Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?
Which of the following protocols should be used when transferring data via the internet?
Which of the following is the MOST important consideration when relying on the work of the prior auditor?
Which of the following is the MOST significant risk to an organization migrating its onsite application servers to a public cloud service provider?
A network analyst is monitoring the network after hours and detects activity that appears to be a brute-force attempt to compromise a critical server. After reviewing the alerts to ensure their accuracy, what should be done NEXT?
Which of the following provides an IS auditor the BEST evidence that a third-party service provider's information security controls are effective?
Which of the following provides re BEST evidence that outsourced provider services are being properly managed?
The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization's information cannot be accessed?
Which of the following provides the MOST reliable method of preventing unauthonzed logon?
Which of the following is the MOST appropriate indicator of change management effectiveness?
Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?
An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application's operating system?
Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor's NEXT action1?
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?
As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (B1A)?
Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?
An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?
Which of the following should be of GREATEST concern to an IS auditor when auditing an organization's IT strategy development process?
Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?
Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?
When assessing the overall effectiveness of an organization's disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?
Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?
An IS auditor is reviewing an organization's business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor's GREATEST concern?
An IS auditor notes that not all security tests were completed for an online sales system recently promoted to production. Which of the following is the auditor's BEST course of action?
When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider’s external audit report on service level management when the
A bank has a combination of corporate customer accounts (higher monetary value) and small business accounts (lower monetary value) as part of online banking. Which of the following is the BEST sampling approach for an IS auditor to use for these accounts?
Which of the following is MOST important for an IS auditor to validate when auditing network device management?
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization's security policy?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
Which of the following would be a result of utilizing a top-down maturity model process?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
Which of the following should be done FIRST when planning a penetration test?
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?