During recent post-implementation reviews, an IS auditor has noted that several deployed applications are not being used by the business. The MOST likely cause would be the lack of:
An organization recently migrated Us data warehouse from a legacy system to a different architecture in the cloud. Which of the following should be of GREATEST concern to the IS auditor reviewing the new data architecture?
A programmer has made unauthorized changes to key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this
problem?
Which of the following is the BEST way to ensure a vendor complies with system security requirements?
A network analyst is monitoring the network after hours and detects activity that appears to be a brute-force attempt to compromise a critical server. After reviewing the alerts to ensure their accuracy, what should be done NEXT?
Which of the following poses the GREATEST potential concern for an organization that decides to consolidate mission-critical applications on a large server as part of IT capacity management?
An organization is planning to implement a control self-assessment (CSA) program for selected business processes. Which of the following should be the role of the internal audit team for this program?
Which of the following security measures is MOST important for protecting Internet of Things (IoT) devices from potential cyberattacks?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?
Which of the following is the BEST indication that a software development project is on track to meet its completion deadline?
Which of the following non-audit activities may impair an IS auditor's independence and objectivity?
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
An IS auditor is planning a review of an organizations robotic process automation (RPA) technology. Which of the following MUST be included in the audit work plan?
An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?
An IS auditor requests direct access to data required to perform audit procedures instead of asking management to provide the data Which of the following is the PRIMARY advantage of this approach?
An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?
The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?
Which of the following provides the BEST evidence that system requirements are met when evaluating a project before implementation?
Which of the following system attack methods is executed by entering malicious code into the search box of a vulnerable website, causing the server to reveal restricted information?
Which of the following MOST effectively minimizes downtime during system conversions?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
What is MOST important to verify during an external assessment of network vulnerability?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
A proper audit trail of changes to server start-up procedures would include evidence of:
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?