<< Prev Question Next Question >>

Question 243/559

In order to be useful, a key performance indicator (KPI) MUST

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (559q)
Question 1: An IS auditor finds a segregation of duties issue in an ente...
Question 2: Which of the following is the MOST reliable way for an IS au...
Question 3: Which of the following should be an IS auditor's GREATEST co...
Question 4: Which of the following user actions poses the GREATEST risk ...
Question 5: An IS auditor is assigned to perform a post-implementation r...
Question 6: During an IS audit of a data center, it was found that progr...
Question 7: Which of the following job scheduling schemes for operating ...
Question 8: Which of the following would be of GREATEST concern to an IS...
Question 9: An IS auditor is reviewing an organization's information ass...
Question 10: An organization used robotic process automation (RPA) techno...
Question 11: Stress testing should ideally be carried out under a:...
Question 12: Which of the following is the MOST important consideration w...
Question 13: Which of the following is the BEST way to detect unauthorize...
Question 14: A small IT department has embraced DevOps, which allows memb...
Question 15: An IS auditor is reviewing a client's outsourced payroll sys...
Question 16: A finance department has a two-year project to upgrade the e...
Question 17: An organization's strategy to source certain IT functions fr...
Question 18: Which of the following would be MOST impacted if an IS audit...
Question 19: During which stage of the penetration test cycle does the te...
Question 20: An IS auditor has been asked to audit the proposed acquisiti...
Question 21: If enabled within firewall rules, which of the following ser...
Question 22: Which of the following is me GREATE ST impact as a result of...
Question 23: An IS auditor finds that one employee has unauthorized acces...
Question 24: An organization is modernizing its technology policy framewo...
Question 25: An IS department is evaluated monthly on its cost-revenue ra...
Question 26: Cross-site scripting (XSS) attacks are BEST prevented throug...
Question 27: Which of the following BEST guards against the risk of attac...
Question 28: Which of the following will provide the GREATEST assurance t...
Question 29: When verifying the accuracy and completeness of migrated dat...
Question 30: An IS auditor determines that the vendor's deliverables do n...
Question 31: As part of an audit response, an auditee has concerns with t...
Question 32: Which of the following weaknesses would have the GREATEST im...
Question 33: Which of the following is the BEST way to strengthen the sec...
Question 34: What should an IS auditor do FIRST when management responses...
Question 35: Which type of attack poses the GREATEST risk to an organizat...
Question 36: An organization has recently acquired and implemented intell...
Question 37: Which of the following is the PRIMARY role of key performanc...
Question 38: Following a merger, a review of an international organizatio...
Question 39: Which of the following will be the MOST effective method to ...
Question 40: Management is concerned about sensitive information being in...
Question 41: A job is scheduled to transfer data from a transactional sys...
Question 42: Management has requested a post-implementation review of a n...
Question 43: What is the MOST effective way to detect installation of una...
Question 44: A bank performed minor changes to the interest calculation c...
Question 45: Which of the following is MOST helpful to an IS auditor revi...
Question 46: Which of the following concerns is MOST effectively addresse...
Question 47: During an information security review, an IS auditor learns ...
Question 48: Which of the following BEST mitigates the risk associated wi...
Question 49: The PRIMARY advantage of using open-source-based solutions i...
Question 50: Which of the following should be of GREATEST concern to an I...
Question 51: Which of the following should be used to evaluate an IT deve...
Question 52: Which of the following is the MAJOR advantage of automating ...
Question 53: An IT governance body wants to determine whether IT service ...
Question 54: The PRIMARY responsibility of a project steering committee i...
Question 55: When planning a review of IT governance, an IS auditor is MO...
Question 56: Which of the following is the BEST recommendation to include...
Question 57: An IS auditor Is renewing the deployment of a new automated ...
Question 58: In which of the following system development life cycle (SDL...
Question 59: A steering committee established to oversee an organization'...
Question 60: Following an IT audit, management has decided to accept the ...
Question 61: An IS auditor should ensure that an application's audit trai...
Question 62: Which of the following is the BEST control to help ensure th...
Question 63: Which of the following is the MOST important advantage of pa...
Question 64: An organization wants to classify database tables according ...
Question 65: Which of the following is the PRIMARY advantage of using an ...
Question 66: An IS audit team is evaluating documentation of the most rec...
Question 67: Which of the following must be in place before an IS auditor...
Question 68: A secure server room has a badge reader system that records ...
Question 69: Which of the following is an example of a preventive control...
Question 70: The PRIMARY reason for an IS auditor to use data analytics t...
Question 71: Which of the following access rights presents the GREATEST r...
Question 72: Which of the following is the BEST way to enforce the princi...
Question 73: Which of the following is the PRIMARY advantage of using vir...
Question 74: Which of the following is the BEST audit procedure to determ...
Question 75: An IS auditor notes that several employees are spending an e...
Question 76: An IS auditor discovers that validation controls m a web app...
Question 77: A review of an organization's IT portfolio revealed several ...
Question 78: During the design phase of a software development project, t...
Question 79: Which of the following should be the GREATEST concern to an ...
Question 80: Which of the following is the GREATEST advantage of vulnerab...
Question 81: An organization has moved all of its infrastructure to the c...
Question 82: As part of the architecture of virtualized environments, in ...
Question 83: A startup organization wants to develop a data loss preventi...
Question 84: During the implementation of an upgraded enterprise resource...
Question 85: An organization establishes capacity utilization thresholds ...
Question 86: Which of the following is the PRIMARY advantage of using vis...
Question 87: An auditee disagrees with a recommendation for corrective ac...
Question 88: Which of the following is the MOST important task of an IS a...
Question 89: Which of the following BEST indicates to an IS auditor that ...
Question 90: A core system fails a week after a scheduled update, causing...
Question 91: Which of the following is the MOST effective control for pro...
Question 92: An IS audit manager was temporarily tasked with supervising ...
Question 93: Which of the following should be of GREATEST concern to an I...
Question 94: When a data center is attempting to restore computing facili...
Question 95: Which of the following would BEST ensure that a backup copy ...
Question 96: Which of the following should be of GREATEST concern to an I...
Question 97: Which of the following is the MOST important determining fac...
Question 98: A telecommunications company has recently created a new frau...
Question 99: The PRIMARY advantage of object-oriented technology is enhan...
Question 100: What is the PRIMARY benefit of using one-time passwords?...
Question 101: Which of the following tests would provide the BEST assuranc...
Question 102: A data breach has occurred due lo malware. Which of the foll...
Question 103: Which of the following backup schemes is the BEST option whe...
Question 104: When auditing IT organizational structure, which of the foll...
Question 105: A checksum is classified as which type of control?...
Question 106: Which of the following is a PRIMARY responsibility of an IT ...
Question 107: Which of the following would be an IS auditor's BEST recomme...
Question 108: Which of the following security risks can be reduced by a pr...
Question 109: During an external review, an IS auditor observes an inconsi...
Question 110: Email required for business purposes is being stored on empl...
Question 111: Which of the following would be an appropriate role of inter...
Question 112: Which type of threat can utilize a large group of automated ...
Question 113: A network analyst is monitoring the network after hours and ...
Question 114: Which of the following should be the PRIMARY objective of co...
Question 115: In a RAO model, which of the following roles must be assigne...
Question 116: Which of the following provides an IS auditor assurance that...
Question 117: Which of the following tasks would cause the GREATEST segreg...
Question 118: Which of the following is the BEST method to delete sensitiv...
Question 119: Which of the following is the MOST efficient solution for a ...
Question 120: With regard to resilience, which of the following is the GRE...
Question 121: In which of the following sampling methods is the entire sam...
Question 122: Which of the following is the GREATEST risk associated with ...
Question 123: Which of the following is the BEST way for management to ens...
Question 124: A warehouse employee of a retail company has been able to co...
Question 125: An IS auditor has been tasked with analyzing an organization...
Question 126: Which of the following is an example of a preventative contr...
Question 127: Which of the following IT service management activities is M...
Question 128: Which of the following BEST enables an IS auditor to priorit...
Question 129: Which of the following conditions would be of MOST concern t...
Question 130: When reviewing a project to replace multiple manual data ent...
Question 131: Which of the following is an IS auditor's BEST recommendatio...
Question 132: Which of the following provides a new IS auditor with the MO...
Question 133: An IS auditor Is reviewing a recent security incident and is...
Question 134: Which of the following is MOST important during software lic...
Question 135: An organization is planning to implement a work-from-home po...
Question 136: Which of the following would lead an IS auditor to conclude ...
Question 137: During an exit meeting, an IS auditor highlights that backup...
Question 138: Which of the following is MOST important to consider when as...
Question 139: An IS auditor is concerned that unauthorized access to a hig...
Question 140: During a disaster recovery audit, an IS auditor finds that a...
Question 141: An IS auditor finds that firewalls are outdated and not supp...
Question 142: An organization relies on an external vendor that uses a clo...
Question 143: An organization has introduced a capability maturity model t...
Question 144: A system administrator recently informed the IS auditor abou...
Question 145: Which of the following would minimize the risk of losing tra...
Question 146: The BEST way to evaluate the effectiveness of a newly develo...
Question 147: In the development of a new financial application, the IS au...
Question 148: Which of the following is a social engineering attack method...
Question 149: The PRIMARY role of a control self-assessment (CSA) facilita...
Question 150: Which of the following is the MOST efficient way to identify...
Question 151: Which of the following concerns is BEST addressed by securin...
Question 152: Which of the following BEST minimizes performance degradatio...
Question 153: Which of the following BEST enables an organization to impro...
Question 154: Which of the following is the MOST effective way for an orga...
Question 155: Which of the following is the PRIMARY benefit of effective i...
Question 156: A transaction processing system interfaces with the general ...
Question 157: Which of the following BEST demonstrates to senior managemen...
Question 158: Which of the following issues identified during a formal rev...
Question 159: When building or upgrading enterprise cryptographic infrastr...
Question 160: Which of the following BEST indicates that the effectiveness...
Question 161: An IS auditor finds that a number of key patches have not be...
Question 162: IT governance should be driven by:...
Question 163: Which of the following types of firewalls provides the GREAT...
Question 164: Which of the following technology trends can lead to more ro...
Question 165: A business application's database is copied to a replication...
Question 166: During the planning phase of a data loss prevention (DLP) au...
Question 167: Which of the following should be of MOST concern to an IS au...
Question 168: Afire alarm system has been installed in the computer room T...
Question 169: Which of the following approaches BEST enables an IS auditor...
Question 170: Which of the following tests is MOST likely to detect an err...
Question 171: Which of the following should be of GREATEST concern to an I...
Question 172: An IS auditor is reviewing desktop software profiles and not...
Question 173: What is MOST important to verify during an external assessme...
Question 174: An IS auditor is conducting an IT governance audit and notic...
Question 175: Which of the following is the MOST important consideration f...
Question 176: An organization allows employees to retain confidential data...
Question 177: During a follow-up engagement, an IS auditor confirms eviden...
Question 178: Which of the following is the BEST approach to help organiza...
Question 179: An IS auditor has completed the fieldwork phase of a network...
Question 180: Which of the following provides the MOST useful information ...
Question 181: Which of the following is MOST important with regard to an a...
Question 182: in a post-implantation Nation review of a recently purchased...
Question 183: Which of the following should be the PRIMARY consideration w...
Question 184: Which of the following is MOST important to determine when c...
Question 185: While executing follow-up activities, an IS auditor is conce...
Question 186: An IS auditor has been asked to assess the security of a rec...
Question 187: During an operational audit on the procurement department, t...
Question 188: Which of the following is the MOST important course of actio...
Question 189: During which phase of the software development life cycle is...
Question 190: An IS auditor has been asked to review the integrity of data...
Question 191: An IS auditor is asked to review an organization's technolog...
Question 192: When reviewing an organization's information security polici...
Question 193: A global bank plans to use a cloud provider for backup of cu...
Question 194: When evaluating information security governance within an or...
Question 195: An organization has assigned two new IS auditors to audit a ...
Question 196: Which of the following should be the PRIMARY basis for prior...
Question 197: Which of the following will BEST ensure that archived electr...
Question 198: An organization plans to replace its nightly batch processin...
Question 199: Which of the following would be of GREATEST concern to an IS...
Question 200: Which of the following should be an IS auditor's GREATEST co...
Question 201: Which of the following would present the GREATEST concern du...
Question 202: Which of the following is MOST important to consider when re...
Question 203: Which of the following would be an IS auditor's GREATEST con...
Question 204: Which of the following is an effective way to ensure the int...
Question 205: An organization is planning to implement a control self-asse...
Question 206: An organization is permanently transitioning from onsite to ...
Question 207: Control self-assessments (CSAs) can be used to:...
Question 208: What is the MAIN reason to use incremental backups?...
Question 209: Which of the following should be of GREATEST concern for an ...
Question 210: Which of the following is the MOST efficient control to redu...
Question 211: Providing security certification for a new system should inc...
Question 212: Which of the following is the BEST indicator for measuring p...
Question 213: Which of the following should be an IS auditor's GREATEST co...
Question 214: Which of the following is the MOST important control for vir...
Question 215: Which of the following would be the BEST criteria for monito...
Question 216: The use of control totals satisfies which of the following c...
Question 217: The MOST important measure of the effectiveness of an organi...
Question 218: Effective separation of duties in an online environment can ...
Question 219: Users are complaining that a newly released enterprise resou...
Question 220: Which of the following is the MOST efficient way to identify...
Question 221: Having knowledge in which of the following areas is MOST rel...
Question 222: Who is responsible for defining data access permissions?...
Question 223: One advantage of managing an entire collection of projects a...
Question 224: Which of the following applications has the MOST inherent ri...
Question 225: Which of the following would MOST effectively ensure the int...
Question 226: Coding standards provide which of the following?...
Question 227: When planning an audit, it is acceptable for an IS auditor t...
Question 228: Which of the following indicates that an internal audit orga...
Question 229: A white box testing method is applicable with which of the f...
Question 230: Which of the following provides re BEST evidence that outsou...
Question 231: An IS auditor has been asked to advise on measures to improv...
Question 232: When designing a data analytics process, which of the follow...
Question 233: An organization that has decided to approve the use of end-u...
Question 234: Which of the following would be of GREATEST concern when rev...
Question 235: Which of the following BEST enables an organization to impro...
Question 236: An IS auditor is reviewing the perimeter security design of ...
Question 237: Which of the following would MOST likely jeopardize the inde...
Question 238: An incident response team has been notified of a virus outbr...
Question 239: Which of the following is the GREATEST risk associated with ...
Question 240: The process of applying a hash function to a message and obt...
Question 241: The IS auditor has recommended that management test a new sy...
Question 242: Which of the following would BEST indicate the effectiveness...
Question 243: In order to be useful, a key performance indicator (KPI) MUS...
Question 244: An IS auditor has discovered that a software system still in...
Question 245: To reduce operational costs, IT management plans to reduce t...
Question 246: Spreadsheets are used to calculate project cost estimates. T...
Question 247: An IS auditor reviewing the throat assessment for a data can...
Question 248: Which of the following is the BEST method to safeguard data ...
Question 249: Which of the following is the GREATEST risk if two users hav...
Question 250: An IS auditor is reviewing database fields updated in real-t...
Question 251: Which of the following is the BEST indication to an IS audit...
Question 252: Which of the following provides the MOST protection against ...
Question 253: A programmer has made unauthorized changes lo key fields in ...
Question 254: Which of the following should be performed FIRST before key ...
Question 255: Which of the following is an IS auditor's BEST recommendatio...
Question 256: What type of control has been implemented when secure code r...
Question 257: Which of the following technologies is BEST suited to fulfil...
Question 258: Which of the following should be the IS auditor's PRIMARY fo...
Question 259: Which of the following would BEST facilitate the successful ...
Question 260: Which of the following would be MOST useful to an IS auditor...
Question 261: Which of the following presents the GREATEST risk to an orga...
Question 262: Which of the following should be an IS auditor's PRIMARY foc...
Question 263: An IS auditor is reviewing an organization's primary router ...
Question 264: An IS auditor reviewing the database controls for a new e-co...
Question 265: Which of the following BEST enables the timely identificatio...
Question 266: While auditing a small organization's data classification pr...
Question 267: Retention periods and conditions for the destruction of pers...
Question 268: Which of the following is the BEST metric to measure the ali...
Question 269: An IS auditor finds a user account where privileged access i...
Question 270: During the walk-through procedures for an upcoming audit, an...
Question 271: Which of the following is the BEST metric to measure the qua...
Question 272: Which of the following backup methods is MOST appropriate wh...
Question 273: What is the BEST control to address SQL injection vulnerabil...
Question 274: The PRIMARY objective of a follow-up audit is to:...
Question 275: In a large organization, IT deadlines on important projects ...
Question 276: Which of the following BEST describes the role of the IS aud...
Question 277: Which of the following is PRIMARILY used in blockchain techn...
Question 278: An IS auditor discovers a box of hard drives in a secured lo...
Question 279: The PRIMARY objective of a control self-assessment (CSA) is ...
Question 280: Which of the following should be the GREATEST concern for an...
Question 281: Which of the following is the GREATEST concern associated wi...
Question 282: Which of the following is the BEST way to address segregatio...
Question 283: An IS auditor is reviewing a medical device that is attached...
Question 284: An IS auditor has been asked to review an event log aggregat...
Question 285: An IS auditor is reviewing a machine learning model that pre...
Question 286: Which of the following presents the GREATEST challenge to th...
Question 287: Which of the following would be MOST helpful to an IS audito...
Question 288: Which of the following is the PRIMARY reason to involve IS a...
Question 289: During an external review, an IS auditor observes an inconsi...
Question 290: Which of the following threats is mitigated by a firewall?...
Question 291: An organization has both an IT strategy committee and an IT ...
Question 292: Which of the following should be used as the PRIMARY basis f...
Question 293: Which of the following is the MOST important consideration w...
Question 294: In a 24/7 processing environment, a database contains severa...
Question 295: Which of the following findings from a database security aud...
Question 296: Which of the following is the GREATEST risk associated with ...
Question 297: During a pre-implementation review, an IS auditor notes that...
Question 298: Demonstrated support from which of the following roles in an...
Question 299: A credit card company has decided to outsource the printing ...
Question 300: During recent post-implementation reviews, an IS auditor has...
Question 301: Which of the following responsibilities associated with a di...
Question 302: Which of the following is MOST helpful to an IS auditor when...
Question 303: Which of the following controls helps to ensure that data ex...
Question 304: The FIRST step in auditing a data communication system is to...
Question 305: Which of the following is the BEST reason for an organizatio...
Question 306: Which of the following is the MOST reliable way for an IS au...
Question 307: Due to limited storage capacity, an organization has decided...
Question 308: Which of the following is the PRIMARY objective of enterpris...
Question 309: Which of the following is the MOST effective way to maintain...
Question 310: An IS auditor is reviewing an organizations release manageme...
Question 311: The business case for an information system investment shoul...
Question 312: When reviewing hard disk utilization reports, an IS auditor ...
Question 313: In a small IT web development company where developers must ...
Question 314: An IS auditor observes that a business-critical application ...
Question 315: Which of the following types of environmental equipment will...
Question 316: An organization has outsourced its data processing function ...
Question 317: A source code repository should be designed to:...
Question 318: An IS audit manager is preparing the staffing plan for an au...
Question 319: Which of the following should be of GREATEST concern to an I...
Question 320: An IS auditor can BEST evaluate the business impact of syste...
Question 321: Which of the following BEST indicates that an incident manag...
Question 322: Which of the following is the BEST way to verify the effecti...
Question 323: Which of the following is the GREATEST benefit of adopting a...
Question 324: An IS auditor should be MOST concerned if which of the follo...
Question 325: An internal audit team is deciding whether to use an audit m...
Question 326: What should be the PRIMARY basis for selecting which IS audi...
Question 327: In response to an audit finding regarding a payroll applicat...
Question 328: An organization is establishing a steering committee for the...
Question 329: Which of the following is the BEST evidence that an organiza...
Question 330: Which of the following application input controls would MOST...
Question 331: Which of the following is MOST appropriate to review when de...
Question 332: A review of IT interface controls finds an organization does...
Question 333: Which of the following is MOST helpful in identifying system...
Question 334: Which of the following is the GREATEST advantage of maintain...
Question 335: An IS auditor is performing a follow-up audit for findings i...
Question 336: Which of the following would BEST guide an IS auditor when d...
Question 337: An organizations audit charier PRIMARILY:...
Question 338: Which of the following are BEST suited for continuous auditi...
Question 339: Which of the following should be the GREATEST concern for an...
Question 340: An IS auditor is tasked to review an organization's plan-do-...
Question 341: During a routine internal software licensing review, an IS a...
Question 342: During a follow-up audit, an IS auditor finds that some crit...
Question 343: An IS auditor is reviewing the security of a web-based custo...
Question 344: Which of the following is an example of shadow IT?...
Question 345: An IS auditor learns that an organization's business continu...
Question 346: Which of the following features would BEST address risk asso...
Question 347: Which of the following controls helps to reduce fraud risk a...
Question 348: If concurrent update transactions to an account are not proc...
Question 349: IT disaster recovery time objectives (RTOs) should be based ...
Question 350: Which of the following is the BEST approach for determining ...
Question 351: Which of the following features of a library control softwar...
Question 352: An IS auditor is assessing backup performance and observes t...
Question 353: A financial group recently implemented new technologies and ...
Question 354: Which of the following is MOST important to determine during...
Question 355: Which of the following would be MOST useful when analyzing c...
Question 356: An organization has replaced all of the storage devices at i...
Question 357: Upon completion of audit work, an IS auditor should:...
Question 358: In an annual audit cycle, the audit of an organization's IT ...
Question 359: Which of the following is the BEST detective control for a j...
Question 360: Which of the following occurs during the issues management p...
Question 361: Backup procedures for an organization's critical data are co...
Question 362: An IS auditor is reviewing a contract for the outsourcing of...
Question 363: Management receives information indicating a high level of r...
Question 364: To confirm integrity for a hashed message, the receiver shou...
Question 365: Which of the following is MOST useful for determining the st...
Question 366: Which of the following is the BEST recommendation by an IS a...
Question 367: Which of the following control measures is the MOST effectiv...
Question 368: Which of the following is the BEST source of information for...
Question 369: An IS auditor who was instrumental in designing an applicati...
Question 370: Who is PRIMARILY responsible for the design of IT controls t...
Question 371: Which of the following should be the PRIMARY role of an inte...
Question 372: Which of the following poses the GREATEST risk to the use of...
Question 373: Which of the following provides the BEST evidence of the val...
Question 374: Which of the following is a method to prevent disclosure of ...
Question 375: What should an IS auditor recommend to management as the MOS...
Question 376: An IS auditor conducts a review of a third-party vendor's re...
Question 377: Which of the following is the PRIMARY reason for using a dig...
Question 378: Which of the following audit procedures would be MOST conclu...
Question 379: During the discussion of a draft audit report. IT management...
Question 380: Which of the following BEST facilitates the legal process in...
Question 381: When reviewing an organization's enterprise architecture (EA...
Question 382: In an IT organization where many responsibilities are shared...
Question 383: An IS auditor is planning a review of an organizations cyber...
Question 384: Which of the following is the GREATEST risk of project dashb...
Question 385: An IS auditor is reviewing logical access controls for an or...
Question 386: Which of the following findings should be of GREATEST concer...
Question 387: Which of the following is the BEST methodology to use for es...
Question 388: Which of the following should be an IS auditor's PRIMARY con...
Question 389: A contract for outsourcing IS functions should always includ...
Question 390: Which of the following is the MOST appropriate testing appro...
Question 391: The PRIMARY role of an IS auditor in the remediation of prob...
Question 392: Which of the following is the MOST important factor when an ...
Question 393: Which of the following is the BEST method to maintain an aud...
Question 394: Which of the following is the BEST compensating control agai...
Question 395: In an area susceptible to unexpected increases in electrical...
Question 396: Which of the following network communication protocols is us...
Question 397: In the case of a disaster where the data center is no longer...
Question 398: Which of the following BEST enables an IS auditor to combine...
Question 399: Which of the following is the BEST control to help ensure th...
Question 400: Which of the following BEST enables an organization to deter...
Question 401: An IS auditor is reviewing the installation of a new server....
Question 402: An organization's sensitive data is stored in a cloud comput...
Question 403: Which of the following would an IS auditor recommend as the ...
Question 404: Which of the following would BEST help to ensure that an inc...
Question 405: An IS auditor discovers an option in a database that allows ...
Question 406: During a follow-up audit, an IS auditor finds that some crit...
Question 407: Which of the following would be of GREATEST concern to an IS...
Question 408: An IS auditor is reviewing processes for importing market pr...
Question 409: Which of the following statements appearing in an organizati...
Question 410: Which of the following should be the FIRST consideration whe...
Question 411: Which of the following is the MOST important task of an IS a...
Question 412: An IS auditor evaluating the change management process must ...
Question 413: Which of the following is MOST likely to be reduced when imp...
Question 414: Which of the following is the BEST indicator of the effectiv...
Question 415: Which of the following BEST addresses the availability of an...
Question 416: An IS auditor is assigned to review the IS department s qual...
Question 417: During an external review, an IS auditor observes an inconsi...
Question 418: Recovery facilities providing a redundant combination of Int...
Question 419: Which type of control has been established when an organizat...
Question 420: Which of the following is an IS auditor's BEST approach when...
Question 421: Which of the following findings from an IT governance review...
Question 422: Which of the following documents would be MOST useful in det...
Question 423: An IS auditor has discovered that a software system still in...
Question 424: Which of the following is a PRIMARY benefit of using risk as...
Question 425: The PRIMARY benefit of automating application testing is to:...
Question 426: Which of the following is MOST important to define within a ...
Question 427: Which of the following is the PRIMARY benefit of monitoring ...
Question 428: Which of the following should be of GREATEST concern to an I...
Question 429: When determining whether a project in the design phase will ...
Question 430: Which of the following BEST enables an IS auditor to confirm...
Question 431: Which of the following presents the GREATEST risk associated...
Question 432: Which of the following would BEST determine whether a post-i...
Question 433: Which of the following should be of GREATEST concern to an I...
Question 434: Which of the following is a threat to IS auditor independenc...
Question 435: An organization has recently implemented a Voice-over IP (Vo...
Question 436: Which of the following is an IS auditor's BEST recommendatio...
Question 437: Which of the following is an IS auditor's BEST course of act...
Question 438: Which of the following is the MOST important reason to imple...
Question 439: Which of the following would be MOST effective to protect in...
Question 440: Which of the following findings related to segregation of du...
Question 441: An IS auditor discovers that a developer has used the same k...
Question 442: Which of the following is the PRIMARY purpose of a rollback ...
Question 443: An organization recently migrated Us data warehouse from a l...
Question 444: A system development project is experiencing delays due to o...
Question 445: During an incident management audit, an IS auditor finds tha...
Question 446: Which of the following provides the MOST reliable method of ...
Question 447: Which of the following BEST protects evidence in a forensic ...
Question 448: Which of the following would BEST protect the confidentialit...
Question 449: Which of the following should be of GREATEST concern to an I...
Question 450: Which of the following is the BEST reason for an IS auditor ...
Question 451: Which of the following constitutes an effective detective co...
Question 452: Which of the following should be of GREATEST concern to an I...
Question 453: Which of the following controls is MOST important for ensuri...
Question 454: An organization plans to receive an automated data feed into...
Question 455: Which of the following is the MOST effective way to identify...
Question 456: Documentation of workaround processes to keep a business fun...
Question 457: Which of the following would protect the confidentiality of ...
Question 458: Which of the following is the GREATEST risk related to the u...
Question 459: An IS auditor has been tasked with auditing the inventory co...
Question 460: Which of the following strategies BEST optimizes data storag...
Question 461: Which of the following should be the GREATEST concern for an...
Question 462: Which of the following is an audit reviewer's PRIMARY role w...
Question 463: What is the purpose of hashing a document?...
Question 464: An IS auditor learns that an in-house system development lif...
Question 465: Which of the following is the MOST important responsibility ...
Question 466: During the review of a system disruption incident, an IS aud...
Question 467: An IS auditor is planning an audit of an organization's risk...
Question 468: Which of the following BEST indicates a need to review an or...
Question 469: Which of the following is an IS auditor's BEST approach when...
Question 470: Which of the following provides the BEST evidence that all e...
Question 471: Which of the following is the PRIMARY objective of cyber res...
Question 472: An external audit firm was engaged to perform a validation a...
Question 473: Which of the following findings should be of GREATEST concer...
Question 474: Audit frameworks can assist the IS audit function by:...
Question 475: When auditing the closing stages of a system development pro...
Question 476: During a project audit, an IS auditor notes that project rep...
Question 477: Which of the following should be considered when examining f...
Question 478: A web proxy server for corporate connections to external res...
Question 479: When reviewing a business case for a proposed implementation...
Question 480: An audit has identified that business units have purchased c...
Question 481: An IS auditor is reviewing processes for importing market pr...
Question 482: Which of the following system attack methods is executed by ...
Question 483: Which of the following is the BEST source of information to ...
Question 484: Which of the following findings would be of GREATEST concern...
Question 485: Which of the following should an IS auditor use when verifyi...
Question 486: Which of the following is the BEST reason for software devel...
Question 487: Which of the following security testing techniques is MOST e...
Question 488: Which of the following provides the BEST evidence that syste...
Question 489: Which of the following provides the MOST assurance over the ...
Question 490: During a project assessment, an IS auditor finds that busine...
Question 491: An IS auditor reviewing a job scheduling tool notices perfor...
Question 492: An IS auditor finds a high-risk vulnerability in a public-fa...
Question 493: Which of the following is a detective control?...
Question 494: An IS auditor wants to determine who has oversight of staff ...
Question 495: An external attacker spoofing an internal Internet Protocol ...
Question 496: An organization that has suffered a cyber-attack is performi...
Question 497: The PRIMARY reason to assign data ownership for protection o...
Question 498: An IS auditor is verifying the adequacy of an organization's...
Question 499: If a source code is not recompiled when program changes are ...
Question 500: An IS auditor is reviewing a network diagram. Which of the f...
Question 501: Which of the following fire suppression systems needs to be ...
Question 502: Who is accountable for an organization's enterprise risk man...
Question 503: Which of the following would be the BEST process for continu...
Question 504: Which of the following should be an IS auditor's PRIMARY foc...
Question 505: A new system development project is running late against a c...
Question 506: An IS auditor finds that a key Internet-facing system is vul...
Question 507: An IS auditor is reviewing an organization's cloud access se...
Question 508: The FIRST step in an incident response plan is to:...
Question 509: A senior auditor is reviewing work papers prepared by a juni...
Question 510: Following a breach, what is the BEST source to determine the...
Question 511: Which of the following should be an IS auditor's GREATEST co...
Question 512: Which of the following is the MOST important prerequisite fo...
Question 513: Which of the following should be the FIRST step when conduct...
Question 514: An organization wants to use virtual desktops to deliver cor...
Question 515: What would be an IS auditor's BEST recommendation upon findi...
Question 516: A national bank recently migrated a large number of business...
Question 517: An IS auditor is reviewing security controls related to coll...
Question 518: Which of the following is the BEST recommendation to drive a...
Question 519: Which of the following is MOST important to the effectivenes...
Question 520: Which of the following provides the MOST useful information ...
Question 521: Which of the following security measures is MOST important f...
Question 522: Which of the following is MOST critical to the success of an...
Question 523: During an audit of a reciprocal disaster recovery agreement ...
Question 524: Which of the following demonstrates the use of data analytic...
Question 525: The use of access control lists (ACLs) is the MOST effective...
Question 526: Which of the following is MOST important for an IS auditor t...
Question 527: Which of the following is a concern associated with virtuali...
Question 528: Which of the following is the GREATEST risk associated with ...
Question 529: An IS auditor discovers that due to resource constraints a d...
Question 530: Due to limited storage capacity, an organization has decided...
Question 531: Which of the following is the GREATEST concern related to an...
Question 532: Which of the following would provide an IS auditor with the ...
Question 533: An organization is considering allowing users to connect per...
Question 534: Which of the following approaches would utilize data analyti...
Question 535: Which of the following is the GREATEST risk when relying on ...
Question 536: Which of the following provides an IS auditor the BEST evide...
Question 537: Which of the following is the GREATEST advantage of outsourc...
Question 538: During an audit of a multinational bank's disposal process, ...
Question 539: A CFO has requested an audit of IT capacity management due t...
Question 540: Which of the following would provide the BEST evidence of an...
Question 541: Which of the following controls BEST ensures appropriate seg...
Question 542: Which of the following BEST describes a digital signature?...
Question 543: Which of the following is the MOST important area of focus f...
Question 544: During the evaluation of controls over a major application d...
Question 545: Which of the following BEST ensures the quality and integrit...
Question 546: During a review, an IS auditor discovers that corporate user...
Question 547: An organization has developed mature risk management practic...
Question 548: Which of the following BEST describes an audit risk?...
Question 549: Management has decided to accept a risk in response to a dra...
Question 550: An organization was recently notified by its regulatory body...
Question 551: An IS auditor suspects an organization's computer may have b...
Question 552: In which phase of the audit life cycle process should an IS ...
Question 553: An organization recently implemented a cloud document storag...
Question 554: Which of the following documents should define roles and res...
Question 555: The PRIMARY focus of a post-implementation review is to veri...
Question 556: When is it MOST important for an IS auditor to apply the con...
Question 557: Which of the following should be given GREATEST consideratio...
Question 558: When protecting the confidentiality of information assets, t...
Question 559: What is the Most critical finding when reviewing an organiza...