The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.
Table of Contents
- CISA Question 2451
- Question
- Answer
- CISA Question 2452
- Question
- Answer
- CISA Question 2453
- Question
- Answer
- CISA Question 2454
- Question
- Answer
- CISA Question 2455
- Question
- Answer
- CISA Question 2456
- Question
- Answer
- CISA Question 2457
- Question
- Answer
- CISA Question 2458
- Question
- Answer
- CISA Question 2459
- Question
- Answer
- CISA Question 2460
- Question
- Answer
CISA Question 2451
Question
During a computer forensics investigation, what is the PRIMARY reason for obtaining a bit-for-bit copy of data in storage?
A. To document findings
B. To obtain residual data
C. To obtain data as well as source code details
D. To transfer the data into a controlled location
Answer
B. To obtain residual data
CISA Question 2452
Question
Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor’s BEST recommendation?
A. Ensure the business signs off on end-to-end user acceptance test results.
B. Ensure corrected program code is compiled in a dedicated server.
C. Ensure change management reports are independently reviewed.
D. Ensure programmers cannot access code after the completion of program edits.
Answer
B. Ensure corrected program code is compiled in a dedicated server.
CISA Question 2453
Question
Which cloud deployment model is MOST likely to be limited in scalability?
A. Public
B. Private
C. Hybrid
D. Community
Answer
B. Private
CISA Question 2454
Question
A programmer has made unauthorized changes to key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?
A. The user requirements were not documented.
B. Payroll files were not under the control of a librarian.
C. The programmer did not involve the user in testing.
D. The programmer has access to the production programs.
Answer
D. The programmer has access to the production programs.
CISA Question 2455
Question
Which of the following is the MOST reliable control to prevent double payments made as a result of payment system batch jobs restarting after processing errors?
A. Database rollback in case of processing errors
B. Review of batch job competition logs
C. Duplicate verification at the last possible point in processing
D. Restart procedures integrated in job controls
Answer
C. Duplicate verification at the last possible point in processing
CISA Question 2456
Question
Which of the following is used in providing logical access control to restrict updating or deleting business information in a relational database?
A. Trigger
B. View
C. Join
D. Primary key
Answer
B. View
CISA Question 2457
Question
Which of the following is the MOST effective way to minimize the risk of a SQL injection attack?
A. Reconfiguring content filtering settings
B. Performing activity monitoring
C. Using secure coding practices
D. Implementing an intrusion detection tool
Answer
C. Using secure coding practices
CISA Question 2458
Question
Which of the following methods should be used to purge confidential data from write-once optical media?
A. Degauss the media.
B. Destroy the media.
C. Remove the references to data from the access index.
D. Write over the data with null values.
Answer
B. Destroy the media.
CISA Question 2459
Question
Which of the following is the BEST physical security solution for granting and restricting access to individuals based on their unique access needs?
A. Bolting door locks
B. Cipher locks
C. Closed-circuit television (CCTV)
D. Electronic badge system
Answer
D. Electronic badge system
CISA Question 2460
Question
Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?
A. Preventive
B. Deterrent
C. Corrective
D. Detective
Answer
A. Preventive