CISA Final Assessment 3
Quiz Summary
0 of 150 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 150 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 150
1. Question
Which of the following analytical methods would be MOST useful when trying to identify groups with similar behavior or characteristics in a large population?
CorrectIncorrect -
Question 2 of 150
2. Question
Which of the following BEST addresses the availability of an online store?
CorrectIncorrect -
Question 3 of 150
3. Question
Who would provide an IS auditor with the MOST helpful input during an interview to determine whether business requirements for an application were met?
CorrectIncorrect -
Question 4 of 150
4. Question
Which of the following should be an IS auditor’s GREATEST concern when assessing an IT service configuration database?
CorrectIncorrect -
Question 5 of 150
5. Question
Which of the following is PRIMARY responsibility of an IT steering committee?
CorrectIncorrect -
Question 6 of 150
6. Question
Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?
CorrectIncorrect -
Question 7 of 150
7. Question
An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?
CorrectIncorrect -
Question 8 of 150
8. Question
Which of the following is an indication of possible hacker activity involving voice communications?
CorrectIncorrect -
Question 9 of 150
9. Question
Which of the following is the MOST appropriate indicator of change management effectiveness?
CorrectIncorrect -
Question 10 of 150
10. Question
Which of the following should be an IS auditor’s GREATEST concern when reviewing an organization’s capacity management planning?
CorrectIncorrect -
Question 11 of 150
11. Question
Which of the following is the BEST source of information to determine the required level of data protection on a file server?
CorrectIncorrect -
Question 12 of 150
12. Question
Which of the following is the PRIMARY objective of implementing IT governance?
CorrectIncorrect -
Question 13 of 150
13. Question
During an information security audit of a mid-sized organization, an IS auditor notes that the organization’s information security policy is not sufficient. What is the auditor’s BEST recommendation for the organization?
CorrectIncorrect -
Question 14 of 150
14. Question
The GREATEST limitation of a network-based intrusion detection system (IDS) is that it:
CorrectIncorrect -
Question 15 of 150
15. Question
Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves for care?
CorrectIncorrect -
Question 16 of 150
16. Question
Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?
CorrectIncorrect -
Question 17 of 150
17. Question
Which of the following is the BEST report for an IS auditor to reference when tasked with reviewing the security of code written for a newly developed website?
CorrectIncorrect -
Question 18 of 150
18. Question
Which of the following observations should be of MOST concern to an IS auditor reviewing an organization’s business impact analysis (BIA) practices?
CorrectIncorrect -
Question 19 of 150
19. Question
During an audit, which of the following would be MOST helpful in establishing a baseline for measuring data quality?
CorrectIncorrect -
Question 20 of 150
20. Question
Which of the following approaches would BEST enable an e-commerce website to handle unpredictable amounts of traffic?
CorrectIncorrect -
Question 21 of 150
21. Question
An organization is permanently transitioning from onsite to fully remote business operations. When should the existing business impact analysis (BIA) be reviewed?
CorrectIncorrect -
Question 22 of 150
22. Question
Which of the following is a PRIMARY benefit of a maturity model?
CorrectIncorrect -
Question 23 of 150
23. Question
In the development of a new financial application, the IS auditor’s FIRST involvement should be in the:
CorrectIncorrect -
Question 24 of 150
24. Question
Which of the following tests would BEST indicate that a software development project is ready to be deployed into the production environment?
CorrectIncorrect -
Question 25 of 150
25. Question
Which of the following is the MOST important element of quality control with respect to an audit engagement?
CorrectIncorrect -
Question 26 of 150
26. Question
Which of the following threats is mitigated by a firewall?
CorrectIncorrect -
Question 27 of 150
27. Question
Which of the following is the GREATEST advantage of maintaining an internal IS audit function within an organization?
CorrectIncorrect -
Question 28 of 150
28. Question
The MOST appropriate person to chair the steering committee for an enterprise-wide system development should be the:
CorrectIncorrect -
Question 29 of 150
29. Question
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization’s vulnerability scanning program?
CorrectIncorrect -
Question 30 of 150
30. Question
An IS audit reveals an organization has decided not to implement a new regulation by the required deadline because the cost of rapid implementation is higher than the penalty for noncompliance. Which of the following is the auditor’s BEST course of action?
CorrectIncorrect -
Question 31 of 150
31. Question
Which of the following is the BEST way for an IS auditor to determine the completeness of data migration?
CorrectIncorrect -
Question 32 of 150
32. Question
Which of the following is MOST important to consider when establishing the retention period for customer data within a specific database or application?
CorrectIncorrect -
Question 33 of 150
33. Question
An organization has decided to purchase a web-based email service from a third-party vendor and eliminate its own email server infrastructure. What type of cloud computing environment would BEST meet the organization’s objective?
CorrectIncorrect -
Question 34 of 150
34. Question
Which of the following is the GREATEST advantage of utilizing guest operating systems in a virtual environment?
CorrectIncorrect -
Question 35 of 150
35. Question
An IS auditor finds that a system receives identical information from two different upstream sources, even though redundancy is not required. Which of the following would BEST enable the organization to avoid this type of inefficiency?
CorrectIncorrect -
Question 36 of 150
36. Question
Which of the following is the BEST way to determine the effectiveness of an organization’s current patch management system?
CorrectIncorrect -
Question 37 of 150
37. Question
A large organization has a centralized infrastructure team and decentralized application support teams reporting into their respective business units. Which of the following is the GREATEST potential issue with his organizational structure?
CorrectIncorrect -
Question 38 of 150
38. Question
An IS auditor is reviewing an origination’s release management practices and observes inconsistent and inaccurate estimation of the size and complexity of business application development projects. Which of the following should the auditor recommend to address this issue?
CorrectIncorrect -
Question 39 of 150
39. Question
Which of the following is the BEST way to faster continuous improvement of IS audit processes and practices?
CorrectIncorrect -
Question 40 of 150
40. Question
An IS auditor is preparing a plan for audits to be carried out over a specified period. Which of the following activities should the IS auditor perform FIRST?
CorrectIncorrect -
Question 41 of 150
41. Question
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor’s NEXT step should be to:
CorrectIncorrect -
Question 42 of 150
42. Question
An organization has developed processes to recover critical files in the event of a ransomware attack. Which type of control do these processes represent?
CorrectIncorrect -
Question 43 of 150
43. Question
Which type of threat can utilize a large group of automated social media accounts to steal data, send spam, or launch distributed denial of service (DDoS) attacks?
CorrectIncorrect -
Question 44 of 150
44. Question
Which of the following is the BEST preventative control to ensure that database integrity is maintained?
CorrectIncorrect -
Question 45 of 150
45. Question
During an information security review, an IS auditor learns an organizational policy requires all employees to attend information security training during the first week of each new year What is the auditor’s BEST recommendation to ensure employees hired after January receive adequate guidance regarding security awareness?
CorrectIncorrect -
Question 46 of 150
46. Question
An IS auditor observes a system performance monitoring too that states that a server critical to the organization averages high CPU utilization across a cluster of four virtual servers throughout the audit period. To determine if further investigation is required an IS auditor should review:
CorrectIncorrect -
Question 47 of 150
47. Question
In a review of the organization standards and guidelines for IT management, which of the following should be included in an IS development methodology?
CorrectIncorrect -
Question 48 of 150
48. Question
When using data analytics to perform an audit, the IS auditor should FIRST:
CorrectIncorrect -
Question 49 of 150
49. Question
An organization outsourced its IS functions. To meet its responsibility for disaster recovery, the organization should:
CorrectIncorrect -
Question 50 of 150
50. Question
Which of the following is a preventive control that can protect against internal fraud in an organization?
CorrectIncorrect -
Question 51 of 150
51. Question
During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor’s BEST course of action?
CorrectIncorrect -
Question 52 of 150
52. Question
An organization has implemented segregation of duties with appropriate job definitions and restrictions on overlapping roles. Which type of control has been implemented?
CorrectIncorrect -
Question 53 of 150
53. Question
Which of the following is the MOST effective way to assess the controls over the hardware maintenance process?
CorrectIncorrect -
Question 54 of 150
54. Question
When auditing an organization’s software acquisition process, the BEST way for an IS auditor to understand the software benefits to the organization would be to review the:
CorrectIncorrect -
Question 55 of 150
55. Question
When building or upgrading enterprise cryptographic infrastructure, which of the following is the MOST critical requirement for growing business requirements?
CorrectIncorrect -
Question 56 of 150
56. Question
After delivering an audit report, the audit manager discovers that evidence was overlooked during the audit. This evidence indicates that procedural control may have failed and could contradict a conclusion of the audit. Which of the following risks is MOST affected by this oversight?
CorrectIncorrect -
Question 57 of 150
57. Question
Which of the following is MOST effective for controlling visitor access to a data center?
CorrectIncorrect -
Question 58 of 150
58. Question
When reviewing a business impact analysis (BIA), it is MOST important for an IS auditor to ensure input was obtained from which group of stakeholders?
CorrectIncorrect -
Question 59 of 150
59. Question
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of an organization’s social media practices?
CorrectIncorrect -
Question 60 of 150
60. Question
Which of the following is the PRIMARY reason an IS auditor would recommend offsite backups although critical data is already on a redundant array of inexpensive disks (RAID)?
CorrectIncorrect -
Question 61 of 150
61. Question
An organization’s business continuity plan (BCP) should be:
CorrectIncorrect -
Question 62 of 150
62. Question
An IS auditor has been asked to review a recently implemented quality management system (QMS). Which of the following should be the auditor’s PRIMARY focus?
CorrectIncorrect -
Question 63 of 150
63. Question
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization’s release management processes?
CorrectIncorrect -
Question 64 of 150
64. Question
An organization’s IT risk assessment should include the identification of:
CorrectIncorrect -
Question 65 of 150
65. Question
Which of the following should be identified FIRST during the risk assessment process?
CorrectIncorrect -
Question 66 of 150
66. Question
Which of the following is MOST important for an IS auditor to confirm when assessing the security of a new cloud-based IT application that is linked with the organization’s existing technology?
CorrectIncorrect -
Question 67 of 150
67. Question
What would be the PRIMARY reason for an IS auditor to recommend using key risk indicators (KRIs)?
CorrectIncorrect -
Question 68 of 150
68. Question
A matrix showing the current state and challenges of an organization’s software release management practices is MOST useful for:
CorrectIncorrect -
Question 69 of 150
69. Question
Which of the following is the BEST way to prevent social engineering incidents?
CorrectIncorrect -
Question 70 of 150
70. Question
Which of the following is the BEST way to reduce the attack surface for a server farm?
CorrectIncorrect -
Question 71 of 150
71. Question
Which of the following is the BEST indication that an IT service desk function needs to improve its incident management processes?
CorrectIncorrect -
Question 72 of 150
72. Question
The PRIMARY benefit of automating application testing is to:
CorrectIncorrect -
Question 73 of 150
73. Question
Which of the following BEST enables an IS auditor to prioritize financial reporting spreadsheets for an end-user computing (EUC) audit?
CorrectIncorrect -
Question 74 of 150
74. Question
Which of the following is the MOST critical factor for the successful implementation of an IT governance framework?
CorrectIncorrect -
Question 75 of 150
75. Question
During an investigation, it was determined that an employee leaked company system administrative credentials on a public social media site. What is the IS auditor’s FIRST recommendation?
CorrectIncorrect -
Question 76 of 150
76. Question
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
CorrectIncorrect -
Question 77 of 150
77. Question
Which of the following BEST enables an organization to control which software can be installed on a user’s computer?
CorrectIncorrect -
Question 78 of 150
78. Question
Which of the following indicators would BEST demonstrate the efficiency of a help desk operation?
CorrectIncorrect -
Question 79 of 150
79. Question
Which of the following should be identified FIRST when assessing the maturity level of an organization’s vulnerability management practices?
CorrectIncorrect -
Question 80 of 150
80. Question
An organization wants an independent measure of an outsourced system’s availability. This measure is directly related to contractual payment obligations. Which of the following procedures would an IS auditor MOST likely recommend?
CorrectIncorrect -
Question 81 of 150
81. Question
Which of the following should be of GREATEST concern to an IS auditor when using data analytics?
CorrectIncorrect -
Question 82 of 150
82. Question
Which of the following BEST indicates that an organization’s risk management practices contribute to the effectiveness of internal IS audits?
CorrectIncorrect -
Question 83 of 150
83. Question
An IS auditor notes that an organization’s DevOps team has both production and developer access. The head of IT operations agrees that there is a segregation of duties concern but considers both types of access to be necessary for the team. Which of the following is the auditor’s BEST recommendation?
CorrectIncorrect -
Question 84 of 150
84. Question
An organization has outsourced the maintenance of its customer database to an external vendor, and the vendor has requested live data to test the performance of the database. Which of the following is MOST important for the IS auditor to recommend?
CorrectIncorrect -
Question 85 of 150
85. Question
The use of control totals satisfies which of the following control objectives?
CorrectIncorrect -
Question 86 of 150
86. Question
An organization outsources its IT function to a third-party provider that supplies all hardware and support personnel. Which of the following poses the GREATEST risk that the provider’s IT resources may not be available to meet the organization’s objectives?
CorrectIncorrect -
Question 87 of 150
87. Question
Which of the following biometric authentication methods has the LOWEST false acceptance rate?
CorrectIncorrect -
Question 88 of 150
88. Question
Which of the following is MOST important for an IS auditor to confirm upon learning that an organization utilizes storage virtualization for key systems in their environment?
