Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 409

Which of the following controls is BEST implemented through system configuration?

    Network user accounts for temporary workers expire after 90 days.

    Application user access is reviewed every 180 days for appropriateness.

    Financial data in key reports is traced to source systems for completeness and accuracy.

A.

Computer operations personnel initiate batch processing jobs daily.

Full Access
Question # 410

Which of the following BEST enables an IS auditor to prioritize financial reporting spreadsheets for an end-user computing (EUC) audit?

A.

Understanding the purpose of each spreadsheet

B.

Identifying the spreadsheets with built-in macros

C.

Reviewing spreadsheets based on file size

D.

Ascertaining which spreadsheets are most frequently used

Full Access
Question # 411

To help determine whether a controls-reliant approach to auditing financial systems in a company should be used, which sequence of IS audit work is MOST appropriate?

A.

Review of the general IS controls followed by a review of the application controls

B.

Detailed examination of financial transactions followed by review of the general ledger

C.

Review of major financial applications followed by a review of IT governance processes

D.

Review of application controls followed by a test of key business process controls

Full Access
Question # 412

Which of the following should be of GREATEST concern to an IS auditor reviewing project documentation for a client relationship management (CRM) system migration project?

A.

The technical migration is planned for a holiday weekend and end users may not be available.

B.

Five weeks prior to the target date, there are still numerous defects in the printing functionality.

C.

A single implementation phase is planned and the legacy system will be immediately decommissioned.

D.

Employees are concerned that data representation in the new system is completely different from the old system.

Full Access
Question # 413

During the course of fieldwork, an internal IS auditor observes a critical vulnerability within a newly deployed application. What is the auditor's BEST course of action?

A.

Document the finding in the report.

B.

Identify other potential vulnerabilities.

C.

Notify IT management.

D.

Report the finding to the external auditors.

Full Access
Question # 414

Which of the following is the GREATEST risk associated with lack of IT involvement in the organization's strategic planning initiatives?

A.

Business strategies may not align with IT capabilities.

B.

Business strategies may not consider emerging technologies.

C.

IT strategies may not align with business strategies.

D.

IT strategic goals may not be considered by the business.

Full Access
Question # 415

An IS auditor is reviewing a medical device that is attached to a patient’s body, which automatically takes and uploads measurements to a cloud server. Treatment may be updated based on the measurements. Which of the following should be the auditor's PRIMARY focus?

A.

Physical access controls on the device

B.

Security and quality certification of the device

C.

Device identification and authentication

D.

Confirmation that the device is regularly updated

Full Access
Question # 416

Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?

A.

Timely audit execution

B.

Effective allocation of audit resources

C.

Reduced travel and expense costs

D.

Effective risk mitigation

Full Access
Go to page: