Isaca CISA - Certified Information Systems Auditor Exam

Question #6 (Topic: Single Topic)
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor's PRIMARY concern is that:
A. a clear business case has been established. B. the new hardware meets established security standards. C. a full, visible audit trail will be included. D. the implementation plan meets user requirements.
Answer: A
Question #7 (Topic: Single Topic)
To confirm integrity for a hashed message, the receiver should use:
A. the same hashing algorithm as the sender's to create a binary image of the file. B. a different hashing algorithm from the sender's to create a numerical representation of the file. C. a different hashing algorithm from the sender's to create a binary image of the file. D. the same hashing algorithm as the sender's to create a numerical representation of the file.
Answer: D
Question #8 (Topic: Single Topic)
An organization is implementing a new system that supports a month-end business process. Which of the following implementation strategies would be MOST
efficient to decrease business downtime?
A. Cutover B. Phased C. Pilot D. Parallel
Answer: D
Question #9 (Topic: Single Topic)
Which of the following should be the FIRST step in managing the impact of a recently discovered zero-day attack?
A. Estimating potential damage B. Identifying vulnerable assets C. Evaluating the likelihood of attack D. Assessing the impact of vulnerabilities
Answer: B
Question #10 (Topic: Single Topic)
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
A. Pilot testing B. System testing C. Integration testing D. Unit testing
Answer: B
Download Exam
Page: 2 / 365
Total 1823 questions