An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
Which of the following demonstrates the use of data analytics for a loan origination process?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization's goals?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
Which of the following should be an IS auditor's GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
Which of the following data would be used when performing a business impact analysis (BIA)?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
The decision to accept an IT control risk related to data quality should be the responsibility of the:
Which of the following is MOST important to ensure when planning a black box penetration test?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?