Which of the following is the BEST approach to help organizations address risks associated with shadow IT?
An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor’s test data set to include?
When an organization conducts business process improvements, the IS auditor should be MOST concerned with the:
A PRIMARY objective of risk management is to keep the total cost of risks below the:
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:
Which of the following poses the GREATEST risk to an organization related to system interfaces?
Which of the following should be the PRIMARY purpose of conducting tabletop exercises when re-viewing a security incident response plan?
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?
Which of the following demonstrates the use of data analytics for a loan origination process?
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
Which of the following occurs during the issues management process for a system development project?
Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?
Which of the following is MOST important for an IS auditor to assess during a post-implementation review of a newly modified IT application developed in-house?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
An organization ' s IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor ' s BEST recommendation to facilitate compliance with the regulation?
Which of the following is MOST important to consider when defining disaster recovery strategies?
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization ' s incident response management program?
An information systems security officer ' s PRIMARY responsibility for business process applications is to:
A job is scheduled to transfer data from a transactional system database to a data lake for reporting purposes. Which of the following would be of GREATEST concern to an IS auditor?
An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?
During a follow-up audit, an IS auditor finds that some critical recommendations have not been addressed, as management has decided to accept the risk. Which of the following is the IS auditors BEST course of action?
What is MOST important to verify during an external assessment of network vulnerability?
An organization wants to use virtual desktops to deliver corporate applications to its end users. Which of the following should an IS auditor recommend to prevent domain name system (DNS) poisoning in their cloud environment?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor ' s NEXT course of action?
A national tax administration agency with a distributed network experiences service disruptions due to a large influx of traffic to a regional office near the end of each year. Which of the following would BEST enable the agency to improve the performance of its servers during the busy period?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
Which of the following backup methods is MOST appropriate when storage space is limited?
Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?
Which of the following roles is PRIMARILY responsible for mitigating the risk of benefits not being realized in an IT project?
Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor ' s BEST action?
Which of the following is MOST important to consider when reviewing an organization ' s defined data backup and restoration procedures?
Which of the following is MOST important for an IS auditor to verify when evaluating tne upgrade of an organization ' s enterprise resource planning (ERP) application?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
Which of the following is the PRIMARY benefit of a tabletop exercise for an incident response plan?
A post-implementation audit has been completed for the deployment of a sophisticated job scheduling tool Which of the following observations would be of GREATEST concern?
An IS auditor finds that a number of key patches have not been applied in a timely manner due to re-source constraints. Which of the following is the GREATEST risk to the organization in this
situation?
Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?
An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.
Which of the following is the BEST course of action to address this issue?