Which of the following is the MOST appropriate responsibility of an IS auditor involved in a data center renovation project?
Which of the following key performance indicators (KPIs) provides stakeholders with the MOST useful information about whether information security risk is being managed?
The management of a small e-commerce firm is concerned about the impact of AI adoption on its intellectual property. Which of the following BEST addresses this concern?
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
Which of the following documents should define roles and responsibilities within an IT audit organization?
Which of the following is the MAIN objective of enterprise architecture (EA) governance?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
An organization ' s information security policies should be developed PRIMARILY on the basis of:
Which of the following is BEST supported by enforcing data definition standards within a database?
An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?
A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
Which of the following is the BEST indication of effective IT investment management?
An outsourced recruitment vendor processes personally identifiable information (PII) related to an organization’s new hires. Which of the following would be the GREATEST concern to an IS auditor reviewing the third-party risk management process?
An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
An external IS auditor is reviewing the continuous monitoring system for a large bank and notes several potential issues. Which of the following would present the GREATEST concern regarding the reliability of the monitoring system?
Which of the following MOST effectively detects transposition and transcription errors?
Which of the following BEST indicates that the effectiveness of an organization ' s security awareness program has improved?
An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor ' s PRIMARY concern?
Which of the following BEST enables a governing body to monitor IT performance based on metrics?
Which of the following BEST facilitates the legal process in the event of an incident?
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?
An IS auditor is reviewing an organization ' s system development life cycle (SDLC) Which of the following MUST be included in the review?
Which of the following should be the FIRST step in managing the impact of recently discovered zero-day vulnerabilities?
Which of the following BEST supports an organization ' s objective of restricting the use of removable storage devices by users?
Which of the following is the BEST way to ensure a vendor complies with system security requirements?
Which of the following is me GREATE ST impact as a result of the ongoing deterioration of a detective control?
An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
Which of the following is MOST important to review during the project initiation phase of developing and deploying a new application?
Which of the following would BEST prevent an arbitrary application of a patch?
Which of the following MUST be completed as part of the annual audit planning process?
Which of the following is the BEST recommendation to include in an organization ' s bring your own device (BYOD)
policy to help prevent data leakage?
Which of the following is the PRIMARY basis on which audit objectives are established?
In order for a firewall to effectively protect a network against external attacks, what fundamental practice must be followed?
Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?
An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank ' s customers. Which of the following controls is MOST important for the auditor to confirm is in place?
Which of the following presents the GREATEST risk associated with end-user computing (EUC) applica-tions over financial reporting?
Which of the following should be of MOST concern to an IS auditor when reviewing an intrusion detection system (IDS)?