Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Isaca Certification CISA Full Course Free

Page: 29 / 90
Total 1195 questions

Certified Information Systems Auditor Questions and Answers

Question 113

An IS auditor finds a user account where privileged access is not appropriate for the user’s role. Which of the following would provide the BEST evidence to determine whether the risk of this access has been exploited?

Options:

A.

Activity log for the account

B.

Interview with the user's manager

C.

Last logon date for the account

D.

Documented approval for the account

Question 114

A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:

Options:

A.

the audit committee.

B.

audit management.

C.

auditee line management.

D.

the police.

Question 115

Which of the following is MOST important to the effectiveness of smoke detectors installed in a data processing facility?

Options:

A.

Detectors trigger audible alarms when activated.

B.

Detectors have the correct industry certification.

C.

Detectors are linked to dry pipe fire suppression systems.

D.

Detectors are linked to wet pipe fire suppression systems.

Question 116

The waterfall life cycle model of software development is BEST suited for which of the following situations?

Options:

A.

The project will involve the use of new technology.

B.

The project intends to apply an object-oriented design approach.

C.

The project requirements are well understood.

D.

The project is subject to time pressures.

Page: 29 / 90
Total 1195 questions