Isaca CISA Practice Test - Questions Answers, Page 70

List of questions
Question 691

Which type of attack targets security vulnerabilities in web applications to gain access to data sets?
Question 692

An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?
Question 693

Which of the following is an IS auditor's BEST recommendation for mitigating risk associated with inadvertent disclosure of sensitive information by employees?
Question 694

Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?
Question 695

Which of the following is the GREATEST risk associated with hypervisors in virtual environments?
Question 696

Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's incident response management program?
Question 697

Which of the following is MOST appropriate to review when determining if the work completed on an IT project is in alignment with budgeted costs?
Question 698

The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
Question 699

A source code repository should be designed to:
Question 700

Which of the following would a digital signature MOST likely prevent?
Question