Isaca CISA Practice Test - Questions Answers, Page 39

List of questions
Question 381

A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
Question 382

Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
Question 383

Which of the following is MOST important when implementing a data classification program?
Question 384

Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
Question 385

Which of the following would be MOST useful when analyzing computer performance?
Question 386

Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
Question 387

Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Question 388

An IS auditor assessing the controls within a newly implemented call center would First
Question 389

An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
Question 390

When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
Question