Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 281

Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization's security policy?

A.

Analyzing how the configuration changes are performed

B.

Analyzing log files

C.

Reviewing the rule base

D.

Performing penetration testing

Full Access
Question # 282

Which of the following provides a new IS auditor with the MOST useful information to evaluate overall IT performance?

A.

IT value analysis

B.

Prior audit reports

C.

IT balanced scorecard

D.

Vulnerability assessment report

Full Access
Question # 283

Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?

A.

Evaluating the likelihood of attack

B.

Estimating potential damage

C.

Identifying vulnerable assets

D.

Assessing the Impact of vulnerabilities

Full Access
Question # 284

The FIRST step in auditing a data communication system is to determine:

A.

traffic volumes and response-time criteria

B.

physical security for network equipment

C.

the level of redundancy in the various communication paths

D.

business use and types of messages to be transmitted

Full Access
Question # 285

Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?

A.

Monitoring tools are configured to alert in case of downtime

B.

A comprehensive security review is performed every quarter.

C.

Data for different tenants is segregated by database schema

D.

Tenants are required to implement data classification polices

Full Access
Question # 286

What is the PRIMARY benefit of using one-time passwords?

A.

An intercepted password cannot be reused

B.

Security for applications can be automated

C.

Users do not have to memorize complex passwords

D.

Users cannot be locked out of an account

Full Access
Question # 287

A checksum is classified as which type of control?

A.

Detective control

B.

Preventive control

C.

Corrective control

D.

Administrative control

Full Access
Question # 288

Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization's information cannot be accessed?

A.

Re-partitioning

B.

Degaussing

C.

Formatting

D.

Data wiping

Full Access
Go to page: