Which of the following controls BEST provides confidentiality and nonrepudiation for an online business looking for digital payment data security?
Which of the following is the MOST important outcome of an information security program?
Which of the following is the BEST review for an IS auditor to conduct when a vulnerability has been exploited by an employee?
Which of the following responses to risk associated with separation of duties would incur the LOWEST initial cost?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor ' s NEXT course of action?
Which type of device sits on the perimeter of a corporate of home network, where it obtains a public IP address and then generates private IP addresses internally?
Which of the following represents the GREATEST risk to virtualized environments?
How is nonrepudiation supported within a public key infrastructure (PKI) environment?
Which of the following is an IS auditor ' s BEST recommendation to mitigate the risk of eavesdropping
associated with an application programming interface (API) integration implementation?
An IS auditor is reviewing a data conversion project Which of the following is the auditor ' s BEST recommendation prior to go-live?
Which of the following MUST be completed as part of the annual audit planning process?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor ' s FIRST action should be to:
An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
An organization has alternative links in its wide area network (WAN) to provide redundancy. However, each time there is a problem with a link, network administrators have to update the configuration to divert traffic to the other link. Which of the following would be an IS auditor ' s BEST recommendation?
Which of the following is the GREATEST impact as a result of the ongoing deterioration of a detective control?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following is the MOST important reason for an IS auditor to examine the results of a post-incident review performed after a security incident?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following is the BEST recommendation by an IS auditor to prevent unauthorized access to Internet of Things (loT) devices ' ?
During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor ' s GREATEST concern with this situation?
Which of the following should be the PRIMARY focus when communicating an IS audit issue to management?
Which of the following technologies BEST assists in protection of digital evidence as part of forensic investigation acquisition?
An IS auditor is reviewing an organization ' s cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?
When processing speed is the highest priority, which cryptographic algorithm should be used to verify the integrity of a bit-for-bit copy from digital evidence?
An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?
Which of the following is the PRIMARY advantage of using an automated security log monitoring tool instead of conducting a manual review to monitor the use of privileged access?
To develop meaningful recommendations ' or findings, which of the following is MOST important ' or an IS auditor to determine and understand?
An IS auditor is reviewing a decision to consolidate processing for multiple applications onto a single large server. Which of the following is the MOST significant impact from this decision?
A hearth care organization utilizes Internet of Things (loT) devices to improve patient outcomes through real-time patient monitoring and advanced diagnostics. Which of the following would BEST assist in isolating these devices from corporate network traffic?
Which of the following provides the BEST evidence that system requirements are met when evaluating a project before implementation?
Which of the following is BEST used for detailed testing of a business application ' s data and configuration files?
Which of the following is the PRIMARY benefit of monitoring IT operational logs?
Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization ' s privacy policy?
An IS auditor finds that a recently deployed application has a number of developers with inappropriate update access left over from the testing environment. Which of the following would have BEST prevented the update access from being migrated?
Which of the following BEST enables the timely identification of risk exposure?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
How does the emergence of quantum computing impact traditional data encryption methods?
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?
Who should be the FIRST to evaluate an audit report prior to issuing it to the project steering committee?
An IS auditor has been tasked with auditing the inventory control process for a large organization that processes millions of data transactions. Which of the following is the BEST testing strategy to adopt?
Which of the following would BEST reduce the risk of application programming interface (API) unavailability?
Which of the following should be an IS auditor ' s PRIMARY focus when evaluating the response process for cybercrimes?