New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free Access Isaca CISA New Release

Page: 18 / 90
Total 1195 questions

Certified Information Systems Auditor Questions and Answers

Question 69

An IS auditor is reviewing an artificial intelligence (Al) and expert system application. The system has produced several critical errors with severe impact. Which of the following should the IS auditor do NEXT to understand the cause of the errors?

Options:

A.

Review the decision-making logic built into the system.

B.

Interview the system owner.

C.

Understand the purpose and functionality of the system.

D.

Verify system adherence to corporate policy.

Question 70

Which of the following is the MOST effective way to evaluate the physical security of a data center?

Options:

A.

Review data center access logs.

B.

Interview data center stakeholders.

C.

Review camera footage from the data center.

D.

Perform a data center tour.

Question 71

Which of the following network communication protocols is used by network devices such as routers to send error messages and operational information indicating success or failure when communicating with another IP address?

Options:

A.

Transmission Control Protocol/Internet Protocol (TCP/IP)

B.

Internet Control Message Protocol

C.

Multipurpose Transaction Protocol

D.

Point-to-Point Tunneling Protocol

Question 72

Which of the following is MOST important when creating a forensic image of a hard drive?

Options:

A.

Requiring an independent third party be present while imaging

B.

Securing a backup copy of the hard drive

C.

Generating a content hash of the hard drive

D.

Choosing an industry-leading forensics software tool

Page: 18 / 90
Total 1195 questions