Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 153

Which of the following should be an IS auditor's PRIMARY consideration when determining which issues to include in an audit report?

A.

Professional skepticism

B.

Management's agreement

C.

Materiality

D.

Inherent risk

Full Access
Question # 154

Which of the following is the PRIMARY reason an IS auditor would recommend offsite backups although critical data is already on a redundant array of inexpensive disks (RAID)?

A.

Disks of the array cannot be hot-swapped for quick recovery.

B.

The array cannot offer protection against disk corruption.

C.

The array relies on proper maintenance.

D.

The array cannot recover from a natural disaster.

Full Access
Question # 155

A steering committee established to oversee an organization's digital transformation program is MOSTlikely to be involved with which of the following activities?

A.

Preparing project status reports

B.

Designing interface controls

C.

Reviewing escalated project issues

D.

Documenting requirements

Full Access
Question # 156

Which of the following BEST indicates to an IS auditor that an organization handles emergency changes appropriately and transparently?

A.

The application operations manual contains procedures to ensure emergency fixes do not compromise system integrity.

B.

Special logon IDs are used to grant programmers permanent access to the production environment.

C.

Change management controls are retroactively applied.

D.

Emergency changes are applied to production libraries immediately.

Full Access
Question # 157

An organization's sensitive data is stored in a cloud computing environment and is encrypted. Which of the following findings should be of GREATEST concern to an IS auditor?

A.

The encryption keys are not kept under dual control.

B.

The cloud vendor does not have multi-regional presence.

C.

Symmetric keys are used for encryption.

D.

Data encryption keys are accessible to the service provider.

Full Access
Question # 158

Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?

A.

Timely audit execution

B.

Effective allocation of audit resources

C.

Reduced travel and expense costs

D.

Effective risk mitigation

Full Access
Question # 159

What is the MOST effective way to manage contractors' access to a data center?

A.

Badge identification worn by visitors

B.

Escort requirement for visitor access

C.

Management approval of visitor access

D.

Verification of visitor identification

Full Access
Question # 160

A checksum is classified as which type of control?

A.

Corrective control

B.

Administrative control

C.

Detective control

D.

Preventive control

Full Access
Go to page: