Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Searching for workable clues to ace the Isaca CISA Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISA PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 353

A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?

A.

The survey results were not presented in detail lo management.

B.

The survey questions did not address the scope of the business case.

C.

The survey form template did not allow additional feedback to be provided.

D.

The survey was issued to employees a month after implementation.

Full Access
Question # 354

Which of the following should be the FIRST step when conducting an IT risk assessment?

A.

Identify potential threats.

B.

Assess vulnerabilities.

C.

Identify assets to be protected.

D.

Evaluate controls in place.

Full Access
Question # 355

Which of the following encryption methods offers the BEST wireless security?

A.

Wi-Fi Protected Access 3 (WPA3)

B.

Data Encryption Standard (DES)

C.

Wired Equivalent Privacy (WEP)

D.

Secure Sockets Layer (SSL)

Full Access
Question # 356

Which of the following provides the MOST useful information regarding an organization ' s risk appetite and tolerance?

A.

Gap analysis

B.

Audit reports

C.

Risk profile

D.

Risk register

Full Access
Question # 357

Which of the following is the MOST important consideration for patching mission critical business application servers against known vulnerabilities?

A.

Patches are implemented in a test environment prior to rollout into production.

B.

Network vulnerability scans are conducted after patches are implemented.

C.

Vulnerability assessments are periodically conducted according to defined schedules.

D.

Roles and responsibilities for implementing patches are defined

Full Access
Question # 358

Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?

A.

Review of monthly performance reports submitted by the vendor

B.

Certifications maintained by the vendor

C.

Regular independent assessment of the vendor

D.

Substantive log file review of the vendor ' s system

Full Access
Question # 359

The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:

A.

audit resources are used most effectively.

B.

internal audit activity conforms with audit standards and methodology.

C.

the audit function is adequately governed and meets performance metrics.

D.

inherent risk in audits is minimized.

Full Access
Question # 360

Which of the following would be a result of utilizing a top-down maturity model process?

A.

A means of benchmarking the effectiveness of similar processes with peers

B.

A means of comparing the effectiveness of other processes within the enterprise

C.

Identification of older, more established processes to ensure timely review

D.

Identification of processes with the most improvement opportunities

Full Access
Go to page: