Which of the following is the MOST significant risk associated with the use of virtualization?
Answer(s): B
Which of the following is MOST important to consider when scheduling follow-up audits?
Answer(s): A
Secure code reviews as part of a continuous deployment program are which type of control?
Answer(s): D
Which of the following would BEST detect unauthorized modification of data by a database administrator (DBA)?
In a typical system development life cycle (SDLC), which group is PRIMARILY responsible for confirming compliance with requirements?
Answer(s): C
Share your comments for ISACA CISA exam with other users:
the exam dumps are helping me get a solid foundation on the practical techniques and practices needed to be successful in the auditing world.
not bad but you question database from isaca
i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.