Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 142

Mary Smith

Sat, 24 May 2025

CISA—Certified Information Systems Auditor - Part 142

1. An IS auditor usually places more reliance on evidence directly collected. What is an example of such evidence?

A) Evidence collected through personal observation
B) Evidence collected through systems logs provided by the organization's security administration
C) Evidence collected through surveys collected from internal staff
D) Evidence collected through transaction reports provided by the organization's IT administration



2. What kind of protocols does the OSI Transport Layer of the TCP/IP protocol suite provide to ensure reliable communication?

A) Nonconnection-oriented protocols
B) Connection-oriented protocols
C) Session-oriented protocols
D) Nonsession-oriented protocols



3. How is the time required for transaction processing review usually affected by properly implemented Electronic Data Interface (EDI)?

A) EDI usually decreases the time necessary for review.
B) EDI usually increases the time necessary for review.
C) Cannot be determined.
D) EDI does not affect the time necessary for review.



4. What would an IS auditor expect to find in the console log?

A) Evidence of password spoofing
B) System errors
C) Evidence of data copy activities
D) Evidence of password sharing



5. Atomicity enforces data integrity by ensuring that a transaction is either completed in its entirely or not at all. Atomicity is part of the ACID test reference for transaction processing.True or false?

A) True
B) False
C)
D)



1. Right Answer: A
Explanation: An IS auditor usually places more reliance on evidence directly collected, such as through personal observation.

2. Right Answer: B
Explanation: The transport layer of the TCP/IP protocol suite provides for connection- oriented protocols to ensure reliable communication.

3. Right Answer: A
Explanation: Electronic data interface (EDI) supports intervendor communication while decreasing the time necessary for review because it is usually configured to readily identify errors requiring follow-up.

4. Right Answer: B
Explanation: An IS auditor can expect to find system errors to be detailed in the console log.

5. Right Answer: A
Explanation: Atomicity enforces data integrity by ensuring that a transaction is either completed in its entirely or not at all. Atomicity is part of the ACID test reference for transaction processing.

0 Comments

Leave a comment