Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 121

Which of the following provides the MOST protection against emerging threats?

A.

Demilitarized zone (DMZ)

B.

Heuristic intrusion detection system (IDS)

C.

Real-time updating of antivirus software

D.

Signature-based intrusion detection system (IDS)

Full Access
Question # 122

In a large organization, IT deadlines on important projects have been missed because IT resources are not prioritized properly. Which of the following is the BEST recommendation to address this problem?

A.

Revisit the IT strategic plan.

B.

Implement project portfolio management.

C.

Implement an integrated resource management system.

D.

Implement a comprehensive project scorecard.

Full Access
Question # 123

In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:

A.

integrated test facility (ITF).

B.

parallel simulation.

C.

transaction tagging.

D.

embedded audit modules.

Full Access
Question # 124

Which of the following is the MOST effective control over visitor access to highly secured areas?

A.

Visitors are required to be escorted by authorized personnel.

B.

Visitors are required to use biometric authentication.

C.

Visitors are monitored online by security cameras

D.

Visitors are required to enter through dead-man doors.

Full Access
Question # 125

Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?

A.

Conduct a data inventory and classification exercise.

B.

Identify approved data workflows across the enterprise_

C.

Conduct a threat analysis against sensitive data usage.

D.

Create the DLP policies and templates

Full Access
Question # 126

Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?

A.

Continuous network monitoring

B.

Periodic network vulnerability assessments

C.

Review of electronic access logs

D.

Physical security reviews

Full Access
Question # 127

IT governance should be driven by:

A.

business unit initiatives.

B.

balanced scorecards.

C.

policies and standards.

D.

organizational strategies.

Full Access
Question # 128

Which of the following is MOST important for the successful establishment of a security vulnerability management program?

A.

A robust tabletop exercise plan

B.

A comprehensive asset inventory

C.

A tested incident response plan

D.

An approved patching policy

Full Access
Go to page: