Part 1
Part 1
While conducting a review of project plans related to a new software development, an IS auditor finds
the project initiation document (PID) is incomplete. What is the BEST way for the auditor to proceed?
Which of the following is the BEST preventive control to ensure the integrity of server operating system?
Which of the following is the MOST effective control to ensure electronic records beyond their retention
periods are deleted from IT system?
Which of the following is the GREATEST concern when using a cold backup site?
Which of the following is the BEST sampling method when performing an audit test to determine the
number of access requests without approval signatures?
Which of the following strategies BEST optimizes data storage without compromising data retention
practices?
When a firewall is subjected to a probing attack, the MOST appropriate first response is for the firewall
to:
Which of the following is MOST important to ensure during computer forensics investigations?
Which of the following should an IS auditor recommend to reduce the likelihood of potential intruders
using social engineering?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been
performed. The auditor should FIRST:
During a post-implementation review, a step in determining whether a project met user requirements is
to review the:
An IS auditor is using data analytics in an audit and has obtained the data to be used for testing. Which
of the following is the MOST important task before testing begins?
To create a digital signature in a message using asymmetric encryption, it is necessary to:
During the design phase of a software development project, the PRIMARY responsibility of an IS auditor
is to evaluate the:
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational
effectiveness of an organization’s data loss prevention (DLP) controls?
Which of the following is a preventive control related to change management?
An IS auditor identifies key controls that have been overridden by management, the NEXT step the IS
auditor should take is to:
Which of the following is the BEST control to help prevent sensitive data leaving an organization via
email?
What would be an IS auditor’s BEST recommendation upon finding that a third-party IT service provider
hosts the organization’s human resources (HR) system in a foreign country?
Which of the following is the BEST source of information for an IS auditor when planning an audit of a
business application’s controls?
Which of the following BEST helps to identify errors during data transfer?
Following the sale of a business division, employees will be transferred to a new organization, but they
will retain access to IT equipment from the previous employer. An IS auditor has recommended that
both organizations agree to and document an acceptable use policy for the equipment. What type of
control has been recommended?
Which of the following factors constitutes a strength in regard to the use of a disaster recovery planning
reciprocal agreement?
What would be an IS auditor’s GREATEST concern when using a test environment for an application
audit?
Which of the following is the MOST likely reason an organization would use Platform as a Service (PaaS)?
When aligning IT projects with organizational objectives, it is MOST important to ensure that the:
An IS auditor’s PRIMARY objective when examining problem reposts should be to help ensure:
Which of the following human resources (HR) management practices BEST leads to the detection of
fraudulent activity?
Which of the following is MOST important to ensure when reviewing a global organization’s controls to
protect data held on its IT infrastructure across all of its locations?
Which of the following can help ensure that IT deliverables are linked to business goals and that
appropriate performance criteria are in place?
To ensure efficient and economic use of limited resources in supporting a local area network (LAN)
infrastructure, it is advisable to:
Which of the following situations would impair the independence of an IS auditor involved in a software
development project?
Which of the following is MOST likely to enable a hacker to successfully penetrate a system?
Which of the following is the GREATEST threat to Voice-over internet Protocol (VolP) related to privacy?
An IS auditor noted that a change to a critical calculation was placed into the production environment
without being tested.
Which of the following is most important for the successful establishment of a security vulnerability
management program?
Which of the following would provide the best evidence for use in a forensic investigation of an
employee’s hard drive?
When evaluating the ability of a disaster recovery plan (DRP) to enable the recovery of IT processing
capabilities, it is most important for the IS auditor to verify the plan is
An IS auditor notes that help desk personnel are required to make critical decisions during major service
disruptions. Which of the following is the auditor’s best recommendation to address this situation?
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in
the scope of an upcoming audit. What should the auditor consider the most significant concern?
In which phase of penetration testing would host detection and domain name system (DNS)
interrogation be performed
The primary benefit of using secure shell (SSH) to access a server on a network is that it
An IS auditor is reviewing security policies and finds no mention of the return of corporate-owned
smartphones upon termination of employment. The greatest risk arising from this situation is that
unreturned devices
Which of the following should be done first to effectively define IT audit universe for an entity with
multiple business lines
Which of the following must be in place before an IS auditor initiates audit follow-up activities
The primary role of a control self-assessment (CSA) facilitator is to
Which of the following controls will best ensure that the board of directors receives sufficient
information about IT
Which of the following would be the most significant factor when choosing among several backup
system alternatives with different restoration speeds
Which of the following validation techniques would best prevent duplicate electronic vouchers
Which of the following projects would be most important to review in an audit of an organization’s
financial statements
Which of the following poses the greatest risk to a company that allows employees to use personally
owned devices to access customer files on the company’s network
Which of the following findings should be of greatest concern to an IS auditor conducting a forensic
analysis following incidents of suspicious activities on a server
The first course of action an investigator should take when a computer is being attacked is to
An organization is using a single account shared by personnel for its social networking marketing page.
Which of the following is the best method to maintain accountability over the account
When evaluating a project immediately prior to implementation, which of the following would provide
the best evidence that the system has the required functionality
Which of the following would best enable an IS auditor to perform an audit that requires testing the full
population of data
A manager identifies active privileged accounts belonging to staff who have left the organization, which
of the following is the threat actor in this scenario
The maturity level of an organization’s problem management support function is optimized when the
function