CISA Exam Questions
Information system auditors have identified separation of duties in enterprise resource
planning (ERP) systems.
Which of the following is the best way to prevent repetitive configuration from occurring?
A. Use a role-based model to grant user access
B. Regularly monitor access rights
C. Correcting separation of duties
D. Reference standard user access matrix - Answer A. Use a role-based model to grant
user access
Which of the following should be the most important factor driving a single application
availability requirement when developing a disaster recovery plan?
A. Confidentiality of data processed by the application
B. The criticality of the business processes supported by the application
C. Total cost of ownership (TCO) of the application
D. Support the application's network bandwidth - Answer B. The criticality of the
business processes supported by the application
In order to develop a robust data security program, the first step you should take is:
A. Talk to the senior management level of IT.
B. Implement monitoring controls.
C. Implement data loss prevention measures
D. Perform inventory of assets - Answer D. Perform inventory of assets
he advantage of object-oriented system development is that it:
A. Suitable for data with complex relationships
B. Partition the system as a client server architecture
C. Easier to program than procedural languages
D. Reduce system documentation requirements - Answer A. Suitable for data with
complex relationships
Several portable computers containing customer-sensitive data were stolen from the
staff's office because they were unattended.
Which of the following is the best advice for an information systems auditor to protect
data when it prevents similar incidents from happening again?
A. Enhance physical security
B. Encrypted disk drive
C. Request for dual certification
D. Requires the use of a cable lock - Answer A. Enhance physical security