Isaca CISA Practice Test - Questions Answers, Page 124
List of questions
Question 1231
Which of the following is an IS auditor's BEST course of action when the auditee indicates that a corrective action plan for a high-risk finding will take longer than expected?
Question 1232
Which of the following is MOST important for an IS auditor to verify when reviewing the planned use of Benford's law as a data analytics technique to detect fraud in a set of credit card transactions?
Question 1233
Which of the following would BEST protect the confidentiality of sensitive data in transit between multiple offices?
Question 1234
An IS auditor has been asked to review the integrity of data transfer between two business-critical systems that have not been tested since implementation. Which of the following would provide the MOST useful information to plan an audit?
Question 1235
An IS auditor is reviewing an organization's system development life cycle (SDLC) Which of the following MUST be included in the review?
Question 1236
Which of the following BEST helps data loss prevention (DLP) tools detect movement of sensitive data m transit?
Question 1237
Which of the following is the MOST efficient way to identify fraudulent activity on a set of transactions?
Question 1238
Which of the following should be the PRIMARY concern for the it department head when implementing operational log management?
Question 1239
A business application's database is copied to a replication server within minutes. Which of the following processes taking place during business hours will MOST benefit from this architecture?
Question 1240
An organization is enhancing the security of a client-facing web application following a proposal to acquire personal information for a business purpose. Which of the following is MOST important to review before implementing this initiative?
Question