New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISA Exam - Topic 6 Question 43 Discussion

Actual exam question for Isaca's CISA exam
Question #: 43
Topic #: 6
[All CISA Questions]

Which of the following features of a library control software package would protect against unauthorized updating of source code?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Sherell
4 months ago
Wait, can release comparisons really prevent unauthorized updates?
upvoted 0 times
...
Dalene
4 months ago
Totally agree with access controls!
upvoted 0 times
...
Shannan
4 months ago
Date and time stamping? Seems a bit outdated.
upvoted 0 times
...
Nikita
4 months ago
I think required approvals are more effective.
upvoted 0 times
...
Eulah
5 months ago
Access controls are a must for security!
upvoted 0 times
...
Jess
5 months ago
I feel like release-to-release comparison could help identify unauthorized changes, but it doesn't stop them from happening in the first place.
upvoted 0 times
...
Hannah
5 months ago
Date and time stamping sounds familiar, but I don't see how it would prevent unauthorized updates directly.
upvoted 0 times
...
Fletcher
5 months ago
I'm not entirely sure, but I remember something about required approvals being important in software development. Could that be it?
upvoted 0 times
...
Kaycee
5 months ago
I think access controls for source libraries might be the right answer since they restrict who can make changes.
upvoted 0 times
...
Paola
5 months ago
I've got a good feeling about option C. The description of Extension Mobility as allowing agents to temporarily access their phone settings from other Unified IP Phones seems to match what I know about the feature. I'll go with that as my answer.
upvoted 0 times
...
Sherill
5 months ago
Okay, let's see. I know free reports on memory usage, but I'm not sure if it covers paging and block I/O. Maybe vmstat would be a better choice?
upvoted 0 times
...
Tonette
5 months ago
Hmm, this looks straightforward enough. I'll need to save the workbook as a .xlsm file to enable macros, and then reopen it. The message box and clicking OK seem like they're just part of the VBA code, so I don't think I need to worry about those specifically.
upvoted 0 times
...
Shanice
5 months ago
I think optics and power consumption are definitely two of the options, but I'm not sure about the third one.
upvoted 0 times
...
Shawn
5 months ago
I'm feeling confident about this one. Exploratory testing allows you to leverage your experienced test team to identify risks and issues that might be missed with a more rigid approach.
upvoted 0 times
...
Tiffiny
5 months ago
Hmm, this seems like a tricky one. I'll need to think carefully about the history of Unix and the /etc/passwd file to figure this out.
upvoted 0 times
...

Save Cancel