Isaca CISA Practice Test - Questions Answers, Page 38
List of questions
Related questions
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following should be the FIRST step in the incident response process for a suspected breach?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
A review of an organization's IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
Question