Isaca CISA Practice Test - Questions Answers, Page 64
List of questions
Related questions
Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?
An IS auditor is asked to review an organization's technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
Which of the following is the BEST way to detect unauthorized copies of licensed software on systems?
Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?
During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor's BEST course of action?
An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?
Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?
The use of control totals satisfies which of the following control objectives?
A finance department has a multi-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger. and in year one, the system version upgrade will be applied. Which of the following should be the PRIMARY focus of the IS auditor reviewing the first year of the project?
Question