Question 24: An IS auditor is reviewing enterprise governance and finds t...
Question 25: During which phase of a system development project should ke...
Question 26: Which of the following should an IS auditor be MOST concerne...
Question 27: Which of the following fire suppression systems needs to be ...
Question 28: An IS auditor finds that a key Internet-facing system is vul...
Question 29: After the release of an application system, an IS auditor wa...
Question 30: An IS auditor is following up on prior period items and find...
Question 31: During an IS audit, it is discovered that data classificatio...
Question 32: A finance department has a multi-year project to upgrade the...
Question 33: Which of the following would lead an IS auditor to conclude ...
Question 34: Which of the following should an IS auditor be MOST concerne...
Question 35: An auditee disagrees with a recommendation for corrective ac...
Question 36: Which of the following is MOST important to include within a...
Question 37: Which of the following BEST indicates that the effectiveness...
Question 38: Which of the following provides a new IS auditor with the MO...
Question 39: An IS auditor has found that an organization is unable to ad...
Question 40: Which of the following is the GREATEST risk related to the u...
Question 41: An IS auditor has been tasked to review the processes that p...
Question 42: Which of the following BEST describes the role of a document...
Question 43: When evaluating evidence as part of an IS audit, which of th...
Question 44: How does a switched network reduce the risk of network sniff...
Question 45: Which of the following is the MOST reliable way for an IS au...
Question 46: Which of the following is a PRIMARY benefit of using risk as...
Question 47: Which of the following methods would BEST help detect unauth...
Question 48: Which of the following is MOST important for an IS auditor t...
Question 49: Which of the following is the MOST important determining fac...
Question 50: Which of the following data would be used when performing a ...
Question 51: Which of the following provides the MOST comprehensive descr...
Question 52: Which of the following is the PRIMARY advantage of parallel ...
Question 53: Which of the following should be the FIRST consideration whe...
Question 54: Which of the following audit procedures would provide the BE...
Question 55: Which of the following would MOST effectively ensure the int...
Question 56: An IS auditor reviewing the physical access section of a sec...
Question 57: Which of the following is the GREATEST risk associated with ...
Question 58: Which of the following is the MOST appropriate and effective...
Question 59: Which of the following is MOST important to include in a dat...
Question 60: Which of the following should be the FIRST step to successfu...
Question 61: Which of the following is MOST critical for the effective im...
Question 62: Which of the following would be MOST useful to an IS auditor...
Question 63: When auditing the alignment of IT to the business strategy, ...
Question 64: Which is not a purpose of risk analysis?...
Question 65: Which of the following would be of GREATEST concern if noted...
Question 66: A help desk has been contacted regarding a lost business mob...
Question 67: Which of the following metrics is the BEST indicator of the ...
Question 68: IT governance should be driven by:...
Question 69: Which of the following responsibilities of an organization's...
Question 70: An organization is considering using production data for tes...
Question 71: A new system development project is running late against a c...
Question 72: Which of the following should be the FIRST step in a data mi...
Question 73: An IS auditor reviewing a job scheduling tool notices perfor...
Question 74: Which of the following is a social engineering attack method...
Question 75: What is the BEST way to reduce the risk of inaccurate or mis...
Question 76: Which of the following is the MOST important action to ensur...
Question 77: Which of the following issues associated with a data center'...
Question 78: Which of the following is the GREATEST risk associated with ...
Question 79: Which of the following is the GREATEST impact as a result of...
Question 80: An IS auditor is reviewing security controls related to coll...
Question 81: An organization needs to comply with data privacy regulation...
Question 82: An IS auditor discovers that due to resource constraints, a ...
Question 83: An IS auditor finds a high-risk vulnerability in a public-fa...
Question 84: During a database management evaluation, an IS auditor disco...
Question 85: Which of the following BEST facilitates strategic program ma...
Question 86: Which of the following is the GREATEST risk associated with ...
Question 87: A firewall between internal network segments improves securi...
Question 88: Which of the following activities provides an IS auditor wit...
Question 89: Which of the following is MOST likely to increase if an orga...
Question 90: An IS auditor observes that each department follows a differ...
Question 91: While evaluating the data classification process of an organ...
Question 92: Which of the following would present the GREATEST concern du...
Question 93: An IS auditor finds a segregation of duties issue in an ente...
Question 94: An organization's security policy mandates that all new empl...
Question 95: Due to limited storage capacity, an organization has decided...
Question 96: During an audit of an organization's financial statements, a...
Question 97: Which of the following would the IS auditor MOST likely revi...
Question 98: Which of the following types of testing would BEST mitigate ...
Question 99: On a public-key cryptosystem when there is no previous knowl...
Question 100: As part of the architecture of virtualized environments, in ...
Question 101: As part of the risk management process, threats and vulnerab...
Question 102: A network review is being undertaken to evaluate security ri...
Question 103: Which of the following BEST demonstrates to senior managemen...
Question 104: An IS auditor has been asked to audit the proposed acquisiti...
Question 105: Which of the following would BEST enable an organization to ...
Question 106: An organization is developing data classification standards ...
Question 107: Which of the following should be done FIRST to protect evide...
Question 108: Which feature associated with an Infrastructure as a Service...
Question 109: Of the following, who are the MOST appropriate staff for ens...
Question 110: An internal audit department reports directly to the chief f...
Question 111: An IS auditor finds that a recently deployed application has...
Question 112: Which of the following should an IS auditor recommend be per...
Question 113: Which of the following should be an IS auditor's PRIMARY foc...
Question 114: Which of the following is MOST helpful for understanding an ...
Question 115: Which of the following BEST enables an organization to verif...
Question 116: Which of the following BEST enables an organization to ident...
Question 117: When planning an audit to assess application controls of a c...
Question 118: If enabled within firewall rules, which of the following ser...
Question 119: Which of the following is the BEST recommendation to prevent...
Question 120: The PRIMARY benefit of a risk-based audit methodology is to:...
Question 121: An IS auditor assessing an organization's information system...
Question 122: An IS auditor observes that a bank's web page address is pre...
Question 123: Which of the following would BEST manage the risk of changes...
Question 124: Which of the following observations should be of GREATEST co...
Question 125: An employee loses a mobile device resulting in loss of sensi...
Question 126: Which of the following approaches will ensure recovery time ...
Question 127: When protecting mobile devices, which of the following is th...
Question 128: Which of the following cloud deployment models would BEST me...
Question 129: Which of the following backup schemes is the BEST option whe...
Question 130: Which of the following should be the PRIMARY basis for prior...
Question 131: During the discussion of a draft audit report, IT management...
Question 132: Which of the following is MOST important for an IS auditor t...
Question 133: Which of the following would be the MOST significant factor ...
Question 134: Which of the following is the MOST important outcome of an i...
Question 135: The members of an emergency incident response team should be...
Question 136: One advantage of monetary unit sampling is the fact that...
Question 137: When testing the adequacy of tape backup procedures, which s...
Question 138: A confidential file was sent to a legal entity, and hashing ...
Question 139: Which of the following is MOST important for an effective co...
Question 140: The IS quality assurance (QA) group is responsible for:...
Question 141: Which of the following would an IS auditor consider the GREA...
Question 142: Which of the following is the GREATEST risk when using appli...
Question 143: Which of the following is the BEST reason for an organizatio...
Question 144: An IS auditor reviewing a financial organization's identity ...
Question 145: Which of the following should be of GREATEST concern to an I...
Question 146: Which of the following is the PRIMARY objective of enterpris...
Question 147: An IS auditors reviewing the perimeter security design of a ...
Question 148: Which of the following is MOST important to include in a fea...
Question 149: The MOST appropriate person to chair the steering committee ...
Question 150: An IS auditor who was instrumental in designing an applicati...
Question 151: An IS auditor observes a system performance monitoring too t...
Question 152: Which of the following would BEST integrate multiple data wa...
Question 153: Which of the following methods will BEST reduce the risk ass...
Question 154: Which of the following BEST enables a benefits realization p...
Question 155: Which of the following approaches provides the BEST assuranc...
Question 156: The MOST important reason why an IT risk assessment should b...
Question 157: Which of the following BEST protects an organization's propr...
Question 158: What should an IS auditor do FIRST when management responses...
Question 159: Which of the following findings should be of GREATEST concer...
Question 160: Which of the following incident response team activities con...
Question 161: An audit of environmental controls at a data center could in...
Question 162: What is MOST important to verify during an external assessme...
Question 163: Which of the following is the BEST way to prevent social eng...
Question 164: Which of the following management decisions presents the GRE...
Question 165: Which of the following is the BEST way to mitigate the risk ...
Question 166: Which of the following is the BEST control to minimize the r...
Question 167: An organization that has suffered a cyberattack is performin...
Question 168: Which of the following should be of GREATEST concern to an I...
Question 169: During an access review, an IS auditor observes a workstatio...
Question 170: Which of the following is a core functionality of a configur...
Question 171: An employee transfers from an organization's risk management...
Question 172: An IS auditor notes that several employees are spending an e...
Question 173: Which of the following is MOST important for an IS auditor t...
Question 174: An IS auditor is evaluating an organization's IT strategy an...
Question 175: A sample for testing must include the 80 largest client bala...
Question 176: An IS audit reveals that an organization operating in busine...
Question 177: An organization allows employees to retain confidential data...
Question 178: Which of the following is a threat to IS auditor independenc...
Question 179: An IS audit review identifies inconsistencies in privacy req...
Question 180: When auditing an organization's software acquisition process...
Question 181: Which of the following software versions would an IS auditor...
Question 182: Which of the following is the BEST way to verify the effecti...
Question 183: An IS auditor should ensure that an application's audit trai...
Question 184: Which of the following ensures components of an IT system ar...
Question 185: What is the purpose of the audit charter?...
Question 186: Which of the following is the BEST indication that there are...
Question 187: In a typical system development life cycle (SDLC), which gro...
Question 188: Which of the following features of a library control softwar...
Question 189: Which of the following is the BEST evidence that an organiza...
Question 190: Which of the following is the BEST way for an IS auditor to ...
Question 191: Which of the following BEST facilitates compliance with requ...
Question 192: When reviewing a business case for a proposed implementation...
Question 193: An IS auditor has been tasked with auditing the inventory co...
Question 194: As part of business continuity planning, which of the follow...
Question 195: Which of the following BEST enables an IS auditor to combine...
Question 196: Which of the following is MOST important for an IS auditor t...
Question 197: An organization wants an independent measure of an outsource...
Question 198: A matrix showing the current state and challenges of an orga...
Question 199: Which of the following provides the MOST reliable method of ...
Question 200: What should an IS auditor do FIRST upon discovering that a s...
Question 201: Which of the following should be the MOST important consider...
Question 202: Which of the following is the BEST indication that an IT ser...
Question 203: An IS auditor has been asked to advise on measures to improv...
Question 204: An IS auditor is executing a risk-based IS audit strategy to...
Question 205: Which of the following is MOST important when defining the I...
Question 206: Which of the following statements appearing in an organizati...
Question 207: When reviewing past results of a recurring annual audit, an ...
Question 208: Which of the following is the MOST important advantage of pa...
Question 209: Which of the following is the MOST appropriate indicator of ...
Question 210: When planning an audit, it is acceptable for an IS auditor t...
Question 211: An IS auditor follows up on a recent security incident and f...
Question 212: Management has learned the implementation of a new IT system...
Question 213: Which of the following is the BEST way to identify whether t...
Question 214: Which of the following controls associated with software dev...
Question 215: Which of the following is MOST important when implementing a...
Question 216: An IS auditor has identified deficiencies within the organiz...
Question 217: An organization has an acceptable use policy in place, but u...
Question 218: Which of the following is the BEST indication that a softwar...
Question 219: Which of the following is the BEST way to determine whether ...
Question 220: Which of the following business continuity activities priori...
Question 221: Which of the following should be responsible for verifying c...
Question 222: The PRIMARY benefit of information asset classification is t...
Question 223: Which of the following is the BEST source of information for...
Question 224: In reviewing the IT strategic plan, the IS auditor should co...
Question 225: Which of the following is MOST important for an IS auditor t...
Question 226: Which of the following should be of GREATEST concern to an I...
Question 227: Which of the following is the MOST effective control to miti...
Question 228: Which of the following should be considered when examining f...
Question 229: Which of the following should be reviewed FIRST when assessi...
Question 230: The MOST important function of a business continuity plan (B...
Question 231: During the post-implementation review of an application that...
Question 232: Which of the following is the BEST method to delete sensitiv...
Question 233: Following a security breach in which a hacker exploited a we...
Question 234: An IS auditor is performing an integrated audit covering pay...
Question 235: Which of the following is the BEST way to sanitize a hard di...
Question 236: Which of the following is MOST important with regard to an a...
Question 237: Which of the following is the BEST way to ensure email confi...
Question 238: An IS auditor discovers a box of hard drives in a secured lo...
Question 239: Who would provide an IS auditor with the MOST helpful input ...
Question 240: During a routine internal software licensing review, an IS a...
Question 241: An organization has recently implemented a Voice-over IP (Vo...
Question 242: The BEST indicator of an optimized quality management system...
Question 243: An IS auditor finds a computer that is suspected to have bee...
Question 244: Which of the following observations should be of GREATEST co...
Question 245: Which of the following MOST effectively minimizes downtime d...
Question 246: To develop meaningful recommendations for findings, which of...
Question 247: Which of the following findings from an IT governance review...
Question 248: During an IT governance audit, an IS auditor notes that IT p...
Question 249: An IS auditor discovers from patch logs that some in-scope s...
Question 250: What is the principal issue surrounding the use of CAAT tool...
Question 251: Which of the following should be an IS auditor's PRIMARY foc...
Question 252: Which of the following is the BEST way to address segregatio...
Question 253: Aligning IT strategy with business strategy PRIMARILY helps ...
Question 254: What is the PRIMARY benefit of an audit approach which requi...
Question 255: An organization allows its employees to use personal mobile ...
Question 256: After delivering an audit report, the audit manager discover...
Question 257: Which of the following would provide multi-factor authentica...
Question 258: During a follow-up audit, an IS auditor learns that some key...
Question 259: Which of the following network topologies will provide the G...
Question 260: Which of the following is MOST important when evaluating the...
Question 261: Which of the following indicates that an internal audit orga...
Question 262: Which of the following is the MOST important issue for an IS...
Question 263: Which of the following would be of GREATEST concern to an IS...
Question 264: When evaluating the design of controls related to network mo...
Question 265: An organization's information security department has recent...
Question 266: Which type of framework is BEST suited to illustrate the tra...
Question 267: Which of the following would provide the BEST evidence of an...
Question 268: An IS auditor discovers an option in a database that allows ...
Question 269: During the review of a data conversion process for a retail ...
Question 270: Which of the following is an IS auditor's GREATEST concern w...
Question 271: What is the definition of a work breakdown structure?...
Question 272: Which of the following is a PRIMARY benefit of a maturity mo...
Question 273: Which of the following is the MOST important responsibility ...
Question 274: An IS auditor previously worked in an organization's IT depa...
Question 275: When is the BEST time to commence continuity planning for a ...
Question 276: Which of the following is MOST helpful to a data owner when ...
Question 277: During an incident management audit, an IS auditor finds tha...
Question 278: Which of the following is MOST important for an organization...
Question 279: Which of the following will BEST help detect software licens...
Question 280: When reviewing a data classification scheme, it is MOST impo...
Question 281: Which of the following is MOST useful for matching records o...
Question 282: Which of the following is the BEST way to mitigate risk to a...
Question 283: Which of the following is the MAIN purpose of an information...
Question 284: An external IS auditor has been engaged to determine the org...
Question 285: Which of the following is the MOST effective way to assess t...
Question 286: Which of the following is the BEST way for an IS auditor to ...
Question 287: What is a PRIMARY benefit of using Transport Layer Security ...
Question 288: Which of the following should be an IS auditor's PRIMARY con...
Question 289: Which of the following BEST enables system resiliency for an...
Question 290: Which type of review is MOST important to conduct when an IS...
Question 291: Which of the following BEST demonstrates alignment of the IT...
Question 292: An IS auditor is reviewing the maturity of a large organizat...
Question 293: Which of the following would BEST indicate the effectiveness...
Question 294: Which of the following is critical to the successful establi...
Question 295: What is the BEST method to determine if IT resource spending...
Question 296: Which of the following should be the FIRST step in managing ...
Question 297: The PRIMARY focus of a post-implementation review is to veri...
Question 298: Which of the following is the PRIMARY purpose of conducting ...
Question 299: Which of the following is the BEST detective control for a j...
Question 300: The decision to accept an IT control risk related to data qu...
Question 301: An organization is enhancing the security of a client-facing...
Question 302: Which of the following areas of responsibility would cause t...
Question 303: Which of the following provides IS audit professionals with ...
Question 304: Which of the following should be the PRIMARY objective of an...
Question 305: Which of the following is MOST important to verify when dete...
Question 306: Which of the following would BEST determine whether a post-i...
Question 307: Which of the following observations noted by an IS auditor r...
Question 308: Which of the following is the BEST reason to implement a dat...
Question 309: Which of the following is the MOST effective method to ident...
Question 310: Which of the following provides the BEST audit evidence that...
Question 311: A CFO has requested an audit of IT capacity management due t...
Question 312: Which of the following should an IS auditor review FIRST whe...
Question 313: An organization considers implementing a system that uses a ...
Question 314: Which of the following MUST be completed as part of the annu...
Question 315: Which of the following should be of GREATEST concern to an I...
Question 316: When evaluating an information security risk assessment, wha...
Question 317: When determining whether a project in the design phase will ...
Question 318: Which of the following yields the HIGHEST level of system av...
Question 319: A warehouse employee of a retail company has been able to co...
Question 320: An IS auditor is assigned to perform a post-implementation r...
Question 321: When implementing a new IT maturity model, which of the foll...
Question 322: Which of the following responses to risk associated with seg...
Question 323: A computer forensic audit is MOST relevant in which of the f...
Question 324: During a security audit, an IS auditor is tasked with review...
