Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 141

Mary Smith

Thu, 19 Jun 2025

CISA—Certified Information Systems Auditor - Part 141

1. Batch control reconciliation is a _____________________ (fill the blank) control for mitigating risk of inadequate segregation of duties.

A) Detective
B) Corrective
C) Preventative
D) Compensatory



2. Key verification is one of the best controls for ensuring that:

A) Data is entered correctly
B) Only authorized cryptographic keys are used
C) Input is authorized
D) Database indexing is performed properly



3. If senior management is not committed to strategic planning, how likely is it that a company's implementation of IT will be successful?

A) IT cannot be implemented if senior management is not committed to strategic planning.
B) More likely.
C) Less likely.
D) Strategic planning does not affect the success of a company's implementation of IT.



4. Which of the following could lead to an unintentional loss of confidentiality?

A) Lack of employee awareness of a company's information security policy
B) Failure to comply with a company's information security policy
C) A momentary lapse of reason
D) Lack of security policy enforcement procedures



5. What topology provides the greatest redundancy of routes and the greatest network fault tolerance?

A) A star network topology
B) A mesh network topology with packet forwarding enabled at each host
C) A bus network topology
D) A ring network topology



1. Right Answer: D
Explanation: Batch control reconciliations is a compensatory control for mitigating risk of inadequate segregation of duties.

2. Right Answer: A
Explanation: Key verification is one of the best controls for ensuring that data is entered correctly.

3. Right Answer: C
Explanation: A company's implementation of IT will be less likely to succeed if senior management is not committed to strategic planning.

4. Right Answer: A
Explanation: Lack of employee awareness of a company's information security policy could lead to an unintentional loss of confidentiality.

5. Right Answer: B
Explanation: A mesh network topology provides a point-to-point link between every network host. If each host is configured to route and forward communication, this topology provides the greatest redundancy of routes and the greatest network fault tolerance.

0 Comments

Leave a comment