Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 356

Mary Smith

Thu, 19 Jun 2025

CISA—Certified Information Systems Auditor - Part 356

1. Which of the following BEST ensures that effective change management is in place in an IS environment?

A) User authorization procedures for application access are well established.
B) User-prepared detailed test criteria for acceptance testing of the software.
C) Adequate testing was carried out by the development team.
D) Access to production source and object programs is well controlled.



2. An IS auditor plans to review all access attempts to a video-monitored and proximity-card controlled communications room. Which of the following would be MOST useful to the auditor?

A) System electronic log
B) Security incident log
C) Manual sign-in and sign-out log
D) Alarm system with CCTV



3. Which of the following is the BEST way to mitigate the risk of unintentional modifications associated with complex calculations in end-user computing (EUC)?

A) Verify EUC results through manual calculations.
B) Operate copies of EUC programs out of a secure library.
C) Implement data integrity checks.
D) Utilize an independent party to review the source calculations.



4. An IS auditor has been asked to audit a complex system with computerized and manual elements. Which of the following should be identified FIRST?

A) Manual controls
B) System risks
C) Programmed controls
D) Input validation



5. The MOST appropriate person to chair the steering committee for an enterprise-wide system development should normally be the:

A) project manager
B) IS director
C) executive level manager.
D) business analyst



1. Right Answer: A
Explanation:

2. Right Answer: A
Explanation: Reference:https://www.slideshare.net/desmond.devendran/chap5-2007-cisa-review-course

3. Right Answer: C
Explanation:

4. Right Answer: D
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment