ExamGecko
Home / Isaca / CISA / List of questions
Ask Question

Isaca CISA Practice Test - Questions Answers, Page 131

List of questions

Question 1301

Report Export Collapse

An IS auditor is reviewing a decision to consolidate processing for multiple applications onto a single large server. Which of the following is the MOST significant impact from this decision?

Become a Premium Member for full access
  Unlock Premium Member

Question 1302

Report Export Collapse

The GREATEST concern for an IS auditor reviewing vulnerability assessments by the auditee would be if the assessments are:

Become a Premium Member for full access
  Unlock Premium Member

Question 1303

Report Export Collapse

Which of the following is the MOST significant risk to an organization migrating its onsite application servers to a public cloud service provider?

Become a Premium Member for full access
  Unlock Premium Member

Question 1304

Report Export Collapse

Which of the following is the BEST review for an IS auditor to conduct when a vulnerability has been exploited by an employee?

Become a Premium Member for full access
  Unlock Premium Member

Question 1305

Report Export Collapse

A contract for outsourcing IS functions should always include:

Become a Premium Member for full access
  Unlock Premium Member

Question 1306

Report Export Collapse

Which of the following controls would BEST help a forensic investigator prevent modifications in digital evidence?

Become a Premium Member for full access
  Unlock Premium Member

Question 1307

Report Export Collapse

Which of the following approaches would present the GREATEST concern for the implementation of a quality assurance (QA) function?

Become a Premium Member for full access
  Unlock Premium Member

Question 1308

Report Export Collapse

An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?

Become a Premium Member for full access
  Unlock Premium Member

Question 1309

Report Export Collapse

Which of the following encryption methods offers the BEST wireless security?

Become a Premium Member for full access
  Unlock Premium Member

Question 1310

Report Export Collapse

Which of the following is the MOST important consideration when implementing a Zero Trust strategy for mobile, wireless, and Internet of Things (IoT) devices?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.351 questions
Go to page: of 136
Search

Related questions