Question 325: An organization has implemented segregation of duties with a...
Question 326: Which of the following should be done FIRST to ensure that a...
Question 327: Which of the following would BEST detect that a distributed ...
Question 328: During a software acquisition review, an IS auditor should r...
Question 329: During audit fieldwork, an IS auditor learns that employees ...
Question 330: Which of the following is the MOST important activity in the...
Question 331: When auditing the closing stages of a system development pro...
Question 332: One benefit of return on investment (ROI) analysis in IT dec...
Question 333: An IS auditor discovers that validation controls in a web ap...
Question 334: Which of the following BEST protects private health informat...
Question 335: An IS auditor suspects an organization's computer may have b...
Question 336: Due to a recent business divestiture, an organization has li...
Question 337: Which of the following would be MOST time and cost efficient...
Question 338: Which of the following controls provides the MOST protection...
Question 339: For the implementation of a program change in a production e...
Question 340: Which of the following risks is BEST mitigated by implementi...
Question 341: Which of the following should be the FIRST step when plannin...
Question 342: Which of the following should be the FIRST step when develop...
Question 343: Which of the following is the BEST way for an IS auditor to ...
Question 344: During an audit of an access control system, an IS auditor f...
Question 345: Which of the following is a detective control?...
Question 346: Which of the following BEST enables an IS auditor to priorit...
Question 347: Which of the following controls is BEST implemented through ...
Question 348: Which of the following is the BEST way to reduce the attack ...
Question 349: Which of the following is the MOST important responsibility ...
Question 350: Which of the following will MOST likely compromise the contr...
Question 351: A secure server room has a badge reader system that records ...
Question 352: Which of the following is MOST important to consider when as...
Question 353: Which of the following is MOST important for the effective i...
Question 354: During a project meeting for the implementation of an enterp...
Question 355: Which of the following provides the BEST evidence of effecti...
Question 356: Which of the following BEST minimizes performance degradatio...
Question 357: What are the proper names of the four methods of risk respon...
Question 358: An IT steering committee assists the board of directors in f...
Question 359: Which of the following should be done FIRST when planning to...
Question 360: Which of the following is the GREATEST benefit to an organiz...
Question 361: An organization with many desktop PCs is considering moving ...
Question 362: An IS auditor is planning an audit of an organization's risk...
Question 363: Which of the following is the MOST important consideration f...
Question 364: Which of the following findings related to an organization's...
Question 365: An IS auditor should be MOST concerned with the placement of...
Question 366: Which of the following organizational functions is MOST appr...
Question 367: During a review of an organization's technology policies, wh...
Question 368: Which of the following is the BEST indication that an organi...
Question 369: An IS auditor has learned that access privileges are not per...
Question 370: Which of the following is an IS auditor's BEST recommendatio...
Question 371: An IS auditor observes that exceptions have been approved fo...
Question 372: Which of the following is the GREATEST advantage of agile de...
Question 373: During an exit interview, senior management disagrees with s...
Question 374: Which of the following is the PRIMARY benefit of performing ...
Question 375: Who should issue the organizational policies?...
Question 376: During a review of an organization's network threat response...
Question 377: An IS auditor performing an application development review a...
Question 378: Which of the following is MOST likely to be detected by an I...
Question 379: Which of the following BEST ensures the quality and integrit...
Question 380: Which of the following would be the BEST process for continu...
Question 381: Which of the following is the BEST use of a maturity model i...
Question 382: Which of the following should be the IS auditor's PRIMARY fo...
Question 383: Which of the following would protect the confidentiality of ...
Question 384: An IS auditor has completed the fieldwork phase of a network...
Question 385: A small financial institution is preparing to implement a ch...
Question 386: An IS audit manager is reviewing workpapers for a recently c...
Question 387: Which of the following key performance indicators (KPIs) pro...
Question 388: An organization is planning to hire a third party to develop...
Question 389: What is the MAIN reason to use incremental backups?...
Question 390: An IS auditor is reviewing a contract for the outsourcing of...
Question 391: Which of the following BEST enables an organization to contr...
Question 392: Which of the following should be the GREATEST concern for an...
Question 393: An organization uses public key infrastructure (PKI) to prov...
Question 394: Which of the following would BEST detect unauthorized modifi...
Question 395: An organization sends daily backup media by courier to an of...
Question 396: An emergency power-off switch should:...
Question 397: Which of the following is an IS auditor's BEST course of act...
Question 398: Which of the following should be used to evaluate an IT deve...
Question 399: Which of the following is MOST important to include when dev...
Question 400: Which of the following would a digital signature MOST likely...
Question 401: Which of the following would be MOST effective to protect in...
Question 402: Which of the following techniques is MOST appropriate for ve...
Question 403: Which of the following is the PRIMARY reason that asset clas...
Question 404: When assessing whether an organization's IT performance meas...
Question 405: An organization has outsourced the development of a core app...
Question 406: Which of the following should be of GREATEST concern to an I...
Question 407: An IS auditor is evaluating the security of an organization'...
Question 408: Which of the following is MOST important when planning a net...
Question 409: The MOST critical security weakness of a packet level firewa...
Question 410: An IS auditor reviewing an IT organization should be MOST co...
Question 411: From an IS auditor's perspective, which of the following wou...
Question 412: An organization has implemented a quarterly job schedule to ...
Question 413: An IS auditor found that operations personnel failed to run ...
Question 414: Which of the following should be an IS auditor's GREATEST co...
Question 415: When reviewing an IT strategic plan, the GREATEST concern wo...
Question 416: Which of the following BEST supports the effectiveness of a ...
Question 417: Which of the following is the PRIMARY reason for using a dig...
Question 418: When conducting a requirements analysis for a project, the B...
Question 419: Which of the following is the PRIMARY risk when business uni...
Question 420: Which of the following strategies BEST optimizes data storag...
Question 421: Which of the following is MOST important to verify when impl...
Question 422: The record-locking option of a database management system (D...
Question 423: Which of the following BEST guards against the risk of attac...
Question 424: Which of the following is the BEST compensating control agai...
Question 425: To ensure confidentiality through the use of asymmetric encr...
Question 426: When assessing the quality of personnel data, an IS auditor ...
Question 427: Which of the following would BEST prevent the potential leak...
Question 428: Which of the following is MOST critical to the success of an...
Question 429: Which of the following should be done FIRST when a major sec...
Question 430: During an investigation, it was determined that an employee ...
Question 431: An IS auditor has been asked to investigate critical busines...
Question 432: Due to advancements in technology and electronic records, an...
Question 433: An employee has accidentally posted confidential data to the...
Question 434: The two types of tests are referred to as _________ and ____...
Question 435: Which of the following would BEST guide an IS auditor when d...
Question 436: Which of the following should be of GREATEST concern to an I...
Question 437: An IS auditor is reviewing an organization's overall inciden...
Question 438: Which of the following is an indication of possible hacker a...
Question 439: An IS auditor is performing a review of an application and f...
Question 440: Which of the following is the PRIMARY protocol for protectin...
Question 441: An IS auditor learns of a new regulation which imposes penal...
Question 442: During a review of IT service desk practices, an IS auditor ...
Question 443: In order to be useful, a key performance indicator (KPI) MUS...
Question 444: Which of the following is the BEST way for management to ens...
Question 445: Which of the following is the PRIMARY purpose for external a...
Question 446: Which of the following BEST ensures that effective change ma...
Question 447: Who is PRIMARILY responsible for the design of IT controls t...
Question 448: An organization allows employees to use personally owned mob...
Question 449: Which of the following should an IS auditor do FIRST when as...
Question 450: In a RACI model, which of the following roles must be assign...
Question 451: An IS auditor would MOST likely recommend that IT management...
Question 452: In a small IT web development company where developers must ...
Question 453: Which of the following would be of GREATEST concern to an IS...
Question 454: What is the definition of a standard as compared to a guidel...
Question 455: An IS auditor finds that capacity management for a key syste...
Question 456: Which of the following would provide management with the MOS...
Question 457: A data analytics team has developed a process automation bot...
Question 458: Which of the following is the BEST method to maintain an aud...
Question 459: For effective IT governance, it is MOST important to have an...
Question 460: Which of the following should be an IS auditor's GREATEST co...
Question 461: During an organization's implementation of a data loss preve...
Question 462: Which of the following provides the MOST useful information ...
Question 463: During a security access review, an IS auditor identifies a ...
Question 464: Which of the following is the BEST control to mitigate attac...
Question 465: An organization has engaged a third party to implement an ap...
Question 466: An organization is permanently transitioning from onsite to ...
Question 467: Which of the following is the MOST effective control for pro...
Question 468: An IS audit manager finds that data manipulation logic devel...
Question 469: Which of the following is the PRIMARY reason to perform user...
Question 470: Which of the following should be the GREATEST concern for an...
Question 471: Which of the following weaknesses would have the GREATEST im...
Question 472: An IS auditor is reviewing a bank's service level agreement ...
Question 473: Which of the following BEST enables an IS auditor to underst...
Question 474: During planning for a cloud service audit, audit management ...
