FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2023-03-04.q546 Dumps
  • ««
  • «
  • …
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • …
  • »
  • »»
Download Now

Question 141

To determine if unauthorized changes have been made to production code the BEST audit procedure is to:

Correct Answer: C
Explanation/Reference:
Explanation:
The procedure of examining object code files to establish instances of code changes and tracing these back to change control system records is a substantive test that directly addresses the risk of unauthorized code changes. The other choices are valid procedures to apply in a change control audit but they do not directly address the risk of unauthorized code changes.
insert code

Question 142

Which of the following ISO/OSI layers performs transformations on data to provide a standardized
application interface and to provide common communication services such as encryption?

Correct Answer: C
Section: Information System Acquisition, Development and Implementation
Explanation/Reference:
The presentation layer (ISO/OSI layer 6) performs transformations on data to provide a standardized
application interface and to provide common communication services such as encryption, text compression
and reformatting. The function of the presentation layer is to ensure that the format of the data submitted
by the application layer conforms to the applicable network standard.
Source: Information Systems Audit and Control Association, Certified Information Systems Auditor 2002
review manual, Chapter 3: Technical Infrastructure and Operational Practices (page 119).
insert code

Question 143

Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?

Correct Answer: A
insert code

Question 144

What is an edit check to determine whether a field contains valid data?

Correct Answer: A
Explanation/Reference:
A completeness check is an edit check to determine whether a field contains valid data.
insert code

Question 145

The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:

Correct Answer: D
insert code
  • ««
  • «
  • …
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2023-03-04.q546 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.