FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2024-12-27.q999 Dumps
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • »
  • »»
Download Now

Question 21

By evaluating application development projects against the capability maturity model (CMM), an IS auditor should be able to verify that:

Correct Answer: D
Explanation/Reference:
Explanation:
By evaluating the organization's development projects against the CMM, an IS auditor determines whether the development organization follows a stable, predictable software process. Although the likelihood of success should increase as the software processes mature toward the optimizing level, mature processes do not guarantee a reliable product. CMM does not evaluate technical processes such as programming nor does it evaluate security requirements or other application controls.
insert code

Question 22

Which of the following controls MOST effectively reduces the risk associated with use of instant messaging (IM) in the workplace?

Correct Answer: A
insert code

Question 23

A proposed transaction processing application will have many data capture sources and outputs in paper
and electronic form. To ensure that transactions are not lost during processing, an IS auditor should
recommend the inclusion of:

Correct Answer: D
Section: Protection of Information Assets
Explanation
Explanation:
Automated systems balancing would be the best way to ensure that no transactions are lost as any
imbalance between total inputs and total outputs would be reported for investigation and correction.
Validation controls and internal credibility checks are certainly valid controls, but will not detect and report
lost transactions. In addition, although a clerical procedure could be used to summarize and compare
inputs and outputs, an automated process is less susceptible to error.
insert code

Question 24

An IS auditor is reviewing a sample of production incidents and notes that root cause analysis is not being performed. Which of the following is the GREATEST risk associated with this finding?

Correct Answer: C
Section: The process of Auditing Information System
insert code

Question 25

Security should ALWAYS be an all or nothing issue.

Correct Answer: D
Security should not be an all or nothing issue. The designers and operators of systems should assume that security breaches are inevitable in the long term. Full audit trails should be kept of system activity, so that when a security breach occurs, the mechanism and extent of the breach can be determined.
insert code
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2024-12-27.q999 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.