Isaca CISA Practice Test - Questions Answers, Page 89
List of questions
Related questions
An IS auditor discovers that a developer has used the same key to grant access to multiple applications making calls to an application programming interface (API). Which of the following is the BEST recommendation to address this situation?
In an area susceptible to unexpected increases in electrical power, which of the following would MOST effectively protect the system?
An organization plans to centrally decommission end-of-life databases and migrate the data to the latest model of hardware. Which of the following BEST ensures data integrity is preserved during the migration?
During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor's BEST course of action?
During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?
When planning a review of IT governance, an IS auditor is MOST likely to:
Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?
Which of the following would BEST prevent an arbitrary application of a patch?
Which of the following would be MOST important to include in an IS audit report?
At the end of each business day, a business-critical application generates a report of financial transac-tions greater than a certain value, and an employee then checks these transactions for errors. What type of control is in place?
Question