Free ISACA CISA Exam Braindumps (page: 83)

Which of the following is MOST important to determine when conducting a post-implementation review?

  1. Whether the solution architecture complies with IT standards
  2. Whether success criteria have been achieved
  3. Whether lessons learned have been documented
  4. Whether the project has been delivered within the approved budget

Answer(s): B



While reviewing an organization's business continuity plan (BCP), an IS auditor observes that a recently developed application is not included. The IS auditor should:

  1. ensure that the criticality of the application is determined.
  2. include in the audit findings that the BCP is incomplete.
  3. recommend that the application be incorporated in the BCP.
  4. ignore the observation as the application is not mission critical.

Answer(s): A



Data anonymization helps to prevent which types of attacks in a big data environment?

  1. Man-in-the-middle
  2. Denial of service (DoS)
  3. Correlation
  4. Spoofing

Answer(s): C



During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:

  1. note the noncompliance in the audit working papers.
  2. determine why the procedures were not followed.
  3. issue an audit memorandum identifying the noncompliance.
  4. include the noncompliance in the audit report.

Answer(s): B



Viewing page 83 of 457
Viewing questions 329 - 332 out of 1823 questions



Post your Comments and Discuss ISACA CISA exam prep with other Community members:

CISA Exam Discussions & Posts