Isaca CISA Practice Test - Questions Answers, Page 108
List of questions
Question 1071

An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
Question 1072

An IT strategic plan that BEST leverages IT in achieving organizational goals will include:
Question 1073

An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
Question 1074

A global organization's policy states that all workstations must be scanned for malware each day. Which of the following would provide an IS auditor with the BEST evidence of continuous compliance with this policy?
Question 1075

The PRIMARY objective of a control self-assessment (CSA) is to:
Question 1076

If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
Question 1077

Which of the following is the MOST important consideration for a contingency facility?
Question 1078

A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
Question 1079

Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
Question 1080

Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?
Question