Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 249

When selecting a new data loss prevention (DLP) solution, the MOST important consideration is that the solution:

A.

is cost effective and meets proposed return on investment (ROI) criteria.

B.

provides comprehensive reporting and alerting features with detailed insights on data movements.

C.

is compatible with legacy IT infrastructure and integrates with other security tools.

D.

identifies and safeguards confidential information from unauthorized transmission.

Full Access
Question # 250

Which type of threat can utilize a large group of automated social media accounts to steal data, send spam, or launch distributed denial of service (DDoS) attacks?

A.

Botnet attack

B.

Data mining

C.

Phishing attempt

D.

Malware sharing

Full Access
Question # 251

Which of the following would be MOST helpful to an IS auditor performing a risk assessment of an application programming interface (API) that feeds credit scores from a well-known commercial credit agency into an organizational system?

A.

A data dictionary of the transferred data

B.

A technical design document for the interface configuration

C.

The most recent audit report from the credit agency

D.

The approved business case for the API

Full Access
Question # 252

Which of the following is the BEST review for an IS auditor to conduct when a vulnerability has been exploited by an employee?

A.

Compliance audit

B.

Application security testing

C.

Forensic audit

D.

Penetration testing

Full Access
Question # 253

While conducting a follow-up on an asset management audit, the IS auditor finds paid invoices for IT devices not recorded in the organization's inventory. Which of the following is the auditor's BEST course of action?

A.

Ask the asset management staff where the devices are.

B.

Alert both audit and operations management about the discrepancy.

C.

Ignore the invoices since they are not part of the follow-up.

D.

Make a note of the evidence to include it in the scope of a future audit.

Full Access
Question # 254

An IS auditor is assessing backup performance and observes that the system administrator manually initiates backups during unexpected peak usage. Which of the following is the auditor's BEST course of action?

A.

Review separation of duties documentation.

B.

Verify the load balancer configuration.

C.

Recommend using cloud-based backups.

D.

Inspect logs to verify timely execution of backups.

Full Access
Question # 255

Which of the following provides the BEST evidence of effective IT portfolio managements?

A.

IT portfolio updates are communicated when approved.

B.

Programs in the IT portfolio are prioritized by each business function.

C.

The IT portfolio is updated as business strategy changes.

D.

The IT portfolio is updated on the basis of current industry benchmarks.

Full Access
Question # 256

Of the following who should be responsible for cataloging and inventorying robotic process automation (RPA) processes?

A.

IT personnel

B.

Business owner

C.

Information security personnel

D.

Data steward

Full Access
Go to page: