Topics
Products
Follow Us:
Hemangdoshi
Answered: Apr 01, 2020
B. high-risk areas within the organization.

The first and most critical step in the process is to identify high-risk areas within the organization. Once high risk areas have been...Read More

1 Answer

428 views
F. Ray, Student
Answered: Sep 25, 2018
When an organization outsources it IS sources it is important that certain functions are performed by the IS management. Perhaps the most important function of the IS management is monitoring the...Read More

3 Answers

310 views
Hemangdoshi
Answered: Apr 01, 2020
D. read-only access to source code.

An important purpose of library control software is to allow read-only access to source code. Choices A, B and C are activities which library control...Read More

1 Answer

293 views
Hemangdoshi
Answered: Apr 01, 2020
D. vulnerability.

The lack of adequate security controls represents a vulnerability, exposing sensitive information and data to the risk of malicious damage, attack or unauthorized access...Read More

1 Answer

288 views
Hemangdoshi
Answered: Apr 01, 2020
B. management.

Management is ultimately responsible for effectiveness of internal control mechanism. Designing, implementing and maintaining a system of internal controls, including the...Read More

1 Answer

282 views
Hemangdoshi
Answered: Apr 01, 2020
B. Message integrity

Digital signature provides integrity, authentication and non-repudiation for electronic message. It does not ensure message confidentiality. A digital signature...Read More

2 Answers

275 views
Hemangdoshi
Answered: Apr 01, 2020
B. To provide a method of controlling costs and schedules and to ensure communication among users, IS auditors, management and IS personnel

A well-defined systems development methodology...Read More

1 Answer

260 views
Hemangdoshi
Answered: Apr 01, 2020
A. The extent of acceptable system downtime.

The RTO is a measure of the users tolerance to downtime. This is the amount of downtime of the business process that the business can tolerate...Read More

2 Answers

259 views
Hemangdoshi
Answered: Apr 01, 2020
C. detection risk.

This is an example of detection risk. Detection risk is the risk that the auditors fail to detect a material misstatement in the financial statements.

3 Answers

257 views
Christian Jackson, Content Developer
Answered: Aug 28, 2018
The OSI model is included in the computer software systems within the computers. The main function with the OSI model involves communication. This model contains many layers that perform certain...Read More

3 Answers

256 views
Hemangdoshi
Answered: Apr 01, 2020
B. Reviewing system log files

Reviewing system log files is the only trail that may provide information about the unauthorized activities in the production library. Source and object code...Read More

1 Answer

256 views
Hemangdoshi
Answered: Apr 01, 2020
C. graphically summarize data paths and storage.

Data flow diagrams are used as aids to graph or chart data flow and storage. They trace the data from its origination to destination,...Read More

1 Answer

252 views
Hemangdoshi
Answered: Apr 01, 2020
B. Detection

Detection risks are directly affected by the auditors selection of audit procedures and techniques. Inherent risks usually are not affected by the IS auditor. Control risks...Read More

1 Answer

252 views
E. Austin
Answered: Jan 03, 2019
The most critical step while planning an audit is performing a risk assessment. ISACA IS Audit and Assurance Standard 1202 require risk assessment as per the statement 1202.2, where IS audit and...Read More

2 Answers

250 views
Hemangdoshi
Answered: Apr 01, 2020
A. The application owner was unaware of several changes applied to the application by the IT Department

Choice A is the most significant finding as it directly affects the integrity of the...Read More

1 Answer

249 views

Related Topics Of CISA

Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.