Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
Which of the following is the BEST justification for deferring remediation testing until the next audit?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?
Which of the following is the BEST reason for an organization to use clustering?
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
Which of the following is MOST helpful for measuring benefits realization for a new system?
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed?
In an online application which of the following would provide the MOST information about the transaction audit trail?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
Which of the following security risks can be reduced by a property configured network firewall?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?
An information systems security officer's PRIMARY responsibility for business process applications is to:
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
Which of the following BEST enables the timely identification of risk exposure?
Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?
Which of the following represents the HIGHEST level of maturity of an information security program?
Which of the following BEST Indicates that an incident management process is effective?