Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 145

In order for a firewall to effectively protect a network against external attacks, what fundamental practice must be followed?

A.

The firewall must be placed in the demilitarized zone (DMZ).

B.

Only essential external services should be permitted.

C.

Filters for external information must be defined.

D.

All external communication must be via the firewall.

Full Access
Question # 146

A configuration management audit identified that predefined automated procedures are used when deploying and configuring application infrastructure in a cloud-based

environment. Which of the following is MOST important for the IS auditor to review?

A.

Storage location of configuration management documentation

B.

Processes for making changes to cloud environment specifications

C.

Contracts of vendors responsible for maintaining provisioning tools

D.

Number of administrators with access to cloud management consoles

Full Access
Question # 147

Which of the following BEST addresses the availability of an online store?

A.

RAID level 5 storage devices

B.

A mirrored site at another location

C.

Online backups

D.

Clustered architecture

Full Access
Question # 148

A global bank plans to use a cloud provider for backup of customer financial data. Which of the following should be the PRIMARY focus of this project?

A.

Backup testing schedule

B.

Data retention policy

C.

Transfer frequency

D.

Data confidentiality

Full Access
Question # 149

Management has requested a post-implementation review of a newly implemented purchasing package to determine the extent that business requirements are being met. Which of the following

is MOST likely to be assessed?

A.

Acceptance testing results

B.

Results of live processing

C.

Implementation methodology

D.

Purchasing guidelines and policies

Full Access
Question # 150

Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?

A.

A high percentage of stakeholders satisfied with the quality of IT

B.

A high percentage of IT processes reviewed by quality assurance (QA)

C.

A high percentage of incidents being quickly resolved

D.

A high percentage of IT employees attending quality training

Full Access
Question # 151

An IS auditor wants to inspect recent events in a system to observe failed authentications and password changes. Which of the following is the MOST appropriate method to use for this purpose?

A.

Penetration testing

B.

Authenticated scanning

C.

Change management records

D.

System log review

Full Access
Question # 152

Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?

A.

Information security policy

B.

Industry standards

C.

Incident response plan

D.

Industry regulations

Full Access
Go to page: