The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.
Table of Contents
- CISA Question 2441
- Question
- Answer
- CISA Question 2442
- Question
- Answer
- CISA Question 2443
- Question
- Answer
- CISA Question 2444
- Question
- Answer
- CISA Question 2445
- Question
- Answer
- CISA Question 2446
- Question
- Answer
- CISA Question 2447
- Question
- Answer
- CISA Question 2448
- Question
- Answer
- CISA Question 2449
- Question
- Answer
- CISA Question 2450
- Question
- Answer
CISA Question 2441
Question
To create a digital signature in a message using asymmetric encryption, it is necessary to:
A. first use a symmetric algorithm for the authentication sequence.
B. encrypt the authentication sequence using a public key.
C. transmit the actual digital signature in unencrypted clear text.
D. encrypt the authentication sequence using a private key.
Answer
D. encrypt the authentication sequence using a private key.
CISA Question 2442
Question
Which of the following BEST helps to identify errors during data transfer?
A. Decrease the size of data transfer packets.
B. Test the integrity of the data transfer.
C. Review and verify the data transfer sequence numbers.
D. Enable a logging process for data transfer.
Answer
B. Test the integrity of the data transfer.
CISA Question 2443
Question
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
A. Substantive testing
B. Walk-through reviews
C. Compliance testing
D. Design documentation reviews
Answer
A. Substantive testing
CISA Question 2444
Question
Which of the following strategies BEST optimizes data storage without compromising data retention practices?
A. Limiting the size of the file attachments being sent via email
B. Automatically deleting emails older than one year
C. Moving emails to a virtual email vault after 30 days
D. Allowing employees to store large emails on flash drives
Answer
C. Moving emails to a virtual email vault after 30 days
CISA Question 2445
Question
For a company that outsources payroll processing, which of the following is the BEST way to ensure that only authorized employees are paid?
A. The company’s bank reconciliations should be independently prepared and checked.
B. Employees should receive pay statements showing gross pay, net pay, and deductions.
C. Only payroll employees should be given the password for data entry and report retrieval.
D. Electronic payroll reports should be independently reviewed.
Answer
A. The company’s bank reconciliations should be independently prepared and checked.
CISA Question 2446
Question
Which of the following would provide the MOST assurance that an application will work in a live environment?
A. Walking through the programs to view the results of error processing
B. Processing of test data to prove that data can be passed between individual programs
C. Walking through the programs to view the results of processing copies of production data.
D. Processing of valid and erroneous data in an acceptance test environment
Answer
D. Processing of valid and erroneous data in an acceptance test environment
CISA Question 2447
Question
When reviewing an end-user computing (EUC) application, which of the following techniques is MOST appropriate for testing program logic?
A. Integrated testing facility
B. Test decking
C. Re-performance
D. Key calculation inspection
Answer
B. Test decking
CISA Question 2448
Question
A retailer normally uses a scanner to read product labels and input product codes and prices. The unit is not functioning and staff are keying information manually.
With respect to the accuracy of the input, it is likely that:
A. audit risk has increased.
B. control risk has increased.
C. inherent risk has decreased.
D. detection risk has decreased.
Answer
C. inherent risk has decreased.
CISA Question 2449
Question
IS management has decided to replace the current single-server-based local area network (LAN) with three interconnected servers running different operating systems. Existing applications and data on the old server have been exclusively distributed on the new servers. This will MOST likely result in:
A. disclosure of information.
B. multiple authentication.
C. data incompleteness.
D. data unavailability.
Answer
B. multiple authentication.
CISA Question 2450
Question
Controls related to authorized modifications to production programs are BEST tested by:
A. testing only the authorizations to implement the new program.
B. tracing modifications from the executable program back to the original request for change.
C. reviewing only the actual lines of source code changed in the program.
D. tracing modifications from the original request for change forward to the executable program.
Answer
D. tracing modifications from the original request for change forward to the executable program.