<< Prev Question Next Question >>

Question 414/492

The IS quality assurance (OA) group is responsible for:

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (492q)
Question 1: An IS auditor is reviewing a machine learning algorithm-base...
Question 2: Secure code reviews as part of a continuous deployment progr...
Question 3: Which of the following should be an IS auditor's GREATEST co...
Question 4: The PRIMARY role of an IS auditor in the remediation of prob...
Question 5: Which of the following is the MOST important reason to class...
Question 6: What Is the BEST method to determine if IT resource spending...
Question 7: Which of the following approaches will ensure recovery time ...
Question 8: An organization allows its employees lo use personal mobile ...
Question 9: Which of the following is the PRIMARY advantage of using vis...
Question 10: Which of the following is the BEST way to verify the effecti...
Question 11: Which of following is MOST important to determine when condu...
Question 12: Which of the following is MOST important for an IS auditor t...
Question 13: To confirm integrity for a hashed message, the receiver shou...
Question 14: An organization's sensitive data is stored in a cloud comput...
Question 15: Which of the following provides the GREATEST assurance that ...
Question 16: What should an IS auditor do FIRST when management responses...
Question 17: Which of the following is a social engineering attack method...
Question 18: Which of the following controls is BEST implemented through ...
Question 19: Which of the following is a threat to IS auditor independenc...
Question 20: Which of the following is the MOST important area of focus f...
Question 21: Which of the following is the BEST methodology to use for es...
Question 22: Which of the following metrics is the BEST indicator of the ...
Question 23: Which of the following is the BEST way to detect unauthorize...
Question 24: Which of the following would protect the confidentiality of ...
Question 25: Which of the following should be of GREATEST concern to an I...
Question 26: In which of the following sampling methods is the entire sam...
Question 27: A telecommunications company has recently created a new frau...
Question 28: Which of the following is MOST useful for determining whethe...
Question 29: Which of the following findings would be of GREATEST concern...
Question 30: An IS auditor can BEST evaluate the business impact of syste...
Question 31: Which of the following observations regarding change managem...
Question 32: Audit frameworks cart assist the IS audit function by:...
Question 33: The PRIMARY purpose of an incident response plan is to:...
Question 34: Which of the following is the BEST sampling method to use wh...
Question 35: The process of applying a hash function to a message and obt...
Question 36: During a project assessment, an IS auditor finds that busine...
Question 37: Which type of review is MOST important to conduct when an IS...
Question 38: Which of the following is MOST helpful to an IS auditor when...
Question 39: While executing follow-up activities, an IS auditor is conce...
Question 40: The PRIMARY responsibility of a project steering committee i...
Question 41: A checksum is classified as which type of control?...
Question 42: Which of the following would lead an IS auditor to conclude ...
Question 43: Which of the following risk scenarios is BEST addressed by i...
Question 44: Which of the following will BEST ensure that a proper cutoff...
Question 45: A finance department has a multi-year project to upgrade the...
Question 46: An organization has an acceptable use policy in place, but u...
Question 47: Which of the following documents should specify roles and re...
Question 48: Which of the following is an effective way to ensure the int...
Question 49: Which of the following is the PRIMARY objective of implement...
Question 50: The use of which of the following would BEST enhance a proce...
Question 51: IS management has recently disabled certain referential inte...
Question 52: What is the GREATEST concern for an IS auditor reviewing con...
Question 53: An organization is disposing of removable onsite media which...
Question 54: What should an IS auditor evaluate FIRST when reviewing an o...
Question 55: The BEST way to evaluate the effectiveness of a newly develo...
Question 56: Which of the following BEST ensures the quality and integrit...
Question 57: Which of the following is the BEST point in time to conduct ...
Question 58: A small IT department has embraced DevOps, which allows memb...
Question 59: Which of the following is the PRIMARY reason an IS auditor w...
Question 60: Which of the following provides the MOST assurance over the ...
Question 61: An organization that operates an e-commerce website wants to...
Question 62: Which of the following is the BEST way to ensure an organiza...
Question 63: Which of the following management decisions presents the GRE...
Question 64: Which of the following is MOST important when defining the I...
Question 65: Which of the following would be of GREATEST concern to an IS...
Question 66: Which of the following is the MOST effective way to identify...
Question 67: An IS auditor has discovered that a software system still in...
Question 68: Which of the following is MOST likely to be a project delive...
Question 69: In an organization's feasibility study to acquire hardware t...
Question 70: An IS auditor is following up on prior period items and find...
Question 71: Which of the following is the BEST source of information to ...
Question 72: The PRIMARY benefit lo using a dry-pipe fire-suppression sys...
Question 73: Which of the following is an IS auditor's BEST recommendatio...
Question 74: To reduce operational costs, IT management plans to reduce t...
Question 75: Which of the following is the MOST appropriate control to en...
Question 76: Which type of attack poses the GREATEST risk to an organizat...
Question 77: Which of the following provides the MOST assurance of the in...
Question 78: Which of the following should be of GREATEST concern to an |...
Question 79: The PRIMARY advantage of object-oriented technology is enhan...
Question 80: Which of the following would BEST determine whether a post-i...
Question 81: An IS auditor noted a recent production incident in which a ...
Question 82: An IS auditor has been asked to advise on measures to improv...
Question 83: A web application is developed in-house by an organization. ...
Question 84: When auditing an organization's software acquisition process...
Question 85: An organization is concerned about duplicate vendor payments...
Question 86: Recovery facilities providing a redundant combination of Int...
Question 87: Which of the following would be of GREATEST concern to an IS...
Question 88: Which of the following would be MOST useful to an IS auditor...
Question 89: An IS auditor observes that a business-critical application ...
Question 90: Which of the following would provide the BEST evidence of an...
Question 91: An IS audit manager is preparing the staffing plan for an au...
Question 92: Which of the following is the MOST important benefit of invo...
Question 93: A core system fails a week after a scheduled update, causing...
Question 94: A global organization's policy states that all workstations ...
Question 95: An organization is planning to implement a work-from-home po...
Question 96: Afire alarm system has been installed in the computer room T...
Question 97: Which of the following BEST describes an audit risk?...
Question 98: Who is PRIMARILY responsible for the design of IT controls t...
Question 99: Which of the following should be the FIRST step when conduct...
Question 100: During a security audit, an IS auditor is tasked with review...
Question 101: Which of the following must be in place before an IS auditor...
Question 102: The PRIMARY objective of value delivery in reference to IT g...
Question 103: An organization has partnered with a third party to transpor...
Question 104: Which of the following is the PRIMARY concern when negotiati...
Question 105: Which of the following should be GREATEST concern to an IS a...
Question 106: Which of the following is the MOST appropriate and effective...
Question 107: Which type of control has been established when an organizat...
Question 108: Which of the following BEST guards against the risk of attac...
Question 109: Which of the following should be the FIRST step to successfu...
Question 110: Which of the following is the MOST important consideration f...
Question 111: Which of the following is MOST important with regard to an a...
Question 112: An IS auditor discovers that validation controls in a web ap...
Question 113: Due to limited storage capacity, an organization has decided...
Question 114: Which of the following audit procedures would provide the BE...
Question 115: The GREATEST benefit of using a polo typing approach in soft...
Question 116: An IS auditor is examining a front-end subledger and a main ...
Question 117: Which of the following is the BEST indication that there are...
Question 118: Which of the following BEST describes the role of a document...
Question 119: During a disaster recovery audit, an IS auditor finds that a...
Question 120: Which of the following would be the MOST useful metric for m...
Question 121: An organization that has suffered a cyber-attack is performi...
Question 122: Spreadsheets are used to calculate project cost estimates. T...
Question 123: Which of the following tests is MOST likely to detect an err...
Question 124: An IS auditor has been asked to provide support to the contr...
Question 125: Which of the following is MOST important during software lic...
Question 126: Which of the following observations would an IS auditor cons...
Question 127: An external audit firm was engaged to perform a validation a...
Question 128: Which of the following should be restricted from a network a...
Question 129: Following the sale of a business division, employees will be...
Question 130: Which of the following provides the BE ST method for maintai...
Question 131: Which of the following would BEST indicate the effectiveness...
Question 132: An IS auditor is reviewing database fields updated in real-t...
Question 133: Stress testing should ideally be carried out under a:...
Question 134: A manager Identifies active privileged accounts belonging to...
Question 135: The BEST way to prevent fraudulent payments is to implement ...
Question 136: Which of the following is the GREATEST benefit of adopting a...
Question 137: Which of the following would be the BEST criteria for monito...
Question 138: A data breach has occurred due lo malware. Which of the foll...
