1.
When conducting a review of security incident management, an IS auditor found there are no defined escalation processes. All incidents are managed by the service desk. Which of the following should be the auditor's PRIMARY concern?
2.
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
3.
An IS auditor is reviewing a bank's service level agreement (SLA) with a third-party provider that hosts the bank's secondary data center. Which of the following findings should be of GREATEST concern to the auditor?
4.
Which of the following is the MOST appropriate responsibility of an IS auditor involved in a data center renovation project?
5.
Which of the following is MOST important for an IS auditor to determine when reviewing how the organization's incident response team handles devices that may be involved in criminal activity?
6.
During a follow-up audit, an IS auditor learns the organization implemented an automated process instead of the originally agreed upon enhancement of the manual process. The auditor should:
7.
During a privileged access review, an IS auditor observes many help desk employees have privileges within systems not required for their job functions. Implementing which of the following would have prevented this situation?
8.
Management disagrees with a finding in a draft audit report and provides supporting documentation. Which of the following should be the IS auditor's NEXT course of action?
9.
Which of the following audit techniques is MOST appropriate for verifying application program controls?
10.
A business has requested an IS audit to determine whether information stored in an application system is adequately protected. Which of the following is the MOST important action before the audit work begins?