Topics
Products
Follow Us:
Hemangdoshi
Answered: May 27, 2020
B. high-risk areas within the organization.

The first and most critical step in the process is to identify high-risk areas within the organization. Once high risk areas have been...Read More

1 Answer

485 views
Hemangdoshi
Answered: May 27, 2020
D. read-only access to source code.

An important purpose of library control software is to allow read-only access to source code. Choices A, B and C are activities which library control...Read More

1 Answer

359 views
Hemangdoshi
Answered: May 27, 2020
D. vulnerability.

The lack of adequate security controls represents a vulnerability, exposing sensitive information and data to the risk of malicious damage, attack or unauthorized access...Read More

1 Answer

341 views
Hemangdoshi
Answered: May 27, 2020
B. Reviewing system log files

Reviewing system log files is the only trail that may provide information about the unauthorized activities in the production library. Source and object code...Read More

1 Answer

335 views
F. Ray, Student
Answered: Sep 25, 2018
When an organization outsources it IS sources it is important that certain functions are performed by the IS management. Perhaps the most important function of the IS management is monitoring the...Read More

3 Answers

330 views
Hemangdoshi
Answered: May 27, 2020
B. management.

Management is ultimately responsible for effectiveness of internal control mechanism. Designing, implementing and maintaining a system of internal controls, including the...Read More

1 Answer

324 views
Christian Jackson, Content Developer
Answered: Aug 28, 2018
The OSI model is included in the computer software systems within the computers. The main function with the OSI model involves communication. This model contains many layers that perform certain...Read More

3 Answers

306 views
Hemangdoshi
Answered: May 27, 2020
B. Detection

Detection risks are directly affected by the auditors selection of audit procedures and techniques. Inherent risks usually are not affected by the IS auditor. Control risks...Read More

1 Answer

302 views
Hemangdoshi
Answered: May 27, 2020
C. require that changes after that point be evaluated for cost-effectiveness.

Projects often have a tendency to expand, especially during the requirements definition phase. This expansion...Read More

1 Answer

301 views
Hemangdoshi
Answered: May 27, 2020
B. reduce the opportunity for an employee to commit an improper or illegal act.

The correct answer is: B. reduce the opportunity for an employee to commit an improper or illegal act....Read More

1 Answer

291 views
E. Austin
Answered: Jan 03, 2019
The most critical step while planning an audit is performing a risk assessment. ISACA IS Audit and Assurance Standard 1202 require risk assessment as per the statement 1202.2, where IS audit and...Read More

2 Answers

289 views
Hemangdoshi
Answered: May 27, 2020
B. Message integrity

Digital signature provides integrity, authentication and non-repudiation for electronic message. It does not ensure message confidentiality. A digital signature...Read More

2 Answers

289 views
Hemangdoshi
Answered: May 27, 2020
C. compares processing output with independently calculated data.

An integrated test facility is considered a useful audit tool because it uses the same programs to compare processing using...Read More

1 Answer

287 views
Hemangdoshi
Answered: May 27, 2020
B. To provide a method of controlling costs and schedules and to ensure communication among users, IS auditors, management and IS personnel

A well-defined systems development methodology...Read More

1 Answer

286 views
Hemangdoshi
Answered: May 27, 2020
A. during the initial planning stages of the project.

It is extremely important that the project be planned properly and that the specific phases and deliverables be identified during the...Read More

1 Answer

286 views

Related Topics Of CISA

Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.