Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 385

An organization produces control reports with a desktop application that accesses data in the central production database. Which of the following would give an IS auditor concern about the reliability of these reports?

A.

The reports are printed by the same person who reviews them.

B.

The reports are available to all end users.

C.

The report definitions file is not included in routine backups.

D.

The report definitions can be modified by end users.

Full Access
Question # 386

An IS auditor has been asked to provide support to the control self-assessment (CSA) program. Which of the following BEST represents the scope of the auditor’s role in the program?

A.

The auditor should act as a program facilitator.

B.

The auditor should focus on improving process productivity

C.

The auditor should perform detailed audit procedures

D.

The auditor's presence replaces the audit responsibilities of other team members.

Full Access
Question # 387

Which of the following staff should an IS auditor interview FIRST to obtain a general overview of the various technologies used across different programs?

A.

Technical architect

B.

Enterprise architect

C.

Program manager

D.

Solution architect

Full Access
Question # 388

An IS auditor is reviewing how password resets are performed for users working remotely. Which type of documentation should be requested to understand the detailed steps required for this activity?

A.

Standards

B.

Guidelines

C.

Policies

D.

Procedures

Full Access
Question # 389

An organization wants to use virtual desktops to deliver corporate applications to its end users. Which of the following should an IS auditor recommend to prevent domain name system (DNS) poisoning in their cloud environment?

A.

Enable verification of administrators to protect against impersonators modifying DNS tables.

B.

Configure ONS servers to create appropriately sized responses to domain resolution requests.

C.

Ensure DNS changes are propagated across all servers in the organization's cloud account.

D.

Provide corporate laptops to end users with built-in antivirus tools that scan for DNS vulnerabilities.

Full Access
Question # 390

Which of the following is MOST important for an IS auditor to verify when evaluating tne upgrade of an organization's enterprise resource planning (ERP) application?

A.

Application related documentation was updated to reflect the changes in the new version

B.

Security configurations were appropriately applied to the new version

C.

Users were provided security training on the new version

D.

Lessons teamed analysis was documented after the upgrade

Full Access
Question # 391

An organization is establishing a steering committee for the implementation of a new enterprise resource planning (ERP) system that uses Agile project management methodology. What is the MOST important criterion for the makeup of this committee?

A.

Senior management representation

B.

Ability to meet the time commitment required

C.

Agile project management experience

D.

ERP implementation experience

Full Access
Question # 392

When reviewing an organization’s enterprise architecture (EA), which of the following is an IS auditor MOST likely to find within the EA documentation?

A.

Contact information for key resources within the IT department

B.

Detailed encryption standards

C.

Roadmaps showing the evolution from current state to future state

D.

Protocols used to communicate between systems

Full Access
Go to page: