What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
Which of the following is MOST critical for the effective implementation of IT governance?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
An IS auditor assessing the controls within a newly implemented call center would First
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?