Free CISA Exam Braindumps (page: 14)

Page 13 of 457

Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?

  1. Results of a risk assessment
  2. Policies including BYOD acceptable use statements
  3. Findings from prior audits
  4. An inventory of personal devices to be connected to the corporate network

Answer(s): A



An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because central servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?

  1. Comparing all servers included in the current central log repository with the listing used for the prior-year audit
  2. Inspecting a sample of alerts generated from the central log repository
  3. Comparing a list of all servers from the directory server against a list of all servers present in the central log repository
  4. Inspecting a sample of alert settings configured in the central log repository

Answer(s): C



An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?

  1. Failover power
  2. Clustering
  3. Parallel testing
  4. Redundant pathways

Answer(s): B



During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?

  1. Request management wait until a final report is ready for discussion.
  2. Request the auditee provide management responses.
  3. Review working papers with the auditee.
  4. Present observations for discussion only.

Answer(s): D






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts