CISA Certified Information Systems Auditor – Question3067

Which of the following test approaches would utilize data analytics to test a dual approval payment control?

A.
Review payments completed in the past month that do not have a unique approver.
B. Attempt to complete a payment without a secondary approval.
C. Review users within the payment application who are assigned an approver role.
D. Evaluate configuration settings for the secondary approval requirements.

Correct Answer: A

CISA Certified Information Systems Auditor – Question3066

When implementing a software product (middleware) to pass data between local area network (LAN) servers and the mainframe, the MOST critical control consideration is:

A.
cross-platform authentication.
B. time synchronization of databases.
C. network traffic levels between platforms.
D. time-stamping of transactions to facilitate recovery.

Correct Answer: A

CISA Certified Information Systems Auditor – Question3063

Which of the following is the BEST control to protect an organization's sensitive data when using a publicly available cloud storage service?

A.
Cryptographic hash function performed by the cloud vendor
B. Transparent volume encryption offered by the cloud vendor
C. Data encryption performed by the organization prior to uploading
D. Transport layer security (TLS) between the cloud vendor and the organization

Correct Answer: C

CISA Certified Information Systems Auditor – Question3061

An IS auditor is reviewing an organization's implementation of a bring your own device (BYOD) program. Which of following would be the BEST recommendation to help ensure sensitive data is protected if a device is in the possession of an unauthorized individual?

A.
Enable the location service feature on devices.
B. Encrypt data on devices including storage media.
C. Authenticate device users when accessing the corporate network.
D. Enable remote wiping of critical data.

Correct Answer: B