Isaca CISA Practice Test - Questions Answers, Page 83

List of questions
Question 821

Which of the following types of firewalls provides the GREATEST degree of control against hacker intrusion?
Question 822

Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Question 823

Which of the following threats is mitigated by a firewall?
Question 824

Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
Question 825

An IS auditor is reviewing a data conversion project. Which of the following is the auditor's BEST recommendation prior to go-live?
Question 826

A white box testing method is applicable with which of the following testing processes?
Question 827

During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the auditor's BEST recommendation to help prevent unauthorized access?
Question 828

Which of the following BEST indicates that an incident management process is effective?
Question 829

Which of the following BEST reflects a mature strategic planning process?
Question 830

Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
Question