Auditor CISA
2025/2026
Exam Prep Material
with
Verified Questions and Answers
A+ Grades Guarantee
, A. Use a role-based model to grant user access
Information system auditors have
identified separation of duties in
enterprise resource planning (ERP)
systems.
Which of the following is the best
way to prevent repetitive
configuration from occurring?
A. Use a role-based model to grant
user access
B. Regularly monitor access rights
C. Correcting separation of duties
D. Reference standard user access
matrix
B. The criticality of the business processes supported by the application
Which of the following should be the
most important factor driving a
single application availability
requirement when developing a
disaster recovery plan?
A. Confidentiality of data processed
by the application
B. The criticality of the business
processes supported by the
application
C. Total cost of ownership (TCO) of
the application
D. Support the application's network
bandwidth
D. Perform inventory of assets
In order to develop a robust data
security program, the first step you
should take is:
A. Talk to the senior management
level of IT.
B. Implement monitoring controls.
C. Implement data loss prevention
measures
D. Perform inventory of assets