Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Searching for workable clues to ace the Isaca CISA Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISA PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 377

Which type of security testing is MOST efficient for finding hidden errors in software and facilitating source code optimization?

A.

User acceptance testing (UAT)

B.

Black box testing

C.

White box testing

D.

Penetration testing

Full Access
Question # 378

A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?

A.

Periodically reviewing log files

B.

Configuring the router as a firewall

C.

Using smart cards with one-time passwords

D.

Installing biometrics-based authentication

Full Access
Question # 379

Which of the following is MOST important to determine when conducting an audit Of an organization ' s data privacy practices?

A.

Whether a disciplinary process is established for data privacy violations

B.

Whether strong encryption algorithms are deployed for personal data protection

C.

Whether privacy technologies are implemented for personal data protection

D.

Whether the systems inventory containing personal data is maintained

Full Access
Question # 380

Which of the following is the MAIN purpose of an information security management system?

A.

To identify and eliminate the root causes of information security incidents

B.

To enhance the impact of reports used to monitor information security incidents

C.

To keep information security policies and procedures up-to-date

D.

To reduce the frequency and impact of information security incidents

Full Access
Question # 381

Retention periods and conditions for the destruction of personal data should be determined by the.

A.

risk manager.

B.

database administrator (DBA).

C.

privacy manager.

D.

business owner.

Full Access
Question # 382

In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:

A.

hire another person to perform migration to production.

B.

implement continuous monitoring controls.

C.

remove production access from the developers.

D.

perform a user access review for the development team

Full Access
Question # 383

An IS auditor learns that an organization did not conduct any penetration testing over one internet-facing webpage prior to of the following is the auditor ' s BEST course of action?

A.

Revise IT security procedures to require penetration tests for internally developed services prior to deployment.

B.

Report a control deficiency, as no penetration test has been conducted and documented.

C.

Confirm whether vulnerability scanning was conducted after the webpage was deployed.

D.

Meet with IT and the information security team to determine why testing was not completed.

Full Access
Question # 384

Which of the following is MOST important for an IS auditor to verify when reviewing the use of an outsourcer for disposal of storage media?

A.

The vendor ' s process appropriately sanitizes the media before disposal

B.

The contract includes issuance of a certificate of destruction by the vendor

C.

The vendor has not experienced security incidents in the past.

D.

The disposal transportation vehicle is fully secure

Full Access
Go to page: