Isaca CISA Practice Test - Questions Answers, Page 89
List of questions
Question 881
An IS auditor discovers that a developer has used the same key to grant access to multiple applications making calls to an application programming interface (API). Which of the following is the BEST recommendation to address this situation?
Question 882
In an area susceptible to unexpected increases in electrical power, which of the following would MOST effectively protect the system?
Question 883
An organization plans to centrally decommission end-of-life databases and migrate the data to the latest model of hardware. Which of the following BEST ensures data integrity is preserved during the migration?
Question 884
During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor's BEST course of action?
Question 885
During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?
Question 886
When planning a review of IT governance, an IS auditor is MOST likely to:
Question 887
Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?
Question 888
Which of the following would BEST prevent an arbitrary application of a patch?
Question 889
Which of the following would be MOST important to include in an IS audit report?
Question 890
At the end of each business day, a business-critical application generates a report of financial transac-tions greater than a certain value, and an employee then checks these transactions for errors. What type of control is in place?
Question