Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 369

The GREATEST concern for an IS auditor reviewing vulnerability assessments by the auditee would be if the assessments are:

A.

Conducted once per year just before system audits are scheduled.

B.

Conducted by the internal technical team instead of external experts.

C.

Performed for critical systems, not for the entire infrastructure.

D.

Performed using open-source testing tools.

Full Access
Question # 370

Which of the following should be an IS auditor's PRIMARY consideration when determining which issues to include in an audit report?

A.

Professional skepticism

B.

Management's agreement

C.

Materiality

D.

Inherent risk

Full Access
Question # 371

Which of the following should be the PRIMARY focus when communicating an IS audit issue to management?

A.

The risk to which the organization is exposed due to the issue

B.

The nature, extent, and timing of subsequent audit follow-up

C.

How the issue was found and who bears responsibility

D.

A detailed solution for resolving the issue

Full Access
Question # 372

Which of the following is the BEST way to prevent social engineering incidents?

A.

Ensure user workstations are running the most recent version of antivirus software.

B.

Maintain an onboarding and annual security awareness program.

C.

Include security responsibilities in job descriptions and require signed acknowledgment.

D.

Enforce strict email security gateway controls.

Full Access
Question # 373

Which of the following BEST enables an IS auditor to confirm the batch processing to post transactions from an input source is successful?

A.

Error log review

B.

Total number of items

C.

Hash totals

D.

Aggregate monetary amount

Full Access
Question # 374

Attribute sampling is BEST suited to estimate:

A.

the true monetary value of a population.

B.

the total error amount in the population.

C.

the degree of compliance with approved procedures

D.

standard deviation from the mean.

Full Access
Question # 375

Which of the following should be the GREATEST concern to an IS auditor reviewing the information security framework of an organization?

A.

The information security policy has not been updated in the last two years.

B.

Senior management was not involved in the development of the information security policy.

C.

A list of critical information assets was not included in the information security policy.

D.

The information security policy is not aligned with regulatory requirements.

Full Access
Question # 376

Which of the following is MOST helpful for evaluating benefits realized by IT projects?

A.

Benchmarking IT project management practices with industry peers

B.

Evaluating compliance with key security controls

C.

Comparing planned versus actual return on investment (ROI)

D.

Reviewing system development life cycle (SDLC) processes

Full Access
Go to page: