Isaca CISA Practice Test - Questions Answers, Page 86

List of questions
Question 851

The process of applying a hash function to a message and obtaining and ciphering a digest refers to:
Question 852

An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
Question 853

An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process. Which of the following is the MOST appropriate population to sample from when testing for remediation?
Question 854

An organization has both an IT strategy committee and an IT steering committee. When reviewing the minutes of the IT steering committee, an IS auditor would expect to find that the committee:
Question 855

An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated. Which of the following should be of
MOST concern?
Question 856

An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
Question 857

Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's job scheduling practices?
Question 858

Which of the following is the GREATEST impact as a result of the ongoing deterioration of a detective control?
Question 859

Which of the following is the BEST way to ensure a vendor complies with system security requirements?
Question 860

What is the PRIMARY reason to adopt a risk-based IS audit strategy?
Question