Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 377

Mary Smith

Wed, 26 Mar 2025

CISA—Certified Information Systems Auditor - Part 377

1. An IS auditor should ensure that an application's audit trail:

A) has adequate security
B) does not impact operational efficiency.
C) is accessible on-line.
D) logs all database records.



2. As part of an audit response, an auditee has concerns with the recommendations and is hesitant to implement them. Which of the following would be the BEST course of action for the IS auditor?

A) Accept the auditee's response and perform additional testing.
B) Conduct further discussions with the auditee to develop a mitigation plan.
C) Suggest hiring a third-party consultant to perform a current state assessment.
D) Issue a final report without including the opinion of the auditee.



3. Which of the following is the FIRST step in initiating a data classification program?

A) Risk appetite assessment
B) Inventory of data assets
C) Assignment of data ownership
D) Assignment of sensitivity levels



4. Which of the following should be used to assess the level of security required to protect information on a corporate network?

A) Data classification
B) Business intelligence
C) Access rights
D) Access control matrix



5. Which of the following is the MOST important difference between end-user computing (EUC) applications and traditional applications?

A) Traditional application documentation is typically less comprehensive than EUC application documentation.
B) Traditional applications require roll-back procedures whereas EUC applications do not.
C) Traditional applications require periodic patching whereas EUC applications do not.
D) Traditional application input controls are typically more robust than EUC application input controls.



1. Right Answer: B
Explanation:

2. Right Answer: B
Explanation:

3. Right Answer: C
Explanation: The data classification process starts with the process of establishing ownership of data. This process also helps to prepare data dictionary

4. Right Answer: C
Explanation:

5. Right Answer: D
Explanation:

0 Comments

Leave a comment