Isaca CISA Practice Test - Questions Answers, Page 59

List of questions
Question 581

During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?
Question 582

Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?
Question 583

Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
Question 584

When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?
Question 585

A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
Question 586

Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''
Question 587

Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?
Question 588

An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS
Question 589

A database administrator (DBA) should be prevented from having end user responsibilities:
Question 590

An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
Question