Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Searching for workable clues to ace the Isaca CISA Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISA PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 345

In which phase of the audit life cycle process should an IS auditor initially discuss observations with management?

A.

Planning phase

B.

Reporting phase

C.

Follow-up phase

D.

Fieldwork phase

Full Access
Question # 346

An organization is permanently transitioning from onsite to fully remote business operations. When should the existing business impact analysis (BIA) be reviewed?

A.

During the next scheduled review

B.

At least one year after the transition

C.

As soon as the decision about the transition is announced

D.

As soon as the new operating model is in place

Full Access
Question # 347

An outsourced recruitment vendor processes personally identifiable information (PII) related to an organization’s new hires. Which of the following would be the GREATEST concern to an IS auditor reviewing the third-party risk management process?

A.

The vendor collects data using an external-facing web service.

B.

The vendor lacks a team of dedicated privacy professionals.

C.

The vendor uses a fourth party to host client data.

D.

The vendor is excluded from the third-party due diligence process.

Full Access
Question # 348

An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:

A.

well understood by all employees.

B.

based on industry standards.

C.

developed by process owners.

D.

updated frequently.

Full Access
Question # 349

Which of the following job scheduling schemes for operating system updates is MOST likely to adequately balance protection of workstations with user requirements?

A.

Automated patching jobs and immediate restart

B.

Automated patching jobs followed by a scheduled restart outside of business hours

C.

End users can initiate patching including subsequent system restarts

D.

Applying only those patches not requiring a system restart

Full Access
Question # 350

Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?

A.

Analyze whether predetermined test objectives were met.

B.

Perform testing at the backup data center.

C.

Evaluate participation by key personnel.

D.

Test offsite backup files.

Full Access
Question # 351

Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?

A.

Document the security view as part of the EA

B.

Consider stakeholder concerns when defining the EA

C.

Perform mandatory post-implementation reviews of IT implementations

D.

Conduct EA reviews as part of the change advisory board

Full Access
Question # 352

Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?

A.

Use of stateful firewalls with default configuration

B.

Ad hoc monitoring of firewall activity

C.

Misconfiguration of the firewall rules

D.

Potential back doors to the firewall software

Full Access
Go to page: