CISA Certified Information Systems Auditor – Question3108

Which of the following functions should be performed by the application owners to ensure an adequate segregation of duties between IS and end users?

A.
System analysis
B. Authorization of access to data
C. Application programming
D. Data administration

Correct Answer: B

Explanation:

Explanation:
The application owner is responsible for authorizing access to data. Application development and programming are functions of the IS department. Similarly, system analysis should be performed by qualified persons in IS who have knowledge of IS and user requirements. Data administration is a specialized function related to database management systems and should be performed by qualified database administrators.

CISA Certified Information Systems Auditor – Question3107

Which of the following is the MOST important control to help minimize the risk of data leakage from calls made to a business-to-business application programming interface (API)?

A.
Providing API security awareness training to developers
B. Deploying content inspection at the API gateway
C. Implementing API server clusters
D. Implementing an API versioning system

Correct Answer: B

CISA Certified Information Systems Auditor – Question3103

Which of the following is an advantage of using electronic data interchange (EDI)?

A.
Contracts with the vendors are simplified.
B. Transcription of information is reduced.
C. Data validation is provided by the service provider.
D. Multiple inputs of the same document are allowed at different locations.

Correct Answer: B

CISA Certified Information Systems Auditor – Question3101

Buffer overflow in an Internet environment is of particular concern to the IS auditor because it can:

A.
corrupt databases during the build.
B. be used to obtain importer access to a system.
C. cause the loss of critical data during processing.
D. cause printers to lose some of the document text when printing.

Correct Answer: B

CISA Certified Information Systems Auditor – Question3100

Which of the following presents the GREATEST security risk to an organization using peer-to-peer (P2P) file-sharing networks?

A.
There is no audit trail for files residing outside of the organization.
B. IP addresses are shared to create a connection.
C. Penetration testing cannot identify issues with P2P file-sharing networks.
D. Controls are difficult to apply to unstructured networks.

Correct Answer: D

CISA Certified Information Systems Auditor – Question3099

Which of the following is the safest means of transmitting confidential information over the Internet?

A.
Send the data to a trusted third party to resend to the destination.
B. Use asymmetric encryption and encrypt the data with a private key.
C. Establish a virtual private network (VPN) between the source and the destination.
D. Break the data into many packets and send it over different routes.

Correct Answer: C