An IS auditor wants to verify alignment of the organization ' s business continuity plan (BCP) with the business strategy. Which of the following would be MOST helpful to review?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
Which of the following is the PRIMARY reason an IS auditor should recommend that management create an IT risk register?
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization ' s information security plan includes:
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
An IS auditor finds that some employees are using public cloud-based AI tools. Which of the following presents the GREATEST concern?
A white box testing method is applicable with which of the following testing processes?
During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor ' s BEST course of action?
Which of the following findings would be of GREATEST concern to an IS auditor reviewing the security architecture of an organization that has just implemented a Zero Trust solution?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor ' s NEXT course of action?
Which of the following recommendations would BEST prevent the implementation of IT projects without collaborating with the business?
An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
Which of the following would BEST guide an IS auditor when determining an appropriate time to schedule the follow-up of agreed corrective actions for reported audit issues?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor ' s PRIMARY concern would be:
An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality
within the organization. Which of the following should be recommended as the PRIMARY factor to
determine system criticality?
Which of the following is the GREATEST risk of project dashboards being set without sufficiently defined criteria?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization ' s incident management processes?
An organization performs virtual machine (VM) replication instead of daily backups of its critical servers. Which of the following is MOST important to validate when evaluating the adequacy of recovery procedures?
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization ' s vulnerability scanning program ' '
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor ' s BEST recommendation should be to:
Which of the following should be an IS auditor ' s GREATEST concern when a data owner assigns an incorrect classification level to data?
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
Which of the following presents the GREATEST risk to an organization ' s ability to manage quality control (QC) processes?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor ' s BEST course of action would be to determine if:
When reviewing an organization ' s finalized risk assessment process, what would be the MAIN reason for an IS auditor to compare acceptable risk level with residual risk?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
Which of the following activities is MOST likely to increase internal audit quality?
Which of the following issues associated with a data center ' s closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
Which of the following is the BEST compensating control against separation of duties conflicts in new code development?
Which of the following should be an IS auditor ' s GREATEST concern when reviewing an organization ' s security controls for policy compliance?
Which of the following would be of MOST concern to an IS auditor reviewing a data loss prevention (DLP) solution implementation for endpoints?
When reviewing an organization ' s information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
Which of the following is the MOST important course of action to ensure a cloud access security broker (CASB) effectively detects and responds to threats?
Which of the following measures BEST mitigates the risk of data exfiltration during a cyberattack?
IT management has accepted the risk associated with an IS auditor ' s finding due to the cost and complexity of the corrective actions. Which of the following should be the auditor ' s NEXT course of action?
What is the PRIMARY reason for an organization to classify the data stored on its internal networks?
An organization produces control reports with a desktop application that accesses data in the central production database. Which of the following would give an IS auditor concern about the reliability of these reports?
Which of the following is MOST helpful in identifying system performance constraints?
During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility Which of the following is the IS auditor ' s BEST course of action?