Isaca CISA Practice Test - Questions Answers, Page 36

List of questions
Question 351

A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Question 352

An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
Question 353

Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
Question 354

Which of the following backup schemes is the BEST option when storage media is limited?
Question 355

During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
Question 356

Which of the following is a corrective control?
Question 357

An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
Question 358

Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
Question 359

The PRIMARY benefit of information asset classification is that it:
Question 360

Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
Question