Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
Which of the following would be a result of utilizing a top-down maturity model process?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following is MOST important to consider when developing a service level agreement (SLAP)?
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
Which of the following would BEST help to ensure that an incident receives attention from appropriate personnel in a timely manner?
The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:
Which of the following is the PRIMARY role of key performance indicators (KPIs) in supporting business process effectiveness?
Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?
Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?
When assessing the overall effectiveness of an organization's disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?
Due to advancements in technology and electronic records, an IS auditor has completed an engagement by email only. Which of the following did the IS auditor potentially compromise?
During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor's BEST course of action?
When assessing a proposed project for the two-way replication of a customer database with a remote call center, the IS auditor should ensure that:
Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
After delivering an audit report, the audit manager discovers that evidence was overlooked during the audit This evidence indicates that a procedural control may have failed and could contradict a conclusion of the audit Which of the following risks is MOST affected by this oversight?
Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization's configuration and release management process?
A computer forensic audit is MOST relevant in which of the following situations?
Which of the following is MOST important for an IS auditor to review when determining whether IT investments are providing value to tie business?
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?
Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves
for care?
During an audit which of the following would be MOST helpful in establishing a baseline for measuring data quality?
Backup procedures for an organization's critical data are considered to be which type of control?
Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?
During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?
Which of the following methods will BEST reduce the risk associated with the transition to a new system using technologies that are not compatible with the old system?
Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?
An IS auditor Is renewing the deployment of a new automated system Which of the following findings presents the MOST significant risk?