Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 377

Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?

A.

The person who collected the evidence is not qualified to represent the case.

B.

The logs failed to identify the person handling the evidence.

C.

The evidence was collected by the internal forensics team.

D.

The evidence was not fully backed up using a cloud-based solution prior to the trial.

Full Access
Question # 378

An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?

A.

Data encryption on the mobile device

B.

Complex password policy for mobile devices

C.

The triggering of remote data wipe capabilities

D.

Awareness training for mobile device users

Full Access
Question # 379

An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?

A.

The security of the desktop PC is enhanced.

B.

Administrative security can be provided for the client.

C.

Desktop application software will never have to be upgraded.

D.

System administration can be better managed

Full Access
Question # 380

An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?

A.

Redundant pathways

B.

Clustering

C.

Failover power

D.

Parallel testing

Full Access
Question # 381

In order to be useful, a key performance indicator (KPI) MUST

A.

be approved by management.

B.

be measurable in percentages.

C.

be changed frequently to reflect organizational strategy.

D.

have a target value.

Full Access
Question # 382

Which of the following is the GREATEST risk associated with storing customer data on a web server?

A.

Data availability

B.

Data confidentiality

C.

Data integrity

D.

Data redundancy

Full Access
Question # 383

Which of the following BEST enables the timely identification of risk exposure?

A.

External audit review

B.

Internal audit review

C.

Control self-assessment (CSA)

D.

Stress testing

Full Access
Question # 384

Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?

A.

Testing

B.

Replication

C.

Staging

D.

Development

Full Access
Go to page: