During audit fieldwork, an IS auditor learns that employees are allowed to connect their personal devices to company-owned computers. How can the auditorBEST validate that appropriate security controls are in place to prevent data loss?
Answer(s): B
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
Answer(s): D
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
Answer(s): C
In an online application, which of the following would provide the MOST information about the transaction audit trail?
On a public-key cryptosystem when there is no previous knowledge between parties, which of the following will BEST help to prevent one person from using a fictitious key to impersonate someone else?
Answer(s): A
Share your comments for ISACA CISA exam with other users:
the exam dumps are helping me get a solid foundation on the practical techniques and practices needed to be successful in the auditing world.
not bad but you question database from isaca
i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.