Isaca CISA Practice Test - Questions Answers, Page 36
List of questions
Question 351
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Question 352
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
Question 353
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
Question 354
Which of the following backup schemes is the BEST option when storage media is limited?
Question 355
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
Question 356
Which of the following is a corrective control?
Question 357
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
Question 358
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
Question 359
The PRIMARY benefit of information asset classification is that it:
Question 360
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
Question