Share all information about certification and examination!
Forums
Members
Recent Posts
Forums
Dumps Discussion
ISACA
CISA
Notifications
Clear all
CISA
Share and discuss the opinions about the dumps with all CISA Q&As.
RSS
Page 1 / 3
1
2
3
Next
Topic Title
Views
Posts
Participants
Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?
Lewis
, 2 weeks ago
21
1
No replies
Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
Mario
, 2 weeks ago
12
1
No replies
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
Lloyd
, 2 weeks ago
10
1
No replies
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
Carmelo
, 3 weeks ago
43
1
No replies
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
Ezequiel
, 3 weeks ago
8
1
No replies
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
Chas
, 3 weeks ago
3
1
No replies
Which of the following business continuity activities prioritizes the recovery of critical functions?
Mikel
, 3 weeks ago
2
1
No replies
The IS auditor's FIRST action should be to:
Dante
, 3 weeks ago
1
1
No replies
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
Wilber
, 3 weeks ago
1
1
No replies
Which of the following is the GREATEST risk associated with storing customer data on a web server?
Mikel
, 2 months ago
24
1
No replies
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
Carmelo
, 2 months ago
23
1
No replies
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
Harris
, 2 months ago
52
1
No replies
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
Guillermo
, 2 months ago
23
1
No replies
The auditor's NEXT step should be to:
Galen
, 2 months ago
28
1
No replies
Which of the following is MOST important to include in forensic data collection and preservation procedures?
Octavio
, 2 months ago
27
1
No replies
When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:
Mikel
, 2 months ago
13
1
No replies
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
Gonzalo
, 2 months ago
18
1
No replies
Which of the following recommendations would BEST address the risk with minimal disruption to the business?
Man
, 2 months ago
17
1
No replies
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
Chas
, 2 months ago
13
1
No replies
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
Ernest
, 2 months ago
12
1
No replies
Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization's goals?
Arden
, 2 months ago
55
1
No replies
Which of the following concerns is BEST addressed by securing production source libraries?
Randolph
, 2 months ago
19
1
No replies
The PRIMARY benefit of automating application testing is to:
Ernest
, 2 months ago
37
1
No replies
Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?
Isreal
, 2 months ago
26
1
No replies
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
Coy
, 2 months ago
35
1
No replies
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
Ali
, 2 months ago
30
1
No replies
The use of which of the following is an inherent risk in the application container infrastructure?
Vicente
, 2 months ago
155
1
No replies
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
Manual
, 2 months ago
35
1
No replies
technologies that are not compatible with the old system?
Orval
, 2 months ago
27
1
No replies
Which of the following is the BEST way to prevent social engineering incidents?
Mauro
, 3 months ago
38
1
No replies
Page 1 / 3
1
2
3
Next
Share: