Isaca CISA Practice Test - Questions Answers, Page 86
List of questions
Related questions
The process of applying a hash function to a message and obtaining and ciphering a digest refers to:
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process. Which of the following is the MOST appropriate population to sample from when testing for remediation?
An organization has both an IT strategy committee and an IT steering committee. When reviewing the minutes of the IT steering committee, an IS auditor would expect to find that the committee:
An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated. Which of the following should be of
MOST concern?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's job scheduling practices?
Which of the following is the GREATEST impact as a result of the ongoing deterioration of a detective control?
Which of the following is the BEST way to ensure a vendor complies with system security requirements?
What is the PRIMARY reason to adopt a risk-based IS audit strategy?
Question