Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 321

Which of the following would be the BEST criteria for monitoring an IT vendor's service levels?

A.

Service auditor's report

B.

Performance metrics

C.

Surprise visit to vendor

D.

Interview with vendor

Full Access
Question # 322

An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?

A.

Information security manager

B.

Quality assurance (QA) manager

C.

Business department executive

D.

Business process owner

Full Access
Question # 323

An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor's NEXT action1?

A.

Make recommendations to IS management as to appropriate quality standards

B.

Postpone the audit until IS management implements written standards

C.

Document and lest compliance with the informal standards

D.

Finalize the audit and report the finding

Full Access
Question # 324

Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization's configuration and release management process?

A.

The organization does not use an industry-recognized methodology

B.

Changes and change approvals are not documented

C.

All changes require middle and senior management approval

D.

There is no centralized configuration management database (CMDB)

Full Access
Question # 325

An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?

A.

Directive

B.

Detective

C.

Preventive

D.

Compensating

Full Access
Question # 326

Which of the following should an organization do to anticipate the effects of a disaster?

A.

Define recovery point objectives (RPO)

B.

Simulate a disaster recovery

C.

Develop a business impact analysis (BIA)

D.

Analyze capability maturity model gaps

Full Access
Question # 327

A computer forensic audit is MOST relevant in which of the following situations?

A.

Inadequate controls in the IT environment

B.

Mismatches in transaction data

C.

Missing server patches

D.

Data loss due to hacking of servers

Full Access
Question # 328

A finance department has a multi-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger. and in year one, the system version upgrade will be applied. Which of the following should be the PRIMARY focus of the IS auditor reviewing the first year of the project?

A.

unit testing

B.

Network performance

C.

User acceptance testing (UAT)

D.

Regression testing

Full Access
Go to page: