FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2022-10-13.q121 Dumps
  • ««
  • «
  • …
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • »
Download Now

Question 116

A comprehensive IS audit policy should include guidelines detailing what involvement the internal audit
team should have?

Correct Answer: D
Section: Protection of Information Assets
Explanation:
The audit policy should include guidelines detailing what involvement internal audit will have in the
development, acquisition, conversion, and testing of major applications. Such a policy must be approved by
top management for it to be effective.
insert code

Question 117

During audit follow-up, an IS auditor finds that a control has been implemented differently than recommended. The auditor should:

Correct Answer: B
Section: Protection of Information Assets
insert code

Question 118

Which of the following data validation edits is effective in detecting transposition and transcription errors?

Correct Answer: B
A check digit is a numeric value that is calculated mathematically and is appended to data to ensure that the original data have not been altered, e.g., an incorrect, but valid, value substituted for the original. This control is effective in detecting transposition and transcription errors. A range check is checking data that matches a predetermined range of values. A validity check is programmed checking of the data validity in accordance with predetermined criteriA . In a duplicate check, newor fresh transactions are matched to those previously entered to ensure that they are not already in the system.
insert code

Question 119

IT disaster recovery lime objectives (RTOs) should be based on the:

Correct Answer: D
insert code

Question 120

Which of the following BEST supports the prioritization of new IT projects?

Correct Answer: C
Explanation/Reference:
Explanation:
It is most desirable to conduct an investment portfolio analysis, which will present not only a clear focus on investment strategy, but will provide the rationale for terminating nonperforming IT projects. Internal control self-assessment {CSA} may highlight noncompliance to the current policy, but may not necessarily be the best source for driving the prioritization of IT projects. Like internal CSA, IS audits may provide only part of the picture for the prioritization of IT projects. Business risk analysis is part of the investment portfolio analysis but, by itself, is not the best method for prioritizing new IT projects.
insert code
  • ««
  • «
  • …
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • »
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2022-10-13.q121 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.