Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
The following findings are the result of an IS auditor’s post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?
Which of the following controls is the BEST recommendation to prevent the skimming of debit or credit card data in point of sale (POS) systems?
Providing security certification for a new system should include which of the following prior to the system ' s implementation?
The PRIMARY reason for an IS auditor to perform a functional walk-through of a business process during the preliminary phase of an audit assignment is to:
Which of the following is the PRIMARY reason that asset classification is vital to an information security program?
An organization ' s sensitive data is stored in a cloud computing environment and is encrypted. Which of the following findings should be of GREATEST concern to an IS auditor?
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
Which of the following is the BEST control to help ensure the completeness of outbound transactions?
An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application ' s operating system?
Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
An IS auditor discovers that backups of critical systems are not being performed in accordance with the recovery point objective (RPO) established in the business continuity plan (BCP). What should the auditor do NEXT?
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization ' s data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
The following findings are the result of an IS auditor ' s post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?
Which of the following is the GREATEST concern related to an organization ' s data classification processes?
The PRIMARY purpose of requiring source code escrow in a contractual agreement is to:
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Which of the following BEST mitigates the risk associated with the deployment of a new production system?
Which of the following findings should be an IS auditor’s GREATEST concern when reviewing a project to migrate confidential data backups to a cloud-based solution?
An organization considering the outsourcing of a business application should FIRST:
The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
Which of the following would BEST help to ensure that an incident receives attention from appropriate personnel in a timely manner?
An organization has shifted from a bottom-up approach to a top-down approach in the development of IT policies. This should result in:
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor ' s BEST course of action?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
Internal audit is evaluating an organization’s IT portfolio management. Which of the following would be the BEST recommendation for prioritizing the funding of IT projects?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?
Which of the following technologies is BEST suited to fulfill a business requirement for nonrepudiation of business-to-business transactions with external parties without the need for a mutually trusted entity?
An IS auditor is reviewing an organization ' s primary router access control list. Which of the following should result in a finding?
Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?
Which of the following is the MOST important control for virtualized environments?
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
An IS auditor has been asked to perform a post-implementation review of a newly developed system. When reviewing the testing phase results, the auditor observed that separate modules of the system tested correctly in the user acceptance testing (UAT) phase, but some features did not work as expected when moved to production. Which of the following was MOST likely omitted prior to implementation?
Which of the following is MOST important to consider when determining the usefulness of audit evidence?
The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:
Which of the following responsibilities associated with a disaster recovery plan (DRP) can be outsourced to a Disaster Recovery as a Service (DRaaS) provider?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
Which of the following is the PRIMARY objective of data loss prevention (DLP) mechanisms?