{"id":46089,"date":"2022-10-07T02:10:37","date_gmt":"2022-10-07T02:10:37","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=46089"},"modified":"2025-09-22T06:41:09","modified_gmt":"2025-09-22T06:41:09","slug":"updated-cisa-practice-exam-dumpsbase-pass-certified-information-systems-auditor-exam-quickly","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/updated-cisa-practice-exam-dumpsbase-pass-certified-information-systems-auditor-exam-quickly.html","title":{"rendered":"Updated CISA Practice Exam DumpsBase &#8211; Pass Certified Information Systems Auditor Exam Quickly"},"content":{"rendered":"\r\n<p>Visit DumpsBase to download the updated CISA practice exam pdf file as the preparation materials. We ensure that you can pass the CISA Certified Information Systems Auditor\u00a0exam quickly and smoothly. The ISACA Certified Information Systems Auditor CISA exam dumps of DumpsBase are real CISA practice questions with precise answers designed by experienced experts. So rest assured that with the DumpsBase CISA practice exam dumps you will get everything that you need to learn, prepare and pass the career advancement Certified Information Systems Auditor (CISA) certification exam with good scores.\u00a0<\/p>\r\n<h2>Try to check the <span style=\"background-color: #ff9900;\">ISACA CISA exam dumps questions demo<\/span> first\uff1a<\/h2>\r\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam6520\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-6520\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-6520\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-231183'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='231183' \/><input type='hidden' id='answerType231183' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231183[]' id='answer-id-917827' class='answer   answerof-231183 ' value='917827'   \/><label for='answer-id-917827' id='answer-label-917827' class=' answer'><span>Lack of appropriate labelling<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231183[]' id='answer-id-917828' class='answer   answerof-231183 ' value='917828'   \/><label for='answer-id-917828' id='answer-label-917828' class=' answer'><span>Lack of recent awareness training.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231183[]' id='answer-id-917829' class='answer   answerof-231183 ' value='917829'   \/><label for='answer-id-917829' id='answer-label-917829' class=' answer'><span>Lack of password protection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231183[]' id='answer-id-917830' class='answer   answerof-231183 ' value='917830'   \/><label for='answer-id-917830' id='answer-label-917830' class=' answer'><span>Lack of appropriate data classification<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-231184'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:<\/div><input type='hidden' name='question_id[]' id='qID_2' value='231184' \/><input type='hidden' id='answerType231184' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231184[]' id='answer-id-917831' class='answer   answerof-231184 ' value='917831'   \/><label for='answer-id-917831' id='answer-label-917831' class=' answer'><span>a risk management process.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231184[]' id='answer-id-917832' class='answer   answerof-231184 ' value='917832'   \/><label for='answer-id-917832' id='answer-label-917832' class=' answer'><span>an information security framework.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231184[]' id='answer-id-917833' class='answer   answerof-231184 ' value='917833'   \/><label for='answer-id-917833' id='answer-label-917833' class=' answer'><span>past information security incidents.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231184[]' id='answer-id-917834' class='answer   answerof-231184 ' value='917834'   \/><label for='answer-id-917834' id='answer-label-917834' class=' answer'><span>industry best practices.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-231185'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>During an ongoing audit, management requests a briefing on the findings to date . <br \/>\r<br>Which of the following is the IS auditor's BEST course of action?<\/div><input type='hidden' name='question_id[]' id='qID_3' value='231185' \/><input type='hidden' id='answerType231185' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231185[]' id='answer-id-917835' class='answer   answerof-231185 ' value='917835'   \/><label for='answer-id-917835' id='answer-label-917835' class=' answer'><span>Review working papers with the auditee.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231185[]' id='answer-id-917836' class='answer   answerof-231185 ' value='917836'   \/><label for='answer-id-917836' id='answer-label-917836' class=' answer'><span>Request the auditee provide management responses.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231185[]' id='answer-id-917837' class='answer   answerof-231185 ' value='917837'   \/><label for='answer-id-917837' id='answer-label-917837' class=' answer'><span>Request management wait until a final report is ready for discussion.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231185[]' id='answer-id-917838' class='answer   answerof-231185 ' value='917838'   \/><label for='answer-id-917838' id='answer-label-917838' class=' answer'><span>Present observations for discussion only.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-231186'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='231186' \/><input type='hidden' id='answerType231186' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231186[]' id='answer-id-917839' class='answer   answerof-231186 ' value='917839'   \/><label for='answer-id-917839' id='answer-label-917839' class=' answer'><span>Periodic vendor reviews<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231186[]' id='answer-id-917840' class='answer   answerof-231186 ' value='917840'   \/><label for='answer-id-917840' id='answer-label-917840' class=' answer'><span>Dual control<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231186[]' id='answer-id-917841' class='answer   answerof-231186 ' value='917841'   \/><label for='answer-id-917841' id='answer-label-917841' class=' answer'><span>Independent reconciliation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231186[]' id='answer-id-917842' class='answer   answerof-231186 ' value='917842'   \/><label for='answer-id-917842' id='answer-label-917842' class=' answer'><span>Re-keying of monetary amounts<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231186[]' id='answer-id-917843' class='answer   answerof-231186 ' value='917843'   \/><label for='answer-id-917843' id='answer-label-917843' class=' answer'><span>Engage an external security incident response expert for incident handling.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-231187'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>The implementation of an IT governance framework requires that the board of directors of an organization:<\/div><input type='hidden' name='question_id[]' id='qID_5' value='231187' \/><input type='hidden' id='answerType231187' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231187[]' id='answer-id-917844' class='answer   answerof-231187 ' value='917844'   \/><label for='answer-id-917844' id='answer-label-917844' class=' answer'><span>Address technical IT issues.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231187[]' id='answer-id-917845' class='answer   answerof-231187 ' value='917845'   \/><label for='answer-id-917845' id='answer-label-917845' class=' answer'><span>Be informed of all IT initiatives.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231187[]' id='answer-id-917846' class='answer   answerof-231187 ' value='917846'   \/><label for='answer-id-917846' id='answer-label-917846' class=' answer'><span>Have an IT strategy committee.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231187[]' id='answer-id-917847' class='answer   answerof-231187 ' value='917847'   \/><label for='answer-id-917847' id='answer-label-917847' class=' answer'><span>Approve the IT strategy.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-231188'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality . <br \/>\r<br>Which of the following is MOST important for an IS auditor to understand when reviewing this decision?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='231188' \/><input type='hidden' id='answerType231188' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231188[]' id='answer-id-917848' class='answer   answerof-231188 ' value='917848'   \/><label for='answer-id-917848' id='answer-label-917848' class=' answer'><span>The current business capabilities delivered by the legacy system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231188[]' id='answer-id-917849' class='answer   answerof-231188 ' value='917849'   \/><label for='answer-id-917849' id='answer-label-917849' class=' answer'><span>The proposed network topology to be used by the redesigned system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231188[]' id='answer-id-917850' class='answer   answerof-231188 ' value='917850'   \/><label for='answer-id-917850' id='answer-label-917850' class=' answer'><span>The data flows between the components to be used by the redesigned system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231188[]' id='answer-id-917851' class='answer   answerof-231188 ' value='917851'   \/><label for='answer-id-917851' id='answer-label-917851' class=' answer'><span>The database entity relationships within the legacy system<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-231189'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>IS management has recently disabled certain referential integrity controls in the database <br \/>\r<br>management system (DBMS) software to provide users increased query performance . <br \/>\r<br>Which of the following controls will MOST effectively compensate for the lack of referential integrity?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='231189' \/><input type='hidden' id='answerType231189' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231189[]' id='answer-id-917852' class='answer   answerof-231189 ' value='917852'   \/><label for='answer-id-917852' id='answer-label-917852' class=' answer'><span>More frequent data backups<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231189[]' id='answer-id-917853' class='answer   answerof-231189 ' value='917853'   \/><label for='answer-id-917853' id='answer-label-917853' class=' answer'><span>Periodic table link checks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231189[]' id='answer-id-917854' class='answer   answerof-231189 ' value='917854'   \/><label for='answer-id-917854' id='answer-label-917854' class=' answer'><span>Concurrent access controls<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231189[]' id='answer-id-917855' class='answer   answerof-231189 ' value='917855'   \/><label for='answer-id-917855' id='answer-label-917855' class=' answer'><span>Performance monitoring tools<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-231190'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization's goals?<\/div><input type='hidden' name='question_id[]' id='qID_8' value='231190' \/><input type='hidden' id='answerType231190' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231190[]' id='answer-id-917856' class='answer   answerof-231190 ' value='917856'   \/><label for='answer-id-917856' id='answer-label-917856' class=' answer'><span>Balanced scorecard<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231190[]' id='answer-id-917857' class='answer   answerof-231190 ' value='917857'   \/><label for='answer-id-917857' id='answer-label-917857' class=' answer'><span>Enterprise dashboard<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231190[]' id='answer-id-917858' class='answer   answerof-231190 ' value='917858'   \/><label for='answer-id-917858' id='answer-label-917858' class=' answer'><span>Enterprise architecture (EA)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231190[]' id='answer-id-917859' class='answer   answerof-231190 ' value='917859'   \/><label for='answer-id-917859' id='answer-label-917859' class=' answer'><span>Key performance indicators (KPIs)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-231191'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:<\/div><input type='hidden' name='question_id[]' id='qID_9' value='231191' \/><input type='hidden' id='answerType231191' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231191[]' id='answer-id-917860' class='answer   answerof-231191 ' value='917860'   \/><label for='answer-id-917860' id='answer-label-917860' class=' answer'><span>Future compatibility of the application.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231191[]' id='answer-id-917861' class='answer   answerof-231191 ' value='917861'   \/><label for='answer-id-917861' id='answer-label-917861' class=' answer'><span>Proposed functionality of the application.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231191[]' id='answer-id-917862' class='answer   answerof-231191 ' value='917862'   \/><label for='answer-id-917862' id='answer-label-917862' class=' answer'><span>Controls incorporated into the system specifications.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231191[]' id='answer-id-917863' class='answer   answerof-231191 ' value='917863'   \/><label for='answer-id-917863' id='answer-label-917863' class=' answer'><span>Development methodology employed.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-231192'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>To confirm integrity for a hashed message, the receiver should use:<\/div><input type='hidden' name='question_id[]' id='qID_10' value='231192' \/><input type='hidden' id='answerType231192' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231192[]' id='answer-id-917864' class='answer   answerof-231192 ' value='917864'   \/><label for='answer-id-917864' id='answer-label-917864' class=' answer'><span>the same hashing algorithm as the sender's to create a binary image of the file.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231192[]' id='answer-id-917865' class='answer   answerof-231192 ' value='917865'   \/><label for='answer-id-917865' id='answer-label-917865' class=' answer'><span>a different hashing algorithm from the sender's to create a binary image of the file.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231192[]' id='answer-id-917866' class='answer   answerof-231192 ' value='917866'   \/><label for='answer-id-917866' id='answer-label-917866' class=' answer'><span>the same hashing algorithm as the sender's to create a numerical representation of the file.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231192[]' id='answer-id-917867' class='answer   answerof-231192 ' value='917867'   \/><label for='answer-id-917867' id='answer-label-917867' class=' answer'><span>a different hashing algorithm from the sender's to create a numerical representation of the file.