Which of the following BEST enables an organization to determine the effectiveness of its information security awareness program?
Which of the following would be a result of utilizing a top-down maturity model process?
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
Which of the following provides the BEST evidence that IT portfolio management is aligned with organizational strategies?
During a database security audit, an IS auditor is reviewing the process used to input data. Which of the following is the MOST significant risk area for the auditor to focus on?
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change
management process?
The business case for an information system investment should be available for review until the:
Which of the following would an IS auditor find to be the GREATEST risk associated with the server room in a remote office location?
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
Which of the following physical controls provides the GREATEST assurance that only authorized individuals can access a data center?
In which phase of the audit life cycle process should an IS auditor initially discuss observations with management?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization ' s job scheduling practices?
To help determine whether a controls-reliant approach to auditing financial systems in a company should be used, which sequence of IS audit work is MOST appropriate?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor ' s NEXT step should be to:
Management has agreed to move the organization ' s data center due to recent flood map changes in its current location. Which risk response has been adopted?
Which of the following is MOST important for an IS auditor to determine when reviewing the design and implementation of controls?
Which of the following is the PRIMARY benefit of implementing an IT capacity management process?
The GREATEST benefit of using a polo typing approach in software development is that it helps to:
During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
A review of an organization ' s enterprise architecture (EA) BEST enables an IS auditor to determine:
Which of the following should be the IS auditor ' s PRIMARY focus, when evaluating an organization ' s offsite storage facility?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization ' s enterprise architecture (EA) program?
Which of the following is the BEST source of organizational direction on when to use cloud services?
Which of the following metrics is MOST helpful for evaluating the effectiveness of problem management practices?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor ' s MOST important course of action?
Which of the following public key infrastructure (PKI) elements provides detailed descriptions for dealing with a compromised private key?
An IS auditor is reviewing documentation from a change that was applied to an application. Which of the following findings would be the GREATEST concern?
During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor ' s BEST recommendation?
Which of the following cloud capabilities BEST enables an organization to meet unexpectedly high service demand?
An organization outsourced its IS functions to meet its responsibility for disaster recovery, the organization should:
Which of the following is an example of a preventative control in an accounts payable system?
Which of the following should be done FIRST when creating a data protection program?
An organization is implementing a data loss prevention (DLP) system in response to a new regulatory requirement Reviewing. which of the following would be MOST helpful in evaluating the system ' s design?
Which of the following protocols should be used when transferring data via the internet?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization ' s website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
An IS auditor is conducting an IT governance audit and notices many initiatives are managed informally by isolated project managers. Which of the following recommendations would have the GREATEST impact on improving the maturity of the IT team?
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization ' s information security policy?
Which of the following should be of GREATEST concern to an IS auditor assessing an organization ' s patch management program?
What is the BEST way to reduce the risk of inaccurate or misleading data proliferating through business intelligence systems?
Which of the following methods would MOST effectively provide positive authentication for physical access?
In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?
Data from a system of sensors located outside of a network is received by the open ports on a server. Which of the following is the BEST way to ensure the integrity of the data being collected from the sensor system?