Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Searching for workable clues to ace the Isaca CISA Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISA PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 329

The process of applying a hash function to a message and obtaining and ciphering a digest refers to:

A.

digital certificates.

B.

digital signatures.

C.

public key infrastructure (PKI).

D.

authentication.

Full Access
Question # 330

During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor ' s BEST course of action?

A.

Identify accounts that have had excessive failed login attempts and request they be disabled

B.

Request the IT manager to change administrator security parameters and update the finding

C.

Document the finding and explain the risk of having administrator accounts with inappropriate security settings

Full Access
Question # 331

Which of the following is the BEST way to detect unauthorized copies of licensed software on systems?

A.

Implement controls to prohibit downloads of unauthorized software.

B.

Conduct periodic software scanning.

C.

Perform periodic counting of licenses.

D.

Require senior management approval when installing licenses.

Full Access
Question # 332

How does the emergence of quantum computing impact traditional data encryption methods?

A.

Quantum computing may render classical encryption algorithms obsolete due to its ability to decrypt data with unprecedented efficiency.

B.

Quantum computing introduces new encryption techniques that are immune to decryption by classical and quantum computers alike.

C.

Quantum computing enhances the security of classical encryption algorithms by providing faster computation speeds.

D.

Quantum computing will require more frequent training on the application of classical data encryption methods.

Full Access
Question # 333

An IS auditor evaluating the change management process must select a sample from the change log. What is the BEST way to the auditor to confirm the change log is complete?

A.

Interview change management personnel about completeness.

B.

Take an item from the log and trace it back to the system.

C.

Obtain management attestation of completeness.

D.

Take the last change from the system and trace it back to the log.

Full Access
Question # 334

Which of the following is the BEST way to ensure that an application is performing according to its specifications?

A.

Unit testing

B.

Pilot testing

C.

System testing

D.

Integration testing

Full Access
Question # 335

The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?

A.

Report results to management

B.

Document lessons learned

C.

Perform a damage assessment

D.

Prioritize resources for corrective action

Full Access
Question # 336

Which of the following should be of MOST concern to an IS auditor reviewing an organization’s business impact analysis (BIA)?

A.

A risk assessment was not conducted prior to completing the BIA.

B.

System criticality information was only provided by the IT manager.

C.

A questionnaire was used to gather information as opposed to in-person interviews.

D.

The BIA was not signed off by executive management.

Full Access
Go to page: