Isaca CISA Practice Test - Questions Answers, Page 93
List of questions
Related questions
Which of the following would be of GREATEST concern to an IS auditor reviewing the resiliency of an organizational network that has two internet connections?
An IS auditor wants to inspect recent events in a system to observe failed authentications and password changes. Which of the following is the MOST appropriate method to use for this purpose?
How is nonrepudiation supported within a public key infrastructure (PKI) environment?
Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?
Which of the following is the GREATEST risk of project dashboards being set without sufficiently defined criteria?
Which of the following should an IS auditor recommend be done FIRST when an organization is planning to implement an IT compliance program?
An IS auditor has been asked to provide support to the control self-assessment (CSA) program. Which of the following BEST represents the scope of the auditor's role in the program?
Which of the following is a PRIMARY function of an intrusion detection system (IDS)?
Who should be the FIRST to evaluate an audit report prior to issuing it to the project steering committee?
An IS auditor is reviewing database fields updated in real-time and displayed through other applications in multiple organizational functions. When validating business approval for these various use cases, which of the following sources of information would be the BEST starting point?
Question