Isaca CISA Practice Test - Questions Answers, Page 60

List of questions
Question 591

An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?
Question 592

Which of the following would protect the confidentiality of information sent in email messages?
Question 593

Which of the following provides the MOST reliable method of preventing unauthonzed logon?
Question 594

An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?
Question 595

Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
Question 596

A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
Question 597

Which of the following is the PRIMARY reason to perform a risk assessment?
Question 598

Which of the following is an IS auditor's BEST approach when prepanng to evaluate whether the IT strategy supports the organization's vision and mission?
Question 599

A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?
Question 600

A firewall between internal network segments improves security and reduces risk by:
Question