Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 161

Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?

A.

Enforce strong security settings on smart devices.

B.

Require employees to formally acknowledge security procedures.

C.

Review access logs to the organization's sensitive data in a timely manner.

D.

Include usage restrictions in bring your own device (BYOD) security procedures.

Full Access
Question # 162

An IS auditor learns that a business owner violated the organization's security policy by creating a web page with access to production data. The auditor's NEXT step should be to:

A.

determine if sufficient access controls exist.

B.

assess the sensitivity of the production data.

C.

shut down the web page.

D.

escalate to senior management.

Full Access
Question # 163

An IS auditor is planning a review of an organizations cybersecurity incident response maturity Which of the following methodologies would provide the MOST reliable conclusions?

A.

Judgmental sampling

B.

Data analytics testing

C.

Variable sampling

D.

Compliance testing

Full Access
Question # 164

Which of the following should be an IS auditor's GREATEST concern when evaluating an organization's ability to recover from system failures?

A.

Data backups being stored onsite

B.

Lack of documentation for data backup procedures

C.

Inadequate backup job monitoring

D.

Lack of periodic data backup restoration testing

Full Access
Question # 165

Which of the following should be of GREATEST concern to an IS auditor when using data analytics?

A.

The data source lacks integrity.

B.

The data analytics software is open source.

C.

The data set contains irrelevant fields.

D.

The data was not extracted by the auditor.

Full Access
Question # 166

Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?

A.

Review of monthly performance reports submitted by the vendor

B.

Certifications maintained by the vendor

C.

Regular independent assessment of the vendor

D.

Substantive log file review of the vendor's system

Full Access
Question # 167

Which of the following recommendations would BEST prevent the implementation of IT projects without collaborating with the business?

A.

Partner with the business units to evaluate IT projects.

B.

Review the projects to identify similarities and eliminate duplication.

C.

Periodically review the projects' return on investment (ROI).

D.

Prioritize protects based on business and IT resource availability.

Full Access
Question # 168

Which of the following should be the GREATEST concern for an IS auditor reviewing recent disaster recovery operations?

A.

The recovery point objective (RPO) was not defined.

B.

Test data was lost during a recovery operation.

C.

A warm site was used as a recovery strategy.

D.

A full backup was only performed once a week.

Full Access
Go to page: