Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 171

Mary Smith

Sun, 15 Mar 2026

CISA—Certified Information Systems Auditor - Part 171

1. What is an acceptable mechanism for extremely time-sensitive transaction processing?

A) Off-site remote journaling
B) Electronic vaulting
C) Shadow file processing
D) Storage area network



2. Off-site data backup and storage should be geographically separated so as to _______________ (fill in the blank) the risk of a widespread physical disaster such as a hurricane or earthquake.

A) Accept
B) Eliminate
C) Transfer
D) Mitigate



3. Why is a clause for requiring source code escrow in an application vendor agreement important?

A) To segregate systems development and live environments
B) To protect the organization from copyright disputes
C) To ensure that sufficient code is available when needed
D) To ensure that the source code remains available even if the application vendor goes out of business



4. What uses questionnaires to lead the user through a series of choices to reach a conclusion?

A) Logic trees
B) Decision trees
C) Decision algorithms
D) Logic algorithms



5. What protects an application purchaser's ability to fix or change an application in case the application vendor goes out of business?

A) Assigning copyright to the organization
B) Program back doors
C) Source code escrow
D) Internal programming expertise



1. Right Answer: C
Explanation: Shadow file processing can be implemented as a recovery mechanism for extremely time- sensitive transaction processing.

2. Right Answer: D
Explanation: Off-site data backup and storage should be geographically separated, to mitigate the risk of a widespread physical disaster such as a hurricane or an earthquake.

3. Right Answer: D
Explanation: A clause for requiring source code escrow in an application vendor agreement is important to ensure that the source code remains available even if the application vendor goes out of business.

4. Right Answer: B
Explanation: Decision trees use questionnaires to lead the user through a series of choices to reach a conclusion.

5. Right Answer: C
Explanation: Source code escrow protects an application purchaser's ability to fix or change an application in case the application vendor goes out of business.

0 Comments

Leave a comment