ISACA.CISA.v2020-09-15.q230

Exam Code:CISA
Exam Name:Certified Information Systems Auditor
Certification Provider:ISACA
Free Question Number:230
Version:v2020-09-15
Rating:
# of views:143
# of Questions views:4241
Start Practice Test

Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam! PrepAwayExam.com now offer the newest CISA exam dumps, the PrepAwayExam.com CISA exam questions have been updated and answers have been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine here:

Access Premium Version
(1035 Q&As Dumps, 40%OFF Special Discount: freecram)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Other Version
189 viewsISACA.CISA.v2020-09-07.q269
183 viewsISACA.CISA.v2020-08-13.q267
158 viewsISACA.CISA.v2020-07-31.q194
570 viewsISACA.CISA.v2020-02-05.q100
766 viewsISACA.CISA.v2019-05-09.q750
637 viewsISACA.CISA.v2019-02-23.q896
685 viewsISACA.CISA.v2018-10-27.q803
656 viewsISACA.CISA.v2018-09-19.q770
604 viewsISACA.Cisa.v2018-02-25.q1069
965 viewsISACA.CISA.v2017-11-28.q1100
Exam Question List
Question 1: Which of the following is the GREATEST risk posed by denial-...
Question 2: Which of the following controls will MOST effectively detect...
Question 3: Which of the following is the GREATEST concern with conducti...
Question 4: Which of the following would be an auditor's GREATEST concer...
Question 5: To preserve chain-of-custody following an internal server co...
Question 6: Which of the following should the IS auditor use to BEST det...
Question 7: ..risk that the IS auditor will not find an error that has o...
Question 8: Which of the following provides the BEST evidence of the eff...
Question 9: Which of the following is the BEST type of backup to minimiz...
Question 10: An organization uses two data centers. Which of the followin...
Question 11: Which of the following is the BEST way to control the concur...
Question 12: After an external IS audit, which of the following should be...
Question 13: While reviewing similar issues in an organization s help des...
Question 14: Spreadsheets are used to calculate project cost estimates To...
Question 15: When reviewing a disaster recovery plan (DRP) an IS auditor ...
Question 16: An IS auditor has discovered that a cloud-based application ...
Question 17: During an audit, which of the following would be MOST helpfu...
Question 18: Which of the following should be reviewed as part of a data ...
Question 19: During an audit of a mission-critical system hosted in an ou...
Question 20: Documentation of workaround processes to keep a business fun...
Question 21: An IS auditor conducts a review of a third-party vendor's re...
Question 22: An IS auditor learns a server administration team regularly ...
Question 23: The BEST way to prevent fraudulent payments is to implement ...
Question 24: Which of the following scenarios would enable a forensic inv...
Question 25: The BEST method an organization can employ to align its busi...
Question 26: Which of the following should be an IS auditor's PRIMARY foc...
Question 27: Which type of risk would MOST influence the selection of a s...
Question 28: mission-critical applications with a low recovery time objec...
Question 29: Which of the following could be determined by an entity-rela...
Question 30: The MAJOR reason for segregating test programs from producti...
Question 31: While reviewing an organization s business continuity plan (...
Question 32: The maturity level of an organization s problem management s...
Question 33: An IS auditor is involved in the user testing phase of a dev...
Question 34: An IS auditor discovered abnormalities in a monthly report g...
Question 35: During the planning stage of compliance audit, an IS auditor...
Question 36: Due to cost restraints, a company defers the replacement of ...
Question 37: What is an IS auditor's BEST recommendation for management i...
Question 38: An is auditor discovers a recurring software control process...
Question 39: A CIO has asked an IS to implement several security controls...
Question 40: An organization allows its employees to use personal mobile ...
Question 41: Both statistical and nonstatistical sampling techniques:...
Question 42: Which of the following features can be provided only by asym...
Question 43: During a network security review the system log indicates an...
Question 44: During an ERP post-implementation review, it was noted that ...
Question 45: Which of the following procedures should be implemented prio...
Question 46: An IS auditor has been asked to advise on the design and imp...
Question 47: Which of the following is MOST important for an IS auditor t...
Question 48: Which of the following would be MOST important for an IS aud...
Question 49: Which of the following is the MOST likely cause of a success...
Question 50: An organization has purchased a replacement mainframe comput...
Question 51: Before concluding that internal controls can be relied upon,...
Question 52: An IS auditor has been asked to audit the proposed acquisiti...
Question 53: Which of the following is the BEST indication of an effectiv...
Question 54: Which of the following is MOST likely to be prevented by a f...
Question 55: An organization considers implementing a system that uses a ...
Question 56: While reviewing the project plan for a new system prior to g...
Question 57: Which of the following is MOST likely to enable a hacker to ...
Question 58: Which of the following is MOST important to consider when cr...
Question 59: Which of the following controls is MOST appropriate against ...
Question 60: Which of the following should be the PRIMARY consideration f...
Question 61: Which of the following is a key success factor for implement...
Question 62: IT service engineers at a large organization are unable to e...
Question 63: An organization has implemented a control to help ensure dat...
Question 64: An IS auditor finds that periodic reviews of read-only users...
Question 65: The scheduling of audit follow-ups should be based PRIMARILY...
Question 66: The quality assurance (QA) function should be prevented from...
Question 67: An IS auditor observes an organization is performing data ba...
Question 68: An IS audit manager finds that data manipulation logic devel...
Question 69: Which of the following provides an IS auditor the MOST assur...
Question 70: Which of the following is the BEST detective control for a j...
Question 71: Which of the following is the MOST effective control to ensu...
Question 72: Which of the following should be of concern to an IS auditor...
Question 73: Which of the following is MOST likely to result from complia...
Question 74: What is the PRIMARY benefit of prototyping as a method of sy...
Question 75: A sales representative is reviewing the organization's feedb...
Question 76: Management decided to accept the residual risk of an audit f...
Question 77: Loss-site scripting (XSS) attacks are BEST prevented through...
Question 78: Which of the following will BEST protect the confidentiality...
Question 79: Which of the following is the PRIMARY role of an IS auditor ...
Question 80: To ensure efficient and economic use of limited resources in...
Question 81: To create a digital signature in a message using asymmetric ...
Question 82: Which of the following is MOST important to ensure when plan...
Question 83: The IS auditor's PRIMARY role in control self-assessment (CS...
Question 84: Which of the following BEST provides continuous availability...
Question 85: Digital signatures are an effective control method for infor...
Question 86: An organization has established hiring policies and procedur...
Question 87: A typical network architecture used for e-commerce, a load b...
Question 88: When designing metrics for information security, the MOST im...
Question 89: Which of the following provides the GREATEST assurance that ...
Question 90: During audit planning, an IS auditor walked through the desi...
Question 91: An IS auditor is evaluating the log management system for an...
Question 92: An IS auditor has found that a vendor has gone out of busine...
Question 93: Which of the following is a detective control?...
Question 94: To confirm integrity for a hashed message, the receiver shou...
Question 95: An IS auditor can BEST help management fulfill risk manageme...
Question 96: An organization has implemented an automated match between p...
Question 97: Which of the following IS audit findings should be of GREATE...
Question 98: An intruder accesses an application server and makes changes...
Question 99: A vulnerability in which of the following virtual systems wo...
Question 100: Which of the following methodologies is MOST appropriate to ...
Question 101: An organization allows employees to use personally owned mob...
Question 102: Which of the following would an IS auditor recommend as the ...
Question 103: Which of the following is MOST important for an IS auditor t...
Question 104: Which of the following is a reason for implementing a decent...
Question 105: An organization was recently notified by its regulatory body...
Question 106: Which of the following group is MOST likely responsible for ...
Question 107: Capacity management enables organizations to:...
Question 108: Which of the following is the GREATEST risk resulting from c...
Question 109: Which of the following is corrective control?...
Question 110: A PRIMARY benefit derived by an organization employing contr...
Question 111: Due to the small size of the payroll department, an organiza...
Question 112: Which of the following is BEST addressed when using a timest...
Question 113: An IS auditor has completed a review of an outsourcing agree...
Question 114: Which of the following is a directive control?...
Question 115: Which of the following is the BEST way to facilitate proper ...
Question 116: Which of the following is MOST important for an IS auditor t...
Question 117: Which of the following is the BEST reason for an organizatio...
Question 118: When introducing a maturity model to the IT management proce...
Question 119: Nonrepudiation of the client for e-commerce transactions is ...
Question 120: What is the MOST important business concern when an organiza...
Question 121: A company has implemented an IT segregation of duties policy...
Question 122: An organization offers an online information security awaren...
Question 123: The demilitarized zone (DMZ) is the part of a network where ...
Question 124: Which of the following is MOST important to include in a bus...
Question 125: At a project steering committee meeting, it is stated that a...
Question 126: An IS auditor concludes that a local area network's (LAN's) ...
Question 127: Which of the following would BEST indicate the effectiveness...
Question 128: An employee transfers from an organization's risk management...
Question 129: Which of the following should be an IS auditor's PRIMARY con...
Question 130: A review of an organization's IT portfolio revealed several ...
Question 131: During an audit, it is discovered that several suppliers wit...
Question 132: During an audit of a data center, an IS auditor's BEST way t...
Question 133: A large insurance company is about to replace a major financ...
Question 134: Which of the following entities is BEST suited to define the...
Question 135: Which of the following is the BEST approach to identify whet...
Question 136: Which of the following BEST determines if a batch update job...
Question 137: On a daily basis, an in-house development team moves duplica...
Question 138: Which of the following controls should be implemented to BES...
Question 139: Which of the following should be of GREATEST concern to an I...
Question 140: MOST critical security weakness of a packet level firewall i...
Question 141: A user of a telephone banking system has forgotten his perso...
Question 142: An auditor is creating an audit program in which the objecti...
Question 143: Which of the following is the BEST source of information whe...
Question 144: An organization implements a data loss prevention tool as a ...
Question 145: An organization wants to test business continuity using a sc...
Question 146: Software quality assurance (QA) reviews are planned as part ...
Question 147: The BEST data backup strategy for mobile users is to:...
Question 148: Which of the following controls would BEST ensure that payro...
Question 149: To BEST evaluate the effectiveness of a disaster recovery pl...
Question 150: The GREATEST risk of database renormalization is:...
Question 151: An employee loses a mobile device resulting in loss of sensi...
Question 152: The objectives of business process improvement should PRIMAR...
Question 153: Which of the following protects against the impact of tempor...
Question 154: The grants management system is used to calculate grant paym...
Question 155: Which of the following is the GREATEST concern associated wi...
Question 156: An organization has installed blade server technology in its...
Question 157: Which of the following is the MOST important consideration w...
Question 158: Which of the following should be of MOST concern to an IS au...
Question 159: Which of the following cloud deployment models would BEST me...
Question 160: While performing a risk-based audit, which of the following ...
Question 161: Which of the following a the MOST important prerequisite for...
Question 162: An IS auditor notes that the anticipated benefits from an on...
Question 163: An IS auditor has assessed a payroll service provider's secu...
Question 164: To help ensure the organization s information assets are ade...
Question 165: When engaging services from external auditors, which of the ...
Question 166: internal IS auditor recommends that incoming accounts payabl...
Question 167: Which of the following would be the PRIMARY benefit of repla...
Question 168: An organization's IT security policy requires annual securit...
Question 169: During a vulnerability assessment, an IS auditor finds a hig...
Question 170: An IS auditor is mapping controls to risk for an accounts pa...
Question 171: A 5 year audit plan provides for general audits every year a...
Question 172: An IS auditor is analysing a sample of assesses recorded on ...
Question 173: Which of the following should be of GREATEST concern to an I...
Question 174: Which of the following would be the MOST appropriate reason ...
Question 175: Which of the following is the MOST important requirement for...
Question 176: What is the FIRST step an auditor should take when beginning...
Question 177: The MOST efficient way to confirm that an ERP system being i...
Question 178: An IS auditor conducting audit follow-up activities learns t...
Question 179: Which of the following should be reviewed FIRST when plannin...
Question 180: An IS auditor is conducting a review of an organization s in...
Question 181: Which of the following IS audit recommendations would BEST h...
Question 182: Which of the following components of a scheduling tool BEST ...
Question 183: Which of the following would BEST detect logic bombs in new ...
Question 184: Which of the following are BEST suited for continuous auditi...
Question 185: When determining the specifications for a server supporting ...
Question 186: Which of the following is the PRIMARY benefit of including I...
Question 187: A legacy application is running on an operating system that ...
Question 188: Which of the following would be MOST helpful when assessing ...
Question 189: The risk that the IS auditor will not find an error that has...
Question 190: After the release of an application system, an IS auditor wa...
Question 191: Which of the following would BEST detect that a distributed-...
Question 192: The use of the Transport Layer Security (TLS) protocol enabl...
Question 193: An IS auditor is reviewing the upgrading of an operating sys...
Question 194: An organization is in the process of deciding whether to all...
Question 195: Which of the following activities is MOST important to consi...
Question 196: ..control that MOST effectively addresses the risk of piggyb...
Question 197: Which of the following sampling techniques is commonly used ...
Question 198: Which of the following would be the MOST likely reason for a...
Question 199: An IS auditor auditing the effectiveness of utilizing a hot ...
Question 200: As part of business continuity planning. Which of the follow...
Question 201: An IT governance framework provides an organization with:...
Question 202: An IS auditor has completed a service level management audit...
Question 203: Which of the following a recent internal data breach, an IS ...
Question 204: Which of the following management decisions presents the GRE...
Question 205: Which of the following is a prerequisite to help ensure that...
Question 206: Following a security breach, in which a hacker exploited a w...
Question 207: What is the GREASTEST concern for an IS auditory reviewing c...
Question 208: Which of the following findings should be of MOST concern to...
Question 209: As part of an IS audit, the auditor notes the practices list...
Question 210: A database administrator (DBA) extracts a user listing for a...
Question 211: Inherent risk rating are determined by assessing the impact ...
Question 212: An organization using instant messaging to communicate with ...
Question 213: Which of the following is the PRIMARY advantage of single si...
Question 214: An organization is replacing its financial processing system...
Question 215: An organization has decided to migrate payroll processing to...
Question 216: Which of the following is an example of audit risk?...
Question 217: When conducting a requirements analysis for a project, the B...
Question 218: Which of the following is the MOST significant concerns when...
Question 219: An airlines online booking system uses an automated script t...
Question 220: During a review of an application system, an IS auditor iden...
Question 221: Which of the following should an IS auditor be MOST concerne...
Question 222: Intrusion detection systems (IDSs) can:...
Question 223: An organization is considering replacing physical backup tap...
Question 224: When auditing a quality assurance plan, an IS auditor should...
Question 225: An IS auditor is a member of an application development team...
Question 226: An IS auditor plans to review all access attempts to a video...
Question 227: During business process reengineering (BPR) of a bank's tell...
Question 228: Which of the following would BEST assist senior management i...
Question 229: Due to the increasing size of a database, user access times ...
Question 230: Which of the following is MOST important when an incident ma...