Isaca CISA Practice Test - Questions Answers, Page 126
List of questions
Question 1251

When drafting a disaster recovery strategy, what should be the MOST important outcome of a business impact analysis (BIA)?
Question 1252

Which of the following is the BEST way to ensure email confidentiality in transit?
Question 1253

Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls?
Question 1254

Which of the following is MOST important for an IS auditor to validate when reviewing the controls for an organization's quality management system (QMS)?
Question 1255

Which of the following is the MOST important task of an IS auditor during an application post-implementation review?
Question 1256

An organization saves confidential information in a file with password protection and the file is placed in a shared folder. An attacker has stolen this information by obtaining the password through social engineering. Implementing which of the following would BEST enable the organization to prevent this type of incident in the future?
Question 1257

An organization wants to use virtual desktops to deliver corporate applications to its end users. Which of the following should an IS auditor recommend to prevent domain name system (DNS) poisoning in their cloud environment?
Question 1258

Of the following who should be responsible for cataloging and inventorying robotic process automation (RPA) processes?
Question 1259

Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?
Question 1260

Which of the following is the PRIMARY purpose of conducting a control self-assessment (CSA)?
Question