Isaca CISA Practice Test - Questions Answers, Page 83
List of questions
Question 821
Which of the following types of firewalls provides the GREATEST degree of control against hacker intrusion?
Question 822
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Question 823
Which of the following threats is mitigated by a firewall?
Question 824
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
Question 825
An IS auditor is reviewing a data conversion project. Which of the following is the auditor's BEST recommendation prior to go-live?
Question 826
A white box testing method is applicable with which of the following testing processes?
Question 827
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the auditor's BEST recommendation to help prevent unauthorized access?
Question 828
Which of the following BEST indicates that an incident management process is effective?
Question 829
Which of the following BEST reflects a mature strategic planning process?
Question 830
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
Question