CISA Test An IS auditor observes that an agency has outsourced software program improvement to a 3rd birthday birthday celebration that may be a startup company. To make sure that the agency’s funding in software program is protected, which of the subsequent ought to be advocated via way of means of the IS auditor? a) Due diligence ought to be accomplished at the software program vendor. b) A quarterly audit of the seller centers ought to be accomplished. c) There ought to be a supply code escrow settlement in area. d) A excessive penalty clause ought to be blanketed withinside the agreement. 04. An IS auditor reveals a small wide variety of person get entry to requests that had now no longer been legal via way of means of managers thru the everyday predefined workflow steps and escalation rules. The IS auditor ought to: a) propose that the proprietor of the identification control (IDM) device repair the workflow problems. b) file the hassle to the audit committee. c) behavior a protection danger evaluation. d) carry out an extra analysis. 05. Responsibility of granting get entry to to information with the assist of protection officer is living with: a) The information proprietors b) The device developer c) The library controller d) The device administrator 06. An IS auditor is reviewing the bodily protection controls of a information middle and notices numerous regions for concern. Which of the subsequent regions is the MOST essential? a) The emergency electricity off button cowl is missing. b) Scheduled preservation of the hearthplace suppression device become now no longer accomplished.
Click Here More Info https://dumpsarena.com/isaca-certification/cisa-certification/