Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Searching for workable clues to ace the Isaca CISA Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISA PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 177

Which of the following provides the BEST assurance that a new database management system (DBMS) meets the requirements of local privacy regulations?

A.

Compliance audit

B.

Administrative audit

C.

General IT controls review

D.

Forensic audit

Full Access
Question # 178

An organization ' s security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?

A.

To collect digital evidence of cyberattacks

B.

To attract attackers in order to study their behavior

C.

To provide training to security managers

D.

To test the intrusion detection system (IDS)

Full Access
Question # 179

Which of the following is the GREATEST benefit of an effective data classification process?

A.

Data custodians are identified.

B.

Data retention periods are well defined

C.

Data is protected according to its sensitivity

D.

Appropriate ownership over data is assigned

Full Access
Question # 180

Which of the following MUST be completed as part of the annual audit planning process?

A.

Business impact analysis (BIA)

B.

Fieldwork

C.

Risk assessment

D.

Risk control matrix

Full Access
Question # 181

Which of the following is an effective way to ensure the integrity of file transfers in a peer-to-peer (P2P) computing environment?

A.

Associate a message authentication code with each file transferred.

B.

Ensure the files are transferred through an intrusion detection system (IDS).

C.

Encrypt the packets shared between peers within the environment.

D.

Connect the client computers in the environment to a jump server.

Full Access
Question # 182

Which of the following should be the role of internal audit in an organization’s move to the cloud?

A.

Mitigating risk to an acceptable level.

B.

Assessing key controls that support the migration.

C.

Implementing security controls for data prior to migration.

D.

Identifying impacts to organizational budgets and resources.

Full Access
Question # 183

As part of an audit response, an auditee has concerns with the recommendations and is hesitant to implement them. Which of the following is the BEST course of action for the IS auditor?

A.

Accept the auditee ' s response and perform additional testing.

B.

Suggest hiring a third-party consultant to perform a current state assessment.

C.

Conduct further discussions with the auditee to develop a mitigation plan.

D.

Issue a final report without including the opinion of the auditee.

Full Access
Question # 184

Which of the following is MOST important to consider when defining disaster recovery strategies?

A.

Maximum tolerable downtime (MTD)

B.

Mean time to restore (MTTR)

C.

Mean time to acknowledge

D.

Maximum time between failures (MTBF)

Full Access
Go to page: