ISACA.CISA.v2020-10-23.q332

Exam Code:CISA
Exam Name:Certified Information Systems Auditor
Certification Provider:ISACA
Free Question Number:332
Version:v2020-10-23
Rating:
# of views:243
# of Questions views:7395
Start Practice Test

Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam! PrepAwayExam.com now offer the newest CISA exam dumps, the PrepAwayExam.com CISA exam questions have been updated and answers have been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine here:

Access Premium Version
(745 Q&As Dumps, 40%OFF Special Discount: freecram)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Other Version
318 viewsISACA.CISA.v2020-10-27.q362
206 viewsISACA.CISA.v2020-10-13.q299
270 viewsISACA.CISA.v2020-10-09.q270
322 viewsISACA.CISA.v2020-09-15.q230
282 viewsISACA.CISA.v2020-09-07.q269
265 viewsISACA.CISA.v2020-08-13.q267
254 viewsISACA.CISA.v2020-07-31.q194
673 viewsISACA.CISA.v2020-02-05.q100
818 viewsISACA.CISA.v2019-05-09.q750
709 viewsISACA.CISA.v2019-02-23.q896
722 viewsISACA.CISA.v2018-10-27.q803
721 viewsISACA.CISA.v2018-09-19.q770
655 viewsISACA.Cisa.v2018-02-25.q1069
1059 viewsISACA.CISA.v2017-11-28.q1100
Exam Question List
Question 1: Which of the following is the MOST significant concerns when...
Question 2: An IS auditor suspects an organization's computer may have b...
Question 3: An IS auditor finds the timeliness and depth of information ...
Question 4: An enterprise receiving email should have procedures to cont...
Question 5: Which of the following is the MOST effective mechanism for e...
Question 6: Which of the following documents would be MOST useful in det...
Question 7: During a vulnerability assessment, an IS auditor finds a hig...
Question 8: Which of the following is the BEST physical security solutio...
Question 9: An IS auditor identifies key controls that have been overrid...
Question 10: Which of the following occurs during the issues management p...
Question 11: Which of the following would BEST detect that a distributed-...
Question 12: Which of the following should be an IS auditor's FIRST activ...
Question 13: Which of the following would be MOST helpful in ensuring sec...
Question 14: A development team has designed a new application and incorp...
Question 15: Which of the following is the BEST reason to perform root ca...
Question 16: An IS auditor discovers that management has created a system...
Question 17: A security administrator should have read-only access for wh...
Question 18: Which of the following controls would BEST decrease the expo...
Question 19: An organization has outsourced its data processing function ...
Question 20: Which of the following is MOST important for an IS auditor t...
Question 21: When introducing a maturity model to the IT management proce...
Question 22: When determining the specifications for a server supporting ...
Question 23: Which of the following roles combined with the role of a dat...
Question 24: Which of the following is MOST important when an incident ma...
Question 25: When physical destruction is not practical, which of the fol...
Question 26: When auditing a quality assurance plan, an IS auditor should...
Question 27: An IS auditor reviewing security incident processes realizes...
Question 28: Which function in the purchasing module of an enterprise res...
Question 29: Which of the following procedures should an IS auditor compl...
Question 30: Which of the following should be a PRIMARY control objective...
Question 31: An audit team has a completed schedule approved by the audit...
Question 32: A database is denormalized in order to:...
Question 33: Audit management has just completed the annual audit plan fo...
Question 34: Which of the following is MOST important for the IS auditor ...
Question 35: Which of the following is MOST important in the audit qualit...
Question 36: Which of the following is MOST important when planning a net...
Question 37: The quality assurance (QA) function should be prevented from...
Question 38: Which of the following is the PRIMARY role of an IS auditor ...
Question 39: Communicating which of the following would BEST encourage ma...
Question 40: An organization is using a single account shared by personne...
Question 41: When reviewing a disaster recovery plan (DRP) an IS auditor ...
Question 42: Which of the following data would be used when performing a ...
Question 43: Which of the following methods should be used to effectively...
Question 44: A legacy application is running on an operating system that ...
Question 45: Which of the following would provide the BEST evidence for a...
Question 46: Which of the following should the IS auditor do FIRST to ens...
Question 47: The recovery time objective (RTO) is normally determined on ...
Question 48: Which of the following would provide the BEST assurance that...
Question 49: When engaging services from external auditors, which of the ...
Question 50: The MAIN reason an organization's incident management proced...
Question 51: To help ensure the accuracy and completeness of end-user com...
Question 52: An audit committee is reviewing an annual IT risk assessment...
Question 53: A database administrator (DBA) extracts a user listing for a...
Question 54: A large insurance company is about to replace a major financ...
Question 55: Which of the following findings would have the GREATEST impa...
Question 56: Which of the following would be MOST important to update onc...
Question 57: Which of the following provides an IS auditor the MOST assur...
Question 58: Reviewing which of the following would be MOST helpful in as...
Question 59: Which of the following is the BEST key performance indicator...
Question 60: During an audit, which of the following would be MOST helpfu...
Question 61: During a network security review the system log indicates an...
Question 62: Which of the following is MOST important to include in a con...
Question 63: Which of the following is a key success factor for implement...
Question 64: Buffer overflow in an Internet environment is of particular ...
Question 65: A post-implementation review of a system implementation has ...
Question 66: During a help desk review, an IS auditor determines the call...
Question 67: Which of the following is MOST important to include in foren...
Question 68: What is an IS auditor's BEST recommendation to management if...
Question 69: Which of the following would provide the BEST evidence of su...
Question 70: Which of the following would BEST detect logic bombs in new ...
Question 71: MOST effective way to determine if IT is meeting business re...
Question 72: An IS auditor is planning a risk-based audit of the human re...
Question 73: An IS auditor learns that after each scheduled batch process...
Question 74: The operations team of an organization has reported an IS se...
Question 75: An IS auditor is examining a front-end sub ledger and a main...
Question 76: Which of the following findings should hr of GREATEST concer...
Question 77: An IS auditor notes that several users have not logged into ...
Question 78: In which of the following cloud service models does the user...
Question 79: In the IT department where segregation of duties is not feas...
Question 80: An IS auditor is assessing a recent migration of mission cri...
Question 81: An IS auditor is planning an audit of an organization s payr...
Question 82: As part of an IS audit, the auditor notes the practices list...
Question 83: Due to the increasing size of a database, user access times ...
Question 84: To confirm integrity for a hashed message, the receiver shou...
Question 85: A retirement system verifies that the field for employee sta...
Question 86: An IS auditor is conducting a review of an organization s in...
Question 87: Which of the following is the MOST critical characteristic o...
Question 88: Previous audits have found that a large organization has had...
Question 89: Which of the following poses the GREATEST risk to data secur...
Question 90: Which of the following should be done FIRST when planning a ...
Question 91: An advantage of object-oriented system development is that i...
Question 92: Which of the following IS audit findings should be of GREATE...
Question 93: Which of the following would be the MOST effective control t...
Question 94: In a decentralized organization, the selection and purchase ...
Question 95: When conducting a requirements analysis for a project, the B...
Question 96: Which of the following is the KST source of information for ...
Question 97: Which of the following would BEST prevent data from being or...
Question 98: Which combination of access controls provides the BEST physi...
Question 99: Which of the following is MOST important to helping incident...
Question 100: An IS Auditor is performing a business continuity plan (BCP)...
Question 101: Which of the following would BEST indicate the effectiveness...
Question 102: For an organization which uses a VoIP telephony system exclu...
Question 103: An IS auditor is assessing an organization's implementation ...
Question 104: Which of the following is the GREATEST risk resulting from c...
Question 105: Which of the following is the MAIN purpose of implementing a...
Question 106: Which of the following attacks is BEST detected by an intrus...
Question 107: An IS audit had identified that default passwords for a newl...
Question 108: An IS auditor should ensure that an application's audit trai...
Question 109: Within a payroll department, which of the following responsi...
Question 110: When auditing the security architecture of an e-commerce env...
Question 111: Which of the following BEST enables timely detection of chan...
Question 112: An IS auditor is evaluating a virtual server environment and...
Question 113: Which of the following procedures would BEST contribute to t...
Question 114: An IS auditor finds ad hoc vulnerability scanning is in plac...
Question 115: A sales representative is reviewing the organization's feedb...
Question 116: An IS auditor is observing transaction processing and notes ...
Question 117: Which of the following will BEST help to ensure that an in-h...
Question 118: A potential risk of executing a program on an Internet site ...
Question 119: An IS auditor was involved in the design phase for a new sys...
Question 120: Which of the following should the IS auditor use to BEST det...
Question 121: Which of the following is a reason for implementing a decent...
Question 122: Which of the following provides the GREATEST assurance that ...
Question 123: An organization implements a data loss prevention tool as a ...
Question 124: Which of the following would be an IS auditor's GREATEST con...
Question 125: Which of the following is the BEST development methodology t...
Question 126: During an audit of an organization's financial statements, a...
Question 127: Which of the following is MOST important to consider when re...
Question 128: An IS auditor found that a company executive is encouraging ...
Question 129: An internal audit has revealed a large number of incidents f...
Question 130: Which of the following areas are the MOST likely cause of an...
Question 131: An IS auditor has identified that some IT staff have adminis...
Question 132: Which of the following is the GREATEST advantage of implemen...
Question 133: Which of the following should be of MOST concern to an IS au...
Question 134: An IS auditor has performed an agreed-upon procedures engage...
Question 135: An IS auditor reviewing an incident management process ident...
Question 136: Spreadsheets are used to calculate project cost estimates To...
Question 137: Which of the following should be reviewed as part of a data ...
Question 138: Which of the following BEST enables an audit department to i...
Question 139: Prior to the migration of acquired software into production,...
Question 140: An IS auditor auditing the effectiveness of utilizing a hot ...
Question 141: An IS auditor observes that an organization s critical IT sy...
Question 142: Which of the following is the MOST effective way for an IS a...
Question 143: An IS auditor is reviewing an organization's implementation ...
Question 144: Which of the following should MOST concern an IS auditor rev...
Question 145: A financial institution suspects that a manager has been cre...
Question 146: Which of the following should be of GREATEST concern to an I...
Question 147: An organization is moving its on-site application servers to...
Question 148: Which of the following is the BEST way to reduce the risk of...
Question 149: After the release of an application system, an IS auditor wa...
Question 150: During a review of an insurance company s claims system, the...
Question 151: The MOST efficient way to confirm that an ERP system being i...
Question 152: Of the following procedures for testing a disaster recovery ...
Question 153: Which of the following is the MOST significant driver of eff...
Question 154: Which of the following key performance indicators (KPIs) pro...
Question 155: Reorganization of databases is undertaken PRIMARILY to:...
Question 156: An organization is developing a web portal using some extern...
Question 157: An employee transfers from an organization's risk management...
Question 158: Which of the following requirements in a document control st...
Question 159: Privileged account access is require to start an ad hoc batc...
Question 160: Which of the following is the GREATEST risk associated with ...
Question 161: Which of the following is the GREATEST concern with conducti...
Question 162: Which of the following would provide the MOST reliable evide...
Question 163: A review of Internet security disclosed that users have indi...
Question 164: Which of the following activities would allow an IS auditor ...
Question 165: An organization is choosing key performance indicators (KPIs...
Question 166: An organization has performance metrics to track how well IT...
Question 167: A recent audit identified duplicate software licenses and te...
Question 168: Which of the following would BEST facilitate the detection o...
Question 169: What is the purpose of using a write blocker during the acqu...
Question 170: Which of the following would BEST assist senior management i...
Question 171: An IS auditor is assigned to review the development of a spe...
Question 172: Which of the following is MOST important for an IS auditor t...
Question 173: Which of the following is the MOST effective way to identify...
Question 174: An organization has decided to migrate payroll processing to...
Question 175: An organization is deciding whether to outsource its custome...
Question 176: A security company and service provider have merged and the ...
Question 177: Following an IS audit recommendation, all Telnet and File Tr...
Question 178: Which of the following is the PRIMARY benefit of implementin...
Question 179: Which of the following metrics would BEST measure the agilit...
Question 180: Which of the following is the PRIMARY benefit of using an in...
Question 181: Which of the following would be an appropriate role of inter...
Question 182: When planning for the implementation of a new system, an org...
Question 183: Which of the following sampling techniques is commonly used ...
Question 184: During an audit, it is discovered that several suppliers wit...
Question 185: During an ERP post-implementation review, it was noted that ...
Question 186: An IS auditor finds that the process for removing access for...
Question 187: A manufacturing company is implementing application software...
Question 188: The BEST method an organization can employ to align its busi...
Question 189: An IS auditor is using data analytics in an audit and has ob...
Question 190: While reviewing similar issues in an organization s help des...
Question 191: Which of the following is the BEST way to control the concur...
Question 192: Which of the following is the MOST important consideration w...
Question 193: Using swipe cards to limit employee access to restricted are...
Question 194: Which of the following provides the BEST audit evidence that...
Question 195: MOST critical security weakness of a packet level firewall i...
Question 196: The grants management system is used to calculate grant paym...
Question 197: The BEST way to prevent fraudulent payments is to implement ...
Question 198: Which of the following controls can BEST detect accidental c...
Question 199: Which of the following should be the PRIMARY consideration w...
Question 200: While reviewing an organization s business continuity plan (...
Question 201: Which of the following should an IS auditor be MOST concerne...
Question 202: Which of the following is the MOST effective means of helpin...
Question 203: internal IS auditor recommends that incoming accounts payabl...
Question 204: An airlines online booking system uses an automated script t...
Question 205: Which of the following system deployments requires the cloud...
Question 206: An organization is replacing a mission-critical system. Whic...
Question 207: An organization using instant messaging to communicate with ...
Question 208: Which of the following would represent an acceptable test of...
Question 209: Which of the following is the BEST IS audit strategy?...
Question 210: Which of the following is the FIRST consideration when devel...
Question 211: An IS auditor notes that the anticipated benefits from an on...
Question 212: An IS auditor is reviewing an organization's method to trans...
Question 213: Which of the following is the MOST important reason for upda...
Question 214: Which of the following should an IS auditor do FIRST when de...
Question 215: Which of the following should be an IS auditor's PRIMARY foc...
Question 216: The demilitarized zone (DMZ) is the part of a network where ...
Question 217: A system administrator recently informed the IS auditor abou...
Question 218: In a small organization, an IS auditor finds that security a...
Question 219: Which of the following is the MOST important process to ensu...
Question 220: What is the MOST important role of a certificate authority (...
Question 221: Which of the following is MOST likely to result from complia...
Question 222: Which of the following is corrective control?...
Question 223: The CIO of an organization is concerned that the information...
Question 224: As part of a mergers and acquisitions activity, an acquiring...
Question 225: An IS auditor is assessing an organization's data loss preve...
Question 226: During a review of system access, an IS auditor notes that a...
Question 227: After an external IS audit, which of the following should be...
Question 228: Which of the following would BEST enable alignment of IT wit...
Question 229: An IS auditor discovers that validation controls in a web ap...
Question 230: During an audit, the client learns that the IS auditor has r...
Question 231: An organization uses two data centers. Which of the followin...
Question 232: When testing segregation of duties, which of the following a...
Question 233: To restore service at a large processing facility after a di...
Question 234: Which of the following BEST indicates the effectiveness of a...
Question 235: When designing a data analytics process, which of the follow...
Question 236: When an organization is having new software implemented unde...
Question 237: Which of the following would BEST facilitate the successful ...
Question 238: A small organization is experiencing rapid growth and plans ...
Question 239: An IS auditor reviewing the acquisition of new equipment wou...
Question 240: When preparing to evaluate the effectiveness of an organizat...
Question 241: An operations manager has recently moved to internal audit W...
Question 242: Which of the following tasks should be performed during an o...
Question 243: An organization with high security requirements is evaluatin...
Question 244: Which of the following stakeholders should be PRIMARILY resp...
Question 245: A government organization uses standard Wi-Fi Protected Acce...
Question 246: An IS auditor notes that a number of application plug-ins cu...
Question 247: An IS auditor notes that due to the small size of the organi...
Question 248: Which of the following cloud deployment models would BEST me...
Question 249: To effectively classify data, which of the following MUST be...
Question 250: A technology service organization has recently acquired a ne...
Question 251: Which of the following is a prerequisite to help ensure that...
Question 252: Which of the following should an IS auditor verify when audi...
Question 253: An IS auditor has discovered that unauthorized customer mana...
Question 254: Which of the following is an IS auditor s GREATEST concern w...
Question 255: Which of the following poses the GREATEST risk to the enforc...
Question 256: An IS auditor is evaluating the risks and controls associate...
Question 257: An IS auditor notes that help desk personnel are required to...
Question 258: An IS auditor performing an application development review a...
Question 259: Requiring that passwords contain a combination of numeric an...
Question 260: An organization has established three IS processing environm...
Question 261: When initiating an IT project, which of the following should...
Question 262: Which of the following access rights in the production envir...
Question 263: Which of the following is a passive attack on a network?...
Question 264: Which of the following is the GREATEST risk associated with ...
Question 265: A small startup organization does not have the resources to ...
Question 266: Which of the following controls would BEST ensure that payro...
Question 267: Which of the following activities is MOST important to consi...
Question 268: Which of the following findings should be an IS auditor's GR...
Question 269: Which of the following is the BCST way to determine the effe...
Question 270: Which of the following auditing techniques would be used to ...
Question 271: An information systems security officer's PRIMARY responsibi...
Question 272: Which of the following is MOST likely to improve the portabi...
Question 273: Which of the following is the BEST evidence that an organiza...
Question 274: Which of the following controls is MOST appropriate against ...
Question 275: Which of the following is the MOST important consideration w...
Question 276: An organization considers implementing a system that uses a ...
Question 277: Which of the following should be of GREATEST concern to an I...
Question 278: Which of the following is the PRIMARY function of technology...
Question 279: Which of the following is MOST important for an IS auditor t...
Question 280: Which of the following would be the MOST appropriate reason ...
Question 281: Which of the following is the GREATEST risk of cloud computi...
Question 282: Which of the following is the BEST way to ensure enterprise ...
Question 283: An IS auditor previously worked in an organization s IT depa...
Question 284: Loss-site scripting (XSS) attacks are BEST prevented through...
Question 285: Which of the following sampling methods is the BEST approach...
Question 286: When connecting to an organization's intranet from the Inter...
Question 287: Two organizations will share ownership of a new enterprise r...
Question 288: Which of the following group is MOST likely responsible for ...
Question 289: Which of the following controls MOST effectively reduces the...
Question 290: What is the MOST difficult aspect of access control in a mul...
Question 291: Following a breach, what is the BEST source to determine the...
Question 292: Which of the following would be considered the BEST compensa...
Question 293: Which of the following metrics would be MOST helpful to an I...
Question 294: As part of business continuity planning. Which of the follow...
Question 295: An organization was recently notified by its regulatory body...
Question 296: Which of the following is the BEST way to detect potentially...
Question 297: Which of the following BEST describes the relationship betwe...
Question 298: When reviewing a contract for a disaster recovery hot site, ...
Question 299: The PRIMARY purpose of an internal audit department's qualit...
Question 300: Which of the following tools is MOST helpful in estimating b...
Question 301: An IS auditor would MOST likely recommend that IT management...
Question 302: Which of the following BEST determines if a batch update job...
Question 303: Which of the following should be of GREATEST concern to an I...
Question 304: An IT governance body wants to determine whether IT service ...
Question 305: Which of the following helps to ensure the integrity of data...
Question 306: Which of the following functions is MOST likely to be perfor...
Question 307: An IS auditor performing an audit of backup procedures obser...
Question 308: An organization is considering outsourcing the processing of...
Question 309: When assessing a business case as part of a post-implementat...
Question 310: Which audit technique provides the GREATEST assurance that i...
Question 311: Which of the following will BEST ensure that a proper cutoff...
Question 312: A digital signature addresses which of the following concern...
Question 313: An IS auditor has assessed a payroll service provider's secu...
Question 314: The PRIMARY advantage of object oriented technology is enhan...
Question 315: An IS auditor plans to review all access attempts to a video...
Question 316: Which of the following would MOST effectively and executive ...
Question 317: Which of the following is an example of a data analytics use...
Question 318: Which of the following is MOST important for an IS auditor t...
Question 319: An IS auditor finds that an organization's data loss prevent...
Question 320: The risk that the IS auditor will not find an error that has...
Question 321: An organization transmits large amount of data from one inte...
Question 322: Which of the following presents the GREATEST concern when im...
Question 323: Which of the following would be an auditor's GREATEST concer...
Question 324: An IS auditor has observed gaps in the data available to the...
Question 325: Which of the following communication modes should be of GREA...
Question 326: What is the GREASTEST concern for an IS auditory reviewing c...
Question 327: In attribute sampling, what is the relationship between expe...
Question 328: An IS auditor is planning to audit an organization's infrast...
Question 329: Which of the following is the PRIMARY advantage of using vir...
Question 330: IT service engineers at a large organization are unable to e...
Question 331: An organization recently experienced a phishing attack that ...
Question 332: Which of the following is the PRIMARY objective of the IS au...