An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?
An IS department is evaluated monthly on its cost-revenue ratio user satisfaction rate, and computer downtime This is BEST zed as an application of.
Which of the following is me GREATE ST impact as a result of the ongoing deterioration of a detective control?
A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
Which of the following is an IS auditor's BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?
Which of the following management decisions presents the GREATEST risk associated with data leakage?
Which of the following is a PRIMARY responsibility of an IT steering committee?
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization's objectives?
In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?
Which of the following is an IS auditor's BEST approach when prepanng to evaluate whether the IT strategy supports the organization's vision and mission?
During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?
Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves
for care?
An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?
Which of the following is the BEST testing approach to facilitate rapid identification of application interface errors?
Which of the following is the BEST approach for determining the overall IT risk appetite of an organization when business units use different methods formanaging IT risks?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
Which of the following should be the FIRST step when conducting an IT risk assessment?
Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?
When is it MOST important for an IS auditor to apply the concept of materiality in an audit?
Which of the following is MOST important to determine when conducting an audit Of an organization's data privacy practices?
With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?
An IS auditor is reviewing a data conversion project Which of the following is the auditor's BEST recommendation prior to go-live?
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's data conversion andinfrastructure migration plan?
Which of the following provides the BEST evidence that a third-party service provider's information security controls
are effective?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following
is the auditor’s BEST recommendation to prevent unauthorized access?
Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?
Email required for business purposes is being stored on employees' personal devices.
Which of the following is an IS auditor's BEST recommendation?
The use of which of the following is an inherent risk in the application container infrastructure?
Which of the following is MOST effective for controlling visitor access to a data center?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
Which of the following technologies has the SMALLEST maximum range for data transmission between devices?
An IS auditor Is renewing the deployment of a new automated system Which of the following findings presents the MOST significant risk?
Which of the following is the MOST appropriate control to ensure integrity of online orders?
Which of the following should be the PRIMARY focus when communicating an IS audit issue to management?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's incident response management program?
Which of the following is an IS auditor’s BEST approach when low-risk anomalies have been identified?
Which of the following controls would BEST help a forensic investigator prevent modifications in digital evidence?
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
Which of the following is the BEST approach to help organizations address risks associated with shadow IT?
Which of the following BEST mitigates the risk of SQL injection attacks against applications exposed to the internet?
An organization has both an IT strategy committee and an IT steering committee. When reviewing the minutes of the IT steering committee, an IS auditor would expect to find that the
committee:
A steering committee established to oversee an organization's digital transformation program is MOSTlikely to be involved with which of the following activities?
Which of the following BEST indicates that the effectiveness of an organization's security awareness program has improved?
Which of the following is the BEST way to ensure a vendor complies with system security requirements?