CISA Final Assessment 2
Quiz Summary
0 of 150 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 150 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 150
1. Question
An IT balanced scorecard is the MOST effective means of monitoring:
CorrectIncorrect -
Question 2 of 150
2. Question
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor’s BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
CorrectIncorrect -
Question 3 of 150
3. Question
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
CorrectIncorrect -
Question 4 of 150
4. Question
Which of the following is MOST important for an IS auditor to look for in a project feasibility study?
CorrectIncorrect -
Question 5 of 150
5. Question
An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization’s RACI chart. Which of the following roles within the chart would provide this information?
CorrectIncorrect -
Question 6 of 150
6. Question
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
CorrectIncorrect -
Question 7 of 150
7. Question
During an audit of a multinational bank’s disposal process, an IS auditor notes several findings. Which of the following should be the auditor’s GREATEST concern?
CorrectIncorrect -
Question 8 of 150
8. Question
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
CorrectIncorrect -
Question 9 of 150
9. Question
Which of the following would MOST effectively help to reduce the number of repeated incidents in an organization?
CorrectIncorrect -
Question 10 of 150
10. Question
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
CorrectIncorrect -
Question 11 of 150
11. Question
An organization’s software developers need access to personally identifiable information (PII) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
CorrectIncorrect -
Question 12 of 150
12. Question
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
CorrectIncorrect -
Question 13 of 150
13. Question
Which of the following is the BEST evidence that an organization’s IT strategy is aligned to its business objectives?
CorrectIncorrect -
Question 14 of 150
14. Question
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
CorrectIncorrect -
Question 15 of 150
15. Question
Which of the following is the BEST method to safeguard data on an organization’s laptop computers?
CorrectIncorrect -
Question 16 of 150
16. Question
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
CorrectIncorrect -
Question 17 of 150
17. Question
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
CorrectIncorrect -
Question 18 of 150
18. Question
A finance group recently implemented new technologies and processes. Which type of IS audit would provide the GREATEST level of assurance that the department’s objectives have been met?
CorrectIncorrect -
Question 19 of 150
19. Question
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
CorrectIncorrect -
Question 20 of 150
20. Question
Which of the following would BEST help to support an auditor’s conclusion about the effectiveness of an implemented data classification program?
CorrectIncorrect -
Question 21 of 150
21. Question
An IS auditor notes that not all security tests were completed for an online sales system recently promoted to production. Which of the following is the auditor’s
BEST course of action?CorrectIncorrect -
Question 22 of 150
22. Question
A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed. Which of the following is the MOST important requirement to include in the vendor contract to ensure continuity?
CorrectIncorrect -
Question 23 of 150
23. Question
An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor’s BEST course of action when preparing the final report?
CorrectIncorrect -
Question 24 of 150
24. Question
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
CorrectIncorrect -
Question 25 of 150
25. Question
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
CorrectIncorrect -
Question 26 of 150
26. Question
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
CorrectIncorrect -
Question 27 of 150
27. Question
Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
CorrectIncorrect -
Question 28 of 150
28. Question
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
CorrectIncorrect -
Question 29 of 150
29. Question
Which of the following should be the IS auditor’s PRIMARY focus when evaluating an organization’s offsite storage facility?
CorrectIncorrect -
Question 30 of 150
30. Question
Which of the following is an example of a preventative control in an accounts payable system?
CorrectIncorrect -
Question 31 of 150
31. Question
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
CorrectIncorrect -
Question 32 of 150
32. Question
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster?
CorrectIncorrect -
Question 33 of 150
33. Question
An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:
CorrectIncorrect -
Question 34 of 150
34. Question
Which of the following would be the BEST process for continuous auditing in a large financial institution?
CorrectIncorrect -
Question 35 of 150
35. Question
Which of the following occurs during the issues management process for a system development project?
CorrectIncorrect -
Question 36 of 150
36. Question
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following is the BEST recommendation?
CorrectIncorrect -
Question 37 of 150
37. Question
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business. The auditor’s PRIMARY concern would be:
CorrectIncorrect -
Question 38 of 150
38. Question
From an IS auditor’s perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
CorrectIncorrect -
Question 39 of 150
39. Question
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor’s NEXT course of action?
CorrectIncorrect -
Question 40 of 150
40. Question
A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor’s GREATEST concern?
CorrectIncorrect -
Question 41 of 150
41. Question
Which of the following techniques provides the BEST assurance of server availability over time?
CorrectIncorrect -
Question 42 of 150
42. Question
Which of the following is the BEST approach for determining the overall IT risk appetite of an organization when business units use different methods for managing IT risks?
CorrectIncorrect -
Question 43 of 150
43. Question
In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?
CorrectIncorrect -
Question 44 of 150
44. Question
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
CorrectIncorrect -
Question 45 of 150
45. Question
Which of the following is MOST helpful for measuring benefits realization for a new system?
CorrectIncorrect -
Question 46 of 150
46. Question
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of on e-commerce application system’s edit routine?
CorrectIncorrect -
Question 47 of 150
47. Question
An IT balanced scorecard is PRIMARILY used for:
CorrectIncorrect -
Question 48 of 150
48. Question
Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization’s information cannot be accessed?
CorrectIncorrect -
Question 49 of 150
49. Question
Which of the following is the BEST indication of effective IT investment management?
CorrectIncorrect -
Question 50 of 150
50. Question
Which of the following is MOST important with regard to an application development acceptance test?
CorrectIncorrect -
Question 51 of 150
51. Question
Which of the following should be an IS auditor’s GREATEST concern when an international organization intends to roll out a global data privacy policy?
CorrectIncorrect -
Question 52 of 150
52. Question
An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?
CorrectIncorrect -
Question 53 of 150
53. Question
Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization’s security policy?
CorrectIncorrect -
Question 54 of 150
54. Question
Which of the following would BEST indicate the effectiveness of a security awareness training program?
CorrectIncorrect -
Question 55 of 150
55. Question
An organization recently migrated its data warehouse from a legacy system to a different architecture in the cloud. Which of the following should be GREATEST concern to the IS auditor reviewing the new data architecture?
CorrectIncorrect -
Question 56 of 150
56. Question
Which of the following is the BEST means of defense against social engineering attacks?
CorrectIncorrect -
Question 57 of 150
57. Question
The FIRST step in auditing a data communication system is to determine:
CorrectIncorrect -
Question 58 of 150
58. Question
Which of the following is the BEST indicator to measure service quality of change and incident management processes outsourced to an external provider?
CorrectIncorrect -
Question 59 of 150
59. Question
For the implementation of a program change in a production environment, the MOST important approval required is from:
CorrectIncorrect -
Question 60 of 150
60. Question
An organization that has decided to approve the use of end-user computing (EUC) should FIRST ensure:
CorrectIncorrect -
Question 61 of 150
61. Question
During a vendor management database audit, an IS auditor identifies multiple instances of duplicate vendor records. In order to prevent recurrence of the same issue, which of the following is the IS auditor’s BEST recommendation to management?
CorrectIncorrect -
Question 62 of 150
62. Question
An organization is modernizing its technology policy framework to demonstrate compliance with external industry standards. Which of the following would be MOST useful to an IS auditor for validating the outcome?
CorrectIncorrect -
Question 63 of 150
63. Question
Which of the following system implementation approaches allows for the LONGEST overlap period between the old and new systems?
CorrectIncorrect -
Question 64 of 150
64. Question
Which of the following provides the BEST assurance that a new process for purging transactions does not have a detrimental impact on the integrity of the database?
CorrectIncorrect -
Question 65 of 150
65. Question
The MOST critical security weakness of a packet level firewall is that it can be circumvented by:
CorrectIncorrect -
Question 66 of 150
66. Question
Which of the following should be the FIRST step when conducting an IT risk assessment?
