exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 169 discussion

Actual exam question from Isaca's CISA
Question #: 169
Topic #: 1
[All CISA Questions]

Which of the following would BEST detect unauthorized modification of data by a database administrator (DBA)?

  • A. Audit database change requests
  • B. Audit database activity logs
  • C. Review changes to edit checks
  • D. Compare data to input records
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
shiowbah
Highly Voted 1 year, 3 months ago
B. Audit database activity logs
upvoted 8 times
...
a84n
Most Recent 8 months, 2 weeks ago
Selected Answer: B
Answer: B
upvoted 1 times
...
Swallows
9 months ago
Selected Answer: B
Monitoring the activity log is the action that best detects unauthorized changes.
upvoted 1 times
...
starzuu
1 year, 6 months ago
Selected Answer: D
its D. These answers are out of hand.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...