Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Searching for workable clues to ace the Isaca CISA Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISA PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 305

Which of the following is the PRIMARY benefit of introducing business impact analyses (BIAs) to business resiliency strategies?

A.

It identifies legal obligations that may be incurred as a result of business service disruptions

B.

It provides updates on the risk level of disasters that may occur

C.

It delineates employee responsibilities that the organization must fulfill in a crisis

D.

It helps prioritize the restoration of systems and applications

Full Access
Question # 306

When an organization conducts business process improvements, the IS auditor should be MOST concerned with the:

A.

metrics used to evaluate key operating segments.

B.

adequacy of the controls in the redesigned process.

C.

adequacy of reporting to senior management.

D.

lack of version control over process documentation.

Full Access
Question # 307

Following a merger, a review of an international organization determines the IT steering committee ' s decisions do not extend to regional offices as required in the consolidated IT operating model. Which of the following is the IS auditor ' s BEST recommendation?

A.

Create regional centers of excellence.

B.

Engage an IT governance consultant.

C.

Create regional IT steering committees.

D.

Update the IT steering committee ' s formal charter.

Full Access
Question # 308

Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?

A.

Biometric authentication for the device

B.

Remote data wipe program

C.

Encryption of the data stored on the device

D.

Password for device authentication

Full Access
Question # 309

Which of the following provides an IS auditor the BEST evidence that a third-party service provider ' s information security controls are effective?

A.

Documentation of the service provider’s security configuration controls

B.

A review of the service provider ' s policies and procedures

C.

An audit report of the controls by an external auditor

D.

An interview with the service provider ' s senior management

Full Access
Question # 310

Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?

A.

adequate measurement of key risk indicators (KRIS)

B.

Inadequate alignment of IT plans and business objectives

C.

Inadequate business impact analysis (BIA) results and predictions

D.

Inadequate measurement of key performance indicators (KPls)

Full Access
Question # 311

Which of the following should an IS auditor recommend be done FIRST when an organization is planning to implement an IT compliance program?

A.

Identify staff training needs related to compliance requirements.

B.

Analyze historical compliance-related audit findings.

C.

Research and purchase an industry-recognized IT compliance tool

D.

Identify applicable laws, regulations, and standards.

Full Access
Question # 312

Which of the following controls helps to ensure that data extraction queries run by the database administrator (DBA) are monitored?

A.

Restricting access to DBA activities

B.

Performing periodic access reviews

C.

Storing logs of database access

D.

Reviewing activity logs of the DBA

Full Access
Go to page: