Isaca CISA - Certified Information Systems Auditor
Which of the following is MOST important with regard to an application development acceptance test?
Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
The PRIMARY advantage of object-oriented technology is enhanced:
An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Which of the following would be a result of utilizing a top-down maturity model process?
An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
An organizations audit charier PRIMARILY:
Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization's goals?
Which of the following strategies BEST optimizes data storage without compromising data retention practices?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
Which of the following is the BEST method to safeguard data on an organization's laptop computers?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
Secure code reviews as part of a continuous deployment program are which type of control?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
Which of the following is the BEST data integrity check?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
Which of the following BEST guards against the risk of attack by hackers?
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
Which of the following MOST effectively minimizes downtime during system conversions?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
Which of the following data would be used when performing a business impact analysis (BIA)?
Which of the following BEST indicates the effectiveness of an organization's risk management program?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST