ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 83

Question list
Search
Search

Related questions











Which of the following types of firewalls provides the GREATEST degree of control against hacker intrusion?

A.
Packet filtering router
A.
Packet filtering router
Answers
B.
Circuit gateway
B.
Circuit gateway
Answers
C.
Application-level gateway
C.
Application-level gateway
Answers
D.
Screening router.
D.
Screening router.
Answers
Suggested answer: C

Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?

A.
Information security policy
A.
Information security policy
Answers
B.
Industry standards
B.
Industry standards
Answers
C.
Incident response plan
C.
Incident response plan
Answers
D.
Industry regulations
D.
Industry regulations
Answers
Suggested answer: D

Which of the following threats is mitigated by a firewall?

A.
Intrusion attack
A.
Intrusion attack
Answers
B.
Asynchronous attack
B.
Asynchronous attack
Answers
C.
Passive assault
C.
Passive assault
Answers
D.
Trojan horse
D.
Trojan horse
Answers
Suggested answer: A

Which of the following is the MOST important factor when an organization is developing information security policies and procedures?

A.
Alignment with an information security framework
A.
Alignment with an information security framework
Answers
B.
Compliance with relevant regulations
B.
Compliance with relevant regulations
Answers
C.
Inclusion of mission and objectives
C.
Inclusion of mission and objectives
Answers
D.
Consultation with security staff
D.
Consultation with security staff
Answers
Suggested answer: B

An IS auditor is reviewing a data conversion project. Which of the following is the auditor's BEST recommendation prior to go-live?

A.
Conduct a mock conversion test.
A.
Conduct a mock conversion test.
Answers
B.
Review test procedures and scenarios.
B.
Review test procedures and scenarios.
Answers
C.
Automate the test scripts.
C.
Automate the test scripts.
Answers
D.
Establish a configuration baseline.
D.
Establish a configuration baseline.
Answers
Suggested answer: A

A white box testing method is applicable with which of the following testing processes?

A.
Integration testing
A.
Integration testing
Answers
B.
Parallel testing
B.
Parallel testing
Answers
C.
Sociability testing
C.
Sociability testing
Answers
D.
User acceptance testing (UAT)
D.
User acceptance testing (UAT)
Answers
Suggested answer: A

During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the auditor's BEST recommendation to help prevent unauthorized access?

A.
Utilize strong anti-malware controls on all computing devices.
A.
Utilize strong anti-malware controls on all computing devices.
Answers
B.
Update security policies and procedures.
B.
Update security policies and procedures.
Answers
C.
Implement an intrusion detection system (IDS).
C.
Implement an intrusion detection system (IDS).
Answers
D.
Implement multi-factor authentication.
D.
Implement multi-factor authentication.
Answers
Suggested answer: D

Which of the following BEST indicates that an incident management process is effective?

A.
Decreased number of calls to the help desk
A.
Decreased number of calls to the help desk
Answers
B.
Decreased time for incident resolution
B.
Decreased time for incident resolution
Answers
C.
Increased number of incidents reviewed by IT management
C.
Increased number of incidents reviewed by IT management
Answers
D.
Increased number of reported critical incidents
D.
Increased number of reported critical incidents
Answers
Suggested answer: B

Which of the following BEST reflects a mature strategic planning process?

A.
Action plans with IT requirements built into all projects
A.
Action plans with IT requirements built into all projects
Answers
B.
An IT strategic plan with specifications of controls and safeguards
B.
An IT strategic plan with specifications of controls and safeguards
Answers
C.
An IT strategic plan that supports the corporate strategy
C.
An IT strategic plan that supports the corporate strategy
Answers
D.
IT projects from the strategic plan are approved by management
D.
IT projects from the strategic plan are approved by management
Answers
Suggested answer: C

Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?

A.
The BCP's contact information needs to be updated.
A.
The BCP's contact information needs to be updated.
Answers
B.
The BCP is not version-controlled.
B.
The BCP is not version-controlled.
Answers
C.
The BCP has not been approved by senior management.
C.
The BCP has not been approved by senior management.
Answers
D.
The BCP has not been tested since it was first issued.
D.
The BCP has not been tested since it was first issued.
Answers
Suggested answer: D
Total 1.198 questions
Go to page: of 120