An IS auditor wants to gain a better understanding of an organization’s selected IT operating system software. Which of the following would be MOST helpful to review?
An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:
For security awareness training to be MOST effective, management should ensure the training:
Management has learned the implementation of a new IT system will not be completed on time and has requested an audit. Which of the following audit findings should be of GREATEST concern?
Retention periods and conditions for the destruction of personal data should be determined by the.
Some control activities have been found to be only partially compliant with the design of the control. Which of the following is an IS auditor’s PRIMARY course of action?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor ' s BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?
Which of the following is the PRIMARY benefit of introducing business impact analyses (BIAs) to business resiliency strategies?
Which of the following is an IS auditor’s MOST important step in a privacy audit?
Which of the following MOST effectively enables consistency across high-volume software changes ' ?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
The PRIMARY purpose of a vulnerability assessment in a cybersecurity program is to:
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor ' s BEST recommendation for the organization?
During a follow-up engagement, an IS auditor confirms evidence of a problem that was not an issue in the original audit. Which of the following is the auditor ' s BEST course of action?
Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls?
An IS auditor is reviewing an organization ' s incident management processes and procedures. Which of the following observations should be the auditor ' s GREATEST concern?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system ' s security settings Where would the auditor MOST likely find this information?
What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?
Which of the following BEST helps data loss prevention (DLP) tools detect movement of sensitive data m transit?
During an information security review, an IS auditor learns an organizational policy requires all employ-ees to attend information security training during the first week of each new year. What is
the auditor ' s BEST recommendation to ensure employees hired after January receive adequate guid-ance regarding security awareness?
During an audit of payment services of a branch based in a foreign country, a large global bank ' s audit team identifies an opportunity to use data analytics techniques to identify abnormal payments. Which of the following is the team ' s MOST important course of action?
Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
An IS auditor is reviewing job scheduling software and notes instances of delayed processing time, unexpected job interruption, and out-of-sequence job execution. Which of the following should the auditor examine FIRST to help determine the reasons for these instances?
An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?
Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?
Which of the following is MOST critical for the effective implementation of IT governance?
An organization establishes capacity utilization thresholds and monitors for instances when thresholds are exceeded. Which of the following is BEST supported by this activity?
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
When planning an audit to assess controls for an application in the cloud environment, it is MOST important for an IS auditor to understand:
An IS auditor is reviewing an organization ' s incident management processes. Which of the following observations should be the auditor ' s GREATEST concern?
Which of the following is the BEST metric to measure the quality of software developed in an organization?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
Which of the following is MOST critical to the success of an information security program?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
During which phase of the software development life cycle should an IS auditor be consulted to recommend security controls?
An organization has replaced its call center with Al chatbots that autonomously learn new responses through internet queries and customer conversation history. Which of the following would an IS auditor tasked with verifying IT controls consider to be the GREATEST risk?
Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?
How does public key infrastructure (PKI) help to verify that a digitally signed document is not a forgery?
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
Which of the following is the BEST indication that a software development project is on track to meet its completion deadline?
An IS auditor is reviewing a machine learning (ML) model that predicts the likelihood that a user will watch a certain movie. Which of the following would be of GREATEST concern to the auditor?
Which of the following is MOST important for an IS auditor to validate when reviewing the controls for an organization ' s quality management system (QMS)?
An IS auditor is reviewing a bank ' s service level agreement (SLA) with a third-party provider that hosts the bank ' s secondary data center, which of the following findings should be of GREATEST concern to the auditor?
Which of the following is the BEST way to determine the adequacy of controls for detecting inappropriate network activity in an organization?