Question 139: An organization's IT risk assessment should include the iden...
Question 140: An IS auditor learns a server administration team regularly ...
Question 141: What is the BEST control to address SQL injection vulnerabil...
Question 142: An internal audit department recently established a quality ...
Question 143: An IS auditor is evaluating an enterprise resource planning ...
Question 144: Which of the following presents the GREATEST challenge to th...
Question 145: A senior IS auditor suspects that a PC may have been used to...
Question 146: During an audit of a multinational bank's disposal process, ...
Question 147: Which of the following should be the FRST step when developi...
Question 148: Which of the following is MOST useful when planning to audit...
Question 149: During the planning phase of a data loss prevention (DLP) au...
Question 150: Which of the following biometric access controls has the HIG...
Question 151: An IS auditor is planning an audit of an organization's acco...
Question 152: Which of the following should be an IS auditor's PRIMARY con...
Question 153: Which of the following is the BEST indication of effective I...
Question 154: During an ongoing audit, management requests a briefing on t...
Question 155: Which of the following metrics would BEST measure the agilit...
Question 156: An IS auditor should be MOST concerned if which of the follo...
Question 157: Which of the following is the BEST way to mitigate the risk ...
Question 158: Which of the following is MOST important to consider when re...
Question 159: Which of the following is MOST appropriate to prevent unauth...
Question 160: An IS auditor is reviewing processes for importing market pr...
Question 161: An organization outsourced its IS functions to meet its resp...
Question 162: An IS auditor who was instrumental in designing an applicati...
Question 163: Which of the following is MOST important to include in foren...
Question 164: Which of the following is the MOST important prerequisite fo...
Question 165: Which of the following physical controls provides the GREATE...
Question 166: An IS auditor is reviewing the security of a web-based custo...
Question 167: Which of the following would BEST facilitate the successful ...
Question 168: Management receives information indicating a high level of r...
Question 169: Which of the following is MOST appropriate to review when de...
Question 170: During an audit of payment services of a branch based in a f...
Question 171: Which of the following should be of GREATEST concern to an I...
Question 172: An organization is shifting to a remote workforce In prepara...
Question 173: To mitigate the risk of exposing data through application pr...
Question 174: Which of the following should be the PRIMARY role of an inte...
Question 175: An IS auditor discovers that due to resource constraints a d...
Question 176: An IS auditor will be testing accounts payable controls by p...
Question 177: Several unattended laptops containing sensitive customer dat...
Question 178: A transaction processing system interfaces with the general ...
Question 179: An IS auditor wants to gain a better understanding of an org...
Question 180: An IS auditor finds that capacity management for a key syste...
Question 181: When auditing the closing stages of a system development pro...
Question 182: An employee loses a mobile device resulting in loss of sensi...
Question 183: Which of the following is a method to prevent disclosure of ...
Question 184: Which of the following BEST demonstrates to senior managemen...
Question 185: Which of the following activities provides an IS auditor wit...
Question 186: An IS auditor has been tasked to review the processes that p...
Question 187: A new system development project is running late against a c...
Question 188: Which of the following data would be used when performing a ...
Question 189: Following a breach, what is the BEST source to determine the...
Question 190: The PRIMARY objective of a follow-up audit is to:...
Question 191: The BEST way to provide assurance that a project is adhering...
Question 192: When planning a review of IT governance, an IS auditor is MO...
Question 193: Which of the following provides the BEST assurance of data i...
Question 194: An IS auditor finds a user account where privileged access i...
Question 195: Due to system limitations, segregation of duties (SoD) canno...
Question 196: Which of the following methods will BEST reduce the risk ass...
Question 197: Which of the following provides the BEST evidence of the val...
Question 198: Which of the following is a corrective control?...
Question 199: Which of the following is the GREATEST risk of using a recip...
Question 200: Which of the following tests would provide the BEST assuranc...
Question 201: Which of the following findings should be of GREATEST concer...
Question 202: Which of the following observations should be of GREATEST co...
Question 203: A business has requested an audit to determine whether infor...
Question 204: Which of the following is MOST useful to an IS auditor perfo...
Question 205: Due to limited storage capacity, an organization has decided...
Question 206: An IS auditor discovers from patch logs that some in-scope s...
Question 207: An IS audit reveals an IT application is experiencing poor p...
Question 208: Which of the following is the MOST reliable way for an IS au...
Question 209: A new regulation requires organizations to report significan...
Question 210: Which of the following should be of MOST concern to an IS au...
Question 211: Which of the following is the BEST way to help ensure new IT...
Question 212: An IS auditor is reviewing the perimeter security design of ...
Question 213: Which of the following should be the FIRST step in the incid...
Question 214: An organization has recently acquired and implemented intell...
Question 215: Which of the following provides a new IS auditor with the MO...
Question 216: Following a security breach in which a hacker exploited a we...
Question 217: An IS auditor learns that an in-house system development lif...
Question 218: During the implementation of a new system, an IS auditor mus...
Question 219: A database administrator (DBA) should be prevented from havi...
Question 220: An IS auditor wants to inspect recent events in a system to ...
Question 221: Which of the following is the MOST effective accuracy contro...
Question 222: An organization is ready to implement a new IT solution cons...
Question 223: When reviewing the functionality of an intrusion detection s...
Question 224: An organization has implemented a new data classification sc...
Question 225: An organization allows programmers to change production syst...
Question 226: Which of the following would be an appropriate rote of inter...
Question 227: Which of the following is MOST important for an IS auditor t...
Question 228: What is the PRIMARY benefit of an audit approach which requi...
Question 229: An IS auditor finds that one employee has unauthorized acces...
Question 230: Which of the following BEST enables the effectiveness of an ...
Question 231: Which of the following applications has the MOST inherent ri...
Question 232: Which of the following is the GREATEST risk of project dashb...
Question 233: Which of the following BEST enables an IS auditor to confirm...
Question 234: Which of the following non-audit activities may impair an IS...
Question 235: Which of the following is the BEST way to foster continuous ...
Question 236: Who should be the FIRST to evaluate an audit report prior to...
Question 237: An IS auditor evaluating the change management process must ...
Question 238: Which of the following statements appearing in an organizati...
Question 239: Which of the following should be an IS auditor's GREATEST co...
Question 240: Which of the following is necessary for effective risk manag...
Question 241: Which of the following would be the BEST process for continu...
Question 242: Which of the following BEST supports the effectiveness of a ...
Question 243: An IS auditor is reviewing the service agreement with a tech...
Question 244: Which of the following BEST enables alignment of IT with bus...
Question 245: An IS auditor concludes that logging and monitoring mechanis...
Question 246: Which of the following BEST enables the timely identificatio...
Question 247: Which of the following is MOST important for an effective co...
Question 248: Which of the following areas is MOST likely to be overlooked...
Question 249: A system development project is experiencing delays due to o...
Question 250: Which of the following would BEST help lo support an auditor...
Question 251: Documentation of workaround processes to keep a business fun...
Question 252: Which of the following BEST indicates that an incident manag...
Question 253: Which of the following should be an IS auditor's PRIMARY foc...
Question 254: During an IT general controls audit of a high-risk area wher...
Question 255: Which of the following is the GREATEST concern related to an...
Question 256: In which phase of penetration testing would host detection a...
Question 257: Which of the following is the BEST way to address potential ...
Question 258: Which of the following poses the GREATEST risk to an organiz...
Question 259: An incident response team has been notified of a virus outbr...
Question 260: Which of the following is the MOST efficient control to redu...
Question 261: Which of the following would BEST detect that a distributed ...
Question 262: Which of the following provides IS audit professionals with ...
Question 263: During an audit of an organization's risk management practic...
Question 264: Which of the following helps to ensure the integrity of data...
Question 265: An organization has implemented a distributed security admin...
Question 266: Which of the following is the GREATEST risk if two users hav...
Question 267: An IS auditor notes that several employees are spending an e...
Question 268: Which of the following provides the BEST providence that out...
Question 269: Which of the following findings would be of GREATEST concern...
Question 270: Which of the following is the GREATEST advantage of maintain...
Question 271: Which of the following would provide the MOST important inpu...
Question 272: As part of the architecture of virtualized environments, in ...
Question 273: The PRIMARY purpose of a configuration management system is ...
Question 274: Capacity management tools are PRIMARILY used to ensure that:...
Question 275: What would be an IS auditor's BEST course of action when an ...
Question 276: Which of the following is the MOST important outcome of an i...
Question 277: In an annual audit cycle, the audit of an organization's IT ...
Question 278: An IS audit learn is evaluating the documentation related to...
Question 279: To develop meaningful recommendations 'or findings, which of...
Question 280: Which of the following is the GREATEST security risk associa...
Question 281: Which of the following should be the PRIMARY basis for prior...
Question 282: Management is concerned about sensitive information being in...
Question 283: Which of the following business continuity activities priori...
Question 284: An IS auditor is reviewing a bank's service level agreement ...
Question 285: Which of the following should be the FIRST step m managing t...
Question 286: Which of the following is the BEST compensating control when...
Question 287: Which of the following BEST Indicates that an incident manag...
Question 288: An IS auditor finds that application servers had inconsisten...
Question 289: Which of the following would provide management with the MOS...
Question 290: An auditee disagrees with a recommendation for corrective ac...
Question 291: Which of the following provides the MOST reliable method of ...
Question 292: How is nonrepudiation supported within a public key infrastr...
Question 293: A programmer has made unauthorized changes lo key fields in ...
Question 294: Which of the following is MOST helpful for measuring benefit...
Question 295: Which of the following is the PRIMARY reason an IS auditor s...
Question 296: An incident response team has been notified of a virus outbr...
Question 297: An IS auditor concludes that an organization has a quality s...
Question 298: Which of the following is the GREATEST advantage of outsourc...
Question 299: An IS auditor learns that an organization's business continu...
Question 300: Which of the following should an IS auditor expect to see in...
Question 301: An IS auditor found that a company executive is encouraging ...
Question 302: Which of the following is the BEST control to minimize the r...
Question 303: Which of the following is the MOST important consideration w...
Question 304: In which phase of the internal audit process is contact esta...
Question 305: A data center's physical access log system captures each vis...
Question 306: Which of the following provides the MOST useful information ...
Question 307: Which of the following is the PRIMARY advantage of using an ...
Question 308: In a small IT web development company where developers must ...
Question 309: Backup procedures for an organization's critical data are co...
Question 310: Which of the following information security requirements BE ...
Question 311: An IS auditor finds that a recently deployed application has...
Question 312: An organization is considering allowing users to connect per...
Question 313: Which of the following would provide the BEST evidence that ...
Question 314: During the planning phase of a data loss prevention (DLP) au...
Question 315: Which of the following is MOST important to the effectivenes...
Question 316: An IS auditor reviewing the throat assessment for a data can...
Question 317: Which of the following should an organization do to anticipa...
Question 318: Which of the following should be used as the PRIMARY basis f...
Question 319: Which of the following IT service management activities is M...
Question 320: Which of the following is the BEST compensating control agai...
Question 321: Which of the following is the MOST important consideration w...
Question 322: Which of the following BEST enables a benefits realization p...
Question 323: Stress testing should ideally be earned out under a:...
Question 324: Which of the following types of firewalls provide the GREATE...
Question 325: Which of the following should an IS auditor ensure is classi...
Question 326: When classifying information, it is MOST important to align ...
Question 327: Which of the following is a PRIMARY responsibility of an IT ...
Question 328: The business case for an information system investment shoul...
Question 329: An IS auditor finds that a number of key patches have not be...
Question 330: When evaluating information security governance within an or...
Question 331: Which of the following measures BEST mitigates the risk of d...
Question 332: Which of the following findings would be of GREATEST concern...
Question 333: Which of the following is the MOST effective way to evaluate...
Question 334: A senior IS auditor suspects that a PC may have been used to...
Question 335: During an external review, an IS auditor observes an inconsi...
Question 336: An organization implemented a cybersecurity policy last year...
Question 337: Which of the following will provide the GREATEST assurance t...
Question 338: Which of the following access rights presents the GREATEST r...
Question 339: A now regulation requires organizations to report significan...
Question 340: The due date of an audit project is approaching, and the aud...
Question 341: During a follow-up audit, an IS auditor finds that some crit...
Question 342: An IS auditor is reviewing security controls related to coll...
Question 343: In an online application which of the following would provid...
Question 344: Which of the following should be of GREATEST concern to an I...
Question 345: An IS auditor is reviewing the backup procedures in an organ...
Question 346: An IS auditor is reviewing an organization's primary router ...
Question 347: During which phase of the software development life cycle sh...
Question 348: If a recent release of a program has to be backed out of pro...
Question 349: An IS auditor conducts a review of a third-party vendor's re...
Question 350: Which of the following BEST describes a digital signature?...
Question 351: Following a breach, what is the BEST source to determine the...
Question 352: Which of the following is the BEST metric to measure the ali...
Question 353: An IS auditor is assessing the adequacy of management's reme...
Question 354: Which of the following would be of GREATEST concern when rev...
Question 355: Which audit approach is MOST helpful in optimizing the use o...
Question 356: Which of the following will MOST likely compromise the contr...
Question 357: Which of the following is the BEST way to address segregatio...
Question 358: An IS auditor is tasked to review an organization's plan-do-...
Question 359: During a closing meeting, the IT manager disagrees with a va...
Question 360: Which of the following features of a library control softwar...
Question 361: An organization has recently implemented a Voice-over IP (Vo...
Question 362: Which of the following BEST ensures that effective change ma...
Question 363: A firewall between internal network segments improves securi...
Question 364: Following an IT audit, management has decided to accept the ...
Question 365: An organization uses public key infrastructure (PKI) to prov...
Question 366: In a high-volume, real-time system, the MOST effective techn...
Question 367: What is the FIRST step when creating a data classification p...
Question 368: One benefit of return on investment (ROI) analysts in IT dec...
Question 369: During the walk-through procedures for an upcoming audit, an...
Question 370: What should be the PRIMARY focus during a review of a busine...
Question 371: Which of the following is MOST important when planning a net...
Question 372: Which of the following provides the MOST protection against ...
Question 373: Which of the following would be of GREATEST concern to an IS...
Question 374: With regard to resilience, which of the following is the GRE...
Question 375: Which of the following is the GREATEST risk associated with ...
Question 376: What should an IS auditor recommend to management as the MOS...
Question 377: An IS auditor discovers that an IT organization serving seve...
Question 378: A security administrator is called in the middle of the nigh...
Question 379: Which of the following should be of GREATEST concern to an I...
Question 380: To enable the alignment of IT staff development plans with I...
Question 381: An IS auditor discovers an option in a database that allows ...
Question 382: Which of the following is the BEST control to prevent the tr...
Question 383: Which of the following will provide the GREATEST assurance t...
Question 384: When protecting the confidentiality of information assets, t...
Question 385: Which of the following should be the PRIMARY focus when comm...
Question 386: An IS auditor is reviewing an organization that performs bac...
Question 387: Which of the following is the BEST source of information tor...
Question 388: An organization's information security policies should be de...
Question 389: An organization requires the use of a key card to enter its ...
Question 390: An audit has identified that business units have purchased c...
Question 391: Which of the following would be of GREATEST concern to an IS...
Question 392: A financial group recently implemented new technologies and ...
Question 393: An IS auditor notes that not all security tests were complet...
Question 394: Which of the following cloud capabilities BEST enables an or...
Question 395: Which of the following BEST demonstrates that IT strategy Is...
Question 396: Which of the following is the BEST method to prevent wire tr...
Question 397: When developing customer-facing IT applications, in which st...
Question 398: An organization has developed mature risk management practic...
Question 399: Which of the following approaches would utilize data analyti...
Question 400: Which of the following is the GREATEST concern associated wi...
Question 401: A review of Internet security disclosed that users have indi...
Question 402: Which type of attack targets security vulnerabilities in web...
Question 403: A web proxy server for corporate connections to external res...
Question 404: Which of the following is the MOST important consideration f...
Question 405: An organization's enterprise architecture (EA) department de...
Question 406: An IS auditor is evaluating an organization's IT strategy an...
Question 407: Which of the following types of firewalls provides the GREAT...
Question 408: An IS auditor determines that the vendor's deliverables do n...
Question 409: An IS auditor should look for which of the following to ensu...
Question 410: If a source code is not recompiled when program changes are ...
Question 411: Which of the following BEST enables an IS auditor to combine...
Question 412: Which of the following would BEST prevent an arbitrary appli...
Question 413: Prior to a follow-up engagement, an IS auditor learns that m...
Question 414: The IS quality assurance (OA) group is responsible for:...
Question 415: An IS auditor plans to review all access attempts to a video...
Question 416: Which of the following should be of GREATEST concern to an I...
Question 417: Which of the following BEST reflects a mature strategic plan...
Question 418: Which of the following is an example of a preventative contr...
Question 419: Which of the following is the MOST efficient solution for a ...
Question 420: An IS auditor discovers that backups of critical systems are...
Question 421: An IS auditor notes that the previous year's disaster recove...
Question 422: An organization is planning an acquisition and has engaged a...
Question 423: An organization has engaged a third party to implement an ap...
Question 424: During which process is regression testing MOST commonly use...
Question 425: Which of the following is the BEST way to determine whether ...
Question 426: Which of the following should be an IS auditor's GREATEST co...
Question 427: A bank has a combination of corporate customer accounts (hig...
Question 428: When verifying the accuracy and completeness of migrated dat...
Question 429: During audit framework. an IS auditor teams that employees a...
Question 430: The PRIMARY reason for an IS auditor to use data analytics t...
Question 431: An organization has outsourced the development of a core app...
Question 432: Which of the following is the BEST performance indicator for...
Question 433: When assessing whether an organization's IT performance meas...
Question 434: Which of the following is the MOST significant impact to an ...
Question 435: Which of the following would be of MOST concern for an IS au...
Question 436: Which of the following should be the GREATEST concern to an ...
Question 437: When testing the accuracy of transaction data, which of the ...
Question 438: Which of the following is MOST important to determine when c...
Question 439: Which of the following is an IS auditor's BEST recommendatio...
Question 440: An organization plans to replace its nightly batch processin...
Question 441: Which of the following is the BEST way for management to ens...
Question 442: Which of the following should be of GREATEST concern to an I...
Question 443: An IS auditor is reviewing the installation of a new server....
Question 444: An IS auditor is assigned to perform a post-implementation r...
Question 445: During a physical security audit, an IS auditor was provided...
Question 446: An organization's security policy mandates that all new empl...
Question 447: A senior IS auditor suspects that a PC may have been used to...
Question 448: Which of the following can BEST reduce the impact of a long-...
Question 449: An IS auditor is reviewing logical access controls for an or...
Question 450: Which of the following is the PRIMARY advantage of parallel ...
Question 451: An IS auditor is reviewing enterprise governance and finds t...
Question 452: The record-locking option of a database management system (D...
Question 453: Which of the following is the GREATEST impact as a result of...
Question 454: A characteristic of a digital signature is that it...
Question 455: Which of the following is the BEST detective control for a j...
Question 456: Which of the following BEST describes the role of the IS aud...
Question 457: Which of the following components of a risk assessment is MO...
Question 458: Which of the following is MOST important to ensure that elec...
Question 459: Which of the following is the MAIN responsibility of the IT ...
Question 460: Which of the following will be the MOST effective method to ...
Question 461: What is the BEST way to reduce the risk of inaccurate or mis...
Question 462: Which of the following presents the GREATEST risk of data le...
Question 463: Which of the following should be done FIRST when planning a ...
Question 464: Which of the following are used in a firewall to protect the...
Question 465: A secure server room has a badge reader system that records ...
Question 466: Who is PRIMARILY responsible for the design of IT controls t...
Question 467: When assessing the overall effectiveness of an organization'...
Question 468: Which of the following methods BEST enforces data leakage pr...
Question 469: Which of the following is the BEST method to safeguard data ...
Question 470: Data from a system of sensors located outside of a network i...
Question 471: A project team has decided to switch to an agile approach to...
Question 472: Which of the following is the MAJOR advantage of automating ...
Question 473: Which of the following methods would BEST help detect unauth...
Question 474: Which of the following would be an IS auditor's BEST recomme...
Question 475: Which of the following environments is BEST used for copying...
Question 476: Which of the following is the PRIMARY reason an IS auditor w...
Question 477: An IS audit team is evaluating documentation of the most rec...
Question 478: Which of the following is MOST important to define within a ...
Question 479: Which of the following would BEST guide an IS auditor when d...
Question 480: An organization conducted an exercise to test the security a...
Question 481: A review of IT interface controls finds an organization does...
Question 482: Which of the following is the MOST effective control for pro...
Question 483: A steering committee established to oversee an organization'...
Question 484: IT disaster recovery time objectives (RTOs) should be based ...
Question 485: An IS auditor finds the log management system is overwhelmed...
Question 486: Which of the following is the BEST way to ensure that an app...
Question 487: Which of the following is the GREATEST risk if two users hav...
Question 488: A proper audit trail of changes to server start-up procedure...
Question 489: Which of the following would be an appropriate role of inter...
Question 490: An organization has replaced all of the storage devices at i...
Question 491: Which of the following should be the PRIMARY consideration w...
Question 492: When auditing the security architecture of an online applica...