ISACA CISA Exam (page: 9)
ISACA Certified Information Systems Auditor
Updated on: 25-Dec-2025

Viewing Page 9 of 366

During audit fieldwork, an IS auditor learns that employees are allowed to connect their personal devices to company-owned computers. How can the auditor
BEST validate that appropriate security controls are in place to prevent data loss?

  1. Verify the data loss prevention (DLP) tool is properly configured by the organization.
  2. Review compliance with data loss and applicable mobile device user acceptance policies.
  3. Verify employees have received appropriate mobile device security awareness training.
  4. Conduct a walk-through to view results of an employee plugging in a device to transfer confidential data.

Answer(s): B



Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?

  1. Implementation methodology
  2. Test results
  3. Purchasing guidelines and policies
  4. Results of live processing

Answer(s): D



Which of the following is an advantage of using agile software development methodology over the waterfall methodology?

  1. Quicker end user acceptance
  2. Clearly defined business expectations
  3. Quicker deliverables
  4. Less funding required overall

Answer(s): C



In an online application, which of the following would provide the MOST information about the transaction audit trail?

  1. File layouts
  2. Data architecture
  3. System/process flowchart
  4. Source code documentation

Answer(s): C



On a public-key cryptosystem when there is no previous knowledge between parties, which of the following will BEST help to prevent one person from using a fictitious key to impersonate someone else?

  1. Send a certificate that can be verified by a certification authority with the public key.
  2. Encrypt the message containing the sender's public key, using the recipient's public key.
  3. Send the public key to the recipient prior to establishing the connection.
  4. Encrypt the message containing the sender's public key, using a private-key cryptosystem.

Answer(s): A



Viewing Page 9 of 366



Share your comments for ISACA CISA exam with other users:

Mike 8/20/2023 5:12:00 PM

the exam dumps are helping me get a solid foundation on the practical techniques and practices needed to be successful in the auditing world.
UNITED STATES


Sam 8/31/2023 10:32:00 AM

not bad but you question database from isaca
MALAYSIA


Deno 10/25/2023 1:14:00 AM

i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.
Anonymous