Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 361

Which of the following MOST effectively enables consistency across high-volume software changes'?

A.

The use of continuous integration and deployment pipelines

B.

Management reviews of detailed exception reports for released code

C.

Publication of a refreshed policy on development and release management

D.

An ongoing awareness campaign for software deployment best practices

Full Access
Question # 362

Which of the following is the MOST effective control when granting access to a service provider for a ctoud-6ased application?

A.

Administrator access is provided for a limited period with an expiration date.

B.

Access has been provided on a need-to-know basis.

C.

User IDs are deleted when work is completed.

D.

Access is provided to correspond with the service level agreement (SLA).

Full Access
Question # 363

Which of the following is an effective way to ensure the integrity of file transfers in a peer-to-peer (P2P) computing environment?

A.

Associate a message authentication code with each file transferred.

B.

Ensure the files are transferred through an intrusion detection system (IDS).

C.

Encrypt the packets shared between peers within the environment.

D.

Connect the client computers in the environment to a jump server.

Full Access
Question # 364

Which of the following is the MOST important consideration when relying on the work of the prior auditor?

A.

Qualifications of the prior auditor

B.

Management agreement with recommendations

C.

Duration of the prior audit

D.

Number of findings identified by the prior auditor

Full Access
Question # 365

Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's mobile device policies and controls in its corporate environment?

A.

The mobile authentication policy requires biometrics.

B.

The virtual private network (VPN) policy is not enabled for the internal corporate network.

C.

Not all active devices are enrolled in mobile device management (MDM).

D.

Remote wipe and lock features are only available with access to the internet.

Full Access
Question # 366

An IS auditor is planning a review of an organizations cybersecurity incident response maturity Which of the following methodologies would provide the MOST reliable conclusions?

A.

Judgmental sampling

B.

Data analytics testing

C.

Variable sampling

D.

Compliance testing

Full Access
Question # 367

Which of the following is the PRIMARY benefit of benchmarking an organization's software development lifecycle practices against a capability maturity model?

A.

Reliable products are guaranteed.

B.

Repeatable software development procedures are established.

C.

Programmers' efficiency is improved.

D.

Security requirements are added to software development processes.

Full Access
Question # 368

During which stage of the penetration test cycle does the tester utilize identified vulnerabilities to attempt to access the target system?

A.

Exfiltration

B.

Exploitation

C.

Reconnaissance

D.

Scanning

Full Access
Go to page: