ISACA Certified Information Systems Auditor CISA Exam Questions in PDF

Free ISACA CISA Dumps Questions (page: 34)

Which of the following is the MOST significant risk associated with the use of virtualization?

  1. Insufficient network bandwidth
  2. Single point of failure
  3. Inadequate configuration
  4. Performance issues of hosts

Answer(s): B



Which of the following is MOST important to consider when scheduling follow-up audits?

  1. The impact if corrective actions are not taken
  2. The amount of time the auditee has agreed to spend with auditors
  3. The efforts required for independent verification with new auditors
  4. Controls and detection risks related to the observations

Answer(s): A



Secure code reviews as part of a continuous deployment program are which type of control?

  1. Detective
  2. Corrective
  3. Logical
  4. Preventive

Answer(s): D



Which of the following would BEST detect unauthorized modification of data by a database administrator (DBA)?

  1. Audit database change requests
  2. Audit database activity logs
  3. Review changes to edit checks
  4. Compare data to input records

Answer(s): B



In a typical system development life cycle (SDLC), which group is PRIMARILY responsible for confirming compliance with requirements?

  1. Steering committee
  2. Risk management
  3. Quality assurance (QA)
  4. Internal audit

Answer(s): C



Share your comments for ISACA CISA exam with other users:

M
Mike
8/20/2023 5:12:00 PM

the exam dumps are helping me get a solid foundation on the practical techniques and practices needed to be successful in the auditing world.

S
Sam
8/31/2023 10:32:00 AM

not bad but you question database from isaca

D
Deno
10/25/2023 1:14:00 AM

i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.

AI Tutor 👋 I’m here to help!