A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
Which of the following is MOST critical for the effective implementation of IT governance?
Which of the following is necessary for effective risk management in IT governance?
Which of the following is MOST critical to the success of an information security program?
Which of the following BEST facilitates the legal process in the event of an incident?
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
Which of the following would be MOST useful when analyzing computer performance?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
Which of the following should be an IS auditor's GREATEST concern when assessing an IT service configuration database?
An organization wants to classify database tables according to its data classification scheme From an IS auditor's perspective the tables should be classified based on the:
Which of the following is the MOST effective control over visitor access to highly secured areas?
An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?
Which of the following should be the FIRST step when planning an IS audit of a third-party service provider that monitors network activities?
An IS auditor is reviewing a data conversion project Which of the following is the auditor's BEST recommendation prior to go-live?
A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
Which of the following would protect the confidentiality of information sent in email messages?
An IS auditor determines that the vendor's deliverables do not include the source code for a newly acquired product. To address this issue, which of the following should the auditor recommend be included in the contract?
Which of the following is MOST critical to the success of an information security program?
When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?
During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?
An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fixhas been implemented, what should the IS auditor recommend to validate the interface is working in the future?
Which of the following should be done FIRST to minimize the risk of unstructured data?
The use of which of the following would BEST enhance a process improvement program?
An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?
Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization's payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management
experience. What is the BEST course of action?
An IS auditor reviewing incident response management processes notices that resolution times for reoccurring incidents have not shown improvement. Which of the following is the auditor's BEST recommendation?
Retention periods and conditions for the destruction of personal data should be determined by the.
An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country.
What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted
application?
An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be the GREATEST concern?
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
Which of the following would be the BEST process for continuous auditing to a large financial Institution?
Which of the following provides the BEST assurance of data integrity after file transfers?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?