Isaca CISA Practice Test - Questions Answers, Page 134
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 1331
 
                            
                            
                                Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's mobile device policies and controls in its corporate environment?
Question 1332
 
                            
                            
                                An organization is planning to implement a control self-assessment (CSA) program for selected business processes. Which of the following should be the role of the internal audit team for this program?
Question 1333
 
                            
                            
                                Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?
Question 1334
 
                            
                            
                                Data Loss Prevention (DLP) tools provide the MOST protection against:
Question 1335
 
                            
                            
                                Which of the following responses to risk associated with separation of duties would incur the LOWEST initial cost?
Question 1336
 
                            
                            
                                Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
Question 1337
 
                            
                            
                                An IS auditor is reviewing an organization's incident management processes. Which of the following observations should be the auditor's GREATEST concern?
Question 1338
 
                            
                            
                                The following findings are the result of an IS auditor's post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?
Question 1339
 
                            
                            
                                Which of the following protocols should be used when transferring data via the internet?
Question 1340
 
                            
                            
                                During which stage of the penetration test cycle does the tester utilize identified vulnerabilities to attempt to access the target system?
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question