Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 381

Mary Smith

Wed, 26 Mar 2025

CISA—Certified Information Systems Auditor - Part 381

1. An IS auditor is reviewing the results of a business process improvement project. Which of the following should be performed FIRST?

A) Evaluate control gaps between the old and the new processes.
B) Develop compensating controls.
C) Document the impact of control weaknesses in the process.
D) Ensure that lessons learned during the change process are documented.



2. Which of the following controls can BEST detect accidental corruption during transmission of data across a network?

A) Sequence checking
B) Parity checking
C) Symmetric encryption
D) Check digit verification



3. An IS auditor is asked to identify risk within an organization's software development project. The project manager tells the auditor that an agile development methodology is being used to minimize the lengthy development process. Which of the following would be of GREATEST concern to the auditor?

A) Each team does its own testing.
B) The needed work has not yet been fully identified.
C) Some of the developers have not attended recent training.
D) Elements of the project have not been documented.



4. Which of the following must be in place before an IS auditor initiates audit follow-up activities?

A) A heat map with the gaps and recommendations displayed in terms of risk
B) A management response in the final report with a committed implementation date
C) Supporting evidence for the gaps and recommendations mentioned in the audit report
D) Available resources for the activities included in the action plan



5. To maintain the confidentiality of information moved between office and home on removable media, which of the following is the MOST effective control?

A) Mandatory file passwords
B) Security awareness training
C) Digitally signed media
D) Data encryption



1. Right Answer: A
Explanation:

2. Right Answer: B
Explanation: Parity check is used to detect transmission errors in the data. When a parity check is applied to a single character, it is called vertical or column check. In addition, if a parity check is applied to all the data it is called vertical or row check. By using both types of parity check simultaneously can greatly increase the error detection possibility, which may not be possible when only one type of parity check is used.

3. Right Answer: B
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: D
Explanation:

0 Comments

Leave a comment