New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISA Exam - Topic 1 Question 51 Discussion

Actual exam question for Isaca's CISA exam
Question #: 51
Topic #: 1
[All CISA Questions]

An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality Which of the following is MOST important for an IS auditor to understand when reviewing this decision?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Rene
4 months ago
Proposed network topology is important too, though!
upvoted 0 times
...
Colette
4 months ago
Surprised that the entity relationships aren't the priority!
upvoted 0 times
...
Deangelo
4 months ago
Wait, why not focus on the data flows instead?
upvoted 0 times
...
Erick
4 months ago
Totally agree, that's key for the audit.
upvoted 0 times
...
Donette
5 months ago
Gotta know the current business capabilities!
upvoted 0 times
...
Lawrence
5 months ago
The database entity relationships could be relevant, but I wonder if they matter as much as the business capabilities in this context.
upvoted 0 times
...
Nicholle
5 months ago
I remember a practice question that emphasized the importance of network topology, but I'm not convinced it's the most critical aspect here.
upvoted 0 times
...
Silva
5 months ago
I'm not entirely sure, but I feel like the data flows might be really important too, especially if they change with the new system.
upvoted 0 times
...
Gretchen
5 months ago
I think understanding the current business capabilities is crucial since we need to ensure the new components still meet those needs.
upvoted 0 times
...
Malcolm
5 months ago
Okay, let me think this through. The chart is about sales totals, so I'm guessing we need some kind of measure and a way to break it down by region. I'll go with Measure and Dimension.
upvoted 0 times
...
Leanna
5 months ago
Okay, I think I've got this. The key is to leverage the Sender Authentication Package and match the external keys between the sender profile and the data extension with the account rep details. That should let me dynamically populate the From Name and From Email without having to segment the audience.
upvoted 0 times
...
Anthony
5 months ago
I'm pretty sure DLP can be combined with DRM to enhance data controls, but I'll double-check the other options just to be sure.
upvoted 0 times
...
Reyes
5 months ago
The bank's senior management is ultimately responsible for the security of customer data, even if it's outsourced. They need to provide oversight and ensure the right controls are in place with the service provider.
upvoted 0 times
...
Jenelle
5 months ago
Okay, I've got this. The key here is the "Synchronization" feature, which is mentioned in multiple options. I think the correct answer is D, "Synchronization & Transformation Services feature."
upvoted 0 times
...

Save Cancel