When auditing the feasibility study of a system development project, the IS auditor should:
In an annual audit cycle, the audit of an organization ' s IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
An organization is establishing a steering committee for the implementation of a new enterprise resource planning (ERP) system that uses Agile project management methodology. What is the MOST important criterion for the makeup of this committee?
The decision to accept an IT control risk related to data quality should be the responsibility of the:
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
Which of the following BEST enables an IS auditor to prioritize financial reporting spreadsheets for an end-user computing (EUC) audit?
Which of the following should be the role of internal audit in an organization’s move to the cloud?
The GREATEST concern for an IS auditor reviewing vulnerability assessments by the auditee would be if the assessments are:
An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
An organization has decided to build a data warehouse using source data from several disparate systems to support strategic decision-making.
Which of the following is the BEST way to ensure the accuracy and completeness of the data used to support business decisions?
Which of the following is the BEST control to mitigate attacks that redirect internet traffic to an unauthorized website?
Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?
Which of the following is the GREATEST benefit of adopting an Agile audit methodology?
Which of the following would be an IS auditor ' s GREATEST concern when reviewing the organization ' s business continuity plan (BCP)?
A sample for testing must include the 80 largest client balances and a random sample of the rest. What should the IS auditor recommend?
Which of the following controls is MOST crucial to ensure an organization will be able to recover its data from backup media in the event of a disaster?
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor’s independence?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
An IS auditor is reviewing an organization ' s information asset management process. Which of the following would be of GREATEST concern to the auditor?
Which of the following is the MOST important consideration of any disaster response plan?
An IS auditor is evaluating the log management system for an organization with devices and systems in multiple geographic locations. Which of the following is MOST important for the auditor to verify?
Which of the following is the MOST important consideration when implementing a Zero Trust strategy for mobile, wireless, and Internet of Things (IoT) devices?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
What should be the PRIMARY focus during a review of a business process improvement project?
Which of the following should an IS auditor consider FIRST when evaluating firewall rules?
Which of the following is the MOST important responsibility of user departments associated with program changes?
An organization plans to centrally decommission end-of-life databases and migrate the data to the latest model of hardware. Which of the following BEST ensures data integrity is preserved during the migration?
Which of the following activities should be separated in an organization’s incident management processes?
Which of the following should be the FIRST step to successfully implement a corporate data classification program?
Which of the following provides the GREATEST assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively?
Which of the following is the MOST important consideration to facilitate prosecution of a perpetrator after a cybercrime?
When evaluating whether the expected benefits of a project have been achieved, it is MOST important for an IS auditor to review:
Which of the following BEST demonstrates alignment of the IT department with the corporate mission?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
A telecommunications company has recently created a new fraud department with three employees and acquired a fraud detection system that uses artificial intelligence (AI) modules. Which of the following would be of GREATEST concern to an IS auditor reviewing the system?
Which of the following would minimize the risk of losing transactions as a result of a disaster?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the
associated risk?
Which of the following would be an appropriate rote of internal audit in helping to establish an organization ' s privacy program?
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
Which of the following BEST helps to ensure data integrity across system interfaces?
Which of the following should be the PRIMARY focus for any network design that deploys a Zero Trust architecture?