Which of the following backup schemes is the BEST option when storage media is limited?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
Which of the following is MOST important for an IS auditor to validate when reviewing the controls for an organization's quality management system (QMS)?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
Which of the following MOST effectively minimizes downtime during system conversions?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
Which of the following is MOST important with regard to an application development acceptance test?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
Which of the following is the GREATEST concern associated with a high number of IT policy exceptions approved by management?
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
The BEST way to evaluate the effectiveness of a newly developed application is to:
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?