Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 353

Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?

A.

Process and resource inefficiencies

B.

Irregularities and illegal acts

C.

Noncompliance with organizational policies

D.

Misalignment with business objectives

Full Access
Question # 354

Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?

A.

Temperature sensors

B.

Humidity sensors

C.

Water sensors

D.

Air pressure sensors

Full Access
Question # 355

Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?

A.

Identify approved data workflows across the enterprise.

B.

Conduct a threat analysis against sensitive data usage.

C.

Create the DLP pcJc.es and templates

D.

Conduct a data inventory and classification exercise

Full Access
Question # 356

An IS auditor found that operations personnel failed to run a script contributing to year-end financial statements. Which of the following is the BEST recommendation?

A.

Retrain operations personnel.

B.

Implement a closing checklist.

C.

Update the operations manual.

D.

Bring staff with financial experience into operations.

Full Access
Question # 357

What is the MOST effective way to manage contractors' access to a data center?

A.

Badge identification worn by visitors

B.

Escort requirement for visitor access

C.

Management approval of visitor access

D.

Verification of visitor identification

Full Access
Question # 358

Which of the following is the MOST important task of an IS auditor during an application post-implementation review?

A.

Conduct a business impact analysis (BIA)

B.

Perform penetration testing

C.

identify project delays

D.

Verify user access controls

Full Access
Question # 359

Which of the following should be of GREATEST concern to an IS auditor reviewing system interfaces used to transfer publicly available information?

A.

A system interface tracking program is not enabled.

B.

The data has not been encrypted.

C.

Data is intercepted while in transit between systems.

D.

The data from the originating system differs from the downloaded data.

Full Access
Question # 360

When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the

firewall and:

A.

the organization's network.

B.

the demilitarized zone (DMZ).

C.

the Internet.

D.

the organization's web server.

Full Access
Go to page: