Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 353

Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?

A.

inventory of relevant business processes

B.

Policies for business procurement

C.

Documentation of application configurations

D.

Results of business resumption planning efforts

Full Access
Question # 354

Which of the following is the MOST important factor when an organization is developing information security policies and procedures?

A.

Consultation with security staff

B.

Inclusion of mission and objectives

C.

Compliance with relevant regulations

D.

Alignment with an information security framework

Full Access
Question # 355

Which of the following is the BEST performance indicator for the effectiveness of an incident management program?

A.

Average time between incidents

B.

Incident alert meantime

C.

Number of incidents reported

D.

Incident resolution meantime

Full Access
Question # 356

An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?

A.

Intrusion detection system (IDS)

B.

Security information and event management (SIEM) system

C.

Stateful firewall

D.

Load balancer

Full Access
Question # 357

Email required for business purposes is being stored on employees' personal devices.

Which of the following is an IS auditor's BEST recommendation?

A.

Require employees to utilize passwords on personal devices

B.

Prohibit employees from storing company email on personal devices

C.

Ensure antivirus protection is installed on personal devices

D.

Implement an email containerization solution on personal devices

Full Access
Question # 358

Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?

A.

The testing produces a lower number of false positive results

B.

Network bandwidth is utilized more efficiently

C.

Custom-developed applications can be tested more accurately

D.

The testing process can be automated to cover large groups of assets

Full Access
Go to page: