Isaca CISA Practice Test - Questions Answers, Page 60
List of questions
Related questions
An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?
Which of the following would protect the confidentiality of information sent in email messages?
Which of the following provides the MOST reliable method of preventing unauthonzed logon?
An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?
Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
Which of the following is the PRIMARY reason to perform a risk assessment?
Which of the following is an IS auditor's BEST approach when prepanng to evaluate whether the IT strategy supports the organization's vision and mission?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?
A firewall between internal network segments improves security and reduces risk by:
Question