Isaca CISA Practice Test - Questions Answers, Page 129
List of questions
Question 1281

Which of the following control measures is the MOST effective against unauthorized access of confidential information on stolen or lost laptops?
Question 1282

During the forensic investigation of a cyberattack involving credit card data, which of the following is MOST important to ensure?
Question 1283

What is the MAIN purpose of an organization's internal IS audit function?
Question 1284

Which of the following is the MOST important course of action to ensure a cloud access security broker (CASB) effectively detects and responds to threats?
Question 1285

Which of the following is the MAIN objective of enterprise architecture (EA) governance?
Question 1286

Which of the following MOST effectively detects transposition and transcription errors?
Question 1287

Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization's enterprise architecture (EA) program?
Question 1288

The PRIMARY advantage of using open-source-based solutions is that they:
Question 1289

In which phase of the audit life cycle process should an IS auditor initially discuss observations with management?
Question 1290

Which of the following is the MOST important consideration to facilitate prosecution of a perpetrator after a cybercrime?
Question