ExamGecko
Home / Isaca / CISA / List of questions
Ask Question

Isaca CISA Practice Test - Questions Answers, Page 123

List of questions

Question 1221

Report Export Collapse

During recent post-implementation reviews, an IS auditor has noted that several deployed applications are not being used by the business. The MOST likely cause would be the lack of:

Become a Premium Member for full access
  Unlock Premium Member

Question 1222

Report Export Collapse

An organization is modernizing its technology policy framework to demonstrate compliance with external industry standards. Which of the following would be MOST useful to an IS auditor for validating the outcome?

Become a Premium Member for full access
  Unlock Premium Member

Question 1223

Report Export Collapse

Which of the following is the MOST effective way to ensure adequate system resources are available for high-priority activities?

Become a Premium Member for full access
  Unlock Premium Member

Question 1224

Report Export Collapse

An IS auditor is reviewing an organization's cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?

Become a Premium Member for full access
  Unlock Premium Member

Question 1225

Report Export Collapse

An IS auditor observes that a large number of departed employees have not been removed from the accounts payable system. Which of the following is MOST important to determine in order to assess the risk1?

Become a Premium Member for full access
  Unlock Premium Member

Question 1226

Report Export Collapse

Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?

Become a Premium Member for full access
  Unlock Premium Member

Question 1227

Report Export Collapse

A hearth care organization utilizes Internet of Things (loT) devices to improve patient outcomes through real-time patient monitoring and advanced diagnostics. Which of the following would BEST assist in isolating these devices from corporate network traffic?

Become a Premium Member for full access
  Unlock Premium Member

Question 1228

Report Export Collapse

In a public key cryptographic system, which of the following is the PRIMARY requirement to address the risk of man-in-the-middle attacks through spoofing?

Become a Premium Member for full access
  Unlock Premium Member

Question 1229

Report Export Collapse

Which of the following is the PRIMARY benefit of operational log management?

Become a Premium Member for full access
  Unlock Premium Member

Question 1230

Report Export Collapse

Which of the following system attack methods is executed by entering malicious code into the search box of a vulnerable website, causing the server to reveal restricted information?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.351 questions
Go to page: of 136
Search

Related questions