Free CISA Exam Braindumps (page: 12)

Page 11 of 457

During audit fieldwork, an IS auditor learns that employees are allowed to connect their personal devices to company-owned computers. How can the auditor
BEST validate that appropriate security controls are in place to prevent data loss?

  1. Verify the data loss prevention (DLP) tool is properly configured by the organization.
  2. Review compliance with data loss and applicable mobile device user acceptance policies.
  3. Verify employees have received appropriate mobile device security awareness training.
  4. Conduct a walk-through to view results of an employee plugging in a device to transfer confidential data.

Answer(s): B



Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?

  1. Implementation methodology
  2. Test results
  3. Purchasing guidelines and policies
  4. Results of live processing

Answer(s): D



Which of the following is an advantage of using agile software development methodology over the waterfall methodology?

  1. Quicker end user acceptance
  2. Clearly defined business expectations
  3. Quicker deliverables
  4. Less funding required overall

Answer(s): C



In an online application, which of the following would provide the MOST information about the transaction audit trail?

  1. File layouts
  2. Data architecture
  3. System/process flowchart
  4. Source code documentation

Answer(s): C






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts