Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 105

Which of the following is the BEST reason for an organization to use clustering?

A.

To decrease system response time

B.

To Improve the recovery lime objective (RTO)

C.

To facilitate faster backups

D.

To improve system resiliency

Full Access
Question # 106

In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?

A.

Discovery sampling

B.

Variable sampling

C.

Stop-or-go sampling

D.

Judgmental sampling

Full Access
Question # 107

Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?

A.

Review exception reports

B.

Review IT staffing schedules.

C.

Analyze help desk ticket logs

D.

Conduct IT management interviews

Full Access
Question # 108

Which of the following provides the BEST evidence of the validity and integrity of logs in an organization's security information and event management (SIEM) system?

A.

Compliance testing

B.

Stop-or-go sampling

C.

Substantive testing

D.

Variable sampling

Full Access
Question # 109

Which of the following is the MOST important prerequisite for implementing a data loss prevention (DLP) tool?

A.

Requiring users to save files in secured folders instead of a company-wide shared drive

B.

Reviewing data transfer logs to determine historical patterns of data flow

C.

Developing a DLP policy and requiring signed acknowledgment by users

D.

Identifying where existing data resides and establishing a data classification matrix

Full Access
Question # 110

When reviewing a business case for a proposed implementation of a third-party system, which of the following should be an IS auditor's GREATEST concern?

A.

Lack of ongoing maintenance costs

B.

Lack of training materials

C.

Lack of plan for pilot implementation

D.

Lack of detailed work breakdown structure

Full Access
Question # 111

Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?

A.

Data ownership

B.

Applicable laws and regulations

C.

Business requirements and data flows

D.

End-user access rights

Full Access
Question # 112

During an external review, an IS auditor observes an inconsistent approach in classifying system criticality

within the organization. Which of the following should be recommended as the PRIMARY factor to

determine system criticality?

A.

Recovery point objective (RPO)

B.

Maximum allowable downtime (MAD)

C.

Mean time to restore (MTTR)

D.

Key performance indicators (KPls)

Full Access
Go to page: