Isaca CISA Practice Test - Questions Answers, Page 45

List of questions
Question 441

Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
Question 442

The PRIMARY purpose of requiring source code escrow in a contractual agreement is to:
Question 443

Which of the following provides the MOST assurance of the integrity of a firewall log?
Question 444

Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD) policy to help prevent data leakage?
Question 445

Which of the following is the MOST appropriate control to ensure integrity of online orders?
Question 446

Which of the following provides the BEST evidence that a third-party service provider's information security controls are effective?
Question 447

Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
Question 448

An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
Question 449

An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:
Question 450

Which of the following is the BEST indication of effective IT investment management?
Question