Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Searching for workable clues to ace the Isaca CISA Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISA PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 153

Which of the following is the MOST likely root cause of shadow IT in an organization?

A.

Lengthy approval for technology investment

B.

The opportunity to reduce software license fees

C.

Ease of use for cloud-based applications and services

D.

Approved software not meeting user requirements

Full Access
Question # 154

A cloud access security broker (CASB) administers the user access of a Software as a Service {SaaS) on behalf of the customer organization. When conducting an audit of the service, which of the following is MOST important for the IS auditor to confirm?

A.

The CASB logs the access request as a service record that is reviewed after granting access.

B.

The CASB verifies the access request from a named customer contact before granting access.

C.

The CASB manages secure access to the federated directory service used by the SaaS application.

D.

The CASB conducts periodic audits of access requests to ensure compliance with customer policy.

Full Access
Question # 155

When determining the quality of evidence collected during an audit, it is MOST important to ensure the evidence is:

A.

Valid, complete, and accurate.

B.

Timely, reliable, and reasonable.

C.

Sufficient and comes from the source of the information.

D.

Persuasive and applicable.

Full Access
Question # 156

An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor’s independence?

A.

The auditor implemented a specific control during the development of the system.

B.

The auditor participated as a member of the project team without operational responsibilities.

C.

The auditor provided advice concerning best practices.

D.

The auditor designed an embedded audit module exclusively for audit.

Full Access
Question # 157

Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?

A.

Preventive maintenance costs exceed the business allocated budget.

B.

Preventive maintenance has not been approved by the information system

C.

Preventive maintenance is outsourced to multiple vendors without requiring nondisclosure agreements (NDAs)

D.

The preventive maintenance schedule is based on mean time between failures (MTBF) parameters.

Full Access
Question # 158

Which of the following findings related to segregation of duties should be of GREATEST concern to an IS auditor?

A.

The person who tests source code also approves changes.

B.

The person who administers servers is also part of the infrastructure management team.

C.

The person who creates new user accounts also modifies user access levels.

D.

The person who edits source code also has write access to production.

Full Access
Question # 159

Which of the following is the BEST approach to validate whether a streaming site can continue to provide service during a period of live streaming with an anticipated high volume of viewers?

A.

Fuzzing

B.

Usability test

C.

Fault grading

D.

Load test

Full Access
Question # 160

Which of the following is the MAJOR advantage of automating internal controls?

A.

To enable the review of large value transactions

B.

To efficiently test large volumes of data

C.

To help identity transactions with no segregation of duties

D.

To assist in performing analytical reviews

Full Access
Go to page: