Isaca CISA Practice Test - Questions Answers, Page 123
List of questions
Question 1221

During recent post-implementation reviews, an IS auditor has noted that several deployed applications are not being used by the business. The MOST likely cause would be the lack of:
Question 1222

An organization is modernizing its technology policy framework to demonstrate compliance with external industry standards. Which of the following would be MOST useful to an IS auditor for validating the outcome?
Question 1223

Which of the following is the MOST effective way to ensure adequate system resources are available for high-priority activities?
Question 1224

An IS auditor is reviewing an organization's cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?
Question 1225

An IS auditor observes that a large number of departed employees have not been removed from the accounts payable system. Which of the following is MOST important to determine in order to assess the risk1?
Question 1226

Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?
Question 1227

A hearth care organization utilizes Internet of Things (loT) devices to improve patient outcomes through real-time patient monitoring and advanced diagnostics. Which of the following would BEST assist in isolating these devices from corporate network traffic?
Question 1228

In a public key cryptographic system, which of the following is the PRIMARY requirement to address the risk of man-in-the-middle attacks through spoofing?
Question 1229

Which of the following is the PRIMARY benefit of operational log management?
Question 1230

Which of the following system attack methods is executed by entering malicious code into the search box of a vulnerable website, causing the server to reveal restricted information?
Question