Anyone in the London area taking the CISA in June 2016?
Looking for people who are taking the CISA in June 2016 ? I will try and keep the thread active by posting study timetables , target dates , resources etc if enough people join
View ArticleCh1. Process of Auditing IS..
What are practical definitions / differences/ Examples of below Audit Risks.· Inherent Risk· Control Risk· Detection Risk
View ArticleCISA June 16 online coaching
Hi All,Is there anyone who have enrolled for any online training/coaching (for CISA) from any online learning site e.g. CBT Nuggets or Simplilearn ?If yes, can you please suggest your experience and is...
View ArticleQuery on Public Key Encryption
Hi, The is a query in the data base regarding a Public Key encryption, When using public key encryption to secure data being transmitted across a network: A.both the key used to encrypt and decrypt the...
View ArticleCISA June 2016 - Mumbai Western Suburbs Study Group
Hello friends, kindly post your contact information so that a study group can be created for candidates from the Mumbai western suburbs - Manish Gupta | 09821326688 | CISA aspirant June 2016
View ArticleCISA 2016 Study Group in Washington, DC Area (Now until 14 May 16) / Hampton...
Hello, I looking to join a CISA study group in the Washington, DC area from now until 14 May 2016 and then one in the Hampton Roads area from 15 May until 10 June 2016. Please contact me via email at...
View ArticleSubjective Questions in Exam
Hello There,I've been doing some practice questions and there are instances where, I feel, where the questions are subjecting. How would I choose the correct answer? What mindset (thinking cap) should...
View ArticleContinous Auditing
There is a question on continuous auditing An IS audit department is considering implementing continuous auditing techniques for a multinational retail enterprise that processes a large volume of...
View ArticleBPR
Hello,i came across this question in the question bank-Which of the following is MOST likely to result from abusiness process reengineering (BPR) project? A. An increased number of people using...
View ArticleGot Certification
Just now received an email from ISACA confirming my certification. Got certified wef yesterday. Took around 6 weeks to get it.
View ArticleCISA June 2016 preparation
Hi AllI just joined ISACA and enrolled to sit the exam in June (4 months). I bought the manual and review questions books as my resource study materials. Do you have any other suggestion as to how to...
View ArticleCISA June 2016 Study Group in Florida
Hello All, I have recently enrolled for June 2016 CISA exam. Anyone on the forum from/around Tampa Bay area? It would be fun to collaborate and learn together. Thanks, Kaushik
View ArticleCISA JUNE DURBAN study group
hi all anyone who is taking June exam based in Durban South Africa lets join together for studies 0768840061
View ArticleCISA Study for June exam - IN UAE - Lets get study togather
I am Preparing the the June CISA exam. test get to gather to study or transfer knowledge to each other. discussions are very important for this exam, you may forget what you read but won't forget the...
View ArticleSoftware Policy Question
Hi, Following is the question from question Bank An IS auditor discovers that some users have installed personal software on their PCs. This is not explicitly forbidden by the security policy. Of the...
View ArticleJune CISA studying course
Has anyone purchased Allen Keele's online training course? I was thinking of purchasing it to study for my June 2016 CISA exam, but do not know if it's the same as the CISA Review Database sold by...
View ArticleConfidence Coefficient
On page 54 of the 26th Edition of the CISA Review Manual the definition of confidence coefficient is as follows: A percentage expression (90 percent, 95 percent, 99 percent, etc.) of the probability...
View ArticleProgram Compiler and Library Controls
Hello,I came across a question in the question bank:Which of the following tests is an IS auditor performingwhen a sample of programs is selected to determine if the source and objectversions are the...
View Articlesuccessful implementation and maintenance of a security policy
I have a confusion regarding below question.Which of the following is MOST critical for the successful implementation and maintenance of asecurity policy?A.Assimilation of the framework and intent of a...
View Article