The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.
Table of Contents
- CISA Question 981
- Question
- Answer
- Explanation
- CISA Question 982
- Question
- Answer
- Explanation
- CISA Question 983
- Question
- Answer
- Explanation
- CISA Question 984
- Question
- Answer
- Explanation
- CISA Question 985
- Question
- Answer
- Explanation
- CISA Question 986
- Question
- Answer
- Explanation
- CISA Question 987
- Question
- Answer
- Explanation
- CISA Question 988
- Question
- Answer
- Explanation
- CISA Question 989
- Question
- Answer
- Explanation
- CISA Question 990
- Question
- Answer
- Explanation
CISA Question 981
Question
Database snapshots can provide an excellent audit trail for an IS auditor. True or false?
A. True
B. False
Answer
A. True
Explanation
Database snapshots can provide an excellent audit trail for an IS auditor.
CISA Question 982
Question
What is a data validation edit control that matches input data to an occurrence rate? Choose the BEST answer.
A. Accuracy check
B. Completeness check
C. Reasonableness check
D. Redundancy check
Answer
C. Reasonableness check
Explanation
A reasonableness check is a data validation edit control that matches input data to an occurrence rate.
CISA Question 983
Question
Processing controls ensure that data is accurate and complete, and is processed only through which of the following?
A. Documented routines
B. Authorized routines
C. Accepted routines
D. Approved routines
Answer
B. Authorized routines
Explanation
Processing controls ensure that data is accurate and complete, and is processed only through authorized routines.
CISA Question 984
Question
Data edits are implemented before processing and are considered which of the following?
A. Deterrent integrity controls
B. Detective integrity controls
C. Corrective integrity controls
D. Preventative integrity controls
Answer
D. Preventative integrity controls
Explanation
Data edits are implemented before processing and are considered preventive integrity controls.
CISA Question 985
Question
What is used as a control to detect loss, corruption, or duplication of data?
A. Redundancy check
B. Reasonableness check
C. Hash totals
D. Accuracy check
Answer
C. Hash totals
Explanation
Hash totals are used as a control to detect loss, corruption, or duplication of data.
CISA Question 986
Question
________________ should be implemented as early as data preparation to support data integrity at the earliest point possible.
A. Control totals
B. Authentication controls
C. Parity bits
D. Authorization controls
Answer
A. Control totals
Explanation
Control totals should be implemented as early as data preparation to support data integrity at the earliest point possible.
CISA Question 987
Question
When should an application-level edit check to verify that availability of funds was completed at the electronic funds transfer (EFT) interface?
A. Before transaction completion
B. Immediately after an EFT is initiated
C. During run-to-run total testing
D. Before an EFT is initiated
Answer
D. Before an EFT is initiated
Explanation
An application-level edit check to verify availability of funds should be completed at the electronic funds transfer (EFT) interface before an EFT is initiated.
CISA Question 988
Question
Whenever business processes have been re-engineered, the IS auditor attempts to identify and quantify the impact of any controls that might have
been removed, or controls that might not work as effectively after business process changes. True or false?
A. True
B. False
Answer
A. True
Explanation
Whenever business processes have been re-engineered, the IS auditor should attempt to identify and quantify the impact of any controls that might have been removed, or controls that might not work as effectively after business process changes.
CISA Question 989
Question
Business process re-engineering often results in ___________________ automation, which results in ____________ number of people using
technology. Fill in the blanks.
A. Increased; a greater
B. Increased; a fewer
C. Less; a fewer
D. Increased; the same
Answer
A. Increased; a greater
Explanation
Business process re-engineering often results in increased automation, which results in a greater number of people using technology.
CISA Question 990
Question
Which of the following exploit vulnerabilities to cause loss or damage to the organization and its assets?
A. Exposures
B. Threats
C. Hazards
D. Insufficient controls
Answer
B. Threats
Explanation
Threats exploit vulnerabilities to cause loss or damage to the organization and its assets.