Free CISA Exam Braindumps (page: 44)

Page 44 of 457

Which of the following would BEST detect unauthorized modification of data by a database administrator (DBA)?

  1. Audit database change requests
  2. Audit database activity logs
  3. Review changes to edit checks
  4. Compare data to input records

Answer(s): B



In a typical system development life cycle (SDLC), which group is PRIMARILY responsible for confirming compliance with requirements?

  1. Steering committee
  2. Risk management
  3. Quality assurance (QA)
  4. Internal audit

Answer(s): C



Which of the following BEST facilitates detection of zero-day exploits?

  1. Anti-malware software
  2. User behavior analytics
  3. Intrusion detection systems (IDS)
  4. Intrusion prevention systems (IPS)

Answer(s): B



Which of the following is MOST important to review when evaluating the performance of a critical web application?

  1. Business-defined application response times
  2. Feedback from customer satisfaction surveys
  3. Roles and responsibilities for reporting
  4. Strategy for application performance monitoring in the cloud

Answer(s): A






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts