Isaca CISA Practice Test - Questions Answers, Page 83
List of questions
Related questions
Which of the following types of firewalls provides the GREATEST degree of control against hacker intrusion?
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Which of the following threats is mitigated by a firewall?
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
An IS auditor is reviewing a data conversion project. Which of the following is the auditor's BEST recommendation prior to go-live?
A white box testing method is applicable with which of the following testing processes?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the auditor's BEST recommendation to help prevent unauthorized access?
Which of the following BEST indicates that an incident management process is effective?
Which of the following BEST reflects a mature strategic planning process?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
Question