ISACA CISA Exam (page: 34)
ISACA Certified Information Systems Auditor
Updated on: 25-Dec-2025

Viewing Page 34 of 366

Which of the following is the MOST significant risk associated with the use of virtualization?

  1. Insufficient network bandwidth
  2. Single point of failure
  3. Inadequate configuration
  4. Performance issues of hosts

Answer(s): B



Which of the following is MOST important to consider when scheduling follow-up audits?

  1. The impact if corrective actions are not taken
  2. The amount of time the auditee has agreed to spend with auditors
  3. The efforts required for independent verification with new auditors
  4. Controls and detection risks related to the observations

Answer(s): A



Secure code reviews as part of a continuous deployment program are which type of control?

  1. Detective
  2. Corrective
  3. Logical
  4. Preventive

Answer(s): D



Which of the following would BEST detect unauthorized modification of data by a database administrator (DBA)?

  1. Audit database change requests
  2. Audit database activity logs
  3. Review changes to edit checks
  4. Compare data to input records

Answer(s): B



In a typical system development life cycle (SDLC), which group is PRIMARILY responsible for confirming compliance with requirements?

  1. Steering committee
  2. Risk management
  3. Quality assurance (QA)
  4. Internal audit

Answer(s): C



Viewing Page 34 of 366



Share your comments for ISACA CISA exam with other users:

Mike 8/20/2023 5:12:00 PM

the exam dumps are helping me get a solid foundation on the practical techniques and practices needed to be successful in the auditing world.
UNITED STATES


Sam 8/31/2023 10:32:00 AM

not bad but you question database from isaca
MALAYSIA


Deno 10/25/2023 1:14:00 AM

i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.
Anonymous