Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 107

Mary Smith

Sat, 24 May 2025

CISA—Certified Information Systems Auditor - Part 107

1. Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?

A) Stress testing
B) Regression testing
C) User acceptance testing
D) Black-box testing



2. Reconciliations have identified data discrepancies between an enterprise data warehouse and a revenue system for key financial reports. What is the GREATEST risk to the organization in this situation?

A) The key financial reports may no longer be produced
B) Financial reports may be delayed
C) Undetected fraud may occur
D) Decisions may be made based on incorrect information



3. Which of the following is the MOST important feature of access control software?

A) Authentication
B) Violation reporting
C) Nonrepudiation
D) Identification



4. The BEST access strategy while configuring a firewall would be to:

A) permit access to all and log the activity
B) deny access to all but permit selected
C) permit access to all but deny selected
D) deny access to all except authorized programs



5. For several years, a vendor has been providing offsite backup media and record storage for a bank. Due to familiarity with bank employees, the vendor does not consistently require authorization forms from them to retrieve media. Which of the following is the GREATEST risk from this situation?

A) Bank employees can inappropriately obtain sensitive records
B) Backup tapes may not be available
C) Chain of custody could not be validated
D) The vendor provides the incorrect media to employees



1. Right Answer: B
Explanation:

2. Right Answer: C
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: D
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment