An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
Which of the following applications has the MOST inherent risk and should be prioritized during audit planning?
Which of the following provides the BEST assurance that vendor-supported software remains up to date?
Which of the following is the PRIMARY reason an IS auditor should recommend that management create an IT risk register?
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
The following findings are the result of an IS auditor’s post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?
How is nonrepudiation supported within a public key infrastructure (PKI) environment?
Which of the following BEST indicates that the effectiveness of an organization's security awareness program has improved?
When drafting a disaster recovery strategy, what should be the MOST important outcome of a business impact analysis (BIA)?
Which of the following is the BEST way to ensure a vendor complies with system security requirements?
Management has decided to accept a risk in response to a draft audit recommendation. Which of the following should be the IS auditor’s NEXT course of action?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?
Which of the following is the BEST indication of effective governance over IT infrastructure?
Which of the following would be an IS auditor's GREATEST concern when reviewing the organization's business continuity plan (BCP)?
Which of the following is the MOST effective way for an organization to project against data loss?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
An IS auditor is reviewing an artificial intelligence (Al) and expert system application. The system has produced several critical errors with severe impact. Which of the following should the IS auditor do NEXT to understand the cause of the errors?
From a risk management perspective, which of the following is the BEST approach when implementing a large and complex data center IT infrastructure?
When an organization conducts business process improvements, the IS auditor should be MOST concerned with the:
An IS auditor is reviewing database fields updated in real-time and displayed through other applications in multiple organizational functions. When validating business approval for these various use cases, which of the following sources of information would be the BEST starting point?
Which of the following MOST effectively enables consistency across high-volume software changes'?
Which of the following is the BEST control to mitigate the risk of shadow IT?
Which of the following BEST indicates that an incident management process is effective?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
which of the following is a core functionality of a configuration and release management system?
Which of the following risk scenarios is BEST mitigated through the use of a data loss prevention (DLP) tool?
An IS auditor has been asked to review the quality of data in a general ledger system. Which of the following would provide the auditor with the MOST meaningful results?
Which of the following procedures for testing a disaster recovery plan (DRP) is MOST effective?
Which type of control has been established when an organization implements a security information and event management (SIEM) system?
Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?
When is it MOST important for an IS auditor to apply the concept of materiality in an audit?