1. Which of the following should be the PRIMARY objective of an information security governance framework?
A) Increase the organization's return on security investment. B) Provide a baseline for optimizing the security profile of the organization. C) Ensure that users comply with the organization's information security policies. D) Demonstrate compliance with industry best practices to external stakeholders.
2. An organization has developed mature risk management practices that are followed across all departments. What is the MOST effective way for the audit team to leverage this risk management maturity?
A) Facilitating audit risk identification and evaluation workshops B) Implementing risk responses on management's behalf C) Providing assurances to management regarding risk D) Integrating the risk register for audit planning purposes
3. Which of the following findings would be of GREATEST concern to an IS auditor performing an information security audit of critical server log management activities?
A) Log records can be overwritten before being reviewed. B) Logging procedures are insufficiently documented. C) Log records are dynamically into different servers. D) Logs are monitored using manual processes.
4. The BEST way to validate whether a malicious act has actually occurred in an application is to review:
A) segregation of duties B) access controls C) activity logs D) change management logs
5. A vulnerability in which of the following virtual systems would be of GREATEST concern to the IS auditor?
A) The virtual machine management server B) The virtual file server C) The virtual application server D) The virtual antivirus server
Leave a comment