Isaca CISA Practice Test - Questions Answers, Page 75
List of questions
Related questions
During an organization's implementation of a data loss prevention (DLP) solution, which of the following activities should be completed FIRST?
A new regulation has been enacted that mandates specific information security practices for the protection of customer data. Which of the following is MOST useful for an IS auditor to review when auditing against the regulation?
An external attacker spoofing an internal Internet Protocol (IP) address can BEST be detected by which of the following?
During the audit of an enterprise resource planning (ERP) system, an IS auditor found an applicationpatch was applied to the production environment. It is MOST
important for the IS auditor to verify approval from the:
Which of the following would be of GREATEST concern to an IS auditor reviewing the feasibility study for a new application system?
When an intrusion into an organization's network is detected, which of the following should be done FIRST?
Data from a system of sensors located outside of a network is received by the open ports on a server. Which of the following is the BEST way to ensure the integrity of the data being collected from the sensor system?
Which of the following provides the BEST assurance that vendor-supported software remains up to date?
If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:
A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:
Question