Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Searching for workable clues to ace the Isaca CISA Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISA PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 257

An IS auditor has been asked to perform a post-implementation review of a newly developed system. When reviewing the testing phase results, the auditor observed that separate modules of the system tested correctly in the user acceptance testing (UAT) phase, but some features did not work as expected when moved to production. Which of the following was MOST likely omitted prior to implementation?

A.

Integration testing

B.

End-user training

C.

Full unit testing

D.

Parallel testing

Full Access
Question # 258

When reviewing an organization ' s information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:

A.

a risk management process.

B.

an information security framework.

C.

past information security incidents.

D.

industry best practices.

Full Access
Question # 259

Which of the following is the BEST source of organizational direction on when to use cloud services?

A.

Enterprise architecture (EA)

B.

Business continuity plans (BCPs)

C.

Availability requirements

D.

Cloud regulations

Full Access
Question # 260

An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?

A.

Report the variance immediately to the audit committee

B.

Request an explanation of the variance from the auditee

C.

Increase the sample size to 100% of the population

D.

Exclude the transaction from the sample population

Full Access
Question # 261

Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?

A.

Analyzing risks posed by new regulations

B.

Developing procedures to monitor the use of personal data

C.

Defining roles within the organization related to privacy

D.

Designing controls to protect personal data

Full Access
Question # 262

Which of the following is an example of shadow IT?

A.

An employee using a cloud based order management tool without approval from IT

B.

An employee using a company provided laptop to access personal banking information

C.

An employee using personal email to communicate with clients without approval from IT

D.

An employee using a company-provided tablet to access social media during work hours

Full Access
Question # 263

Which of the following is MOST important to consider when determining the usefulness of audit evidence?

A.

Timing of the evidence

B.

Nature of evidence gathered

C.

Overall objectives of the review

D.

Competence of the IS auditor

Full Access
Question # 264

Which of the following would be the BEST criteria for monitoring an IT vendor ' s service levels?

A.

Service auditor ' s report

B.

Performance metrics

C.

Surprise visit to vendor

D.

Interview with vendor

Full Access
Go to page: