Isaca CISA Practice Test - Questions Answers, Page 129
List of questions
Question 1281
Which of the following control measures is the MOST effective against unauthorized access of confidential information on stolen or lost laptops?
Question 1282
During the forensic investigation of a cyberattack involving credit card data, which of the following is MOST important to ensure?
Question 1283
What is the MAIN purpose of an organization's internal IS audit function?
Question 1284
Which of the following is the MOST important course of action to ensure a cloud access security broker (CASB) effectively detects and responds to threats?
Question 1285
Which of the following is the MAIN objective of enterprise architecture (EA) governance?
Question 1286
Which of the following MOST effectively detects transposition and transcription errors?
Question 1287
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization's enterprise architecture (EA) program?
Question 1288
The PRIMARY advantage of using open-source-based solutions is that they:
Question 1289
In which phase of the audit life cycle process should an IS auditor initially discuss observations with management?
Question 1290
Which of the following is the MOST important consideration to facilitate prosecution of a perpetrator after a cybercrime?
Question