Free ISACA CISA Exam Braindumps (page: 12)

During audit fieldwork, an IS auditor learns that employees are allowed to connect their personal devices to company-owned computers. How can the auditor
BEST validate that appropriate security controls are in place to prevent data loss?

  1. Verify the data loss prevention (DLP) tool is properly configured by the organization.
  2. Review compliance with data loss and applicable mobile device user acceptance policies.
  3. Verify employees have received appropriate mobile device security awareness training.
  4. Conduct a walk-through to view results of an employee plugging in a device to transfer confidential data.

Answer(s): B



Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?

  1. Implementation methodology
  2. Test results
  3. Purchasing guidelines and policies
  4. Results of live processing

Answer(s): D



Which of the following is an advantage of using agile software development methodology over the waterfall methodology?

  1. Quicker end user acceptance
  2. Clearly defined business expectations
  3. Quicker deliverables
  4. Less funding required overall

Answer(s): C



In an online application, which of the following would provide the MOST information about the transaction audit trail?

  1. File layouts
  2. Data architecture
  3. System/process flowchart
  4. Source code documentation

Answer(s): C



Viewing page 12 of 457
Viewing questions 45 - 48 out of 1823 questions



Post your Comments and Discuss ISACA CISA exam prep with other Community members:

CISA Exam Discussions & Posts