Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 265

Which of the following should be of GREATEST concern for an IS auditor when reviewing user account policies?

A.

There is no policy to revoke an employee's system access upon termination.

B.

There is no policy in place for ongoing security awareness training.

C.

There is no policy requiring employees to sign nondisclosure agreements (NDAs).

D.

There is no policy to revoke previous access rights when employees change roles.

Full Access
Question # 266

A finance department has a two-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger in year one the system version upgrade will be applied and in year two business processes will be updated to implement new system functionality. Which of the following should be the PRIMARY focus of an IS auditor reviewing the second year of the implementation'?

A.

Data migration

B.

Sociability testing

C.

User acceptance testing (UAT)

D.

Initial user access provisioning

Full Access
Question # 267

Who is accountable for an organization's enterprise risk management (ERM) program?

A.

Board of directors

B.

Steering committee

C.

Chief risk officer (CRO)

D.

Executive management

Full Access
Question # 268

Which of the following is the BEST indication that an information security awareness program is effective?

A.

A reduction in the number of reported information security incidents

B.

A reduction in the success rate of social engineering attacks

C.

A reduction in the cost of maintaining the information security program

D.

A reduction in the number of information security attacks

Full Access
Question # 269

A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?

A.

Quota sampling

B.

Haphazard sampling

C.

Attribute sampling

D.

Variable sampling

Full Access
Question # 270

Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?

A.

The policy aligns with corporate policies and practices.

B.

The policy aligns with global best practices.

C.

The policy aligns with business goals and objectives.

D.

The policy aligns with local laws and regulations.

Full Access
Question # 271

An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?

A.

Inability of the network intrusion detection system (IDS) to monitor virtual server-lo-server communications

B.

Vulnerability in the virtualization platform affecting multiple hosts

C.

Data center environmental controls not aligning with new configuration

D.

System documentation not being updated to reflect changes in the environment

Full Access
Question # 272

Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?

A.

Securing information assets in accordance with the classification assigned

B.

Validating that assets are protected according to assigned classification

C.

Ensuring classification levels align with regulatory guidelines

D.

Defining classification levels for information assets within the organization

Full Access
Go to page: