Isaca CISA Practice Test - Questions Answers, Page 106
List of questions
Question 1051
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
Question 1052
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which of the following BEST facilitates strategic program management?
Question 1053
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change management process?
Question 1054
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Retention periods and conditions for the destruction of personal data should be determined by the.
Question 1055
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?
Question 1056
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
Question 1057
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)
agreement. What should the auditor do NEXT?
Question 1058
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
Question 1059
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which of the following provides the BEST evidence of the validity and integrity of logs in an organization's security information and event management (SIEM) system?
Question 1060
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
What is the FIRST step when creating a data classification program?
Question