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-231193'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?<\/div><input type='hidden' name='question_id[]' id='qID_11' value='231193' \/><input type='hidden' id='answerType231193' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231193[]' id='answer-id-917868' class='answer   answerof-231193 ' value='917868'   \/><label for='answer-id-917868' id='answer-label-917868' class=' answer'><span>Frequent testing of backups<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231193[]' id='answer-id-917869' class='answer   answerof-231193 ' value='917869'   \/><label for='answer-id-917869' id='answer-label-917869' class=' answer'><span>Annual walk-through testing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231193[]' id='answer-id-917870' class='answer   answerof-231193 ' value='917870'   \/><label for='answer-id-917870' id='answer-label-917870' class=' answer'><span>Periodic risk assessment<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231193[]' id='answer-id-917871' class='answer   answerof-231193 ' value='917871'   \/><label for='answer-id-917871' id='answer-label-917871' class=' answer'><span>Full operational test<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-231194'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>An IT balanced scorecard is the MOST effective means of monitoring:<\/div><input type='hidden' name='question_id[]' id='qID_12' value='231194' \/><input type='hidden' id='answerType231194' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231194[]' id='answer-id-917872' class='answer   answerof-231194 ' value='917872'   \/><label for='answer-id-917872' id='answer-label-917872' class=' answer'><span>governance of enterprise I<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231194[]' id='answer-id-917873' class='answer   answerof-231194 ' value='917873'   \/><label for='answer-id-917873' id='answer-label-917873' class=' answer'><span>control effectiveness.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231194[]' id='answer-id-917874' class='answer   answerof-231194 ' value='917874'   \/><label for='answer-id-917874' id='answer-label-917874' class=' answer'><span>return on investment (ROI).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231194[]' id='answer-id-917875' class='answer   answerof-231194 ' value='917875'   \/><label for='answer-id-917875' id='answer-label-917875' class=' answer'><span>change management effectiveness.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-231195'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>Cross-site scripting (XSS) attacks are BEST prevented through:<\/div><input type='hidden' name='question_id[]' id='qID_13' value='231195' \/><input type='hidden' id='answerType231195' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231195[]' id='answer-id-917876' class='answer   answerof-231195 ' value='917876'   \/><label for='answer-id-917876' id='answer-label-917876' class=' answer'><span>application firewall policy settings.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231195[]' id='answer-id-917877' class='answer   answerof-231195 ' value='917877'   \/><label for='answer-id-917877' id='answer-label-917877' class=' answer'><span>a three-tier web architecture.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231195[]' id='answer-id-917878' class='answer   answerof-231195 ' value='917878'   \/><label for='answer-id-917878' id='answer-label-917878' class=' answer'><span>secure coding practices.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231195[]' id='answer-id-917879' class='answer   answerof-231195 ' value='917879'   \/><label for='answer-id-917879' id='answer-label-917879' class=' answer'><span>use of common industry frameworks.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-231196'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='231196' \/><input type='hidden' id='answerType231196' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231196[]' id='answer-id-917880' class='answer   answerof-231196 ' value='917880'   \/><label for='answer-id-917880' id='answer-label-917880' class=' answer'><span>Blocking attachments in IM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231196[]' id='answer-id-917881' class='answer   answerof-231196 ' value='917881'   \/><label for='answer-id-917881' id='answer-label-917881' class=' answer'><span>Blocking external IM traffic<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231196[]' id='answer-id-917882' class='answer   answerof-231196 ' value='917882'   \/><label for='answer-id-917882' id='answer-label-917882' class=' answer'><span>Allowing only corporate IM solutions<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231196[]' id='answer-id-917883' class='answer   answerof-231196 ' value='917883'   \/><label for='answer-id-917883' id='answer-label-917883' class=' answer'><span>Encrypting IM traffic<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-231197'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees . <br \/>\r<br>What is the MOST important task before implementing any associated email controls?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='231197' \/><input type='hidden' id='answerType231197' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231197[]' id='answer-id-917884' class='answer   answerof-231197 ' value='917884'   \/><label for='answer-id-917884' id='answer-label-917884' class=' answer'><span>Require all employees to sign nondisclosure agreements (NDAs).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231197[]' id='answer-id-917885' class='answer   answerof-231197 ' value='917885'   \/><label for='answer-id-917885' id='answer-label-917885' class=' answer'><span>Develop an acceptable use policy for end-user computing (EUC).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231197[]' id='answer-id-917886' class='answer   answerof-231197 ' value='917886'   \/><label for='answer-id-917886' id='answer-label-917886' class=' answer'><span>Develop an information classification scheme.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231197[]' id='answer-id-917887' class='answer   answerof-231197 ' value='917887'   \/><label for='answer-id-917887' id='answer-label-917887' class=' answer'><span>Provide notification to employees about possible email monitoring.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-231198'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system . <br \/>\r<br>What is the BEST control to ensure that data is accurately entered into the system?<\/div><input type='hidden' name='question_id[]' id='qID_16' value='231198' \/><input type='hidden' id='answerType231198' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231198[]' id='answer-id-917888' class='answer   answerof-231198 ' value='917888'   \/><label for='answer-id-917888' id='answer-label-917888' class=' answer'><span>Reconciliation of total amounts by project<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231198[]' id='answer-id-917889' class='answer   answerof-231198 ' value='917889'   \/><label for='answer-id-917889' id='answer-label-917889' class=' answer'><span>Validity checks, preventing entry of character data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231198[]' id='answer-id-917890' class='answer   answerof-231198 ' value='917890'   \/><label for='answer-id-917890' id='answer-label-917890' class=' answer'><span>Reasonableness checks for each cost type<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231198[]' id='answer-id-917891' class='answer   answerof-231198 ' value='917891'   \/><label for='answer-id-917891' id='answer-label-917891' class=' answer'><span>Display back of project detail after entry<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-231199'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST<\/div><input type='hidden' name='question_id[]' id='qID_17' value='231199' \/><input type='hidden' id='answerType231199' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231199[]' id='answer-id-917892' class='answer   answerof-231199 ' value='917892'   \/><label for='answer-id-917892' id='answer-label-917892' class=' answer'><span>perform a business impact analysis (BIA).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231199[]' id='answer-id-917893' class='answer   answerof-231199 ' value='917893'   \/><label for='answer-id-917893' id='answer-label-917893' class=' answer'><span>issue an intermediate report to management.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231199[]' id='answer-id-917894' class='answer   answerof-231199 ' value='917894'   \/><label for='answer-id-917894' id='answer-label-917894' class=' answer'><span>evaluate the impact on current disaster recovery capability.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231199[]' id='answer-id-917895' class='answer   answerof-231199 ' value='917895'   \/><label for='answer-id-917895' id='answer-label-917895' class=' answer'><span>conduct additional compliance testing.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-231200'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met . <br \/>\r<br>Which of the following is MOST likely to be assessed?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='231200' \/><input type='hidden' id='answerType231200' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231200[]' id='answer-id-917896' class='answer   answerof-231200 ' value='917896'   \/><label for='answer-id-917896' id='answer-label-917896' class=' answer'><span>Purchasing guidelines and policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231200[]' id='answer-id-917897' class='answer   answerof-231200 ' value='917897'   \/><label for='answer-id-917897' id='answer-label-917897' class=' answer'><span>Implementation methodology<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231200[]' id='answer-id-917898' class='answer   answerof-231200 ' value='917898'   \/><label for='answer-id-917898' id='answer-label-917898' class=' answer'><span>Results of line processing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231200[]' id='answer-id-917899' class='answer   answerof-231200 ' value='917899'   \/><label for='answer-id-917899' id='answer-label-917899' class=' answer'><span>Test results<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-231201'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available . <br \/>\r<br>What should the auditor recommend be done FIRST?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='231201' \/><input type='hidden' id='answerType231201' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231201[]' id='answer-id-917900' class='answer   answerof-231201 ' value='917900'   \/><label for='answer-id-917900' id='answer-label-917900' class=' answer'><span>Implement a new system that can be patched.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231201[]' id='answer-id-917901' class='answer   answerof-231201 ' value='917901'   \/><label for='answer-id-917901' id='answer-label-917901' class=' answer'><span>Implement additional firewalls to protect the system.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231201[]' id='answer-id-917902' class='answer   answerof-231201 ' value='917902'   \/><label for='answer-id-917902' id='answer-label-917902' class=' answer'><span>Decommission the server.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231201[]' id='answer-id-917903' class='answer   answerof-231201 ' value='917903'   \/><label for='answer-id-917903' id='answer-label-917903' class=' answer'><span>Evaluate the associated risk.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-231202'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>During an audit of a reciprocal disaster recovery agreement between two companies, the <br \/>\r<br>IS auditor would be MOST concerned with the:<\/div><input type='hidden' name='question_id[]' id='qID_20' value='231202' \/><input type='hidden' id='answerType231202' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231202[]' id='answer-id-917904' class='answer   answerof-231202 ' value='917904'   \/><label for='answer-id-917904' id='answer-label-917904' class=' answer'><span>allocation of resources during an emergency.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231202[]' id='answer-id-917905' class='answer   answerof-231202 ' value='917905'   \/><label for='answer-id-917905' id='answer-label-917905' class=' answer'><span>frequency of system testing.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231202[]' id='answer-id-917906' class='answer   answerof-231202 ' value='917906'   \/><label for='answer-id-917906' id='answer-label-917906' class=' answer'><span>differences in IS policies and procedures.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231202[]' id='answer-id-917907' class='answer   answerof-231202 ' value='917907'   \/><label for='answer-id-917907' id='answer-label-917907' class=' answer'><span>maintenance of hardware and software compatibility.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-231203'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>An IS auditor is evaluating an organization's IT strategy and plans . <br \/>\r<br>Which of the following would be of GREATEST concern?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='231203' \/><input type='hidden' id='answerType231203' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231203[]' id='answer-id-917908' class='answer   answerof-231203 ' value='917908'   \/><label for='answer-id-917908' id='answer-label-917908' class=' answer'><span>There is not a defined IT security policy.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231203[]' id='answer-id-917909' class='answer   answerof-231203 ' value='917909'   \/><label for='answer-id-917909' id='answer-label-917909' class=' answer'><span>The business strategy meeting minutes are not distributed.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231203[]' id='answer-id-917910' class='answer   answerof-231203 ' value='917910'   \/><label for='answer-id-917910' id='answer-label-917910' class=' answer'><span>IT is not engaged in business strategic planning.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231203[]' id='answer-id-917911' class='answer   answerof-231203 ' value='917911'   \/><label for='answer-id-917911' id='answer-label-917911' class=' answer'><span>There is inadequate documentation of IT strategic planning.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-231204'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email . <br \/>\r<br>Which of the following metrics BEST indicates the effectiveness of awareness training?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='231204' \/><input type='hidden' id='answerType231204' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231204[]' id='answer-id-917912' class='answer   answerof-231204 ' value='917912'   \/><label for='answer-id-917912' id='answer-label-917912' class=' answer'><span>The number of users deleting the email without reporting because it is a phishing email<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231204[]' id='answer-id-917913' class='answer   answerof-231204 ' value='917913'   \/><label for='answer-id-917913' id='answer-label-917913' class=' answer'><span>The number of users clicking on the link to learn more about the sender of the email<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231204[]' id='answer-id-917914' class='answer   answerof-231204 ' value='917914'   \/><label for='answer-id-917914' id='answer-label-917914' class=' answer'><span>The number of users forwarding the email to their business unit managers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231204[]' id='answer-id-917915' class='answer   answerof-231204 ' value='917915'   \/><label for='answer-id-917915' id='answer-label-917915' class=' answer'><span>The number of users reporting receipt of the email to the information security team<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-231205'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?<\/div><input type='hidden' name='question_id[]' id='qID_23' value='231205' \/><input type='hidden' id='answerType231205' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231205[]' id='answer-id-917916' class='answer   answerof-231205 ' value='917916'   \/><label for='answer-id-917916' id='answer-label-917916' class=' answer'><span>Rollback strategy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231205[]' id='answer-id-917917' class='answer   answerof-231205 ' value='917917'   \/><label for='answer-id-917917' id='answer-label-917917' class=' answer'><span>Test cases<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231205[]' id='answer-id-917918' class='answer   answerof-231205 ' value='917918'   \/><label for='answer-id-917918' id='answer-label-917918' class=' answer'><span>Post-implementation review objectives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231205[]' id='answer-id-917919' class='answer   answerof-231205 ' value='917919'   \/><label for='answer-id-917919' id='answer-label-917919' class=' answer'><span>Business case<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-231206'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?<\/div><input type='hidden' name='question_id[]' id='qID_24' value='231206' \/><input type='hidden' id='answerType231206' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231206[]' id='answer-id-917920' class='answer   answerof-231206 ' value='917920'   \/><label for='answer-id-917920' id='answer-label-917920' class=' answer'><span>Senior management's request<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231206[]' id='answer-id-917921' class='answer   answerof-231206 ' value='917921'   \/><label for='answer-id-917921' id='answer-label-917921' class=' answer'><span>Prior year's audit findings<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231206[]' id='answer-id-917922' class='answer   answerof-231206 ' value='917922'   \/><label for='answer-id-917922' id='answer-label-917922' class=' answer'><span>Organizational risk assessment<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231206[]' id='answer-id-917923' class='answer   answerof-231206 ' value='917923'   \/><label for='answer-id-917923' id='answer-label-917923' class=' answer'><span>Previous audit coverage and scope<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-231207'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='231207' \/><input type='hidden' id='answerType231207' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231207[]' id='answer-id-917924' class='answer   answerof-231207 ' value='917924'   \/><label for='answer-id-917924' id='answer-label-917924' class=' answer'><span>Analyze whether predetermined test objectives were met.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231207[]' id='answer-id-917925' class='answer   answerof-231207 ' value='917925'   \/><label for='answer-id-917925' id='answer-label-917925' class=' answer'><span>Perform testing at the backup data center.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231207[]' id='answer-id-917926' class='answer   answerof-231207 ' value='917926'   \/><label for='answer-id-917926' id='answer-label-917926' class=' answer'><span>Evaluate participation by key personnel.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231207[]' id='answer-id-917927' class='answer   answerof-231207 ' value='917927'   \/><label for='answer-id-917927' id='answer-label-917927' class=' answer'><span>Test offsite backup files.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-231208'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes . <br \/>\r<br>Which of the following recommendations would BEST help to reduce the risk of data leakage?<\/div><input type='hidden' name='question_id[]' id='qID_26' value='231208' \/><input type='hidden' id='answerType231208' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231208[]' id='answer-id-917928' class='answer   answerof-231208 ' value='917928'   \/><label for='answer-id-917928' id='answer-label-917928' class=' answer'><span>Requiring policy acknowledgment and nondisclosure agreements (NDAs) signed by employees<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231208[]' id='answer-id-917929' class='answer   answerof-231208 ' value='917929'   \/><label for='answer-id-917929' id='answer-label-917929' class=' answer'><span>Establishing strong access controls on confidential data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231208[]' id='answer-id-917930' class='answer   answerof-231208 ' value='917930'   \/><label for='answer-id-917930' id='answer-label-917930' class=' answer'><span>Providing education and guidelines to employees on use of social networking sites<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231208[]' id='answer-id-917931' class='answer   answerof-231208 ' value='917931'   \/><label for='answer-id-917931' id='answer-label-917931' class=' answer'><span>Monitoring employees' social networking usage<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-231209'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>Which of the following is MOST important to include in forensic data collection and preservation procedures?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='231209' \/><input type='hidden' id='answerType231209' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231209[]' id='answer-id-917932' class='answer   answerof-231209 ' value='917932'   \/><label for='answer-id-917932' id='answer-label-917932' class=' answer'><span>Assuring the physical security of devices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231209[]' id='answer-id-917933' class='answer   answerof-231209 ' value='917933'   \/><label for='answer-id-917933' id='answer-label-917933' class=' answer'><span>Preserving data integrity<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231209[]' id='answer-id-917934' class='answer   answerof-231209 ' value='917934'   \/><label for='answer-id-917934' id='answer-label-917934' class=' answer'><span>Maintaining chain of custody<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231209[]' id='answer-id-917935' class='answer   answerof-231209 ' value='917935'   \/><label for='answer-id-917935' id='answer-label-917935' class=' answer'><span>Determining tools to be used<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-231210'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>An IS auditor finds that firewalls are outdated and not supported by vendors . <br \/>\r<br>Which of the following should be the auditor's NEXT course of action?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='231210' \/><input type='hidden' id='answerType231210' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231210[]' id='answer-id-917936' class='answer   answerof-231210 ' value='917936'   \/><label for='answer-id-917936' id='answer-label-917936' class=' answer'><span>Report the mitigating controls.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231210[]' id='answer-id-917937' class='answer   answerof-231210 ' value='917937'   \/><label for='answer-id-917937' id='answer-label-917937' class=' answer'><span>Report the security posture of the organization.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231210[]' id='answer-id-917938' class='answer   answerof-231210 ' value='917938'   \/><label for='answer-id-917938' id='answer-label-917938' class=' answer'><span>Determine the value of the firewall.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231210[]' id='answer-id-917939' class='answer   answerof-231210 ' value='917939'   \/><label for='answer-id-917939' id='answer-label-917939' class=' answer'><span>Determine the risk of not replacing the firewall.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-231211'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>An IS auditor is following up on prior period items and finds management did not address an audit finding . <br \/>\r<br>Which of the following should be the IS auditor's NEXT course of action?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='231211' \/><input type='hidden' id='answerType231211' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231211[]' id='answer-id-917940' class='answer   answerof-231211 ' value='917940'   \/><label for='answer-id-917940' id='answer-label-917940' class=' answer'><span>Note the exception in a new report as the item was not addressed by management.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231211[]' id='answer-id-917941' class='answer   answerof-231211 ' value='917941'   \/><label for='answer-id-917941' id='answer-label-917941' class=' answer'><span>Recommend alternative solutions to address the repeat finding.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231211[]' id='answer-id-917942' class='answer   answerof-231211 ' value='917942'   \/><label for='answer-id-917942' id='answer-label-917942' class=' answer'><span>Conduct a risk assessment of the repeat finding.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231211[]' id='answer-id-917943' class='answer   answerof-231211 ' value='917943'   \/><label for='answer-id-917943' id='answer-label-917943' class=' answer'><span>Interview management to determine why the finding was not addressed.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-231212'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>What is MOST important to verify during an external assessment of network vulnerability?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='231212' \/><input type='hidden' id='answerType231212' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231212[]' id='answer-id-917944' class='answer   answerof-231212 ' value='917944'   \/><label for='answer-id-917944' id='answer-label-917944' class=' answer'><span>Update of security information event management (SIEM) rules<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231212[]' id='answer-id-917945' class='answer   answerof-231212 ' value='917945'   \/><label for='answer-id-917945' id='answer-label-917945' class=' answer'><span>Regular review of the network security policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231212[]' id='answer-id-917946' class='answer   answerof-231212 ' value='917946'   \/><label for='answer-id-917946' id='answer-label-917946' class=' answer'><span>Completeness of network asset inventory<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231212[]' id='answer-id-917947' class='answer   answerof-231212 ' value='917947'   \/><label for='answer-id-917947' id='answer-label-917947' class=' answer'><span>Location of intrusion detection systems (IDS)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-231213'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>An incorrect version of source code was amended by a development team. This MOST likely indicates a weakness in:<\/div><input type='hidden' name='question_id[]' id='qID_31' value='231213' \/><input type='hidden' id='answerType231213' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231213[]' id='answer-id-917948' class='answer   answerof-231213 ' value='917948'   \/><label for='answer-id-917948' id='answer-label-917948' class=' answer'><span>incident management.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231213[]' id='answer-id-917949' class='answer   answerof-231213 ' value='917949'   \/><label for='answer-id-917949' id='answer-label-917949' class=' answer'><span>quality assurance (QA).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231213[]' id='answer-id-917950' class='answer   answerof-231213 ' value='917950'   \/><label for='answer-id-917950' id='answer-label-917950' class=' answer'><span>change management.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231213[]' id='answer-id-917951' class='answer   answerof-231213 ' value='917951'   \/><label for='answer-id-917951' id='answer-label-917951' class=' answer'><span>project management.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-231214'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?<\/div><input type='hidden' name='question_id[]' id='qID_32' value='231214' \/><input type='hidden' id='answerType231214' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231214[]' id='answer-id-917952' class='answer   answerof-231214 ' value='917952'   \/><label for='answer-id-917952' id='answer-label-917952' class=' answer'><span>File level encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231214[]' id='answer-id-917953' class='answer   answerof-231214 ' value='917953'   \/><label for='answer-id-917953' id='answer-label-917953' class=' answer'><span>File Transfer Protocol (FTP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231214[]' id='answer-id-917954' class='answer   answerof-231214 ' value='917954'   \/><label for='answer-id-917954' id='answer-label-917954' class=' answer'><span>Instant messaging policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231214[]' id='answer-id-917955' class='answer   answerof-231214 ' value='917955'   \/><label for='answer-id-917955' id='answer-label-917955' class=' answer'><span>Application level firewalls<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-231215'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>When an intrusion into an organization network is deleted, which of the following should be done FIRST?<\/div><input type='hidden' name='question_id[]' id='qID_33' value='231215' \/><input type='hidden' id='answerType231215' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231215[]' id='answer-id-917956' class='answer   answerof-231215 ' value='917956'   \/><label for='answer-id-917956' id='answer-label-917956' class=' answer'><span>Block all compromised network nodes.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231215[]' id='answer-id-917957' class='answer   answerof-231215 ' value='917957'   \/><label for='answer-id-917957' id='answer-label-917957' class=' answer'><span>Contact law enforcement.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231215[]' id='answer-id-917958' class='answer   answerof-231215 ' value='917958'   \/><label for='answer-id-917958' id='answer-label-917958' class=' answer'><span>Notify senior management.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231215[]' id='answer-id-917959' class='answer   answerof-231215 ' value='917959'   \/><label for='answer-id-917959' id='answer-label-917959' class=' answer'><span>Identity nodes that have been compromised.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-231216'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>An organization's security policy mandates that all new employees must receive appropriate security awareness training . <br \/>\r<br>Which of the following metrics would BEST assure compliance with this policy?<\/div><input type='hidden' name='question_id[]' id='qID_34' value='231216' \/><input type='hidden' id='answerType231216' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231216[]' id='answer-id-917960' class='answer   answerof-231216 ' value='917960'   \/><label for='answer-id-917960' id='answer-label-917960' class=' answer'><span>Percentage of new hires that have completed the training.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231216[]' id='answer-id-917961' class='answer   answerof-231216 ' value='917961'   \/><label for='answer-id-917961' id='answer-label-917961' class=' answer'><span>Number of new hires who have violated enterprise security policies.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231216[]' id='answer-id-917962' class='answer   answerof-231216 ' value='917962'   \/><label for='answer-id-917962' id='answer-label-917962' class=' answer'><span>Number of reported incidents by new hires.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231216[]' id='answer-id-917963' class='answer   answerof-231216 ' value='917963'   \/><label for='answer-id-917963' id='answer-label-917963' class=' answer'><span>Percentage of new hires who report incidents<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-231217'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:<\/div><input type='hidden' name='question_id[]' id='qID_35' value='231217' \/><input type='hidden' id='answerType231217' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231217[]' id='answer-id-917964' class='answer   answerof-231217 ' value='917964'   \/><label for='answer-id-917964' id='answer-label-917964' class=' answer'><span>re-prioritize the original issue as high risk and escalate to senior management.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231217[]' id='answer-id-917965' class='answer   answerof-231217 ' value='917965'   \/><label for='answer-id-917965' id='answer-label-917965' class=' answer'><span>schedule a follow-up audit in the next audit cycle.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231217[]' id='answer-id-917966' class='answer   answerof-231217 ' value='917966'   \/><label for='answer-id-917966' id='answer-label-917966' class=' answer'><span>postpone follow-up activities and escalate the alternative controls to senior audit management.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231217[]' id='answer-id-917967' class='answer   answerof-231217 ' value='917967'   \/><label for='answer-id-917967' id='answer-label-917967' class=' answer'><span>determine whether the alternative controls sufficiently mitigate the risk.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-36' style=';'><div id='questionWrap-36'  class='   watupro-question-id-231218'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>36. <\/span>An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format . <br \/>\r<br>Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?<\/div><input type='hidden' name='question_id[]' id='qID_36' value='231218' \/><input type='hidden' id='answerType231218' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231218[]' id='answer-id-917968' class='answer   answerof-231218 ' value='917968'   \/><label for='answer-id-917968' id='answer-label-917968' class=' answer'><span>Data masking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231218[]' id='answer-id-917969' class='answer   answerof-231218 ' value='917969'   \/><label for='answer-id-917969' id='answer-label-917969' class=' answer'><span>Data tokenization<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231218[]' id='answer-id-917970' class='answer   answerof-231218 ' value='917970'   \/><label for='answer-id-917970' id='answer-label-917970' class=' answer'><span>Data encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231218[]' id='answer-id-917971' class='answer   answerof-231218 ' value='917971'   \/><label for='answer-id-917971' id='answer-label-917971' class=' answer'><span>Data abstraction<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-37' style=';'><div id='questionWrap-37'  class='   watupro-question-id-231219'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>37. <\/span>Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?<\/div><input type='hidden' name='question_id[]' id='qID_37' value='231219' \/><input type='hidden' id='answerType231219' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231219[]' id='answer-id-917972' class='answer   answerof-231219 ' value='917972'   \/><label for='answer-id-917972' id='answer-label-917972' class=' answer'><span>Compliance with action plans resulting from recent audits<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231219[]' id='answer-id-917973' class='answer   answerof-231219 ' value='917973'   \/><label for='answer-id-917973' id='answer-label-917973' class=' answer'><span>Compliance with local laws and regulations<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231219[]' id='answer-id-917974' class='answer   answerof-231219 ' value='917974'   \/><label for='answer-id-917974' id='answer-label-917974' class=' answer'><span>Compliance with industry standards and best practice<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231219[]' id='answer-id-917975' class='answer   answerof-231219 ' value='917975'   \/><label for='answer-id-917975' id='answer-label-917975' class=' answer'><span>Compliance with the organization's policies and procedures<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-38' style=';'><div id='questionWrap-38'  class='   watupro-question-id-231220'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>38. <\/span>Which of the following is the PRIMARY concern when negotiating a contract for a hot site?<\/div><input type='hidden' name='question_id[]' id='qID_38' value='231220' \/><input type='hidden' id='answerType231220' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231220[]' id='answer-id-917976' class='answer   answerof-231220 ' value='917976'   \/><label for='answer-id-917976' id='answer-label-917976' class=' answer'><span>Availability of the site in the event of multiple disaster declarations<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231220[]' id='answer-id-917977' class='answer   answerof-231220 ' value='917977'   \/><label for='answer-id-917977' id='answer-label-917977' class=' answer'><span>Coordination with the site staff in the event of multiple disaster declarations<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231220[]' id='answer-id-917978' class='answer   answerof-231220 ' value='917978'   \/><label for='answer-id-917978' id='answer-label-917978' class=' answer'><span>Reciprocal agreements with other organizations<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231220[]' id='answer-id-917979' class='answer   answerof-231220 ' value='917979'   \/><label for='answer-id-917979' id='answer-label-917979' class=' answer'><span>Complete testing of the recovery plan<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-39' style=';'><div id='questionWrap-39'  class='   watupro-question-id-231221'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>39. <\/span>Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?<\/div><input type='hidden' name='question_id[]' id='qID_39' value='231221' \/><input type='hidden' id='answerType231221' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231221[]' id='answer-id-917980' class='answer   answerof-231221 ' value='917980'   \/><label for='answer-id-917980' id='answer-label-917980' class=' answer'><span>Identifying relevant roles for an enterprise IT governance framework<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231221[]' id='answer-id-917981' class='answer   answerof-231221 ' value='917981'   \/><label for='answer-id-917981' id='answer-label-917981' class=' answer'><span>Making decisions regarding risk response and monitoring of residual risk<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231221[]' id='answer-id-917982' class='answer   answerof-231221 ' value='917982'   \/><label for='answer-id-917982' id='answer-label-917982' class=' answer'><span>Verifying that legal, regulatory, and contractual requirements are being met<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231221[]' id='answer-id-917983' class='answer   answerof-231221 ' value='917983'   \/><label for='answer-id-917983' id='answer-label-917983' class=' answer'><span>Providing independent and objective feedback to facilitate improvement of IT processes<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-40' style=';'><div id='questionWrap-40'  class='   watupro-question-id-231222'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>40. <\/span>An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur . <br \/>\r<br>Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?<\/div><input type='hidden' name='question_id[]' id='qID_40' value='231222' \/><input type='hidden' id='answerType231222' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231222[]' id='answer-id-917984' class='answer   answerof-231222 ' value='917984'   \/><label for='answer-id-917984' id='answer-label-917984' class=' answer'><span>Assign responsibility for improving data quality.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231222[]' id='answer-id-917985' class='answer   answerof-231222 ' value='917985'   \/><label for='answer-id-917985' id='answer-label-917985' class=' answer'><span>Invest in additional employee training for data entry.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231222[]' id='answer-id-917986' class='answer   answerof-231222 ' value='917986'   \/><label for='answer-id-917986' id='answer-label-917986' class=' answer'><span>Outsource data cleansing activities to reliable third parties.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231222[]' id='answer-id-917987' class='answer   answerof-231222 ' value='917987'   \/><label for='answer-id-917987' id='answer-label-917987' class=' answer'><span>Implement business rules to validate employee data entry.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-41' style=';'><div id='questionWrap-41'  class='   watupro-question-id-231223'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>41. <\/span>Which of the following MOST effectively minimizes downtime during system conversions?<\/div><input type='hidden' name='question_id[]' id='qID_41' value='231223' \/><input type='hidden' id='answerType231223' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231223[]' id='answer-id-917988' class='answer   answerof-231223 ' value='917988'   \/><label for='answer-id-917988' id='answer-label-917988' class=' answer'><span>Phased approach<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231223[]' id='answer-id-917989' class='answer   answerof-231223 ' value='917989'   \/><label for='answer-id-917989' id='answer-label-917989' class=' answer'><span>Direct cutover<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231223[]' id='answer-id-917990' class='answer   answerof-231223 ' value='917990'   \/><label for='answer-id-917990' id='answer-label-917990' class=' answer'><span>Pilot study<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231223[]' id='answer-id-917991' class='answer   answerof-231223 ' value='917991'   \/><label for='answer-id-917991' id='answer-label-917991' class=' answer'><span>Parallel run<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-42' style=';'><div id='questionWrap-42'  class='   watupro-question-id-231224'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>42. <\/span>An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions . <br \/>\r<br>Which of the following is MOST important for the auditor to confirm when sourcing the population data?<\/div><input type='hidden' name='question_id[]' id='qID_42' value='231224' \/><input type='hidden' id='answerType231224' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231224[]' id='answer-id-917992' class='answer   answerof-231224 ' value='917992'   \/><label for='answer-id-917992' id='answer-label-917992' class=' answer'><span>The data is taken directly from the system.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231224[]' id='answer-id-917993' class='answer   answerof-231224 ' value='917993'   \/><label for='answer-id-917993' id='answer-label-917993' class=' answer'><span>There is no privacy information in the data.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231224[]' id='answer-id-917994' class='answer   answerof-231224 ' value='917994'   \/><label for='answer-id-917994' id='answer-label-917994' class=' answer'><span>The data can be obtained in a timely manner.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231224[]' id='answer-id-917995' class='answer   answerof-231224 ' value='917995'   \/><label for='answer-id-917995' id='answer-label-917995' class=' answer'><span>The data analysis tools have been recently updated.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-43' style=';'><div id='questionWrap-43'  class='   watupro-question-id-231225'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>43. <\/span>During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. <br \/>\r<br>Who should be accountable for managing these risks?<\/div><input type='hidden' name='question_id[]' id='qID_43' value='231225' \/><input type='hidden' id='answerType231225' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231225[]' id='answer-id-917996' class='answer   answerof-231225 ' value='917996'   \/><label for='answer-id-917996' id='answer-label-917996' class=' answer'><span>Enterprise risk manager<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231225[]' id='answer-id-917997' class='answer   answerof-231225 ' value='917997'   \/><label for='answer-id-917997' id='answer-label-917997' class=' answer'><span>Project sponsor<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231225[]' id='answer-id-917998' class='answer   answerof-231225 ' value='917998'   \/><label for='answer-id-917998' id='answer-label-917998' class=' answer'><span>Information security officer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231225[]' id='answer-id-917999' class='answer   answerof-231225 ' value='917999'   \/><label for='answer-id-917999' id='answer-label-917999' class=' answer'><span>Project manager<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-44' style=';'><div id='questionWrap-44'  class='   watupro-question-id-231226'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>44. <\/span>In a 24\/7 processing environment, a database contains several privileged application accounts with passwords set to never expire . <br \/>\r<br>Which of the following recommendations would BEST address the risk with minimal disruption to the business?<\/div><input type='hidden' name='question_id[]' id='qID_44' value='231226' \/><input type='hidden' id='answerType231226' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231226[]' id='answer-id-918000' class='answer   answerof-231226 ' value='918000'   \/><label for='answer-id-918000' id='answer-label-918000' class=' answer'><span>Modify applications to no longer require direct access to the database.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231226[]' id='answer-id-918001' class='answer   answerof-231226 ' value='918001'   \/><label for='answer-id-918001' id='answer-label-918001' class=' answer'><span>Introduce database access monitoring into the environment<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231226[]' id='answer-id-918002' class='answer   answerof-231226 ' value='918002'   \/><label for='answer-id-918002' id='answer-label-918002' class=' answer'><span>Modify the access management policy to make allowances for application accounts.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231226[]' id='answer-id-918003' class='answer   answerof-231226 ' value='918003'   \/><label for='answer-id-918003' id='answer-label-918003' class=' answer'><span>Schedule downtime to implement password changes.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-45' style=';'><div id='questionWrap-45'  class='   watupro-question-id-231227'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>45. <\/span>When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:<\/div><input type='hidden' name='question_id[]' id='qID_45' value='231227' \/><input type='hidden' id='answerType231227' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231227[]' id='answer-id-918004' class='answer   answerof-231227 ' value='918004'   \/><label for='answer-id-918004' id='answer-label-918004' class=' answer'><span>communicate via Transport Layer Security (TLS),<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231227[]' id='answer-id-918005' class='answer   answerof-231227 ' value='918005'   \/><label for='answer-id-918005' id='answer-label-918005' class=' answer'><span>block authorized users from unauthorized activities.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231227[]' id='answer-id-918006' class='answer   answerof-231227 ' value='918006'   \/><label for='answer-id-918006' id='answer-label-918006' class=' answer'><span>channel access only through the public-facing firewall.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231227[]' id='answer-id-918007' class='answer   answerof-231227 ' value='918007'   \/><label for='answer-id-918007' id='answer-label-918007' class=' answer'><span>channel access through authentication.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-46' style=';'><div id='questionWrap-46'  class='   watupro-question-id-231228'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>46. <\/span>During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective . <br \/>\r<br>Which of the following is the auditor's BEST action?<\/div><input type='hidden' name='question_id[]' id='qID_46' value='231228' \/><input type='hidden' id='answerType231228' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231228[]' id='answer-id-918008' class='answer   answerof-231228 ' value='918008'   \/><label for='answer-id-918008' id='answer-label-918008' class=' answer'><span>Explain to IT management that the new control will be evaluated during follow-up<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231228[]' id='answer-id-918009' class='answer   answerof-231228 ' value='918009'   \/><label for='answer-id-918009' id='answer-label-918009' class=' answer'><span>Re-perform the audit before changing the conclusion.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231228[]' id='answer-id-918010' class='answer   answerof-231228 ' value='918010'   \/><label for='answer-id-918010' id='answer-label-918010' class=' answer'><span>Change the conclusion based on evidence provided by IT management.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231228[]' id='answer-id-918011' class='answer   answerof-231228 ' value='918011'   \/><label for='answer-id-918011' id='answer-label-918011' class=' answer'><span>Add comments about the action taken by IT management in the report.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-47' style=';'><div id='questionWrap-47'  class='   watupro-question-id-231229'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>47. <\/span>Which of the following is MOST important for an effective control self-assessment (CSA) program?<\/div><input type='hidden' name='question_id[]' id='qID_47' value='231229' \/><input type='hidden' id='answerType231229' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231229[]' id='answer-id-918012' class='answer   answerof-231229 ' value='918012'   \/><label for='answer-id-918012' id='answer-label-918012' class=' answer'><span>Determining the scope of the assessment<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231229[]' id='answer-id-918013' class='answer   answerof-231229 ' value='918013'   \/><label for='answer-id-918013' id='answer-label-918013' class=' answer'><span>Performing detailed test procedures<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231229[]' id='answer-id-918014' class='answer   answerof-231229 ' value='918014'   \/><label for='answer-id-918014' id='answer-label-918014' class=' answer'><span>Evaluating changes to the risk environment<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231229[]' id='answer-id-918015' class='answer   answerof-231229 ' value='918015'   \/><label for='answer-id-918015' id='answer-label-918015' class=' answer'><span>Understanding the business process<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-48' style=';'><div id='questionWrap-48'  class='   watupro-question-id-231230'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>48. <\/span>Which of the following is the BEST method to safeguard data on an organization's laptop computers?<\/div><input type='hidden' name='question_id[]' id='qID_48' value='231230' \/><input type='hidden' id='answerType231230' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231230[]' id='answer-id-918016' class='answer   answerof-231230 ' value='918016'   \/><label for='answer-id-918016' id='answer-label-918016' class=' answer'><span>Disabled USB ports<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231230[]' id='answer-id-918017' class='answer   answerof-231230 ' value='918017'   \/><label for='answer-id-918017' id='answer-label-918017' class=' answer'><span>Full disk encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231230[]' id='answer-id-918018' class='answer   answerof-231230 ' value='918018'   \/><label for='answer-id-918018' id='answer-label-918018' class=' answer'><span>Biometric access control<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231230[]' id='answer-id-918019' class='answer   answerof-231230 ' value='918019'   \/><label for='answer-id-918019' id='answer-label-918019' class=' answer'><span>Two-factor authentication<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-49' style=';'><div id='questionWrap-49'  class='   watupro-question-id-231231'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>49. <\/span>Which of the following is MOST important to ensure when planning a black box penetration test?<\/div><input type='hidden' name='question_id[]' id='qID_49' value='231231' \/><input type='hidden' id='answerType231231' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231231[]' id='answer-id-918020' class='answer   answerof-231231 ' value='918020'   \/><label for='answer-id-918020' id='answer-label-918020' class=' answer'><span>The management of the client organization is aware of the testing.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231231[]' id='answer-id-918021' class='answer   answerof-231231 ' value='918021'   \/><label for='answer-id-918021' id='answer-label-918021' class=' answer'><span>The test results will be documented and communicated to management.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231231[]' id='answer-id-918022' class='answer   answerof-231231 ' value='918022'   \/><label for='answer-id-918022' id='answer-label-918022' class=' answer'><span>The environment and penetration test scope have been determined.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231231[]' id='answer-id-918023' class='answer   answerof-231231 ' value='918023'   \/><label for='answer-id-918023' id='answer-label-918023' class=' answer'><span>Diagrams of the organization's network architecture are available.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-50' style=';'><div id='questionWrap-50'  class='   watupro-question-id-231232'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>50. <\/span>Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?<\/div><input type='hidden' name='question_id[]' id='qID_50' value='231232' \/><input type='hidden' id='answerType231232' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231232[]' id='answer-id-918024' class='answer   answerof-231232 ' value='918024'   \/><label for='answer-id-918024' id='answer-label-918024' class=' answer'><span>Align service level agreements (SLAs) with current needs.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231232[]' id='answer-id-918025' class='answer   answerof-231232 ' value='918025'   \/><label for='answer-id-918025' id='answer-label-918025' class=' answer'><span>Monitor customer satisfaction with the change.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231232[]' id='answer-id-918026' class='answer   answerof-231232 ' value='918026'   \/><label for='answer-id-918026' id='answer-label-918026' class=' answer'><span>Minimize costs related to the third-party agreement.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231232[]' id='answer-id-918027' class='answer   answerof-231232 ' value='918027'   \/><label for='answer-id-918027' id='answer-label-918027' class=' answer'><span>Ensure right to audit is included within the contract.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-51' style=';'><div id='questionWrap-51'  class='   watupro-question-id-231233'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>51. <\/span>An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release . <br \/>\r<br>Which of the following should the IS auditor review FIRST?<\/div><input type='hidden' name='question_id[]' id='qID_51' value='231233' \/><input type='hidden' id='answerType231233' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231233[]' id='answer-id-918028' class='answer   answerof-231233 ' value='918028'   \/><label for='answer-id-918028' id='answer-label-918028' class=' answer'><span>Capacity management plan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231233[]' id='answer-id-918029' class='answer   answerof-231233 ' value='918029'   \/><label for='answer-id-918029' id='answer-label-918029' class=' answer'><span>Training plans<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231233[]' id='answer-id-918030' class='answer   answerof-231233 ' value='918030'   \/><label for='answer-id-918030' id='answer-label-918030' class=' answer'><span>Database conversion results<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231233[]' id='answer-id-918031' class='answer   answerof-231233 ' value='918031'   \/><label for='answer-id-918031' id='answer-label-918031' class=' answer'><span>Stress testing results<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-52' style=';'><div id='questionWrap-52'  class='   watupro-question-id-231234'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>52. <\/span>A proper audit trail of changes to server start-up procedures would include evidence of:<\/div><input type='hidden' name='question_id[]' id='qID_52' value='231234' \/><input type='hidden' id='answerType231234' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231234[]' id='answer-id-918032' class='answer   answerof-231234 ' value='918032'   \/><label for='answer-id-918032' id='answer-label-918032' class=' answer'><span>subsystem structure.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231234[]' id='answer-id-918033' class='answer   answerof-231234 ' value='918033'   \/><label for='answer-id-918033' id='answer-label-918033' class=' answer'><span>program execution.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231234[]' id='answer-id-918034' class='answer   answerof-231234 ' value='918034'   \/><label for='answer-id-918034' id='answer-label-918034' class=' answer'><span>security control options.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231234[]' id='answer-id-918035' class='answer   answerof-231234 ' value='918035'   \/><label for='answer-id-918035' id='answer-label-918035' class=' answer'><span>operator overrides.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-53' style=';'><div id='questionWrap-53'  class='   watupro-question-id-231235'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>53. <\/span>Which of the following should be the PRIMARY basis for prioritizing follow-up audits?<\/div><input type='hidden' name='question_id[]' id='qID_53' value='231235' \/><input type='hidden' id='answerType231235' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231235[]' id='answer-id-918036' class='answer   answerof-231235 ' value='918036'   \/><label for='answer-id-918036' id='answer-label-918036' class=' answer'><span>Audit cycle defined in the audit plan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231235[]' id='answer-id-918037' class='answer   answerof-231235 ' value='918037'   \/><label for='answer-id-918037' id='answer-label-918037' class=' answer'><span>Complexity of management's action plans<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231235[]' id='answer-id-918038' class='answer   answerof-231235 ' value='918038'   \/><label for='answer-id-918038' id='answer-label-918038' class=' answer'><span>Recommendation from executive management<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231235[]' id='answer-id-918039' class='answer   answerof-231235 ' value='918039'   \/><label for='answer-id-918039' id='answer-label-918039' class=' answer'><span>Residual risk from the findings of previous audits<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-54' style=';'><div id='questionWrap-54'  class='   watupro-question-id-231236'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>54. <\/span>Which of the following data would be used when performing a business impact analysis (BIA)?<\/div><input type='hidden' name='question_id[]' id='qID_54' value='231236' \/><input type='hidden' id='answerType231236' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231236[]' id='answer-id-918040' class='answer   answerof-231236 ' value='918040'   \/><label for='answer-id-918040' id='answer-label-918040' class=' answer'><span>Projected impact of current business on future business<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231236[]' id='answer-id-918041' class='answer   answerof-231236 ' value='918041'   \/><label for='answer-id-918041' id='answer-label-918041' class=' answer'><span>Cost-benefit analysis of running the current business<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231236[]' id='answer-id-918042' class='answer   answerof-231236 ' value='918042'   \/><label for='answer-id-918042' id='answer-label-918042' class=' answer'><span>Cost of regulatory compliance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231236[]' id='answer-id-918043' class='answer   answerof-231236 ' value='918043'   \/><label for='answer-id-918043' id='answer-label-918043' class=' answer'><span>Expected costs for recovering the business<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-55' style=';'><div id='questionWrap-55'  class='   watupro-question-id-231237'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>55. <\/span>An organization has outsourced its data processing function to a service provider . <br \/>\r<br>Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?<\/div><input type='hidden' name='question_id[]' id='qID_55' value='231237' \/><input type='hidden' id='answerType231237' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231237[]' id='answer-id-918044' class='answer   answerof-231237 ' value='918044'   \/><label for='answer-id-918044' id='answer-label-918044' class=' answer'><span>Assessment of the personnel training processes of the provider<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231237[]' id='answer-id-918045' class='answer   answerof-231237 ' value='918045'   \/><label for='answer-id-918045' id='answer-label-918045' class=' answer'><span>Adequacy of the service provider's insurance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231237[]' id='answer-id-918046' class='answer   answerof-231237 ' value='918046'   \/><label for='answer-id-918046' id='answer-label-918046' class=' answer'><span>Review of performance against service level agreements (SLAs)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231237[]' id='answer-id-918047' class='answer   answerof-231237 ' value='918047'   \/><label for='answer-id-918047' id='answer-label-918047' class=' answer'><span>Periodic audits of controls by an independent auditor<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-56' style=';'><div id='questionWrap-56'  class='   watupro-question-id-231238'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>56. <\/span>Which of the following is the BEST detective control for a job scheduling process involving data transmission?<\/div><input type='hidden' name='question_id[]' id='qID_56' value='231238' \/><input type='hidden' id='answerType231238' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231238[]' id='answer-id-918048' class='answer   answerof-231238 ' value='918048'   \/><label for='answer-id-918048' id='answer-label-918048' class=' answer'><span>Metrics denoting the volume of monthly job failures are reported and reviewed by senior management.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231238[]' id='answer-id-918049' class='answer   answerof-231238 ' value='918049'   \/><label for='answer-id-918049' id='answer-label-918049' class=' answer'><span>Jobs are scheduled to be completed daily and data is transmitted using a Secure File Transfer Protocol (SFTP).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231238[]' id='answer-id-918050' class='answer   answerof-231238 ' value='918050'   \/><label for='answer-id-918050' id='answer-label-918050' class=' answer'><span>Jobs are scheduled and a log of this activity is retained for subsequent review.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231238[]' id='answer-id-918051' class='answer   answerof-231238 ' value='918051'   \/><label for='answer-id-918051' id='answer-label-918051' class=' answer'><span>Job failure alerts are automatically generated and routed to support personnel.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-57' style=';'><div id='questionWrap-57'  class='   watupro-question-id-231239'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>57. <\/span>Which of the following is the MOST effective way for an organization to project against data loss?<\/div><input type='hidden' name='question_id[]' id='qID_57' value='231239' \/><input type='hidden' id='answerType231239' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231239[]' id='answer-id-918052' class='answer   answerof-231239 ' value='918052'   \/><label for='answer-id-918052' id='answer-label-918052' class=' answer'><span>Limit employee internet access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231239[]' id='answer-id-918053' class='answer   answerof-231239 ' value='918053'   \/><label for='answer-id-918053' id='answer-label-918053' class=' answer'><span>Implement data classification procedures.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231239[]' id='answer-id-918054' class='answer   answerof-231239 ' value='918054'   \/><label for='answer-id-918054' id='answer-label-918054' class=' answer'><span>Review firewall logs for anomalies.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231239[]' id='answer-id-918055' class='answer   answerof-231239 ' value='918055'   \/><label for='answer-id-918055' id='answer-label-918055' class=' answer'><span>Conduct periodic security awareness training.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-58' style=';'><div id='questionWrap-58'  class='   watupro-question-id-231240'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>58. <\/span>Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:<\/div><input type='hidden' name='question_id[]' id='qID_58' value='231240' \/><input type='hidden' id='answerType231240' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231240[]' id='answer-id-918056' class='answer   answerof-231240 ' value='918056'   \/><label for='answer-id-918056' id='answer-label-918056' class=' answer'><span>business impact analysis (BIA).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231240[]' id='answer-id-918057' class='answer   answerof-231240 ' value='918057'   \/><label for='answer-id-918057' id='answer-label-918057' class=' answer'><span>threat and risk assessment.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231240[]' id='answer-id-918058' class='answer   answerof-231240 ' value='918058'   \/><label for='answer-id-918058' id='answer-label-918058' class=' answer'><span>business continuity plan (BCP).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231240[]' id='answer-id-918059' class='answer   answerof-231240 ' value='918059'   \/><label for='answer-id-918059' id='answer-label-918059' class=' answer'><span>disaster recovery plan (DRP).<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-59' style=';'><div id='questionWrap-59'  class='   watupro-question-id-231241'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>59. <\/span>An organizations audit charier PRIMARILY:<\/div><input type='hidden' name='question_id[]' id='qID_59' value='231241' \/><input type='hidden' id='answerType231241' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231241[]' id='answer-id-918060' class='answer   answerof-231241 ' value='918060'   \/><label for='answer-id-918060' id='answer-label-918060' class=' answer'><span>describes the auditors' authority to conduct audits.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231241[]' id='answer-id-918061' class='answer   answerof-231241 ' value='918061'   \/><label for='answer-id-918061' id='answer-label-918061' class=' answer'><span>defines the auditors' code of conduct.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231241[]' id='answer-id-918062' class='answer   answerof-231241 ' value='918062'   \/><label for='answer-id-918062' id='answer-label-918062' class=' answer'><span>formally records the annual and quarterly audit plans.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231241[]' id='answer-id-918063' class='answer   answerof-231241 ' value='918063'   \/><label for='answer-id-918063' id='answer-label-918063' class=' answer'><span>documents the audit process and reporting standards.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-60' style=';'><div id='questionWrap-60'  class='   watupro-question-id-231242'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>60. <\/span>Which of the following demonstrates the use of data analytics for a loan origination process?<\/div><input type='hidden' name='question_id[]' id='qID_60' value='231242' \/><input type='hidden' id='answerType231242' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231242[]' id='answer-id-918064' class='answer   answerof-231242 ' value='918064'   \/><label for='answer-id-918064' id='answer-label-918064' class=' answer'><span>Evaluating whether loan records are included in the batch file and are validated by the servicing system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231242[]' id='answer-id-918065' class='answer   answerof-231242 ' value='918065'   \/><label for='answer-id-918065' id='answer-label-918065' class=' answer'><span>Comparing a population of loans input in the origination system to loans booked on the servicing system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231242[]' id='answer-id-918066' class='answer   answerof-231242 ' value='918066'   \/><label for='answer-id-918066' id='answer-label-918066' class=' answer'><span>Validating whether reconciliations between the two systems are performed and discrepancies are investigated<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231242[]' id='answer-id-918067' class='answer   answerof-231242 ' value='918067'   \/><label for='answer-id-918067' id='answer-label-918067' class=' answer'><span>Reviewing error handling controls to notify appropriate personnel in the event of a transmission failure<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-61' style=';'><div id='questionWrap-61'  class='   watupro-question-id-231243'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>61. <\/span>A data breach has occurred due lo malware . <br \/>\r<br>Which of the following should be the FIRST course of action?<\/div><input type='hidden' name='question_id[]' id='qID_61' value='231243' \/><input type='hidden' id='answerType231243' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231243[]' id='answer-id-918068' class='answer   answerof-231243 ' value='918068'   \/><label for='answer-id-918068' id='answer-label-918068' class=' answer'><span>Notify the cyber insurance company.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231243[]' id='answer-id-918069' class='answer   answerof-231243 ' value='918069'   \/><label for='answer-id-918069' id='answer-label-918069' class=' answer'><span>Shut down the affected systems.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231243[]' id='answer-id-918070' class='answer   answerof-231243 ' value='918070'   \/><label for='answer-id-918070' id='answer-label-918070' class=' answer'><span>Quarantine the impacted systems.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231243[]' id='answer-id-918071' class='answer   answerof-231243 ' value='918071'   \/><label for='answer-id-918071' id='answer-label-918071' class=' answer'><span>Notify customers of the breach.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-62' style=';'><div id='questionWrap-62'  class='   watupro-question-id-231244'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>62. <\/span>Which of the following is MOST important with regard to an application development acceptance test?<\/div><input type='hidden' name='question_id[]' id='qID_62' value='231244' \/><input type='hidden' id='answerType231244' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231244[]' id='answer-id-918072' class='answer   answerof-231244 ' value='918072'   \/><label for='answer-id-918072' id='answer-label-918072' class=' answer'><span>The programming team is involved in the testing process.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231244[]' id='answer-id-918073' class='answer   answerof-231244 ' value='918073'   \/><label for='answer-id-918073' id='answer-label-918073' class=' answer'><span>All data files are tested for valid information before conversion.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231244[]' id='answer-id-918074' class='answer   answerof-231244 ' value='918074'   \/><label for='answer-id-918074' id='answer-label-918074' class=' answer'><span>User management approves the test design before the test is started.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231244[]' id='answer-id-918075' class='answer   answerof-231244 ' value='918075'   \/><label for='answer-id-918075' id='answer-label-918075' class=' answer'><span>The quality assurance (QA) team is in charge of the testing process.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-63' style=';'><div id='questionWrap-63'  class='   watupro-question-id-231245'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>63. <\/span>An IS auditor is reviewing an organization's information asset management process . <br \/>\r<br>Which of the following would be of GREATEST concern to the auditor?<\/div><input type='hidden' name='question_id[]' id='qID_63' value='231245' \/><input type='hidden' id='answerType231245' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231245[]' id='answer-id-918076' class='answer   answerof-231245 ' value='918076'   \/><label for='answer-id-918076' id='answer-label-918076' class=' answer'><span>The process does not require specifying the physical locations of assets.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231245[]' id='answer-id-918077' class='answer   answerof-231245 ' value='918077'   \/><label for='answer-id-918077' id='answer-label-918077' class=' answer'><span>Process ownership has not been established.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231245[]' id='answer-id-918078' class='answer   answerof-231245 ' value='918078'   \/><label for='answer-id-918078' id='answer-label-918078' class=' answer'><span>The process does not include asset review.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231245[]' id='answer-id-918079' class='answer   answerof-231245 ' value='918079'   \/><label for='answer-id-918079' id='answer-label-918079' class=' answer'><span>Identification of asset value is not included in the process.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-64' style=';'><div id='questionWrap-64'  class='   watupro-question-id-231246'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>64. <\/span>What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?<\/div><input type='hidden' name='question_id[]' id='qID_64' value='231246' \/><input type='hidden' id='answerType231246' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231246[]' id='answer-id-918080' class='answer   answerof-231246 ' value='918080'   \/><label for='answer-id-918080' id='answer-label-918080' class=' answer'><span>Full test results<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231246[]' id='answer-id-918081' class='answer   answerof-231246 ' value='918081'   \/><label for='answer-id-918081' id='answer-label-918081' class=' answer'><span>Completed test plans<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231246[]' id='answer-id-918082' class='answer   answerof-231246 ' value='918082'   \/><label for='answer-id-918082' id='answer-label-918082' class=' answer'><span>Updated inventory of systems<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231246[]' id='answer-id-918083' class='answer   answerof-231246 ' value='918083'   \/><label for='answer-id-918083' id='answer-label-918083' class=' answer'><span>Change management processes<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-65' style=';'><div id='questionWrap-65'  class='   watupro-question-id-231247'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>65. <\/span>Which of the following is the BEST method to prevent wire transfer fraud by bank employees?<\/div><input type='hidden' name='question_id[]' id='qID_65' value='231247' \/><input type='hidden' id='answerType231247' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231247[]' id='answer-id-918084' class='answer   answerof-231247 ' value='918084'   \/><label for='answer-id-918084' id='answer-label-918084' class=' answer'><span>Independent reconciliation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231247[]' id='answer-id-918085' class='answer   answerof-231247 ' value='918085'   \/><label for='answer-id-918085' id='answer-label-918085' class=' answer'><span>Re-keying of wire dollar amounts<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231247[]' id='answer-id-918086' class='answer   answerof-231247 ' value='918086'   \/><label for='answer-id-918086' id='answer-label-918086' class=' answer'><span>Two-factor authentication control<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231247[]' id='answer-id-918087' class='answer   answerof-231247 ' value='918087'   \/><label for='answer-id-918087' id='answer-label-918087' class=' answer'><span>System-enforced dual control<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-66' style=';'><div id='questionWrap-66'  class='   watupro-question-id-231248'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>66. <\/span>A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification . <br \/>\r<br>Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?<\/div><input type='hidden' name='question_id[]' id='qID_66' value='231248' \/><input type='hidden' id='answerType231248' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231248[]' id='answer-id-918088' class='answer   answerof-231248 ' value='918088'   \/><label for='answer-id-918088' id='answer-label-918088' class=' answer'><span>Include the requirement in the incident management response plan.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231248[]' id='answer-id-918089' class='answer   answerof-231248 ' value='918089'   \/><label for='answer-id-918089' id='answer-label-918089' class=' answer'><span>Establish key performance indicators (KPIs) for timely identification of security incidents.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231248[]' id='answer-id-918090' class='answer   answerof-231248 ' value='918090'   \/><label for='answer-id-918090' id='answer-label-918090' class=' answer'><span>Enhance the alert functionality of the intrusion detection system (IDS).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231248[]' id='answer-id-918091' class='answer   answerof-231248 ' value='918091'   \/><label for='answer-id-918091' id='answer-label-918091' class=' answer'><span>Engage an external security incident response expert for incident handling.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-67' style=';'><div id='questionWrap-67'  class='   watupro-question-id-231249'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>67. <\/span>Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?<\/div><input type='hidden' name='question_id[]' id='qID_67' value='231249' \/><input type='hidden' id='answerType231249' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231249[]' id='answer-id-918092' class='answer   answerof-231249 ' value='918092'   \/><label for='answer-id-918092' id='answer-label-918092' class=' answer'><span>Real-time audit software<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231249[]' id='answer-id-918093' class='answer   answerof-231249 ' value='918093'   \/><label for='answer-id-918093' id='answer-label-918093' class=' answer'><span>Performance data<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231249[]' id='answer-id-918094' class='answer   answerof-231249 ' value='918094'   \/><label for='answer-id-918094' id='answer-label-918094' class=' answer'><span>Quality assurance (QA) reviews<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231249[]' id='answer-id-918095' class='answer   answerof-231249 ' value='918095'   \/><label for='answer-id-918095' id='answer-label-918095' class=' answer'><span>Participative management techniques<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-68' style=';'><div id='questionWrap-68'  class='   watupro-question-id-231250'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>68. <\/span>Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?<\/div><input type='hidden' name='question_id[]' id='qID_68' value='231250' \/><input type='hidden' id='answerType231250' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231250[]' id='answer-id-918096' class='answer   answerof-231250 ' value='918096'   \/><label for='answer-id-918096' id='answer-label-918096' class=' answer'><span>Portfolio management<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231250[]' id='answer-id-918097' class='answer   answerof-231250 ' value='918097'   \/><label for='answer-id-918097' id='answer-label-918097' class=' answer'><span>Business plans<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231250[]' id='answer-id-918098' class='answer   answerof-231250 ' value='918098'   \/><label for='answer-id-918098' id='answer-label-918098' class=' answer'><span>Business processes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231250[]' id='answer-id-918099' class='answer   answerof-231250 ' value='918099'   \/><label for='answer-id-918099' id='answer-label-918099' class=' answer'><span>IT strategic plans<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-69' style=';'><div id='questionWrap-69'  class='   watupro-question-id-231251'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>69. <\/span>Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?<\/div><input type='hidden' name='question_id[]' id='qID_69' value='231251' \/><input type='hidden' id='answerType231251' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231251[]' id='answer-id-918100' class='answer   answerof-231251 ' value='918100'   \/><label for='answer-id-918100' id='answer-label-918100' class=' answer'><span>Assignment of responsibility for each project to an IT team member<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231251[]' id='answer-id-918101' class='answer   answerof-231251 ' value='918101'   \/><label for='answer-id-918101' id='answer-label-918101' class=' answer'><span>Adherence to best practice and industry approved methodologies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231251[]' id='answer-id-918102' class='answer   answerof-231251 ' value='918102'   \/><label for='answer-id-918102' id='answer-label-918102' class=' answer'><span>Controls to minimize risk and maximize value for the IT portfolio<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231251[]' id='answer-id-918103' class='answer   answerof-231251 ' value='918103'   \/><label for='answer-id-918103' id='answer-label-918103' class=' answer'><span>Frequency of meetings where the business discusses the IT portfolio<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-70' style=';'><div id='questionWrap-70'  class='   watupro-question-id-231252'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>70. <\/span>Which of the following should be done FIRST when planning a penetration test?<\/div><input type='hidden' name='question_id[]' id='qID_70' value='231252' \/><input type='hidden' id='answerType231252' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231252[]' id='answer-id-918104' class='answer   answerof-231252 ' value='918104'   \/><label for='answer-id-918104' id='answer-label-918104' class=' answer'><span>Execute nondisclosure agreements (NDAs).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231252[]' id='answer-id-918105' class='answer   answerof-231252 ' value='918105'   \/><label for='answer-id-918105' id='answer-label-918105' class=' answer'><span>Determine reporting requirements for vulnerabilities.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231252[]' id='answer-id-918106' class='answer   answerof-231252 ' value='918106'   \/><label for='answer-id-918106' id='answer-label-918106' class=' answer'><span>Define the testing scope.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231252[]' id='answer-id-918107' class='answer   answerof-231252 ' value='918107'   \/><label for='answer-id-918107' id='answer-label-918107' class=' answer'><span>Obtain management consent for the testing.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-71' style=';'><div id='questionWrap-71'  class='   watupro-question-id-231253'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>71. <\/span>An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner . <br \/>\r<br>Which of the following is the auditor's BEST recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_71' value='231253' \/><input type='hidden' id='answerType231253' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231253[]' id='answer-id-918108' class='answer   answerof-231253 ' value='918108'   \/><label for='answer-id-918108' id='answer-label-918108' class=' answer'><span>Increase the capacity of existing systems.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231253[]' id='answer-id-918109' class='answer   answerof-231253 ' value='918109'   \/><label for='answer-id-918109' id='answer-label-918109' class=' answer'><span>Upgrade hardware to newer technology.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231253[]' id='answer-id-918110' class='answer   answerof-231253 ' value='918110'   \/><label for='answer-id-918110' id='answer-label-918110' class=' answer'><span>Hire temporary contract workers for the IT function.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231253[]' id='answer-id-918111' class='answer   answerof-231253 ' value='918111'   \/><label for='answer-id-918111' id='answer-label-918111' class=' answer'><span>Build a virtual environment.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-72' style=';'><div id='questionWrap-72'  class='   watupro-question-id-231254'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>72. <\/span>Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?<\/div><input type='hidden' name='question_id[]' id='qID_72' value='231254' \/><input type='hidden' id='answerType231254' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231254[]' id='answer-id-918112' class='answer   answerof-231254 ' value='918112'   \/><label for='answer-id-918112' id='answer-label-918112' class=' answer'><span>Segregation of duties between staff ordering and staff receiving information assets<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231254[]' id='answer-id-918113' class='answer   answerof-231254 ' value='918113'   \/><label for='answer-id-918113' id='answer-label-918113' class=' answer'><span>Complete and accurate list of information assets that have been deployed<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231254[]' id='answer-id-918114' class='answer   answerof-231254 ' value='918114'   \/><label for='answer-id-918114' id='answer-label-918114' class=' answer'><span>Availability and testing of onsite backup generators<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231254[]' id='answer-id-918115' class='answer   answerof-231254 ' value='918115'   \/><label for='answer-id-918115' id='answer-label-918115' class=' answer'><span>Knowledge of the IT staff regarding data protection requirements<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-73' style=';'><div id='questionWrap-73'  class='   watupro-question-id-231255'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>73. <\/span>The PRIMARY advantage of object-oriented technology is enhanced:<\/div><input type='hidden' name='question_id[]' id='qID_73' value='231255' \/><input type='hidden' id='answerType231255' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231255[]' id='answer-id-918116' class='answer   answerof-231255 ' value='918116'   \/><label for='answer-id-918116' id='answer-label-918116' class=' answer'><span>efficiency due to the re-use of elements of logic.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231255[]' id='answer-id-918117' class='answer   answerof-231255 ' value='918117'   \/><label for='answer-id-918117' id='answer-label-918117' class=' answer'><span>management of sequential program execution for data access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231255[]' id='answer-id-918118' class='answer   answerof-231255 ' value='918118'   \/><label for='answer-id-918118' id='answer-label-918118' class=' answer'><span>grouping of objects into methods for data access.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231255[]' id='answer-id-918119' class='answer   answerof-231255 ' value='918119'   \/><label for='answer-id-918119' id='answer-label-918119' class=' answer'><span>management of a restricted variety of data types for a data object.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-74' style=';'><div id='questionWrap-74'  class='   watupro-question-id-231256'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>74. <\/span>An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:<\/div><input type='hidden' name='question_id[]' id='qID_74' value='231256' \/><input type='hidden' id='answerType231256' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231256[]' id='answer-id-918120' class='answer   answerof-231256 ' value='918120'   \/><label for='answer-id-918120' id='answer-label-918120' class=' answer'><span>refuse the assignment to avoid conflict of interest.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231256[]' id='answer-id-918121' class='answer   answerof-231256 ' value='918121'   \/><label for='answer-id-918121' id='answer-label-918121' class=' answer'><span>use the knowledge of the application to carry out the audit.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231256[]' id='answer-id-918122' class='answer   answerof-231256 ' value='918122'   \/><label for='answer-id-918122' id='answer-label-918122' class=' answer'><span>inform audit management of the earlier involvement.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231256[]' id='answer-id-918123' class='answer   answerof-231256 ' value='918123'   \/><label for='answer-id-918123' id='answer-label-918123' class=' answer'><span>modify the scope of the audit.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-75' style=';'><div id='questionWrap-75'  class='   watupro-question-id-231257'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>75. <\/span>Which of the following components of a risk assessment is MOST helpful to management in determining the level of risk mitigation to apply?<\/div><input type='hidden' name='question_id[]' id='qID_75' value='231257' \/><input type='hidden' id='answerType231257' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231257[]' id='answer-id-918124' class='answer   answerof-231257 ' value='918124'   \/><label for='answer-id-918124' id='answer-label-918124' class=' answer'><span>Risk identification<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231257[]' id='answer-id-918125' class='answer   answerof-231257 ' value='918125'   \/><label for='answer-id-918125' id='answer-label-918125' class=' answer'><span>Risk classification<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231257[]' id='answer-id-918126' class='answer   answerof-231257 ' value='918126'   \/><label for='answer-id-918126' id='answer-label-918126' class=' answer'><span>Control self-assessment (CSA)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231257[]' id='answer-id-918127' class='answer   answerof-231257 ' value='918127'   \/><label for='answer-id-918127' id='answer-label-918127' class=' answer'><span>Impact assessment<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-76' style=';'><div id='questionWrap-76'  class='   watupro-question-id-231258'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>76. <\/span>During an incident management audit, an IS auditor finds that several similar incidents <br \/>\r<br>were logged during the audit period . <br \/>\r<br>Which of the following is the auditor's MOST important course of action?<\/div><input type='hidden' name='question_id[]' id='qID_76' value='231258' \/><input type='hidden' id='answerType231258' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231258[]' id='answer-id-918128' class='answer   answerof-231258 ' value='918128'   \/><label for='answer-id-918128' id='answer-label-918128' class=' answer'><span>Document the finding and present it to management.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231258[]' id='answer-id-918129' class='answer   answerof-231258 ' value='918129'   \/><label for='answer-id-918129' id='answer-label-918129' class=' answer'><span>Determine if a root cause analysis was conducted.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231258[]' id='answer-id-918130' class='answer   answerof-231258 ' value='918130'   \/><label for='answer-id-918130' id='answer-label-918130' class=' answer'><span>Confirm the resolution time of the incidents.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231258[]' id='answer-id-918131' class='answer   answerof-231258 ' value='918131'   \/><label for='answer-id-918131' id='answer-label-918131' class=' answer'><span>Validate whether all incidents have been actioned.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-77' style=';'><div id='questionWrap-77'  class='   watupro-question-id-231259'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>77. <\/span>Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?<\/div><input type='hidden' name='question_id[]' id='qID_77' value='231259' \/><input type='hidden' id='answerType231259' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231259[]' id='answer-id-918132' class='answer   answerof-231259 ' value='918132'   \/><label for='answer-id-918132' id='answer-label-918132' class=' answer'><span>Conduct periodic on-site assessments using agreed-upon criteria.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231259[]' id='answer-id-918133' class='answer   answerof-231259 ' value='918133'   \/><label for='answer-id-918133' id='answer-label-918133' class=' answer'><span>Periodically review the service level agreement (SLA) with the vendor.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231259[]' id='answer-id-918134' class='answer   answerof-231259 ' value='918134'   \/><label for='answer-id-918134' id='answer-label-918134' class=' answer'><span>Conduct an unannounced vulnerability assessment of vendor's IT systems.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231259[]' id='answer-id-918135' class='answer   answerof-231259 ' value='918135'   \/><label for='answer-id-918135' id='answer-label-918135' class=' answer'><span>Obtain evidence of the vendor's control self-assessment (CSA).<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-78' style=';'><div id='questionWrap-78'  class='   watupro-question-id-231260'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>78. <\/span>During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization . <br \/>\r<br>Which of the following should be recommended as the PRIMARY factor to determine system criticality?<\/div><input type='hidden' name='question_id[]' id='qID_78' value='231260' \/><input type='hidden' id='answerType231260' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231260[]' id='answer-id-918136' class='answer   answerof-231260 ' value='918136'   \/><label for='answer-id-918136' id='answer-label-918136' class=' answer'><span>Key performance indicators (KPIs)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231260[]' id='answer-id-918137' class='answer   answerof-231260 ' value='918137'   \/><label for='answer-id-918137' id='answer-label-918137' class=' answer'><span>Maximum allowable downtime (MAD)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231260[]' id='answer-id-918138' class='answer   answerof-231260 ' value='918138'   \/><label for='answer-id-918138' id='answer-label-918138' class=' answer'><span>Recovery point objective (RPO)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231260[]' id='answer-id-918139' class='answer   answerof-231260 ' value='918139'   \/><label for='answer-id-918139' id='answer-label-918139' class=' answer'><span>Mean time to restore (MTTR)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-79' style=';'><div id='questionWrap-79'  class='   watupro-question-id-231261'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>79. <\/span>Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?<\/div><input type='hidden' name='question_id[]' id='qID_79' value='231261' \/><input type='hidden' id='answerType231261' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231261[]' id='answer-id-918140' class='answer   answerof-231261 ' value='918140'   \/><label for='answer-id-918140' id='answer-label-918140' class=' answer'><span>Write access to production program libraries<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231261[]' id='answer-id-918141' class='answer   answerof-231261 ' value='918141'   \/><label for='answer-id-918141' id='answer-label-918141' class=' answer'><span>Write access to development data libraries<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231261[]' id='answer-id-918142' class='answer   answerof-231261 ' value='918142'   \/><label for='answer-id-918142' id='answer-label-918142' class=' answer'><span>Execute access to production program libraries<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231261[]' id='answer-id-918143' class='answer   answerof-231261 ' value='918143'   \/><label for='answer-id-918143' id='answer-label-918143' class=' answer'><span>Execute access to development program libraries<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-80' style=';'><div id='questionWrap-80'  class='   watupro-question-id-231262'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>80. <\/span>A system development project is experiencing delays due to ongoing staff shortages . <br \/>\r<br>Which of the following strategies would provide the GREATEST assurance of system quality at implementation?<\/div><input type='hidden' name='question_id[]' id='qID_80' value='231262' \/><input type='hidden' id='answerType231262' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231262[]' id='answer-id-918144' class='answer   answerof-231262 ' value='918144'   \/><label for='answer-id-918144' id='answer-label-918144' class=' answer'><span>Implement overtime pay and bonuses for all development staff.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231262[]' id='answer-id-918145' class='answer   answerof-231262 ' value='918145'   \/><label for='answer-id-918145' id='answer-label-918145' class=' answer'><span>Utilize new system development tools to improve productivity.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231262[]' id='answer-id-918146' class='answer   answerof-231262 ' value='918146'   \/><label for='answer-id-918146' id='answer-label-918146' class=' answer'><span>Recruit IS staff to expedite system development.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-231262[]' id='answer-id-918147' class='answer   answerof-231262 ' value='918147'   \/><label for='answer-id-918147' id='answer-label-918147' class=' answer'><span>Deliver only the core functionality on the initial target date.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-81'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons6520\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"6520\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-05-07 19:32:11\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1778182331\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"231183:917827,917828,917829,917830 | 231184:917831,917832,917833,917834 | 231185:917835,917836,917837,917838 | 231186:917839,917840,917841,917842,917843 | 231187:917844,917845,917846,917847 | 231188:917848,917849,917850,917851 | 231189:917852,917853,917854,917855 | 231190:917856,917857,917858,917859 | 231191:917860,917861,917862,917863 | 231192:917864,917865,917866,917867 | 231193:917868,917869,917870,917871 | 231194:917872,917873,917874,917875 | 231195:917876,917877,917878,917879 | 231196:917880,917881,917882,917883 | 231197:917884,917885,917886,917887 | 231198:917888,917889,917890,917891 | 231199:917892,917893,917894,917895 | 231200:917896,917897,917898,917899 | 231201:917900,917901,917902,917903 | 231202:917904,917905,917906,917907 | 231203:917908,917909,917910,917911 | 231204:917912,917913,917914,917915 | 231205:917916,917917,917918,917919 | 231206:917920,917921,917922,917923 | 231207:917924,917925,917926,917927 | 231208:917928,917929,917930,917931 | 231209:917932,917933,917934,917935 | 231210:917936,917937,917938,917939 | 231211:917940,917941,917942,917943 | 231212:917944,917945,917946,917947 | 231213:917948,917949,917950,917951 | 231214:917952,917953,917954,917955 | 231215:917956,917957,917958,917959 | 231216:917960,917961,917962,917963 | 231217:917964,917965,917966,917967 | 231218:917968,917969,917970,917971 | 231219:917972,917973,917974,917975 | 231220:917976,917977,917978,917979 | 231221:917980,917981,917982,917983 | 231222:917984,917985,917986,917987 | 231223:917988,917989,917990,917991 | 231224:917992,917993,917994,917995 | 231225:917996,917997,917998,917999 | 231226:918000,918001,918002,918003 | 231227:918004,918005,918006,918007 | 231228:918008,918009,918010,918011 | 231229:918012,918013,918014,918015 | 231230:918016,918017,918018,918019 | 231231:918020,918021,918022,918023 | 231232:918024,918025,918026,918027 | 231233:918028,918029,918030,918031 | 231234:918032,918033,918034,918035 | 231235:918036,918037,918038,918039 | 231236:918040,918041,918042,918043 | 231237:918044,918045,918046,918047 | 231238:918048,918049,918050,918051 | 231239:918052,918053,918054,918055 | 231240:918056,918057,918058,918059 | 231241:918060,918061,918062,918063 | 231242:918064,918065,918066,918067 | 231243:918068,918069,918070,918071 | 231244:918072,918073,918074,918075 | 231245:918076,918077,918078,918079 | 231246:918080,918081,918082,918083 | 231247:918084,918085,918086,918087 | 231248:918088,918089,918090,918091 | 231249:918092,918093,918094,918095 | 231250:918096,918097,918098,918099 | 231251:918100,918101,918102,918103 | 231252:918104,918105,918106,918107 | 231253:918108,918109,918110,918111 | 231254:918112,918113,918114,918115 | 231255:918116,918117,918118,918119 | 231256:918120,918121,918122,918123 | 231257:918124,918125,918126,918127 | 231258:918128,918129,918130,918131 | 231259:918132,918133,918134,918135 | 231260:918136,918137,918138,918139 | 231261:918140,918141,918142,918143 | 231262:918144,918145,918146,918147\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"231183,231184,231185,231186,231187,231188,231189,231190,231191,231192,231193,231194,231195,231196,231197,231198,231199,231200,231201,231202,231203,231204,231205,231206,231207,231208,231209,231210,231211,231212,231213,231214,231215,231216,231217,231218,231219,231220,231221,231222,231223,231224,231225,231226,231227,231228,231229,231230,231231,231232,231233,231234,231235,231236,231237,231238,231239,231240,231241,231242,231243,231244,231245,231246,231247,231248,231249,231250,231251,231252,231253,231254,231255,231256,231257,231258,231259,231260,231261,231262\";\nWatuPROSettings[6520] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 6520;\t    \nWatuPRO.post_id = 46089;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.84843100 1778182331\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(6520);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\r\n<p>&nbsp;<\/p>\r\n<p>&nbsp;<\/p>\r\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[430,429],"tags":[3595,3603,8620,8619,14509],"class_list":["post-46089","post","type-post","status-publish","format-standard","hentry","category-cisa-certificaton","category-isaca","tag-cisa","tag-cisa-dumps","tag-cisa-exam-dumps","tag-cisa-free-dumps","tag-cisa-practice-exam"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/46089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=46089"}],"version-history":[{"count":3,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/46089\/revisions"}],"predecessor-version":[{"id":110528,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/46089\/revisions\/110528"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=46089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=46089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=46089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}