Which of the following features of a library control software package would protect against unauthorized updating of source code?
Answer(s): A
Which of the following security testing techniques is MOST effective in discovering unknown malicious attacks?
Which of the following should be the PRIMARY objective of conducting an audit follow-up of management action plans?
Which of the following is the BEST use of a balanced scorecard when evaluating IT performance?
Answer(s): B
Which of the following is the MOST appropriate role for an IS auditor assigned as a team member for a software development project?
Answer(s): D
Share your comments for ISACA CISA exam with other users:
the exam dumps are helping me get a solid foundation on the practical techniques and practices needed to be successful in the auditing world.
not bad but you question database from isaca
i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.