0% found this document useful (0 votes)
43 views20 pages

Part 1

Uploaded by

Soweird
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views20 pages

Part 1

Uploaded by

Soweird
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Which of the following should the IS auditor do FIRST to ensure data transfer integrity for internet of

things (IoT) devices?

Which of the following should be the PRIMARY objective of a migration audit?

While conducting a review of project plans related to a new software development, an IS auditor finds
the project initiation document (PID) is incomplete. What is the BEST way for the auditor to proceed?

Which of the following is the BEST preventive control to ensure the integrity of server operating system?

Which of the following is a corrective control?


Which of the following is MOST important to ensure when planning a black box penetration test?

Which of the following is the MOST effective control to ensure electronic records beyond their retention
periods are deleted from IT system?

Which of the following is the GREATEST concern when using a cold backup site?

Which of the following is necessary for effective risk management in IT governance?


An IS auditor determines that a business continuity plan (BCP) has not been reviewed and approved by
management. Which of the following is the MOST significant risk associated with this situation?

Which of the following is the BEST sampling method when performing an audit test to determine the
number of access requests without approval signatures?

Which of the following is the BEST IS audit strategy?


An effective implementation of security roles and responsibilities is BEST evidenced across an enterprise
when:

Which of the following strategies BEST optimizes data storage without compromising data retention
practices?

When a firewall is subjected to a probing attack, the MOST appropriate first response is for the firewall
to:

Which of the following is MOST important to ensure during computer forensics investigations?
Which of the following should an IS auditor recommend to reduce the likelihood of potential intruders
using social engineering?

During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been
performed. The auditor should FIRST:

During a post-implementation review, a step in determining whether a project met user requirements is
to review the:

An IS auditor is using data analytics in an audit and has obtained the data to be used for testing. Which
of the following is the MOST important task before testing begins?
To create a digital signature in a message using asymmetric encryption, it is necessary to:

During the design phase of a software development project, the PRIMARY responsibility of an IS auditor
is to evaluate the:

An IS auditor reviewing a checkpoint/restart procedure should be MOST concerned if it is applied after:

Which of the following is the MOST reliable way for an IS auditor to evaluate the operational
effectiveness of an organization’s data loss prevention (DLP) controls?
Which of the following is a preventive control related to change management?

An IS auditor identifies key controls that have been overridden by management, the NEXT step the IS
auditor should take is to:

Which of the following is the BEST control to help prevent sensitive data leaving an organization via
email?

The MOST effective way to determine if IT is meeting business requirements is to establish


Which of the following is the MOST important consideration for building resilient systems?

What would be an IS auditor’s BEST recommendation upon finding that a third-party IT service provider
hosts the organization’s human resources (HR) system in a foreign country?

Which of the following is the BEST source of information for an IS auditor when planning an audit of a
business application’s controls?
Which of the following BEST helps to identify errors during data transfer?

Following the sale of a business division, employees will be transferred to a new organization, but they
will retain access to IT equipment from the previous employer. An IS auditor has recommended that
both organizations agree to and document an acceptable use policy for the equipment. What type of
control has been recommended?

Which of the following factors constitutes a strength in regard to the use of a disaster recovery planning
reciprocal agreement?

Which of the following are BEST suited for continuous auditing?


An organization has established hiring policies and procedures designed specifically to ensure network
administrators are well qualifies. Which type of control is in place?

What would be an IS auditor’s GREATEST concern when using a test environment for an application
audit?

Which of the following is the MOST likely reason an organization would use Platform as a Service (PaaS)?

When aligning IT projects with organizational objectives, it is MOST important to ensure that the:
An IS auditor’s PRIMARY objective when examining problem reposts should be to help ensure:

Which of the following human resources (HR) management practices BEST leads to the detection of
fraudulent activity?

Which of the following is MOST important to ensure when reviewing a global organization’s controls to
protect data held on its IT infrastructure across all of its locations?

Which of the following can help ensure that IT deliverables are linked to business goals and that
appropriate performance criteria are in place?
To ensure efficient and economic use of limited resources in supporting a local area network (LAN)
infrastructure, it is advisable to:

Which of the following situations would impair the independence of an IS auditor involved in a software
development project?

Which of the following is MOST likely to enable a hacker to successfully penetrate a system?

Which of the following is the GREATEST threat to Voice-over internet Protocol (VolP) related to privacy?
An IS auditor noted that a change to a critical calculation was placed into the production environment
without being tested.

Which of the following is most important for the successful establishment of a security vulnerability
management program?

One advantage of monetary unit sampling is the fact that:

Which of the following would provide the best evidence for use in a forensic investigation of an
employee’s hard drive?
When evaluating the ability of a disaster recovery plan (DRP) to enable the recovery of IT processing
capabilities, it is most important for the IS auditor to verify the plan is

An IS auditor notes that help desk personnel are required to make critical decisions during major service
disruptions. Which of the following is the auditor’s best recommendation to address this situation?

An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in
the scope of an upcoming audit. What should the auditor consider the most significant concern?

In which phase of penetration testing would host detection and domain name system (DNS)
interrogation be performed
The primary benefit of using secure shell (SSH) to access a server on a network is that it

An IS auditor is reviewing security policies and finds no mention of the return of corporate-owned
smartphones upon termination of employment. The greatest risk arising from this situation is that
unreturned devices

Which of the following should be done first to effectively define IT audit universe for an entity with
multiple business lines

Which of the following must be in place before an IS auditor initiates audit follow-up activities
The primary role of a control self-assessment (CSA) facilitator is to

Which of the following controls will best ensure that the board of directors receives sufficient
information about IT

Which of the following would be the most significant factor when choosing among several backup
system alternatives with different restoration speeds

Which of the following validation techniques would best prevent duplicate electronic vouchers
Which of the following projects would be most important to review in an audit of an organization’s
financial statements

Which of the following poses the greatest risk to a company that allows employees to use personally
owned devices to access customer files on the company’s network

Which of the following findings should be of greatest concern to an IS auditor conducting a forensic
analysis following incidents of suspicious activities on a server

The first course of action an investigator should take when a computer is being attacked is to
An organization is using a single account shared by personnel for its social networking marketing page.
Which of the following is the best method to maintain accountability over the account

When evaluating a project immediately prior to implementation, which of the following would provide
the best evidence that the system has the required functionality

Which of the following would best enable an IS auditor to perform an audit that requires testing the full
population of data

The primary benefit of information asset classification is that it


During a security audit, an IS auditor with reviewing log entries obtained from an enterprise intrusion
prevention system (IPS). Which type of risk would be associated with the potential for the auditor to
miss a sequence of logged events that could indicate an error in the IPS configuration

A manager identifies active privileged accounts belonging to staff who have left the organization, which
of the following is the threat actor in this scenario

The maturity level of an organization’s problem management support function is optimized when the
function

Which of the following is an objective of data transfer controls


Which of the following is an example of a preventive control

You might also like