Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Searching for workable clues to ace the Isaca CISA Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISA PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 33

An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?

A.

Team member assignments must be based on individual competencies

B.

Technical co-sourcing must be used to help the new staff

C.

The standard is met as long as one member has a globally recognized audit certification.

D.

The standard is met as long as a supervisor reviews the new auditors ' work

Full Access
Question # 34

Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization ' s enterprise architecture (EA) program?

A.

IT application owners have sole responsibility for architecture approval.

B.

The architecture review board is chaired by the CIO.

C.

Information security requirements are reviewed by the EA program.

D.

The EA program governs projects that are not IT-related.

Full Access
Question # 35

To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?

A.

Data retention

B.

Data minimization

C.

Data quality

D.

Data integrity

Full Access
Question # 36

Email required for business purposes is being stored on employees ' personal devices.

Which of the following is an IS auditor ' s BEST recommendation?

A.

Require employees to utilize passwords on personal devices

B.

Prohibit employees from storing company email on personal devices

C.

Ensure antivirus protection is installed on personal devices

D.

Implement an email containerization solution on personal devices

Full Access
Question # 37

A web application is developed in-house by an organization. Which of the following would provide the BEST evidence to an IS auditor that the application is secure from external attack?

A.

Web application firewall (WAF) implementation

B.

Penetration test results

C.

Code review by a third party

D.

Database application monitoring logs

Full Access
Question # 38

An IS auditor is reviewing a network diagram. Which of the following would be the BEST location for placement of a firewall?

A.

Between each host and the local network switch/hub

B.

Between virtual local area networks (VLANs)

C.

Inside the demilitarized zone (DMZ)

D.

At borders of network segments with different security levels

Full Access
Question # 39

Which of the following would be of MOST concern to an IS auditor reviewing a data loss prevention (DLP) solution implementation for endpoints?

A.

The DLP solution does not support all types of servers.

B.

The solution has been implemented in blocking mode prior to performing tuning.

C.

The organization has never finished tuning the solution.

D.

The solution does not prevent data leakage because it is still in the monitoring phase.

Full Access
Question # 40

Which of the following procedures for testing a disaster recovery plan (DRP) is MOST effective?

A.

Testing at a secondary site using offsite data backups

B.

Performing a quarterly tabletop exercise

C.

Reviewing recovery time and recovery point objectives

D.

Reviewing documented backup and recovery procedures

Full Access
Go to page: