Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 17

Which type of testing is used to identify security vulnerabilities in source code in the development environment?

A.

Interactive application security testing (IAST)

B.

Runtime application self-protection (RASP)

C.

Dynamic analysis security testing (DAST)

D.

Static analysis security testing (SAST)

Full Access
Question # 18

What should be an IS auditor's PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?

A.

Deployment automation to all servers

B.

Technical skills of the deployment team

C.

Comprehensive testing prior to deployment

D.

Validity certification prior to deployment

Full Access
Question # 19

Which of the following tasks would cause the GREATEST segregation of duties (SoD) concern if performed by the person who reconciles the organization's device inventory?

A.

Tracking devices used for spare parts

B.

Creating the device policy

C.

vIssuing devices to employees

D.

Approving the issuing of devices

Full Access
Question # 20

Which of the following is the BEST detective control for a job scheduling process involving data transmission?

A.

Metrics denoting the volume of monthly job failures are reported and reviewed by senior management.

B.

Jobs are scheduled to be completed daily and data is transmitted using a Secure File Transfer Protocol (SFTP).

C.

Jobs are scheduled and a log of this activity is retained for subsequent review.

D.

Job failure alerts are automatically generated and routed to support personnel.

Full Access
Question # 21

Which of the following is MOST important to ensure when planning a black box penetration test?

A.

The management of the client organization is aware of the testing.

B.

The test results will be documented and communicated to management.

C.

The environment and penetration test scope have been determined.

D.

Diagrams of the organization's network architecture are available.

Full Access
Question # 22

Which of the following BEST indicates the effectiveness of an organization's risk management program?

A.

Inherent risk is eliminated.

B.

Residual risk is minimized.

C.

Control risk is minimized.

D.

Overall risk is quantified.

Full Access
Question # 23

Which of the following is an audit reviewer's PRIMARY role with regard to evidence?

A.

Ensuring unauthorized individuals do not tamper with evidence after it has been captured

B.

Ensuring evidence is sufficient to support audit conclusions

C.

Ensuring appropriate statistical sampling methods were used

D.

Ensuring evidence is labeled to show it was obtained from an approved source

Full Access
Question # 24

Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?

A.

Data conversion was performed using manual processes.

B.

Backups of the old system and data are not available online.

C.

Unauthorized data modifications occurred during conversion.

D.

The change management process was not formally documented

Full Access
Go to page: