Isaca CISA Practice Test - Questions Answers, Page 89

List of questions
Question 881

An IS auditor discovers that a developer has used the same key to grant access to multiple applications making calls to an application programming interface (API). Which of the following is the BEST recommendation to address this situation?
Question 882

In an area susceptible to unexpected increases in electrical power, which of the following would MOST effectively protect the system?
Question 883

An organization plans to centrally decommission end-of-life databases and migrate the data to the latest model of hardware. Which of the following BEST ensures data integrity is preserved during the migration?
Question 884

During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor's BEST course of action?
Question 885

During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?
Question 886

When planning a review of IT governance, an IS auditor is MOST likely to:
Question 887

Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?
Question 888

Which of the following would BEST prevent an arbitrary application of a patch?
Question 889

Which of the following would be MOST important to include in an IS audit report?
Question 890

At the end of each business day, a business-critical application generates a report of financial transac-tions greater than a certain value, and an employee then checks these transactions for errors. What type of control is in place?
Question