Free ISACA CISA Exam Braindumps (page: 66)

An algorithm in an email program analyzes traffic to quarantine emails identified as spam. The algorithm in the program is BEST characterized as which type of control?

  1. Detective
  2. Directive
  3. Preventive
  4. Corrective

Answer(s): C



During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements. Which of the following is the BEST way to obtain this assurance?

  1. Re-perform the calculation with audit software.
  2. Review the source code related to the calculation.
  3. Review sign-off documentation.
  4. Inspect user acceptance test (UAT) results.

Answer(s): A



When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled backups are timely and run to completion?

  1. Reviewing a sample of system-generated backup logs
  2. Interviewing key personnel involved in the backup process
  3. Observing the execution of a daily backup run
  4. Evaluating the backup policies and procedures

Answer(s): A



During the planning stage of a compliance audit, an IS auditor discovers that a bank's inventory of compliance requirements does not include recent regulatory changes related to managing data risk. What should the auditor do FIRST?

  1. Ask management why the regulatory changes have not been included.
  2. Report the missing regulatory updates to the chief information officer (CIO).
  3. Discuss potential regulatory issues with the legal department.
  4. Exclude recent regulatory changes from the audit scope.

Answer(s): A



Viewing page 66 of 457
Viewing questions 261 - 264 out of 1823 questions



Post your Comments and Discuss ISACA CISA exam prep with other Community members:

CISA Exam Discussions & Posts