ISACA.CISA.v2021-01-03.q362

Exam Code:CISA
Exam Name:Certified Information Systems Auditor
Certification Provider:ISACA
Free Question Number:362
Version:v2021-01-03
Rating:
# of views:1006
# of Questions views:40994
Start Practice Test

Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam! Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam questions have been updated and answers have been corrected get the newest Fast2test.com CISA dumps with Test Engine here:

Access Premium Version
(568 Q&As Dumps, 40%OFF Special Discount: freecram)

Recent Comments (The most recent comments are at the top.)

   - Apr 19, 2021

I have used the CISA exam preparation material and found it to be exactly what I needed,that is why I would recommend it to all the candidates attempting the CISA exam to use it.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Other Version
459 viewsISACA.CISA.v2021-03-04.q363
973 viewsISACA.CISA.v2020-10-27.q362
679 viewsISACA.CISA.v2020-10-23.q332
496 viewsISACA.CISA.v2020-10-13.q299
596 viewsISACA.CISA.v2020-10-09.q270
675 viewsISACA.CISA.v2020-09-15.q230
582 viewsISACA.CISA.v2020-09-07.q269
471 viewsISACA.CISA.v2020-08-13.q267
497 viewsISACA.CISA.v2020-07-31.q194
962 viewsISACA.CISA.v2020-02-05.q100
1048 viewsISACA.CISA.v2019-05-09.q750
976 viewsISACA.CISA.v2019-02-23.q896
907 viewsISACA.CISA.v2018-10-27.q803
905 viewsISACA.CISA.v2018-09-19.q770
816 viewsISACA.Cisa.v2018-02-25.q1069
1475 viewsISACA.CISA.v2017-11-28.q1100
Exam Question List
Question 1: An IS auditor has observed gaps in the data available to the...
Question 2: An IS auditor finds that a company is using a payroll provid...
Question 3: Which of the following is MOST important when an incident ma...
Question 4: Which of the following is the FIRST step when conducting a b...
Question 5: Which of the following would help to ensure the completeness...
Question 6: Which of the following would be the MOST effective method to...
Question 7: The MOST efficient way to confirm that an ERP system being i...
Question 8: Which of the following is an advantage of decentralized secu...
Question 9: Which of the following is an IS auditor's BEST recommendatio...
Question 10: Which of the following BEST supports an organization's plann...
Question 11: In a small organization, an IS auditor finds that security a...
Question 12: Which of the following stakeholders should be PRIMARILY resp...
Question 13: Which of the following is the BEST way to facilitate proper ...
Question 14: An organization plans to receive an automated data feed into...
Question 15: Which of the following should be of MOST concern to an IS au...
Question 16: Which of the following would an IS auditor consider to be th...
Question 17: To BEST determine if a project is successfully addressing bu...
Question 18: Communicating which of the following would BEST encourage ma...
Question 19: Within a payroll department, which of the following responsi...
Question 20: Which of the following are BEST suited for continuous auditi...
Question 21: Which of the following should be restricted from a network a...
Question 22: An IS auditor is evaluating the access controls at a multina...
Question 23: Which of the following is the MOST important reason to use s...
Question 24: An organization that has suffered a cyber attack is performi...
Question 25: The prioritization of incident response actions should be PR...
Question 26: An IT management group has developed a standardized security...
Question 27: A user of a telephone banking system has forgotten his perso...
Question 28: Which of the following would BEST facilitate the successful ...
Question 29: The PRIMARY purpose for an IS auditor to review previous aud...
Question 30: To test the integrity of the data in the accounts receivable...
Question 31: What is an IS auditor's BEST recommendation for management i...
Question 32: An IS auditor has discovered that a cloud-based application ...
Question 33: The scheduling of audit follow-ups should be based PRIMARILY...
Question 34: Which of the following MOST efficiently protects computer eq...
Question 35: A typical network architecture used for e-commerce, a load b...
Question 36: Which of the following would be the MOST effective control t...
Question 37: The demilitarized zone (DMZ) is the part of a network where ...
Question 38: An advantage of installing a thin client architecture in a l...
Question 39: Which of the following BEST provides audit management with a...
Question 40: Which of the following projects would be MOST important to r...
Question 41: An IS auditor finds that a mortgage origination team receive...
Question 42: An internal audit has revealed a large number of incidents f...
Question 43: Software quality assurance (QA) reviews are planned as part ...
Question 44: Which of the following is an indication of possible hacker a...
Question 45: Which function in the purchasing module of an enterprise res...
Question 46: Based on the Guidance of internal audit, an IT steering comm...
Question 47: Which of the following should be an IS auditor's FIRST activ...
Question 48: Stress testing should ideally be carried out under a:...
Question 49: While following up on a prior audit report, an IS auditor de...
Question 50: Which of the following would provide the BEST evidence of su...
Question 51: Which of the following is the BEST source for describing the...
Question 52: While evaluating an organization's program for tracking syst...
Question 53: An IS auditor finds that periodic reviews of read-only users...
Question 54: Which of the following is the MOST significant risk associat...
Question 55: One advantage of monetary unit sampling is the fact that:...
Question 56: During a disaster recovery audit, an IS auditor finds that a...
Question 57: A CIO has asked an IS auditor to implement several security ...
Question 58: Which of the following controls should be implemented to BES...
Question 59: Which of the following is MOST important for an IS auditor t...
Question 60: Which of the following is MOST important for successful inci...
Question 61: During audit planning, an IS auditor walked through the desi...
Question 62: Which of the following should be of GREATEST concern to an I...
Question 63: An IS auditor can BEST help management fulfill risk manageme...
Question 64: A region where an organization conducts business has announc...
Question 65: When connecting to an organization's intranet from the Inter...
Question 66: An IS auditor finds multiple situations where the help desk ...
Question 67: Which of the following is the BEST physical security solutio...
Question 68: What is the MOST difficult aspect of access control in a mul...
Question 69: To preserve chain-of-custody following an internal server co...
Question 70: Reviewing which of the following would be MOST helpful in as...
Question 71: Which of the following is MOST important to include in an or...
Question 72: An IS auditor is performing a post-implementation review of ...
Question 73: A review of Internet security disclosed that users have indi...
Question 74: A security administrator should have read-only access for wh...
Question 75: Due to cost restraints, a company defers the replacement of ...
Question 76: To achieve desired objectives, which of the following is MOS...
Question 77: Which of the following is the BEST approach to identify whet...
Question 78: Management decided to accept the residual risk of an audit f...
Question 79: Which of the following would be of GREATEST concern to an IS...
Question 80: An advantage of object-oriented system development is that i...
Question 81: An organization using instant messaging to communicate with ...
Question 82: An IS auditor has performed an agreed-upon procedures engage...
Question 83: An IS auditor s role in privacy and security is to:...
Question 84: The quality assurance (QA) function should be prevented from...
Question 85: Which of the following factors constitutes a strength in reg...
Question 86: Which of the following is MOST likely to be spoofed in an em...
Question 87: An IS auditor finds that firewalls are outdated and not supp...
Question 88: An IS auditor is following upon a finding that determined el...
Question 89: When replacing a critical software application, which of the...
Question 90: Which of the following will provide the GREATEST assurance t...
Question 91: Which of the following access control situations represents ...
Question 92: Which of the following activities is MOST important to consi...
Question 93: When reviewing a newly implemented quality management system...
Question 94: Which of the following would be considered the BEST compensa...
Question 95: Which of the following findings should hr of GREATEST concer...
Question 96: Which of the following is the BEST approach for performing a...
Question 97: An IS auditor notes that several users have not logged into ...
Question 98: Which of the following is MOST helpful when establishing the...
Question 99: An IS auditor is assessing an organization's data loss preve...
Question 100: An organization has implemented a distributed security admin...
Question 101: An organization globally distributes a free phone applicatio...
Question 102: The purpose of a checksum on an amount field in an electroni...
Question 103: While reviewing a hot site, the IS auditor discovers that on...
Question 104: Which of the following IT processes is likely to have the in...
Question 105: Which of the following provides the MOST assurance that a ne...
Question 106: When reviewing a database supported by a third-party service...
Question 107: Which of the following would be of MOST concern during an au...
Question 108: Which combination of access controls provides the BEST physi...
Question 109: Which of the following should an IS auditor recommend as MOS...
Question 110: An IS Auditor is performing a business continuity plan (BCP)...
Question 111: Which of the following access fights presents the GREATEST r...
Question 112: To create a digital signature in a message using asymmetric ...
Question 113: The CIO of an organization is concerned that the information...
Question 114: Using swipe cards to limit employee access to restricted are...
Question 115: Which of ihe following is the BEST way to control scope cree...
Question 116: During an audit of an organization's financial statements, a...
Question 117: Which of the following would BEST detect that a distributed-...
Question 118: An e-commerce enterprise's disaster recovery (DR) site has 3...
Question 119: Which of the following provides the BEST evidence that netwo...
Question 120: Which of the following is MOST important when planning a net...
Question 121: Which of the following controls can BEST detect accidental c...
Question 122: An IT service desk has recorded several incidents related to...
Question 123: Which of the following procedures would BEST contribute to t...
Question 124: An audit report notes that terminated employees have been re...
Question 125: Which of the following is the BEST control to protect an org...
Question 126: Prior to the migration of acquired software into production,...
Question 127: Which of the following should MOST concern an IS auditor rev...
Question 128: An organization is replacing its financial processing system...
Question 129: Which of the following factors will BEST promote effective i...
Question 130: A company has implemented an IT segregation of duties policy...
Question 131: To ensure confidentiality through the use of asymmetric encr...
Question 132: Which of the following is MOST important for the successful ...
Question 133: Audit management has just completed the annual audit plan fo...
Question 134: Which of the following would be the MOST appropriate reason ...
Question 135: Which of the following is the MOST significant concerns when...
Question 136: A company laptop has been stolen and all photos on the lapto...
Question 137: An audit report that specifies responsibility for the closur...
Question 138: An organization wants to reuse company-provided smartphones ...
Question 139: The PRIMARY objective of parallel testing an application is ...
Question 140: During a vulnerability assessment, an IS auditor finds a hig...
Question 141: Which of the following could be determined by an entity-rela...
Question 142: Which of the following procedures should be implemented prio...
Question 143: Which of the following is the BEST key performance indicator...
Question 144: Which of the following sampling techniques is commonly used ...
Question 145: An organization wants to classify database tables according ...
Question 146: Which of the following metrics would BEST measure the agilit...
Question 147: What should be the PRIMARY basis for scheduling a follow-up ...
Question 148: Which of the following should be an IS auditor's GREATEST co...
Question 149: maturity model is useful in the assessment of IT service man...
Question 150: Following an acquisition, it was decided that legacy applica...
Question 151: Which of the following is MOST important for an IS auditor t...
Question 152: During an audit of a reciprocal disaster recovery agreement ...
Question 153: The performance of an order-processing system can be measure...
Question 154: Which of the following is the MOST effective control to miti...
Question 155: Which of the following tasks should be performed during an o...
Question 156: Which of the following controls will MOST effectively detect...
Question 157: During the planning stage of compliance audit, an IS auditor...
Question 158: Electrical surge protectors BEST...
Question 159: Which of the following should an IS auditor recommend to red...
Question 160: Since data storage of a critical business application is on ...
Question 161: An IS audit manager finds that data manipulation logic devel...
Question 162: When developing a risk-based IS audit plan, the PRIMARY focu...
Question 163: When reviewing an organization s IT governance processes, wh...
Question 164: Which of the following is MOST important for an IS auditor t...
Question 165: When reviewing user access to an application containing sens...
Question 166: To protect information assets, which of the following should...
Question 167: What is the MOST important role of a certificate authority (...
Question 168: An organization's IT security policy requires annual securit...
Question 169: Which of the following would BEST detect logic bombs in new ...
Question 170: Which of the following activities would allow an IS auditor ...
Question 171: Which of the following is MOST important to include in a bus...
Question 172: Which of the following is MOST important in the audit qualit...
Question 173: An employee transfers from an organization's risk management...
Question 174: ..control that MOST effectively addresses the risk of piggyb...
Question 175: Assessments of critical information systems are based on a c...
Question 176: An organization using development operations (DevOps) proces...
Question 177: A development team has designed a new application and incorp...
Question 178: Which of the following test approaches would utilize data an...
Question 179: The risk that is created if a single sign-on is implemented ...
Question 180: An organization uses two data centers. Which of the followin...
Question 181: Which of the following would be MOST important to update onc...
Question 182: An IS auditor is evaluating the log management system for an...
Question 183: Which of the following is MOST influential when defining dis...
Question 184: What should be an IS auditor s NEXT course of action when a ...
Question 185: Which of the following is the PRIMARY advantage of single si...
Question 186: In an organization that has a staff-rotation policy, the MOS...
Question 187: Spreadsheets are used to calculate project cost estimates To...
Question 188: An organization is moving its on-site application servers to...
Question 189: Two organizations will share ownership of a new enterprise r...
Question 190: Which of the following BEST enables an IS auditor to identif...
Question 191: When planning an application audit, it is MOST important to ...
Question 192: Which of the following should be an IS auditor's PRIMARY con...
Question 193: Following an IT audit, management has decided to accept the ...
Question 194: Which of the following ensures components of an IT system ar...
Question 195: Which of ihe following BEST indicates a need to review an or...
Question 196: A system administrator recently informed the IS auditor abou...
Question 197: At which stage of the software development life cycle should...
Question 198: Which of the following would provide the BEST evidence for u...
Question 199: Adopting a service-oriented architecture would MOST likely:...
Question 200: An IS auditor is planning on utilizing attribute sampling to...
Question 201: Which of the following is MOST important for an organization...
Question 202: Which of the following control? MOST efficiently ensures tha...
Question 203: Which of the following is an example of a data analytics use...
Question 204: While reviewing similar issues in an organization s help des...
Question 205: An organization was recently notified by its regulatory body...
Question 206: Which of the following findings should be of MOST concern to...
Question 207: Which of the following is the MOST important reason to perio...
Question 208: Which of the following is the MOST efficient solution for a ...
Question 209: Which of the following will enable a customer to authenticat...
Question 210: Which type of risk would MOST influence the selection of a s...
Question 211: An IS auditor is examining a front-end sub ledger and a main...
Question 212: An organization has outsourced its data leakage monitoring t...
1 commentQuestion 213: When preparing to evaluate the effectiveness of an organizat...
Question 214: Which of the following methodologies is MOST appropriate to ...
Question 215: Which of the following is the BEST reason for an organizatio...
Question 216: Which of the following procedures should an IS auditor compl...
Question 217: An organization is running servers with critical business ap...
Question 218: While executing follow-up activities, an IS auditor is conce...
Question 219: An IS auditor plans to review all access attempts to a video...
Question 220: Which of the following BEST determines if a batch update job...
Question 221: An IS auditor is reviewing the upgrading of an operating sys...
Question 222: Which of the following is the GREATEST risk associated with ...
Question 223: As part of business continuity planning. Which of the follow...
Question 224: Of the following, who should authorize a project management ...
Question 225: Internal audit reports should be PRIMARILY written for and c...
Question 226: Which of the following should an IS auditor do FIRST when de...
Question 227: Which of the following is the BEST indication that an inform...
Question 228: An IS auditor performs a follow-up audit and learns the appr...
Question 229: An IS auditor is performing a routine procedure to test for ...
Question 230: While auditing an IT department s cloud service provider, th...
Question 231: An IS auditor is using data analytics in an audit and has ob...
Question 232: A PRIMARY benefit derived by an organization employing contr...
Question 233: An organization is currently replacing its accounting system...
Question 234: An IS auditor reviewing a recently implemented virtual envir...
Question 235: An organization's current end-user computing practices inclu...
Question 236: Which of the following is the MOST effective control to rest...
Question 237: A retailer normally uses a scanner to read product labels an...
Question 238: A manufacturing company is implementing application software...
Question 239: During a follow-up audit for a finding related to change man...
Question 240: Which of the following should be an IS auditor's PRIMARY foc...
Question 241: An IS auditor is conducting a review of an organization s in...
Question 242: Which of ihe following should be done FIRST to effectively d...
Question 243: Which of the following is the BEST development methodology t...
Question 244: During an external assessment of network vulnerability which...
Question 245: Which of the following is the BEST sampling method to use wh...
Question 246: Which of the following is the PRIMARY reason for an IS audit...
Question 247: An IS auditor conducts a review of a third-party vendor's re...
Question 248: An IS auditor has discovered that unauthorized customer mana...
Question 249: A database administrator (DBA) extracts a user listing for a...
Question 250: Privileged account access is require to start an ad hoc batc...
Question 251: The maturity level of an organization s problem management s...
Question 252: An IS auditor is assigned to review the development of a spe...
Question 253: Which of the following is MOST important with regard to an a...
Question 254: The BEST reason for implementing a virtual private network (...
Question 255: Which of the following is the MOST effective control to ensu...
Question 256: An IT steering committee assists the board of directors to f...
Question 257: An internal audit department recently established a quality ...
Question 258: Which of the following is a reason for implementing a decent...
Question 259: During a review of system access, an IS auditor notes that a...
Question 260: When reviewing an organization's data protection practices, ...
Question 261: Which of the following should be the PRIMARY basis for plann...
Question 262: An IS auditor has completed a service level management audit...
Question 263: In assessing the priority given to systems covered in an org...
Question 264: Which of the following is the PRIMARY benefit of including I...
Question 265: Which of the following should be of GREATEST concern to an I...
Question 266: Which of the following would be an appropriate role of inter...
Question 267: The business owner's approval of software changes being move...
Question 268: An IS auditor finds ad hoc vulnerability scanning is in plac...
Question 269: Which of the following is the BEST indicator that an applica...
Question 270: An IS auditor is assigned to review the IS department's qual...
Question 271: When an intrusion into an organizations network is detected,...
Question 272: An organization was recently notified by its regulatory body...
Question 273: Which of the following is MOST important for an IS auditor t...
Question 274: During an audit, it is discovered that several suppliers wit...
Question 275: When removing a financial application system from production...
Question 276: In an environment where most IT services have been outsource...
Question 277: Which of the following is the MOST important benefit of invo...
Question 278: An organization plans to launch a social media presence as p...
Question 279: In an IS auditor's review of an organization s configuration...
Question 280: Which of the following mechanisms for process improvement in...
Question 281: When using a wireless device, which of the following BEST en...
Question 282: Which of the following is the BEST indication that an organi...
Question 283: A maturity model can be used to aid the implementation of IT...
Question 284: Which of the following types of controls would BEST facilita...
Question 285: During a software acquision review, an IS auditor should rec...
Question 286: Which of the following helps to ensure the integrity of data...
Question 287: A post-implementation review of a system implementation has ...
Question 288: An intruder accesses an application server and makes changes...
Question 289: An auditor is creating an audit program in which the objecti...
Question 290: Which of the following should be an IS auditor's PRIMARY con...
Question 291: Which of the following a recent internal data breach, an IS ...
Question 292: When designing metrics for information security, the MOST im...
Question 293: Which of the following findings would be of MOST concern to ...
Question 294: Which of the following should be an IS auditor's PRIMARY con...
Question 295: Which of the following would provide the useful input to IS ...
Question 296: Which of the following BEST ensures that only authorized sof...
Question 297: The operations team of an organization has reported an IS se...
Question 298: An organization has purchased a replacement mainframe comput...
Question 299: An IS auditor has found that an organization is unable to ad...
Question 300: An IS auditor is unable to directly test privacy controls fo...
Question 301: An organization offers an online information security awaren...
Question 302: Which of the following is the BEST way to address ongoing co...
Question 303: Which of the following should be performed FIRST when prepar...
Question 304: Which of the following would BEST indicate the effectiveness...
Question 305: Which of the following would BEST deter the theft of corpora...
Question 306: A design company has multiple name and address files for its...
Question 307: During an audit of the organization's data privacy policy, t...
Question 308: An IS auditor has assessed a payroll service provider's secu...
Question 309: During a help desk review, an IS auditor determines the call...
Question 310: Which of the following would provide the MOST important inpu...
Question 311: Which of the following is the GREATEST cause for concern whe...
Question 312: Buffer overflow in an Internet environment is of particular ...
Question 313: Which of the following is the MOST important step in the dev...
Question 314: An IS auditor is reviewing standards and compliance requirem...
Question 315: Which of the following is the BEST way to evaluate the effec...
Question 316: An enterprise receiving email should have procedures to cont...
Question 317: Which of the following is MOST likely to be prevented by a f...
Question 318: An organization uses electronic funds transfer (EFT) to pay ...
Question 319: An audit committee is reviewing an annual IT risk assessment...
Question 320: Which audit technique provides the GREATEST assurance that i...
Question 321: Following a security breach, in which a hacker exploited a w...
Question 322: Which the following is MOST critical for the effective imple...
Question 323: An IS auditor previously worked in an organization s IT depa...
Question 324: internal IS auditor recommends that incoming accounts payabl...
Question 325: Management has agreed to perform multiple remediation action...
Question 326: When implementing a software product (middleware) to pass da...
Question 327: Which of the following is the PRIMARY reason for database op...
Question 328: Which of the following should an IS auditor verify when audi...
Question 329: An organization has software that is not compliant with data...
Question 330: During an audit of a payroll system, an IS auditor identifie...
Question 331: Which of the following audit procedures would BEST assist an...
Question 332: An organization's IT security policy states that user ID's m...
Question 333: Which of the following is a substantive test procedure?...
Question 334: Which of the following is the MOST important reason for upda...
Question 335: Which of the following is the MOST effective way to minimize...
Question 336: Which of the following is the PRIMARY concern if a business ...
Question 337: An IS auditor attempts to sample for variables in a populati...
Question 338: An organization has implemented application whitelisting in ...
Question 339: When auditing the security architecture of an e-commerce env...
Question 340: Which of the following is the PRIMARY responsibility of an o...
Question 341: At what point in software development should the user accept...
Question 342: An IS auditor is conducting a pre-implementation review to d...
Question 343: Which of the following is the BEST guidance from an IS audit...
Question 344: The risk that the IS auditor will not find an error that has...
Question 345: An IS auditor is a member of an application development team...
Question 346: Which of the following is the GREATEST concern when an organ...
Question 347: Which of the following is the BEST indication that an organi...
Question 348: Which of the following would be MOST important for an IS aud...
Question 349: Which of the following is MOST important to include in a con...
Question 350: Which of the following areas are the MOST likely cause of an...
Question 351: The use of the Transport Layer Security (TLS) protocol enabl...
Question 352: Which of the following should an IS auditor review FIRST whe...
Question 353: Which of the following key performance indicators (KPIs) pro...
Question 354: Which of the following should be of GREATEST concern to an I...
Question 355: During a post-implementation review, a step in determining w...
Question 356: A database is denormalized in order to:...
Question 357: Which of the following will BEST help to ensure that an in-h...
Question 358: Which of the following is a detective control that can be us...
Question 359: Which of the following is the GREATEST benefit of implementi...
Question 360: In the IT department where segregation of duties is not feas...
Question 361: Which of the following is the MOST effective mechanism for e...
Question 362: Which of the following is MOST important for an IS auditor t...