Isaca CISA Practice Test - Questions Answers, Page 45
List of questions
Related questions
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
The PRIMARY purpose of requiring source code escrow in a contractual agreement is to:
Which of the following provides the MOST assurance of the integrity of a firewall log?
Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD) policy to help prevent data leakage?
Which of the following is the MOST appropriate control to ensure integrity of online orders?
Which of the following provides the BEST evidence that a third-party service provider's information security controls are effective?
Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:
Which of the following is the BEST indication of effective IT investment management?
Question