CorrectIncorrect -
Question 67 of 150
67. Question
Which of the following BEST enables alignment of IT with business objectives?
CorrectIncorrect -
Question 68 of 150
68. Question
At the end of each business day, a business-critical application generates a report of financial transactions greater than a certain value, and an employee then checks these transactions for errors. What type of control is in place?
CorrectIncorrect -
Question 69 of 150
69. Question
A data center’s physical access log system captures each visitor’s identification document numbers along with the visitor’s photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
CorrectIncorrect -
Question 70 of 150
70. Question
Which of the following BEST enables an organization to determine the priority of applications to be recovered in the event of a disaster?
CorrectIncorrect -
Question 71 of 150
71. Question
Which of the following methods would BEST ensure that IT strategy is in line with business strategy?
CorrectIncorrect -
Question 72 of 150
72. Question
Which of the following has the GREATEST potential impact on the independence of an IS auditor?
CorrectIncorrect -
Question 73 of 150
73. Question
Which of the following should an IS auditor do FIRST when assessing the level of compliance for an organization in the banking industry?
CorrectIncorrect -
Question 74 of 150
74. Question
Which of the following is the MOST effective control to mitigate against the risk of inappropriate activity by employees?
CorrectIncorrect -
Question 75 of 150
75. Question
Which of the following is MOST important for an IS auditor to test when reviewing market data received from external providers?
CorrectIncorrect -
Question 76 of 150
76. Question
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
CorrectIncorrect -
Question 77 of 150
77. Question
Which of the following should an organization do to anticipate the effects of a disaster?
CorrectIncorrect -
Question 78 of 150
78. Question
Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?
CorrectIncorrect -
Question 79 of 150
79. Question
Which of the following is the BEST indication to an IS auditor that management’s post-implementation review was effective?
CorrectIncorrect -
Question 80 of 150
80. Question
Which of the following provides the MOST reliable method of preventing unauthorized logon?
CorrectIncorrect -
Question 81 of 150
81. Question
When designing a data analytics process, which of the following should be the stakeholder’s role in automating data extraction and validation?
CorrectIncorrect -
Question 82 of 150
82. Question
An organization has an acceptable use policy in place, but users do not formally acknowledge the policy. Which of the following is the MOST significant risk from this finding?
CorrectIncorrect -
Question 83 of 150
83. Question
Data from a system of sensors located outside of a network is received by the open ports on a server. Which of the following is the BEST way to ensure the integrity of the data being collected from the sensor system?
CorrectIncorrect -
Question 84 of 150
84. Question
The PRIMARY benefit of a risk-based audit methodology is to:
CorrectIncorrect -
Question 85 of 150
85. Question
Which of the following is MOST helpful to an IS auditor when assessing the effectiveness of controls?
CorrectIncorrect -
Question 86 of 150
86. Question
A bank’s transactional services are exclusively conducted online via Internet and mobile banking. Both its primary and disaster recovery sites are supported by the same Internet service provider (ISP). Which of the following is the BEST way for the bank to minimize risk in this situation?
CorrectIncorrect -
Question 87 of 150
87. Question
An IS auditor notes that a mortgage origination team receives customer loan applications via a shared repository. Which of the following findings presents the GREATEST privacy risk for this process?
CorrectIncorrect -
Question 88 of 150
88. Question
An IS auditor previously worked in an organization’s IT department and was involved with the design of the business continuity plan (BCP). The IS auditor has now been asked to review this same BCP. What should the auditor do FIRST?
CorrectIncorrect -
Question 89 of 150
89. Question
Which of the following is MOST important when evaluating the design effectiveness of multi-factor authentication?
CorrectIncorrect -
Question 90 of 150
90. Question
Which of the following technologies has the SMALLEST maximum range for data transmission between devices?
CorrectIncorrect -
Question 91 of 150
91. Question
Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?
CorrectIncorrect -
Question 92 of 150
92. Question
When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on:
CorrectIncorrect -
Question 93 of 150
93. Question
Which of the following is a core functionality of a configuration and release management system?
CorrectIncorrect -
Question 94 of 150
94. Question
In an annual audit cycle, the audit of an organization’s IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
CorrectIncorrect -
Question 95 of 150
95. Question
An IS auditor finds ad hoc vulnerability scanning is in place with no clear alignment to the organization’s wider security threat and vulnerability management program. Which of the following would BEST enable the organization to work toward improvement in this area?
CorrectIncorrect -
Question 96 of 150
96. Question
Which of the following will BEST help detect software licensing issues in a networked environment where all software is purchased and loaded by IT?
CorrectIncorrect -
Question 97 of 150
97. Question
Which of the following would be the BEST criteria for monitoring an IT vendor’s service levels?
CorrectIncorrect -
Question 98 of 150
98. Question
Which of the following would be the BEST criteria for monitoring an IT vendor’s service levels?
CorrectIncorrect -
Question 99 of 150
99. Question
Which of the following is the PRIMARY reason for using a hash function?
CorrectIncorrect -
Question 100 of 150
100. Question
A sample for testing must include the 80 largest client balances and a random sample of the rest. What should the IS auditor recommend?
CorrectIncorrect -
Question 101 of 150
101. Question
A bank has a combination of corporate customer accounts (higher monetary value) and small business accounts (lower monetary value) as part of online banking. Which of the following is the BEST sampling approach for an IS auditor to use for these accounts?
CorrectIncorrect -
Question 102 of 150
102. Question
An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified. Which type of control is in place?
CorrectIncorrect -
Question 103 of 150
103. Question
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system.
Which of the following is the IS auditor’s BEST recommendation?
CorrectIncorrect -
Question 104 of 150
104. Question
Which of the following would BEST help to ensure that an incident receives attention from appropriate personnel in a timely manner?
CorrectIncorrect -
Question 105 of 150
105. Question
A disaster recovery plan (DRP) should include steps for:
CorrectIncorrect -
Question 106 of 150
106. Question
The use of which of the following is an inherent risk in the application container infrastructure?
CorrectIncorrect -
Question 107 of 150
107. Question
An IS auditor reviewing a job scheduling tool notices performance and reliability problems. Which of the following is MOST likely affecting the tool?
CorrectIncorrect -
Question 108 of 150
108. Question
Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?
CorrectIncorrect -
Question 109 of 150
109. Question
During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor’s GREATEST concern with this situation?
CorrectIncorrect -
Question 110 of 150
110. Question
When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?
CorrectIncorrect -
Question 111 of 150
111. Question
The PRIMARY reason to assign data ownership for protection of data is to establish:
CorrectIncorrect -
Question 112 of 150
112. Question
In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?
CorrectIncorrect -
Question 113 of 150
113. Question
Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?
CorrectIncorrect -
Question 114 of 150
114. Question
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
CorrectIncorrect -
Question 115 of 150
115. Question
An organization has introduced a capability maturity model to the system development life cycle (SDLC) to measure improvements. Which of the following is the BEST indication of successful process improvement?
CorrectIncorrect -
Question 116 of 150
116. Question
Which of the following is a concern associated with virtualization?
CorrectIncorrect -
Question 117 of 150
117. Question
An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?
CorrectIncorrect -
Question 118 of 150
118. Question
An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?
CorrectIncorrect -
Question 119 of 150
119. Question
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization’s release management processes?
CorrectIncorrect -
Question 120 of 150
120. Question
Which of the following management decisions presents the GREATEST risk associated with data leakage?
CorrectIncorrect -
Question 121 of 150
121. Question
An IS auditor is reviewing an organization’s incident management processes and procedures. Which of the following observations should be the auditor’s GREATEST concern?
CorrectIncorrect -
Question 122 of 150
122. Question
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
CorrectIncorrect -
Question 123 of 150
123. Question
What should an IS auditor review FIRST to verify that an organization’s IT strategy is effectively implemented?
CorrectIncorrect -
Question 124 of 150
124. Question
Which of the following is MOST important to include in an awareness program focused on information security risk?
CorrectIncorrect -
Question 125 of 150
125. Question
Which of the following is a threat to IS auditor independence?
CorrectIncorrect -
Question 126 of 150
126. Question
Which of the following BEST supports an organization’s efforts to reduce the impact of ransomware attacks?
CorrectIncorrect -
Question 127 of 150
127. Question
Which of the following network topologies will provide the GREATEST fault tolerance?
CorrectIncorrect -
Question 128 of 150
128. Question
Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization’s newly implemented online security awareness program?
CorrectIncorrect -
Question 129 of 150
129. Question
Which of the following are used in a firewall to protect the entity’s internal resources?
CorrectIncorrect -
Question 130 of 150
130. Question
Which of the following cloud capabilities BEST enables an organization to meet unexpectedly high service demand?
CorrectIncorrect -
Question 131 of 150
131. Question
An organization has shifted from a bottom-up approach to a top-down approach in the development of IT policies. This should result in:
CorrectIncorrect -
Question 132 of 150
132. Question
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
CorrectIncorrect -
Question 133 of 150
133. Question
An organization has engaged a third party to implement an application to perform business-critical calculations. Which of the following is the MOST important process to help ensure the application provides accurate calculations?
CorrectIncorrect -
Question 134 of 150
134. Question
Which of the following is the BEST approach to help ensure evidence from a computer forensics investigation is legally admissible?
CorrectIncorrect -
Question 135 of 150
135. Question
Evaluating application development projects against a defined maturity model enables an IS auditor to determine whether:
CorrectIncorrect -
Question 136 of 150
136. Question
During data conversion, data cleansing is BEST performed prior to:
CorrectIncorrect -
Question 137 of 150
137. Question
Which of the following scenarios should raise a concern about auditor independence?
CorrectIncorrect -
Question 138 of 150
138. Question
Which of the following is the BEST way for an IS auditor to determine whether an organization’s disaster recovery plan (DRP) is current?
CorrectIncorrect -
Question 139 of 150
139. Question
Which of the following BEST enables the authentication of an email from an untrusted network?
CorrectIncorrect -
Question 140 of 150
140. Question
When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider’s external audit report on service level management when the:
CorrectIncorrect -
Question 141 of 150
141. Question
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization’s job scheduling practices?
CorrectIncorrect -
Question 142 of 150
142. Question
Which of the following is the GREATEST benefit to an organization as a result of effective IS audit risk assessments?
CorrectIncorrect -
Question 143 of 150
143. Question
A white box testing method is applicable with which of the following testing processes?
CorrectIncorrect -
Question 144 of 150
144. Question
Which of the following is the GREATEST risk related to the use of virtualized environments?
CorrectIncorrect -
Question 145 of 150
145. Question
Which of the following is a deterrent security control that reduces the likelihood of an insider threat event?
CorrectIncorrect -
Question 146 of 150
146. Question
While evaluating the data classification process of an organization, an IS auditor’s PRIMARY focus should be on whether:
CorrectIncorrect -
Question 147 of 150
147. Question
Which of the following auditing techniques would be used to detect the validity of a credit card transaction based on time, location, and date of purchase?
CorrectIncorrect -
Question 148 of 150
148. Question
Which of the following poses the GREATEST risk to a virtualized environment?
CorrectIncorrect -
Question 149 of 150
149. Question
Capacity management tools are PRIMARILY used to ensure that:
CorrectIncorrect -
Question 150 of 150
150. Question
Which of the following is an example of personally identifiable information (PII)?
CorrectIncorrect