Topic 1: Exam Pool A
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
A.
business continuity plan.
B.
business impact analysis.
C.
threat and risk assessment
D.
disaster recovery plan
business continuity plan.
A security review reveals an organization b struggling with a large number of findings from vulnerability scans. What should the IS auditor recommend be done FIRST.
A.
Remediate vulnerabilities for the most critical systems B. Conduct penetration tests to confirm critical findings.
B.
Remediate issues that are rated as most critical
C.
Address gaps for all internally developed applications
Address gaps for all internally developed applications
When migrating critical systems to a cloud provider, the GREATEST data security concern for an organization would be that data from different clients may be:
A.
subject to different service level agreements (SLAs) for disaster recovery.
B.
subject to varying government compliance regulations.
C.
requested during a legal discovery process.
D.
improperly separated from each other.
improperly separated from each other.
Which of the following would be the MOST efficient audit approach, given that a compliance-based approach was adopted in the previous year?
A.
Perform a review of significant transactions posted within the system
B.
interview systems personnel to evaluate all automated controls
C.
Evaluate the controls surrounding changes to programs.
D.
Validate all applications using test data
Evaluate the controls surrounding changes to programs.
An IS auditor auditing the effectiveness of utilizing a hot site will MOST likely:
A.
review reciprocal agreements
B.
review logical access controls
C.
evaluate physical access control
D.
analyze system restoration procedures
analyze system restoration procedures
Page 12 out of 204 Pages |
Previous |