CorrectIncorrect -
Question 89 of 150
89. Question
As part of a payroll department IS audit, which of the following is the PRIMARY reason an IS auditor would recommend that a supervisor review exception reports before authorizing payments?
CorrectIncorrect -
Question 90 of 150
90. Question
Which of the following is the PRIMARY objective of enterprise architecture (EA)?
CorrectIncorrect -
Question 91 of 150
91. Question
An IS auditor observes that each department follows a different approach for creating and securing spreadsheet macros. Which of the following is the auditor’s BEST recommendation for management in this situation?
CorrectIncorrect -
Question 92 of 150
92. Question
Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?
CorrectIncorrect -
Question 93 of 150
93. Question
Which of the following BEST enables an organization to verify whether an encrypted message sent by a client has been altered?
CorrectIncorrect -
Question 94 of 150
94. Question
Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?
CorrectIncorrect -
Question 95 of 150
95. Question
An IS auditor has been asked to investigate critical business applications that have been producing suspicious results. Which of the following should be done FIRST?
CorrectIncorrect -
Question 96 of 150
96. Question
Which of the following should be the FIRST step to successfully implement a corporate data classification program?
CorrectIncorrect -
Question 97 of 150
97. Question
Which of the following is BEST supported by enforcing data definition standards within a database?
CorrectIncorrect -
Question 98 of 150
98. Question
An IS auditor reviewing an information processing environment decides to conduct external penetration testing. Which of the following is MOST appropriate to include in the audit scope for the organization to distinguish between the auditor’s penetration attacks and actual attacks?
CorrectIncorrect -
Question 99 of 150
99. Question
Which of the following BEST protects private health information from data loss for clients that utilize remote health-monitoring devices?
CorrectIncorrect -
Question 100 of 150
100. Question
The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:
CorrectIncorrect -
Question 101 of 150
101. Question
Which of the following should be the GREATEST concern for an IS auditor performing a post-implementation review for a major system upgrade?
CorrectIncorrect -
Question 102 of 150
102. Question
Which of the following observations noted by an IS auditor reviewing internal IT standards is MOST important to address?
CorrectIncorrect -
Question 103 of 150
103. Question
Which of the following is MOST important for an organization to consider when planning to outsource data storage to a third-party provider?
CorrectIncorrect -
Question 104 of 150
104. Question
An IS auditor has been tasked with analyzing an organization’s capital expenditures against its repair and maintenance costs. Which of the following is the BEST reason to use a data analytics tool for this purpose?
CorrectIncorrect -
Question 105 of 150
105. Question
Which of the following presents the GREATEST risk associated with end-user computing (EUC) applications over financial reporting?
CorrectIncorrect -
Question 106 of 150
106. Question
An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?
CorrectIncorrect -
Question 107 of 150
107. Question
Which of the following is MOST important to consider when defining disaster recovery strategies?
CorrectIncorrect -
Question 108 of 150
108. Question
Which of the following is the GREATEST advantage of agile development over waterfall development?
CorrectIncorrect -
Question 109 of 150
109. Question
Which of the following controls provides the MOST protection against ransomware attacks?
CorrectIncorrect -
Question 110 of 150
110. Question
Which of the following is the BEST control to help ensure that security requirements are considered throughout the life cycle of an agile software development project?
CorrectIncorrect -
Question 111 of 150
111. Question
Which of the following is the BEST control to help ensure that security requirements are considered throughout the life cycle of an agile software development project?
CorrectIncorrect -
Question 112 of 150
112. Question
Which of the following is the BEST control to help ensure that security requirements are considered throughout the life cycle of an agile software development project?
CorrectIncorrect -
Question 113 of 150
113. Question
Which of the following is MOST important when assembling an internal team to perform penetration testing for the organization?
CorrectIncorrect -
Question 114 of 150
114. Question
Which of the following would a digital signature MOST likely prevent?
CorrectIncorrect -
Question 115 of 150
115. Question
An IS auditor is determining the scope for an upcoming audit. Which of the following BEST enables the auditor to ensure appropriate controls are considered?
CorrectIncorrect -
Question 116 of 150
116. Question
A PRIMARY objective of risk management is to keep the total cost of risks below the:
CorrectIncorrect -
Question 117 of 150
117. Question
Which of the following should be the role of internal audit in an organization’s move to the cloud?
CorrectIncorrect -
Question 118 of 150
118. Question
Which of the following should be the role of internal audit in an organization’s move to the cloud?
CorrectIncorrect -
Question 119 of 150
119. Question
How does a switched network reduce the risk of network sniffing?
CorrectIncorrect -
Question 120 of 150
120. Question
Which of the following is the MOST effective way for internal audit management to ensure the quality of IS audits is maintained?
CorrectIncorrect -
Question 121 of 150
121. Question
In an organization’s feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
CorrectIncorrect -
Question 122 of 150
122. Question
Which of the following is MOST helpful for understanding an organization’s key driver to modernize application platforms?
CorrectIncorrect -
Question 123 of 150
123. Question
An IS auditor is reviewing results from the testing of an organization’s disaster recovery plan (DRP). Which of the following findings should be of GREATEST concern?
CorrectIncorrect -
Question 124 of 150
124. Question
Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?
CorrectIncorrect -
Question 125 of 150
125. Question
An employee performs computer operations and, when the situation demands, program modifications. Which of the following should the IS auditor recommend?
CorrectIncorrect -
Question 126 of 150
126. Question
A national bank recently migrated a large number of business-critical applications to the cloud. Which of the following is MOST important to ensuring the resiliency of the applications?
CorrectIncorrect -
Question 127 of 150
127. Question
Which of the following should be an IS auditor’s PRIMARY consideration when evaluating the development and design of a privacy program?
CorrectIncorrect -
Question 128 of 150
128. Question
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization’s newly established enterprise architecture (EA)?
CorrectIncorrect -
Question 129 of 150
129. Question
Which of the following BEST enables an organization to manage unexpected or on-request jobs?
CorrectIncorrect -
Question 130 of 150
130. Question
When protecting mobile devices, which of the following is the PRIMARY risk mitigated by authentication controls?
CorrectIncorrect -
Question 131 of 150
131. Question
During a review of an organization’s technology policies, which of the following observations should be of MOST concern to the IS auditor?
CorrectIncorrect -
Question 132 of 150
132. Question
Which of the following provides a new IS auditor with the MOST useful information to evaluate overall IT performance?
CorrectIncorrect -
Question 133 of 150
133. Question
Which risk response has been adopted by a risk owner postponing the implementation of proper controls due to budget constraints?
CorrectIncorrect -
Question 134 of 150
134. Question
Before the release of a new application into an organization’s production environment, which of the following should be in place to ensure that proper testing has occurred and rollback plans are in place?
CorrectIncorrect -
Question 135 of 150
135. Question
Which of the following BEST describes the role of the IS auditor in a control self-assessment (CSA)?
CorrectIncorrect -
Question 136 of 150
136. Question
Which of the following is the BEST indication that there are potential problems within an organization’s IT service desk function?
CorrectIncorrect -
Question 137 of 150
137. Question
Which of the following is the PRIMARY objective of cyber resiliency?
CorrectIncorrect -
Question 138 of 150
138. Question
During a post-implementation review, which of the following provides the BEST evidence that user requirements have been met?
CorrectIncorrect -
Question 139 of 150
139. Question
An IS auditor assessing an organization’s information systems needs to understand management’s approach regarding controls. Which documentation should the auditor review FIRST?
CorrectIncorrect -
Question 140 of 150
140. Question
Which of the following is MOST useful for matching records of incoming and outgoing personnel to identify tailgating in physical security logs?
CorrectIncorrect -
Question 141 of 150
141. Question
An IS auditor assesses an organization’s backup management practices for optimization potential. Which of the following features of a regular backup tape reorganization job BEST enables the organization to realize cost savings?
CorrectIncorrect -
Question 142 of 150
142. Question
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
CorrectIncorrect -
Question 143 of 150
143. Question
Which of the following findings should be of MOST concern to an IS auditor assessing agile software development practices?
CorrectIncorrect -
Question 144 of 150
144. Question
Which of the following would BEST integrate multiple data warehouses while reducing the workload required for moving data between the warehouses?
CorrectIncorrect -
Question 145 of 150
145. Question
A confidential file was sent to a legal entity, and hashing was used on the file. Which type of control has been applied?
CorrectIncorrect -
Question 146 of 150
146. Question
An IS auditor is performing a follow-up audit and notes that some critical deficiencies have not been addressed. The auditor’s BEST course of action is to:
CorrectIncorrect -
Question 147 of 150
147. Question
Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?
CorrectIncorrect -
Question 148 of 150
148. Question
Which of the following is MOST important to confirm when evaluating an IT organization’s structure?
CorrectIncorrect -
Question 149 of 150
149. Question
Which feature associated with an Infrastructure as a Service (IaaS) cloud service provider allows for the provisioning of new servers as demand changes?
CorrectIncorrect -
Question 150 of 150
150. Question
Which of the following provides the BEST evidence that all elements of a business continuity plan (BCP) are operating effectively?
CorrectIncorrect