MultipleChoice
Which of the following controls is BEST implemented through system configuration?
OptionsMultipleChoice
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
OptionsMultipleChoice
An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data classification in this project?
OptionsMultipleChoice
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the business continuity plan (BCP). Which of the following is the auditor's BEST course of action?
OptionsMultipleChoice
An IS auditor is planning an audit of an organization's risk management practices. Which of the following would provide the MOST useful information about risk appetite?
OptionsMultipleChoice
An IS auditor observes that a bank's web page address is prefixed 'https://'. The auditor would be correct to conclude that:
OptionsMultipleChoice
IS audit is asked to explain how local area network (LAN) servers can contribute to a rapid dissemination of viruses. The IS auditor's BEST response is that:
OptionsMultipleChoice
Which of the following is the BEST control to ensure data entered into a calculation program is accurated?
OptionsMultipleChoice
Which of the following is the BEST indicator that an application system's agreed-upon level of service has been met?
OptionsMultipleChoice
When auditing the security architecture of an online application, an IS auditor should FIRST review the
Options