Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
An IS auditor is supporting a forensic investigation. An image of affected storage media has been captured while collecting digital forensic evidence. Which of the following techniques would BEST enable an IS auditor to verify that the captured image is an exact, unchanged replica of the original media?
Which of the following should be the PRIMARY objective of conducting an audit follow-up of management action plans?
The following findings are the result of an IS auditor’s post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?
An IS auditor is reviewing an organization's incident management processes. Which of the following observations should be the auditor's GREATEST concern?
Which of the following technology trends can lead to more robust data loss prevention (DLP) tools?
Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time?
Which of the following would MOST likely jeopardize the independence of a quality assurance (QA} team and could lead to conflict of interest?
From a risk management perspective, which of the following is the BEST approach when implementing a large and complex data center IT infrastructure?
Which of the following is an IS auditor's BEST recommendation to mitigate the risk of eavesdropping associated with an application programming interface (API) integration implementation?
Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated. Which of the following should be of
MOST concern?
An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?
Which of the following is the PRIMARY objective of enterprise architecture (EA)?
An IS auditor finds that irregularities have occurred and that auditee management has chosen to ignore them. If reporting to external authorities is required which of the following is the BEST action for the IS auditor to take?
Which of the following should be of GREATEST concern to an IS auditor when using data analytics?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's mobile device policies and controls in its corporate environment?
What is the MOST effective way to manage contractors' access to a data center?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
An IS auditor is reviewing an organization that performs backups on local database servers every two weeks and does not have a formal policy to govern data backup and restoration procedures. Which of the following findings presents the GREATEST risk to the organization?
A finance department has a two-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger in year one the system version upgrade will be applied and in year two business processes will be updated to implement new system functionality. Which of the following should be the PRIMARY focus of an IS auditor reviewing the second year of the implementation'?
A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
Which of the following types of firewalls provides the GREATEST degree of control against hacker intrusion?
Management has decided to accept a risk in response to a draft audit recommendation. Which of the following should be the IS auditor’s NEXT course of action?
Which of the following is the BEST review for an IS auditor to conduct when a vulnerability has been exploited by an employee?
During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
Which of the following issues identified during a formal review of an organization's information security policies presents the GREATEST potential risk to the organization?
Which of the following key performance indicators (KPIs) provides stakeholders with the MOST useful information about whether information security risk is being managed?
An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?
What should be an IS auditor's PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?
Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?
An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor’s test data set to include?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
Which of the following is MOST helpful for understanding an organization’s key driver to modernize application platforms?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
Which of the following is the STRONGEST indication of a mature risk management program?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization's enterprise architecture (EA) program?
An IS auditor is reviewing a decision to consolidate processing for multiple applications onto a single large server. Which of the following is the MOST significant impact from this decision?
Which of the following should be of MOST concern to an IS auditor reviewing an organization's operational log management?
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
Which of the following findings would be of GREATEST concern to an IS auditor reviewing the security architecture of an organization that has just implemented a Zero Trust solution?
An organization is establishing a steering committee for the implementation of a new enterprise resource planning (ERP) system that uses Agile project management methodology. What is the MOST important criterion for the makeup of this committee?