Which of the following responsibilities of an organization ' s quality assurance (QA) function should raise concern for an IS auditor?
A programmer has made unauthorized changes to key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this
problem?
When auditing an organization ' s software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
An IS auditor reviewing an organization’s IT systems finds that the organization frequently purchases systems that are incompatible with the technologies already in the organization. Which of the following is the MOST likely reason?
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor ' s BEST action?
Which of the following risk scenarios is BEST mitigated through the use of a data loss prevention (DLP) tool?
To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?
While evaluating the data classification process of an organization, an IS auditor ' s PRIMARY focus should be on whether:
An IS auditor has identified deficiencies within the organization ' s software development life cycle policies. Which of the following should be done NEXT?
Which of the following should be the GREATEST concern to an IS auditor reviewing the information security framework of an organization?
An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization ' s privacy policy?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
Which of the following is the MAJOR advantage of automating internal controls?
An IS auditor is planning a review of an organizations cybersecurity incident response maturity Which of the following methodologies would provide the MOST reliable conclusions?
Which of the following should be given GREATEST consideration when implementing the use of an open-source product?
Which of the following is the BEST approach to validate whether a streaming site can continue to provide service during a period of live streaming with an anticipated high volume of viewers?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
Which of the following provides the GREATEST assurance that an organization has effective controls preventing connection of unauthorized Internet of Things (IoT) devices to the corporate network?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor ' s BEST course of action?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor ' s BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
Which of the following is the MOST appropriate control to ensure integrity of online orders?
A global bank plans to use a cloud provider for backup of customer financial data. Which of the following should be the PRIMARY focus of this project?
In an organization ' s feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
Which of the following backup schemes is the BEST option when storage media is limited?
To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?
The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
Which of the following areas of responsibility would cause the GREATEST segregation of duties conflict if the individual who performs the related tasks also has approval authority?
An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?
One advantage of managing an entire collection of projects as a portfolio is that it highlights the need to:
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
Of the following who should be responsible for cataloging and inventorying robotic process automation (RPA) processes?
Which of the following is MOST important to ensure when planning a black box penetration test?
Which of the following is the PRIMARY benefit of effective implementation of appropriate data classification?
A small IT department has embraced DevOps, which allows members of this group to deploy code to production and maintain some development access to automate releases. Which of the following is the MOST effective control?
Which of the following is the BEST indication that an information security awareness program is effective?
Which of the following is the PRIMARY objective of a control self-assessment (CSA)?
What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?
An IS auditor is reviewing a medical device that is attached to a patient’s body, which automatically takes and uploads measurements to a cloud server. Treatment may be updated based on the measurements. Which of the following should be the auditor ' s PRIMARY focus?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster ' '