1. During a security audit, which of the following is MOST important to review to ensure data confidentiality is managed?
A) Access controls B) Data flows C) Access log monitoring D) Network configuration
2. An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?
A) Access control requirements B) Hardware configurations C) Perimeter network security diagram D) Help desk availability
3. An organization is currently replacing its accounting system. Which of the following strategies will BEST minimize risk associated with the loss of data integrity from the upgrade?
A) Pilot implementation B) Functional integration testing C) Fallback contingency D) Parallel implementation
4. Which of the following would be the BEST performance indicator for the effectiveness of an incident management program?
A) Incident alert meantime B) Average time between incidents C) Number of incidents reported D) Incident resolution meantime
5. An IS auditor is reviewing the performance outcomes of controls in an agile development project. Which of the following would provide the MOST relevant evidence for the auditor to consider?
A) Progress report of outstanding work B) Product backlog C) Number of failed builds D) Composition of the scrum team
Leave a comment