Question 475: An organization has decided to outsource a critical applicat...
Question 476: What should an IS auditor recommend to management as the MOS...
Question 477: Which of the following is the MOST important consideration w...
Question 478: Which of the following is the PRIMARY purpose of conducting ...
Question 479: Which of the following is the MOST cost-effective way to det...
Question 480: A credit card company has decided to outsource the printing ...
Question 481: An organization uses system interfaces to disburse money to ...
Question 482: An IS auditor is conducting a review of a data center. Which...
Question 483: A bank's web-hosting provider has just completed an internal...
Question 484: An IS auditor is performing a follow-up audit for findings i...
Question 485: During a project audit, an IS auditor notes that project rep...
Question 486: An IS auditor is evaluating the risk associated with moving ...
Question 487: During a review of a production schedule, an IS auditor obse...
Question 488: Which of the following is the PRIMARY responsibility of an i...
Question 489: Which of the following is the BEST audit procedure to determ...
Question 490: An IS auditor finds that an organization's data loss prevent...
Question 491: An IS auditor finds that irregularities have occurred and th...
Question 492: IT disaster recovery time objectives (RTOs) should be based ...
Question 493: Which of the following is the MOST significant risk associat...
Question 494: When reviewing a business impact analysis (BIA), it is MOST ...
Question 495: An organization is disposing of a system containing sensitiv...
Question 496: An IS auditor is analyzing a sample of accesses recorded on ...
Question 497: Which of the following is the BEST source of information to ...
Question 498: Which of the following would be MOST useful when analyzing c...
Question 499: Which of the following is the MOST important area of focus f...
Question 500: An IS auditor is reviewing a recent security incident and is...
Question 501: After an employee termination, a network account was removed...
Question 502: The application systems quality assurance (QA) function shou...
Question 503: Which type of control has been established when an organizat...
Question 504: An organization's IT risk assessment should include the iden...
Question 505: Which of the following is an example of personally identifia...
Question 506: What is the purpose of ISACA's professional ethics statement...
Question 507: An application development team is also promoting changes to...
Question 508: Which of the following is the BEST report for an IS auditor ...
Question 509: An organization wants to change its project methodology to a...
Question 510: A new regulation in one country of a global organization has...
Question 511: Which control classification attempts to repair the impact o...
Question 512: The BEST way to provide assurance that a project is adhering...
Question 513: A month after a company purchased and implemented system and...
Question 514: An internal audit team is deciding whether to use an audit m...
Question 515: Management states that a recommendation made during a prior ...
Question 516: Which of the following is the GREATEST benefit of adopting a...
Question 517: Which of the following is the MOST efficient way to identify...
Question 518: The BEST way to evaluate the effectiveness of a newly develo...
Question 519: Which of the following is an executive management concern th...
Question 520: Which of the following is found in an audit charter?...
Question 521: In which of the following sampling methods is the entire sam...
Question 522: Which of the following would be MOST useful to an organizati...
Question 523: Which of the following metrics would be MOST useful to an IS...
Question 524: Which of the following is the BEST way to address potential ...
Question 525: An IS auditor is concerned that unauthorized access to a hig...
Question 526: As part of a recent business-critical initiative, an organiz...
Question 527: Which of the following is the MOST effective approach in ass...
Question 528: An organization has introduced a capability maturity model t...
Question 529: Which of the following is an IS auditor's BEST approach when...
Question 530: While reviewing an organization's business continuity plan (...
Question 531: Which of the following is the PRIMARY reason an IS auditor w...
Question 532: Which of the following methods would BEST ensure that IT str...
Question 533: An organization plans to deploy a data loss prevention (DLP)...
Question 534: The PRIMARY purpose of running a new system in parallel is t...
Question 535: Which of the following indicates an effective change control...
Question 536: An IS auditor is reviewing an industrial control system (ICS...
Question 537: Which of the following approaches would BEST enable an e-com...
Question 538: Which of the following is the BEST way for an IS auditor to ...
Question 539: A web proxy server for corporate connections to external res...
Question 540: Which of the following provides the MOST assurance of the in...
Question 541: An IS auditor detects that event logging has been disabled o...
Question 542: During an operational audit on the procurement department, t...
Question 543: Many departments of an organization have not implemented aud...
Question 544: An IS auditor is observing transaction processing and notes ...
Question 545: Which of the following is the BEST use of a balanced scoreca...
Question 546: Which of the following is the MOST important environmental e...
Question 547: Which of the following would BEST protect the confidentialit...
Question 548: To mitigate the risk of exposing data through application pr...
Question 549: An IS audit reveals that an organization is not proactively ...
Question 550: An organization relies on an external vendor that uses a clo...
Question 551: What is the BEST way to evaluate a control environment where...
Question 552: Which of the following is the BEST way to ensure an organiza...
Question 553: The FIRST step in an incident response plan is to:...
Question 554: The MAIN benefit of using an integrated test facility (ITF) ...
Question 555: An organization shares some of its customers' personally ide...
Question 556: The practice of periodic secure code reviews is which type o...
Question 557: To reduce operational costs, IT management plans to reduce t...
Question 558: An IS auditor is evaluating the access controls for a shared...
Question 559: What would be an IS auditor's BEST course of action when an ...
Question 560: An IS auditor has discovered that a cloud-based application ...
Question 561: Which of the following BEST contributes to the quality of an...
Question 562: Following the implementation of a data loss prevention (DLP)...
Question 563: Documentation of workaround processes to keep a business fun...
Question 564: Which of the following is the BEST recommendation to mitigat...
Question 565: An IS auditor noted that a change to a critical calculation ...
Question 566: What would be the PRIMARY reason for an IS auditor to recomm...
Question 567: Which of the following BEST enables an organization to balan...
Question 568: The PRIMARY objective of a control self-assessment (CSA) is ...
Question 569: Which of the following documents should specify roles and re...
Question 570: Compared to developing a system in-house, acquiring a softwa...
Question 571: Which of the following is the BEST methodology to use for es...
Question 572: An IS auditor is performing a project review and finds that ...
Question 573: An organization's strategy to source certain IT functions fr...
Question 574: Which of the following is the PRIMARY reason for an IS audit...
Question 575: What should an IS auditor review FIRST to verify that an org...
Question 576: Invoking a business continuity plan (BCP) is demonstrating w...
Question 577: A PRIMARY benefit derived by an organization employing contr...
Question 578: Which of the following is the BEST method to safeguard data ...
Question 579: Which of the following should be the PRIMARY role of an inte...
Question 580: Which of the following is MOST important when creating a for...
Question 581: An IS auditor has been asked to perform a post-implementatio...
Question 582: Which of the following is the BEST approach for determining ...
Question 583: Which of the following would be a concern of the auditor tha...
Question 584: An organization was recently notified by its regulatory body...
Question 585: Which of the following provides the BEST evidence that a thi...
Question 586: An information systems security officer's PRIMARY responsibi...
Question 587: To address issues related to privileged users identified in ...
Question 588: An IS auditor finds that the cost of developing an applicati...
Question 589: While conducting an IT operations audit, an internal IS audi...
Question 590: During a review of system access, an IS auditor notes that a...
Question 591: An IS auditor is reviewing processes for importing market pr...
Question 592: While executing follow-up activities, an IS auditor is conce...
Question 593: Which of the following provides the BEST assurance of data i...
Question 594: Which of the following BEST indicates that an organization's...
Question 595: Which of the following is MOST important to consider when de...
Question 596: A senior auditor is reviewing work papers prepared by a juni...
Question 597: Which of the following is the GREATEST risk if two users hav...
Question 598: An organization plans to replace its nightly batch processin...
Question 599: Which of the following will enable a customer to authenticat...
Question 600: Which of the following is the MOST effective control to miti...
Question 601: Which of the following is the BEST way to determine if IT is...
Question 602: Which of the following is the BEST way to mitigate the risk ...
Question 603: Which of the following application input controls would MOST...
Question 604: Which of the following is a concern when an organization's d...
Question 605: Which of the following would be MOST important to include in...
Question 606: Which of the following is the MOST effective way to identify...
Question 607: Which of the following is the MOST effective control over vi...
Question 608: When assessing a proposed project for the two-way replicatio...
Question 609: An organization's enterprise architecture (EA) department de...
Question 610: Which of the following is the BEST way for an IS auditor to ...
Question 611: An organization outsources its IT function to a third-party ...
Question 612: Which of the following should be given GREATEST consideratio...
Question 613: Which of the following governance functions is responsible f...
Question 614: Which of the following is the MOST significant issue that co...
Question 615: Following a recent internal data breach, an IS auditor was a...
Question 616: An organization is experiencing a large number of phishing a...
Question 617: A review of IT interface controls finds an organization does...
Question 618: During an audit of payment services of a branch based in a f...
Question 619: Which of the following is the ULTIMATE objective of performi...
Question 620: During a review, an IS auditor discovers that corporate user...
Question 621: Which of the following is not a type of quantitative samplin...
Question 622: Which of the following is the MOST likely reason an organiza...
Question 623: An IS auditor notes that not all security tests were complet...
Question 624: During an exit meeting, an IS auditor highlights that backup...