Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics
system?
An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?
An organization considering the outsourcing of a business application should FIRST:
Which of the following would minimize the risk of losing transactions as a result of a disaster?
In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?
Which of the following is the PRIMARY benefit of a tabletop exercise for an incident response plan?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor's NEXT course of action?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
Which of the following would be a result of utilizing a top-down maturity model process?
A proper audit trail of changes to server start-up procedures would include evidence of:
Which of the following is MOST important to include in forensic data collection and preservation procedures?
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
Secure code reviews as part of a continuous deployment program are which type of control?