Which of the following is MOST important for an IS auditor to verify after finding repeated unauthorized access attempts were recorded on a security report?

Which of the following is MOST important for an IS auditor to verify after finding repeated unauthorized access attempts were recorded on a security report?A . Password reset requests have been confirmed as legitimateB . There is evidence that the incident was investigatedC . System configuration changes are properly trackedD...

April 3, 2020 No Comments READ MORE +

Which of the following should be the GREATEST IS audit concern?

An organization allows employee use of personal mobile devices for corporate email. Which of the following should be the GREATEST IS audit concern?A . Email forwarding to private devices requires excessive network bandwidthB . There is no corporate policy for the acceptable use of private devicesC . There is no...

April 3, 2020 No Comments READ MORE +

Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?

During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?A...

April 3, 2020 No Comments READ MORE +

The BEST way to validate whether a malicious act has actually occurred in an application is to review:

The BEST way to validate whether a malicious act has actually occurred in an application is to review:A . segregation of dutiesB . access controlsC . activity logsD . change management logsView AnswerAnswer: C

April 3, 2020 No Comments READ MORE +

The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?

The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?A . Technology riskB . Inherent riskC . Detection riskD . Control riskView AnswerAnswer: C

April 3, 2020 No Comments READ MORE +

Which of the following should the auditor recommend FIRST?

An IS auditor finds that application servers had inconsistent configurations leading to potential security vulnerabilities. Which of the following should the auditor recommend FIRST?A . Enforce server baseline standards.B . Improve change management processes using a workflow tool.C . Hold the application owner accountable for monitoring metrics.D . Use a...

April 3, 2020 No Comments READ MORE +

Which of the following findings should be of GREATEST concern to the auditor?

An IS auditor is reviewing a bank’s service level agreement (SLA) with a third-party provider that hosts the bank’s secondary data center. Which of the following findings should be of GREATEST concern to the auditor?A . The recovery point objective (RPO) has a shorter duration than documented in the disaster...

April 3, 2020 No Comments READ MORE +

Which of the following is MOST likely to be included among the benefits in the project proposal?

An IS auditor reviewed the business case for a proposed investment to virtualize an organization’s server infrastructure. Which of the following is MOST likely to be included among the benefits in the project proposal?A . Fewer operating system licensesB . Better efficiency of logical resourcesC . Reduced hardware footprintD ....

April 3, 2020 No Comments READ MORE +

Which of the following is the auditor’s BEST course of action?

An IS auditor has assessed a payroll service provider’s security policy and finds significant topics are missing. Which of the following is the auditor’s BEST course of action?A . Recommend the service provider update their policy.B . Notify the service provider of the discrepancies.C . Report the risk to internal...

April 3, 2020 No Comments READ MORE +

Which of the following findings would be of GREATEST concern to an IS auditor reviewing an organization’s newly implemented online security awareness program?

Which of the following findings would be of GREATEST concern to an IS auditor reviewing an organization’s newly implemented online security awareness program?A . Only new employees are required to attend the programB . The timing for program updates has not been determinedC . Metrics have not been established to...

April 3, 2020 No Comments READ MORE +