Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 25

Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?

A.

Industry regulations

B.

Industry standards

C.

Incident response plan

D.

Information security policy

Full Access
Question # 26

A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?

A.

Quota sampling

B.

Haphazard sampling

C.

Attribute sampling

D.

Variable sampling

Full Access
Question # 27

An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?

A.

Monitoring access rights on a regular basis

B.

Referencing a standard user-access matrix

C.

Granting user access using a role-based model

D.

Correcting the segregation of duties conflicts

Full Access
Question # 28

Which of the following provides the MOST reliable method of preventing unauthonzed logon?

A.

issuing authentication tokens

B.

Reinforcing current security policies

C.

Limiting after-hours usage

D.

Installing an automatic password generator

Full Access
Question # 29

The PRIMARY advantage of object-oriented technology is enhanced:

A.

efficiency due to the re-use of elements of logic.

B.

management of sequential program execution for data access.

C.

grouping of objects into methods for data access.

D.

management of a restricted variety of data types for a data object.

Full Access
Question # 30

Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?

A.

Stronger data security

B.

Better utilization of resources

C.

Increased application performance

D.

Improved disaster recovery

Full Access
Question # 31

What is the MOST effective way to detect installation of unauthorized software packages by employees?

A.

Regular scanning of hard drives

B.

Communicating the policy to employees

C.

Logging of activity on the network

D.

Maintaining current antivirus software

Full Access
Question # 32

In the development of a new financial application, the IS auditor's FIRST involvement should be in the:

A.

control design.

B.

feasibility study.

C.

application design.

D.

system test.

Full Access
Go to page: