ExamGecko
Home / Isaca / CISA / List of questions
Ask Question

Isaca CISA Practice Test - Questions Answers, Page 134

List of questions

Question 1331

Report Export Collapse

Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's mobile device policies and controls in its corporate environment?

Become a Premium Member for full access
  Unlock Premium Member

Question 1332

Report Export Collapse

An organization is planning to implement a control self-assessment (CSA) program for selected business processes. Which of the following should be the role of the internal audit team for this program?

Become a Premium Member for full access
  Unlock Premium Member

Question 1333

Report Export Collapse

Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?

Become a Premium Member for full access
  Unlock Premium Member

Question 1334

Report Export Collapse

Data Loss Prevention (DLP) tools provide the MOST protection against:

Become a Premium Member for full access
  Unlock Premium Member

Question 1335

Report Export Collapse

Which of the following responses to risk associated with separation of duties would incur the LOWEST initial cost?

Become a Premium Member for full access
  Unlock Premium Member

Question 1336

Report Export Collapse

Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?

Become a Premium Member for full access
  Unlock Premium Member

Question 1337

Report Export Collapse

An IS auditor is reviewing an organization's incident management processes. Which of the following observations should be the auditor's GREATEST concern?

Become a Premium Member for full access
  Unlock Premium Member

Question 1338

Report Export Collapse

The following findings are the result of an IS auditor's post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?

Become a Premium Member for full access
  Unlock Premium Member

Question 1339

Report Export Collapse

Which of the following protocols should be used when transferring data via the internet?

Become a Premium Member for full access
  Unlock Premium Member

Question 1340

Report Export Collapse

During which stage of the penetration test cycle does the tester utilize identified vulnerabilities to attempt to access the target system?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.351 questions
Go to page: of 136
Search

Related questions