Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 156

Mary Smith

Thu, 15 May 2025

CISA—Certified Information Systems Auditor - Part 156

1. When storing data archives off-site, what must be done with the data to ensure data completeness?

A) The data must be normalized.
B) The data must be validated.
C) The data must be parallel-tested.
D) The data must be synchronized.



2. Which of the following can help detect transmission errors by appending specially calculated bits onto the end of each segment of data?

A) Redundancy check
B) Completeness check
C) Accuracy check
D) Parity check



3. What is an edit check to determine whether a field contains valid data?

A) Completeness check
B) Accuracy check
C) Redundancy check
D) Reasonableness check



4. A transaction journal provides the information necessary for detecting unauthorized ___________ (fill in the blank) from a terminal.

A) Deletion
B) Input
C) Access
D) Duplication



5. An intentional or unintentional disclosure of a password is likely to be evident within control logs. True or false?

A) True
B) False
C)
D)



1. Right Answer: D
Explanation: When storing data archives off-site, data must be synchronized to ensure data completeness

2. Right Answer: A
Explanation: A redundancy check can help detect transmission errors by appending especially calculated bits onto the end of each segment of data.

3. Right Answer: A
Explanation: A completeness check is an edit check to determine whether a field contains valid data.

4. Right Answer: B
Explanation: A transaction journal provides the information necessary for detecting unauthorized input from a terminal.

5. Right Answer: B
Explanation: An intentional or unintentional disclosure of a password is not likely to be evident within control logs.

0 Comments

Leave a comment