Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Searching for workable clues to ace the Isaca CISA Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISA PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 97

Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?

A.

Enforce strong security settings on smart devices.

B.

Require employees to formally acknowledge security procedures.

C.

Review access logs to the organization ' s sensitive data in a timely manner.

D.

Include usage restrictions in bring your own device (BYOD) security procedures.

Full Access
Question # 98

Which of the following is an IS auditor ' s BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?

A.

Enforce a secure tunnel connection.

B.

Enhance internal firewalls.

C.

Set up a demilitarized zone (DMZ).

D.

Implement a secure protocol.

Full Access
Question # 99

Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?

A.

Perform a business impact analysis (BIA).

B.

Determine which databases will be in scope.

C.

Identify the most critical database controls.

D.

Evaluate the types of databases being used

Full Access
Question # 100

Which of the following is an IS auditor ' s BEST course of action when the auditee indicates that a corrective action plan for a high-risk finding will take longer than expected?

A.

Accept the longer target date and document it in the audit system.

B.

Determine if an interim compensating control has been implemented.

C.

Escalate the overdue finding to the audit committee.

D.

Require that remediation is completed in the agreed timeframe.

Full Access
Question # 101

A characteristic of a digital signature is that it

A.

is under control of the receiver

B.

is unique to the message

C.

is validated when data are changed

D.

has a reproducible hashing algorithm

Full Access
Question # 102

The charging method that effectively encourages the MOST efficient use of IS resources is:

A.

specific charges that can be tied back to specific usage.

B.

total utilization to achieve full operating capacity.

C.

residual income in excess of actual incurred costs.

D.

allocations based on the ability to absorb charges.

Full Access
Question # 103

Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor ' s BEST recommendation?

A.

Ensure corrected program code is compiled in a dedicated server.

B.

Ensure change management reports are independently reviewed.

C.

Ensure programmers cannot access code after the completion of program edits.

D.

Ensure the business signs off on end-to-end user acceptance test (UAT) results.

Full Access
Question # 104

Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?

A.

Legal and compliance requirements

B.

Customer agreements

C.

Data classification

D.

Organizational policies and procedures

Full Access
Go to page: