Isaca CISA Practice Test - Questions Answers, Page 45
List of questions
Question 441
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
Question 442
The PRIMARY purpose of requiring source code escrow in a contractual agreement is to:
Question 443
Which of the following provides the MOST assurance of the integrity of a firewall log?
Question 444
Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD) policy to help prevent data leakage?
Question 445
Which of the following is the MOST appropriate control to ensure integrity of online orders?
Question 446
Which of the following provides the BEST evidence that a third-party service provider's information security controls are effective?
Question 447
Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
Question 448
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
Question 449
An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:
Question 450
Which of the following is the BEST indication of effective IT investment management?
Question