Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Searching for workable clues to ace the Isaca CISA Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISA PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 105

Which of the following provides the BEST evidence that IT portfolio management is aligned with organizational strategies?

A.

Finance committee minutes that include approval for the annual IT budget

B.

Project sponsor sign-off on all project documents from beginning to end

C.

IT steering committee minutes that include approval for prioritization of IT projects

D.

Project sponsor sign-off on IT project proposals and milestones

Full Access
Question # 106

Which of the following public key infrastructure (PKI) elements provides detailed descriptions for dealing with a compromised private key?

A.

Certification practice statement

B.

Certificate policy

C.

PKI disclosure statement

D.

Certificate revocation list

Full Access
Question # 107

Which of the following is the MOST effective way for an IS auditor to ensure information is preserved when conducting a forensic investigation?

A.

Harden computer hardware and software.

B.

Image residual data and deleted files.

C.

Encode system logs and intrusion detection system (IDS) logs.

D.

Document all application programming interface (API) connections with third parties.

Full Access
Question # 108

Which of the following BEST indicates an effective internal audit quality assurance and improvement program?

A.

Oversight of the improvement program by senior management

B.

An improved internal audit charter

C.

A scope that focuses on high-risk audit engagements

D.

Identification of opportunities for continuous improvement

Full Access
Question # 109

Which of the following is MOST critical to the success of an information security program?

A.

Alignment of information security with IT objectives

B.

Management’s commitment to information security

C.

Integration of business and information security

D.

User accountability for information security

Full Access
Question # 110

An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?

A.

The data is taken directly from the system.

B.

There is no privacy information in the data.

C.

The data can be obtained in a timely manner.

D.

The data analysis tools have been recently updated.

Full Access
Question # 111

Which of the following is MOST important to ensure when developing an effective security awareness program?

A.

Training personnel are information security professionals.

B.

Outcome metrics for the program are established.

C.

Security threat scenarios are included in the program content.

D.

Phishing exercises are conducted post-training

Full Access
Question # 112

During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?

A.

Require documentation that the finding will be addressed within the new system

B.

Schedule a meeting to discuss the issue with senior management

C.

Perform an ad hoc audit to determine if the vulnerability has been exploited

D.

Recommend the finding be resolved prior to implementing the new system

Full Access
Go to page: