Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 329

Which of the following should be the FIRST step when planning an IS audit of a third-party service provider that monitors network activities?

A.

Review the third party's monitoring logs and incident handling

B.

Review the roles and responsibilities of the third-party provider

C.

Evaluate the organization's third-party monitoring process

D.

Determine if the organization has a secure connection to the provider

Full Access
Question # 330

Which of the following is the PRIMARY role of key performance indicators (KPIs) in supporting business process effectiveness?

A.

To analyze workflows in order to optimize business processes and eliminate tasks that do not provide value

B.

To evaluate the cost-benefit of tools implemented to monitor control performance

C.

To assess the functionality of a software deliverable based on business processes

D.

To enable conclusions about the performance of the processes and target variances for follow-up analysis

Full Access
Question # 331

An IS auditor requests direct access to data required to perform audit procedures instead of asking management to provide the data Which of the following is the PRIMARY advantage of this approach?

A.

Audit transparency

B.

Data confidentiality

C.

Professionalism

D.

Audit efficiency

Full Access
Question # 332

In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?

A.

Implementation

B.

Development

C.

Feasibility

D.

Design

Full Access
Question # 333

Which of the following is MOST important for an IS auditor to verify when reviewing the use of an outsourcer for disposal of storage media?

A.

The vendor's process appropriately sanitizes the media before disposal

B.

The contract includes issuance of a certificate of destruction by the vendor

C.

The vendor has not experienced security incidents in the past.

D.

The disposal transportation vehicle is fully secure

Full Access
Question # 334

An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?

A.

Requiring policy acknowledgment and nondisclosure agreements (NDAs) signed by employees

B.

Establishing strong access controls on confidential data

C.

Providing education and guidelines to employees on use of social networking sites

D.

Monitoring employees' social networking usage

Full Access
Question # 335

A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?

A.

Notify the cyber insurance company.

B.

Shut down the affected systems.

C.

Quarantine the impacted systems.

D.

Notify customers of the breach.

Full Access
Question # 336

Which of the following would protect the confidentiality of information sent in email messages?

A.

Secure Hash Algorithm 1(SHA-1)

B.

Digital signatures

C.

Encryption

D.

Digital certificates

Full Access
Go to page: