Isaca CISA Practice Test - Questions Answers, Page 49
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 481
 
                            
                            
                                Which of the following provides a new IS auditor with the MOST useful information to evaluate overall IT performance?
Question 482
 
                            
                            
                                A disaster recovery plan (DRP) should include steps for:
Question 483
 
                            
                            
                                Which of the following is the BEST indication that there are potential problems within an organization's IT service desk function?
Question 484
 
                            
                            
                                While evaluating the data classification process of an organization, an IS auditor's PRIMARY focus should be on whether:
Question 485
 
                            
                            
                                An IS auditor is preparing a plan for audits to be carried out over a specified period. Which of the following activities should the IS auditor perform FIRST?
Question 486
 
                            
                            
                                When assessing the overall effectiveness of an organization's disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?
Question 487
 
                            
                            
                                In the development of a new financial application, the IS auditor's FIRST involvement should be in the:
Question 488
 
                            
                            
                                What is the MOST effective way to detect installation of unauthorized software packages by employees?
Question 489
 
                            
                            
                                Which of the following is MOST effective for controlling visitor access to a data center?
Question 490
 
                            
                            
                                Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question