1. An IS auditor is involved with a project and finds an IT project stakeholder wants to make a change that could affect both the project scope and schedule. Which of the following would be the MOST appropriate action for the project manager with respect to the change request?
A) Recommend to the project sponsor whether to approve the change B) Modify the project plan as a result of the change C) Evaluate the impact of the change D) Ignore out-of-scope requests
2. Which of the following should an IS auditor expect to see in a network vulnerability assessment?
A) Misconfiguration and missing updates B) Malicious software and spyware C) Security design flaws D) Zero-day vulnerabilities
3. An IS auditor is evaluating the security of an organization's data backup process, which includes the transmission of daily incremental backups to a dedicated offsite server. Which of the following findings poses the GREATEST risk to the organization?
A) Backup transmissions are not encrypted B) Backup transmissions occasionally fail C) Data recovery testing is conducted once per year D) The archived data log is incomplete
4. When continuous monitoring systems are being implemented, an IS auditor should FIRST identify:
A) the location and format of output files B) applications that provide the highest financial risk C) high-risk areas within the organization D) the controls on which to focus
5. During a follow-up audit, an IS auditor concludes that a previously identified issue has not been adequately remediated. The auditee insists the risk has been addressed. The auditor should:
A) recommend an independent assessment by a third party B) report the disagreement according to established procedures C) follow-up on the finding next year D) accept the auditee's position and close the finding
Leave a comment