1 / 4

2021 Updated Isaca CISA Dumps PDF - RealExamDumps

RealExamDumps.com

elifgeorge
Download Presentation

2021 Updated Isaca CISA Dumps PDF - RealExamDumps

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Isaca CISA Dumps Certified Information Systems Auditor For More Info, Click The Link Below : https://www.realexamdumps.com/ Verified By Experts Get Prepared And Pass Your Exam Teach YourSelf

  2. Version: 29.0 Question: 1 An organization using instant messaging to communicate with customers prevent legitimate customers from being impersonated by: A. Authentication users before conversation are initiated. B. Using firewall to limit network traffic to authorized ports. C. Logging conversation. D. Using call monitoring. Answer: A Question: 2 The MOST effective method for an IS auditor to determine which controls are functioning in an operating system is to: A. Compare the current configuration to the corporate standard B. Consult with the vendor of the system C. Compare the current configuration to the default configuration D. Consult with the systems programmer Answer: A Question: 3 The CIO of an organization is concerned that the information security policies may not be comprehensive. Which of the following should an IS auditor recommend be performed FIRST? A. Determine if there is j process to handle exceptions to the policies B. Establish a governance board to track compliance with the policies C. Obtain a copy of their competitor's policies D. Compare the policies against an industry framework. Answer: B

  3. Question: 4 The PRIMARY purpose for an IS auditor to review previous audit reports during the planning phase of a current audit is to: A. identify applicable regulatory requirements for the current audit. B. adjust audit scope to reduce testing in areas related to previous findings. C. become informed about the auditee s business processes. D. ensure that previously identified risks are addressed in the audit program. Answer: D Question: 5 When physical destruction is not practical, which of the following is the MOST effective measure of disposing of sensitive data on a hard disk? A. Deleting files sequentially B. Overwriting multiple times C. Recycling the disk D. Reformatting Answer: C Question: 6 A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration in establishing a contingency plan and an alternate processing site? A. The alternative site does not reside on the same fault no matter how far the distance apart. B. The alternative site is a hot site with equipment ready to resume processing immediately. C. The contingency plan for high priority applications does not involve a shared cold site. D. The contingency plan provides for backup tapes to be taken to the alternative site. Answer: A Question: 7 During business process reengineering (BPR) of a bank's teller activities, an IS auditor should evaluate:

  4. A. the impact of changed business processes. B. the cost of new controls. C. BPR project plans D. continuous improvement and monitoring plans. Answer: A Question: 8 Which of the following is the BEST indication of control maturity in an organization's systems development and implementation processes? A. Code changes are tested and deployed manually. B. Code changes are tested and deployed through automation. C. Code changes are deployed to a test server and then to production. D. Code changes are documented and approved. Answer: B Question: 9 Which of the following firewall technologies involves examining the header of every packet of data traveling between the Internet and the corporate network without examining the previous packets? A. Stateful filtering B. Stateless filtering C. Proxy servers D. Bastion host Answer: B Question: 10 An IS auditor is reviewing standards and compliance requirements related to an upcoming systems audit. The auditor notes that the industry standards are less stringent than local regulatory standards. How should the auditor proceed? A. Audit to the policies and procedures of the organization. B. Coordinate with regulatory officers to determine necessary requirements. C. Audit exclusively to the industry standards. D. Audit to the standards with the highest requirements. For More Information CISA Dumps

More Related