Which of the following metrics would BEST measure the agility of an organization's IT function?
Which of the following BEST mitigates the risk of SQL injection attacks against applications exposed to the internet?
The GREATEST benefit of using a polo typing approach in software development is that it helps to:
Which of the following BEST enables an organization to determine the effectiveness of its information security awareness program?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization's security policy?
Which of the following is the PRIMARY purpose of conducting a control self-assessment (CSA)?
At the end of each business day, a business-critical application generates a report of financial transac-tions greater than a certain value, and an employee
then checks these transactions for errors. What type of control is in place?
An organization has alternative links in its wide area network (WAN) to provide redundancy. However, each time there is a problem with a link, network administrators have to update the configuration to divert traffic to the other link. Which of the following would be an IS auditor's BEST recommendation?
Which of the following is an analytical review procedure for a payroll system?
The GREATEST concern for an IS auditor reviewing vulnerability assessments by the auditee would be if the assessments are:
Which of the following is the MOST important consideration when relying on the work of the prior auditor?
An IS auditor is conducting an IT governance audit and notices many initiatives are managed informally by isolated project managers. Which of the following recommendations would have the GREATEST impact on improving the maturity of the IT team?
An IS auditor reviewing an organization’s IT systems finds that the organization frequently purchases systems that are incompatible with the technologies already in the organization. Which of the following is the MOST likely reason?
A telecommunications company has recently created a new fraud department with three employees and acquired a fraud detection system that uses artificial intelligence (AI) modules. Which of the following would be of GREATEST concern to an IS auditor reviewing the system?
An organization's information security policies should be developed PRIMARILY on the basis of:
During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?
An IS auditor is reviewing a network diagram. Which of the following would be the BEST location for placement of a firewall?
Which of the following roles is PRIMARILY responsible for mitigating the risk of benefits not being realized in an IT project?
An IS auditor finds ad hoc vulnerability scanning is in place with no clear alignment to the organization's wider security threat and vulnerability management program.
Which of the following would BEST enable the organization to work toward improvement in this area?
Which of the following is MOST important for an IS auditor to verify when reviewing the planned use of Benford's law as a data analytics technique to detect fraud in a set of credit card transactions?
An IS auditor is preparing for a review of controls associated with a manufacturing plant's implementation of industrial Internet of Things (loT) infrastructure Which of the following vulnerabilities would present the GREATEST security risk to the organization?
Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
Which of the following is the BEST indication that an information security awareness program is effective?
An organization saves confidential information in a file with password protection and the file is placed in a shared folder. An attacker has stolen this information by obtaining the password through social engineering. Implementing which of the following would BEST enable the organization to prevent this type of incident in the future?
After areas have been appropriately scoped, what is the IS auditor's NEXT step in the selection for sampling?
Which of the following is the PRIMARY benefit of effective implementation of appropriate data classification?
Which of the following should be of MOST concern to an IS auditor when reviewing an intrusion detection system (IDS)?
Which of the following would be the GREATEST concern during a financial statement audit?
An IS auditor is reviewing a data conversion project. Which of the following is the auditor's BEST recommendation prior to go-live?
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
Which of the following is the BEST recommendation by an IS auditor to prevent unauthorized access to Internet of Things (loT) devices'?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
The PRIMARY role of an IS auditor in the remediation of problems found during an audit engagement is to:
An IS auditor has validated that an organization's IT department runs several low-priority automated tasks Which of the following is the BEST recommendation for an automated job schedule?
Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
A mission-critical application utilizes a one-node database server. On multiple occasions, the database service has been stopped to perform routine patching, causing application outages. Which of the following should be the IS auditor’s GREATEST concern?
Which of the following parameters reflects the risk threshold for an organization experiencing a service disruption?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the
associated risk?
Which of the following audit procedures would provide the BEST assurance that an application program is functioning as designed?
Which of the following is the MOST appropriate testing approach when auditing a daily data flow between two systems via an automated interface to confirm that it is complete and accurate?
Which of the following should be an IS auditor's GREATEST concern when assessing an IT service configuration database?
Which of the following should be the GREATEST concern to an IS auditor reviewing the information security framework of an organization?