Free ISACA CISA Exam Braindumps (page: 47)

When evaluating the management practices at a third-party organization providing outsourced services, the IS auditor considers relying on an independent auditor's report. The IS auditor would FIRST:

  1. review the objectives of the audit.
  2. examine the independent auditor's workpapers.
  3. discuss the report with the independent auditor.
  4. determine if recommendations have been implemented.

Answer(s): A



What is the BEST control to address SQL injection vulnerabilities?

  1. Digital signatures
  2. Input validation
  3. Unicode translation
  4. Secure Sockets Layer (SSL) encryption

Answer(s): B



In a typical network architecture used for e-commerce, a load balancer is normally found between the:

  1. routers and the web servers.
  2. mail servers and the mail repositories.
  3. users and the external gateways.
  4. databases and internal firewalls.

Answer(s): A



During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?

  1. Perform a review of terminated users' account activity.
  2. Conclude that IT general controls are ineffective.
  3. Communicate risks to the application owner.
  4. Perform substantive testing of terminated users' access rights.

Answer(s): C



Viewing page 47 of 457
Viewing questions 185 - 188 out of 1823 questions



Post your Comments and Discuss ISACA CISA exam prep with other Community members:

CISA Exam Discussions & Posts