Isaca CISA Practice Test - Questions Answers, Page 59
List of questions
Question 581
During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?
Question 582
Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?
Question 583
Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
Question 584
When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?
Question 585
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
Question 586
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''
Question 587
Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?
Question 588
An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS
Question 589
A database administrator (DBA) should be prevented from having end user responsibilities:
Question 590
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
Question