Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 113

Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?

A.

adequate measurement of key risk indicators (KRIS)

B.

Inadequate alignment of IT plans and business objectives

C.

Inadequate business impact analysis (BIA) results and predictions

D.

Inadequate measurement of key performance indicators (KPls)

Full Access
Question # 114

Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics

system?

A.

Hashing in-scope data sets

B.

Encrypting in-scope data sets

C.

Running and comparing the count function within the in-scope data sets

D.

Hosting a digital certificate for in-scope data sets

Full Access
Question # 115

Which of the following applications has the MOST inherent risk and should be prioritized during audit planning?

A.

A decommissioned legacy application

B.

An onsite application that is unsupported

C.

An outsourced accounting application

D.

An internally developed application

Full Access
Question # 116

Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?

A.

Threat modeling

B.

Concept mapping

C.

Prototyping

D.

Threat intelligence

Full Access
Question # 117

Which of the following is MOST important to review during the project initiation phase of developing and deploying a new application?

A.

User requirements

B.

User acceptance testing (UAT) plans

C.

Deployment plans

D.

Architectural design

Full Access
Question # 118

A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:

A.

the audit committee.

B.

audit management.

C.

auditee line management.

D.

the police.

Full Access
Question # 119

Which of the following BEST reflects a mature strategic planning process?

A.

Action plans with IT requirements built into all projects

B.

An IT strategic plan with specifications of controls and safeguards

C.

An IT strategic plan that supports the corporate strategy

D.

IT projects from the strategic plan are approved by management

Full Access
Question # 120

An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?

A.

Log feeds are uploaded via batch process.

B.

Completeness testing has not been performed on the log data.

C.

The log data is not normalized.

D.

Data encryption standards have not been considered.

Full Access
Go to page: