Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Searching for workable clues to ace the Isaca CISA Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CISA PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 425

A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?

A.

Notify the cyber insurance company.

B.

Shut down the affected systems.

C.

Quarantine the impacted systems.

D.

Notify customers of the breach.

Full Access
Question # 426

Which of the following is the GREATEST risk associated with hypervisors in virtual environments?

A.

Availability issues

B.

Virtual sprawl

C.

Single point of failure

D.

Lack of patches

Full Access
Question # 427

Which of the following system redundancy configurations BEST improves system resiliency and reduces the possibility of a single cause of failure impacting system dependability?

A.

Active redundancy

B.

Homogeneous redundancy

C.

Diverse redundancy

D.

Passive redundancy

Full Access
Question # 428

An organization has moved all of its infrastructure to the cloud. Which of the following would be an IS auditor’s GREATEST concern related to the organization’s ability to continue operations in case of a disaster?

A.

There is no evidence that disaster recovery plan (DRP) testing was performed after the migration.

B.

Only business-critical servers were configured with redundancy services on the cloud service provider.

C.

The previous infrastructure was not retained to support business operations in case of a disaster.

D.

The step-by-step recovery process was not updated in the disaster recovery plan (DRP) after the migration.

Full Access
Question # 429

Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?

A.

Risk acceptance

B.

Risk mitigation

C.

Risk transference

D.

Risk reduction

Full Access
Question # 430

Which of the following controls BEST provides confidentiality and nonrepudiation for an online business looking for digital payment data security?

A.

Data Encryption Standard (DES)

B.

Advanced Encryption Standard (AES)

C.

Public Key Infrastructure (PKI)

D.

Virtual Private Network (VPN)

Full Access
Question # 431

The use of control totals reduces the risk of:

A.

posting to the wrong record.

B.

incomplete processing.

C.

improper backup.

D.

improper authorization.

Full Access
Question # 432

An IS auditor reviewing an organization’s IT systems finds that the organization frequently purchases systems that are incompatible with the technologies already in the organization. Which of the following is the MOST likely reason?

A.

Ineffective risk management policy

B.

Lack of enterprise architecture (EA)

C.

Lack of a maturity model

D.

Outdated enterprise resource planning (ERP) system

Full Access
Go to page: