Isaca CISA Practice Test - Questions Answers, Page 106
List of questions
Related questions
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
Which of the following BEST facilitates strategic program management?
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change management process?
Retention periods and conditions for the destruction of personal data should be determined by the.
In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)
agreement. What should the auditor do NEXT?
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
Which of the following provides the BEST evidence of the validity and integrity of logs in an organization's security information and event management (SIEM) system?
What is the FIRST step when creating a data classification program?
Question