Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 33

A computer forensic audit is MOST relevant in which of the following situations?

A.

Inadequate controls in the IT environment

B.

Mismatches in transaction data

C.

Missing server patches

D.

Data loss due to hacking of servers

Full Access
Question # 34

Which of the following is the BEST way to minimize sampling risk?

A.

Use a larger sample size

B.

Perform statistical sampling

C.

Perform judgmental sampling

D.

Enhance audit testing procedures

Full Access
Question # 35

Which of the following is the GREATEST advantage of outsourcing the development of an e-banking solution when in-house technical expertise is not available?

A.

Lower start-up costs

B.

Reduced risk of system downtime

C.

Direct oversight of risks

D.

Increased ability to adapt the system

Full Access
Question # 36

Which of the following controls is MOST important for ensuring the integrity of system interfaces?

A.

Periodic audits

B.

File counts

C.

File checksums

D.

IT operator monitoring

Full Access
Question # 37

A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fixhas been implemented, what should the IS auditor recommend to validate the interface is working in the future?

A.

Perform periodic reconciliations.

B.

Ensure system owner sign-off for the system fix.

C.

Conduct functional testing.

D.

Improve user acceptance testing (UAT).

Full Access
Question # 38

An organization uses public key infrastructure (PKI) to provide email security. Which of the following would be the MOST efficient method to determine whether email messages have been modified in transit?

A.

The message is encrypted using a symmetric algorithm.

B.

The message is sent using Transport Layer Security (TLS) protocol.

C.

The message is sent along with an encrypted hash of the message.

D.

The message is encrypted using the private key of the sender.

Full Access
Question # 39

During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?

A.

System administrators should ensure consistency of assigned rights.

B.

IT security should regularly revoke excessive system rights.

C.

Human resources (HR) should delete access rights of terminated employees.

D.

Line management should regularly review and request modification of access rights

Full Access
Question # 40

An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization's payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management

experience. What is the BEST course of action?

A.

Transfer the assignment to a different audit manager despite lack of IT project management experience.

B.

Outsource the audit to independent and qualified resources.

C.

Manage the audit since there is no one else with the appropriate experience.

D.

Have a senior IS auditor manage the project with the IS audit manager performing final review.

Full Access
Go to page: