Which of the following is the BEST data integrity check?
Which of the following is the BEST data integrity check?A . Counting the transactions processed per day B. Performing a sequence check C. Tracing data back to the point of origin D. Preparing and running test dataView AnswerAnswer: C
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?A . Analyze whether predetermined test objectives were met. B. Perform testing at the backup data center. C. Evaluate participation by key personnel. D. Test offsite backup files.View AnswerAnswer: A
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?A . Inability to close unused ports on critical servers B. Inability to identify unused licenses within the organization C. Inability to deploy updated security patches...
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
Which audit approach is MOST helpful in optimizing the use of IS audit resources?A . Agile auditing B. Continuous auditing C. Outsourced auditing D. Risk-based auditingView AnswerAnswer: D
Which of the following BEST guards against the risk of attack by hackers?
Which of the following BEST guards against the risk of attack by hackers?A . Tunneling B. Encryption C. Message validation D. FirewallsView AnswerAnswer: B
What is the auditor's BEST course of action?
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?A . Notify the chair of the audit committee. B. Notify...
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance.
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by.A . phishing. B. denial of service (DoS) C. structured query language (SQL) injection D....
Which of the following is the auditor's MOST important course of action?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?A . Document the finding and present it to management. B. Determine if a root cause analysis was conducted. C....
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?A . Frequent testing of backups B. Annual walk-through testing C. Periodic risk assessment D. Full operational testView AnswerAnswer: D
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
Which of the following is the BEST method to safeguard data on an organization's laptop computers?A . Disabled USB ports B. Full disk encryption C. Biometric access control D. Two-factor authenticationView AnswerAnswer: C