Isaca CISA Practice Test - Questions Answers, Page 39
List of questions
Question 381
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
Question 382
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
Question 383
Which of the following is MOST important when implementing a data classification program?
Question 384
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
Question 385
Which of the following would be MOST useful when analyzing computer performance?
Question 386
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
Question 387
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Question 388
An IS auditor assessing the controls within a newly implemented call center would First
Question 389
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
Question 390
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
Question