CISA Exam Question 16

An IS auditor discovers that a developer has used the same key to grant access to multiple applications making calls to an application programming interface (API). Which of the following is the BEST recommendation to address this situation?
  • CISA Exam Question 17

    Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?
  • CISA Exam Question 18

    What is the Most critical finding when reviewing an organization's information security management?
  • CISA Exam Question 19

    Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?
  • CISA Exam Question 20

    Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?