Isaca CISA Practice Test - Questions Answers, Page 124
List of questions
Question 1231

Which of the following is an IS auditor's BEST course of action when the auditee indicates that a corrective action plan for a high-risk finding will take longer than expected?
Question 1232

Which of the following is MOST important for an IS auditor to verify when reviewing the planned use of Benford's law as a data analytics technique to detect fraud in a set of credit card transactions?
Question 1233

Which of the following would BEST protect the confidentiality of sensitive data in transit between multiple offices?
Question 1234

An IS auditor has been asked to review the integrity of data transfer between two business-critical systems that have not been tested since implementation. Which of the following would provide the MOST useful information to plan an audit?
Question 1235

An IS auditor is reviewing an organization's system development life cycle (SDLC) Which of the following MUST be included in the review?
Question 1236

Which of the following BEST helps data loss prevention (DLP) tools detect movement of sensitive data m transit?
Question 1237

Which of the following is the MOST efficient way to identify fraudulent activity on a set of transactions?
Question 1238

Which of the following should be the PRIMARY concern for the it department head when implementing operational log management?
Question 1239

A business application's database is copied to a replication server within minutes. Which of the following processes taking place during business hours will MOST benefit from this architecture?
Question 1240

An organization is enhancing the security of a client-facing web application following a proposal to acquire personal information for a business purpose. Which of the following is MOST important to review before implementing this initiative?
Question