100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CISA FINAL EXAM QUESTIONS AND 100% CORRECT ANSWERS

Puntuación
-
Vendido
-
Páginas
29
Grado
A+
Subido en
28-08-2025
Escrito en
2025/2026

CISA FINAL EXAM QUESTIONS AND 100% CORRECT ANSWERS

Institución
CISA
Grado
CISA










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CISA
Grado
CISA

Información del documento

Subido en
28 de agosto de 2025
Número de páginas
29
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CISA FINAL EXAM QUESTIONS
AND 100% CORRECT ANSWERS!!
5. While reviewing the IT infrastructure, an IS auditor notices that storage resources
are continuously being added. The IS auditor should:
A. recommend the use of disk mirroring.
B. review the adequacy of offsite storage.
C. review the capacity management process.
D. recommend the use of a compression algorithm.

C

6. During a compliance audit of a small bank, the IS auditor notes that both the IT and
accounting functions are being performed by the same user of the financial system.
Which of the following reviews conducted by a supervisor would represent the BEST
compensating control?
A. Audit trails that show the date and time of the transaction.
B. A summary daily report with the total numbers and dollar amounts of each transaction.
C. User account administration.
D. Computer log files that show individual transactions in the financial system.

D

7. From a control perspective, the PRIMARY objective of classifying information assets
is to:
A. establish guidelines for the level of access controls that should be
assigned. B. ensure access controls are assigned to all information assets.
C. assist management and auditors in risk assessment. D.
identify which assets need to be insured against losses.

,A

8. To gain an understanding of the effectiveness of an organization's planning and
management of investments in IT assets, an IS auditor should review the:
A. enterprise data model.
B. IT balanced scorecard (BSC).
C. IT organizational structure. D.
historical financial statements.

B

9. When using a universal storage bus (USB) flash drive to transport confidential corporate
data to an offsite location, an effective control would be to:
A. carry the flash drive in a portable safe.
B. assure management that you will not lose the flash drive. C.
request that management deliver the flash drive by courier. D.
encrypt the folder containing the data with a strong key.

D

10. For a mission-critical application with a low recovery time objective (RTO), the IS
auditor would recommend the use of which of the following recovery strategies?
A. Mobile site.
B. Redundant site.
C. Hot site.
D. Reciprocal agreements.

B

11. When reviewing IS strategies, an IS auditor can BEST assess whether IS
strategy supports the organizations' business objectives by determining whether IS:
A. has all the personnel and equipment it needs.
B. plans are consistent with management strategy.
C. uses its equipment and personnel efficiently and effectively.
D. has sufficient excess capacity to respond to changing directions.

, B

12. Which of the following system and data conversion strategies provides the
GREATEST redundancy?
A. Direct cutover
B. Pilot study
C. Phased approach
D. Parallel run

D

13. Web and e-mail filtering tools are PRIMARILY valuable to an organization because
they:
A. protect the organization from viruses and non-business materials.
B. maximize employee performance.
C. safeguard the organization's image.
D. assist the organization in preventing legal issues.

A

14. The PRIMARY reason an IS auditor performs a functional walkthrough during
the preliminary phase of an audit assignment is to:
A. understand the business process.
B. comply with auditing standards.
C. identify control weakness.
D. plan substantive testing.

A

15. An IS auditor discovers that the chief information officer (CIO) of an organization is
using a wireless broadband modem utilizing global system for mobile communications
(GSM) technology. This modem is being used to connect the CIO's laptop to the
corporate virtual private network (VPN) when the CIO travels outside of the office. The
IS auditor should:
A. do nothing since the inherent security features of GSM technology are appropriate.
$13.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
QUINTER New York College Of Dentistry
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
352
Miembro desde
2 año
Número de seguidores
104
Documentos
38721
Última venta
2 días hace

3.4

59 reseñas

5
26
4
8
3
7
2
2
1
16

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes