Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CISA Exam Dumps - Certified Information Systems Auditor

Go to page:
Question # 401

Which of the following features would BEST address risk associated with data at rest when evaluating a data loss prevention (DLP) solution?

A.

Printing of scan files

B.

File movement detection

C.

Enforcement of access policies

D.

Storage-scanning technology

Full Access
Question # 402

Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?

A.

Data privacy must be managed in accordance with the regulations applicable to the organization.

B.

Data privacy must be monitored in accordance with industry standards and best practices.

C.

No personal information may be transferred to the service provider without notifying the customer.

D.

Customer data transferred to the service provider must be reported to the regulatory authority.

Full Access
Question # 403

Audit frameworks can assist the IS audit function by:

A.

defining the authority and responsibility of the IS audit function.

B.

providing direction and information regarding the performance of audits.

C.

outlining the specific steps needed to complete audits.

D.

providing details on how to execute the audit program.

Full Access
Question # 404

Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?

A.

Information security policy

B.

Industry standards

C.

Incident response plan

D.

Industry regulations

Full Access
Question # 405

Which of the following is the MOST efficient control to reduce the risk associated with a systems administrator having network administrator responsibilities?

A.

The administrator must obtain temporary access to make critical changes.

B.

The administrator will need to request additional approval for critical changes.

C.

The administrator must sign a due diligence agreement.

D.

The administrator will be subject to unannounced audits.

Full Access
Question # 406

Which of the following is the GREATEST risk if two users have concurrent access to the same database record?

A.

Data integrity

B.

Entity integrity

C.

Referential integrity

D.

Availability integrity

Full Access
Question # 407

Which of the following is MOST important to consider when determining the usefulness of audit evidence?

A.

Timing of the evidence

B.

Nature of evidence gathered

C.

Overall objectives of the review

D.

Competence of the IS auditor

Full Access
Question # 408

Which of the following BEST reflects a mature strategic planning process?

A.

Action plans with IT requirements built into all projects

B.

An IT strategic plan with specifications of controls and safeguards

C.

An IT strategic plan that supports the corporate strategy

D.

IT projects from the strategic plan are approved by management

Full Access
Go to page: