ExamGecko
Question list
Search
Search

Related questions

Question 158 - CISA discussion

Report
Export

Which of the following is the MOST effective way for an organization to project against data loss?

A.
Limit employee internet access.
Answers
A.
Limit employee internet access.
B.
Implement data classification procedures.
Answers
B.
Implement data classification procedures.
C.
Review firewall logs for anomalies.
Answers
C.
Review firewall logs for anomalies.
D.
Conduct periodic security awareness training.
Answers
D.
Conduct periodic security awareness training.
Suggested answer: D

Explanation:

Data loss can occur due to various reasons, such as accidental deletion, hardware failure, malware infection, theft, or unauthorized access. Data classification procedures can help to identify and protect sensitive data, but they are not sufficient to prevent data loss. The most effective way to protect against data loss is to conduct periodic security awareness training for employees, which can educate them on the importance of data security, the best practices for data handling and storage, and the common threats and risks to data.

Using a continuous auditing module is an audit procedure that would provide the best assurance that an application program is functioning as designed. A continuous auditing module is a software tool that performs automated and continuous testing and monitoring of an application program's inputs, outputs, processes, and controls. A continuous auditing module can help to verify the accuracy, completeness, validity, reliability, and timeliness of the application program's data and transactions. A continuous auditing module can also help to identify and report any errors, anomalies, deviations, or exceptions in the application program's performance or compliance.

The other options are not as effective or relevant as using a continuous auditing module for providing assurance that an application program is functioning as designed. Interviewing business management is a technique for obtaining information and opinions from the users or owners of the application program, but it does not directly test or verify the functionality or quality of the application program. Confirming accounts is a technique for verifying the existence and accuracy of account balances or transactions, but it does not necessarily reflect the design or operation of the application program. Reviewing program documentation is a technique for examining the specifications, requirements, and procedures of the application program, but it does not provide evidence of the actual implementation or execution of the application program.

ISACA, CISA Review Manual, 27th Edition, 2019, p.2361

Continuous audit and monitoring - PwC2

asked 18/09/2024
jonathan Smallwood
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first