ExamGecko
Home / Isaca / CISA / List of questions
Ask Question

Isaca CISA Practice Test - Questions Answers, Page 97

Add to Whishlist

List of questions

Question 961

Report Export Collapse

External audits have identified recurring exceptions in the user termination process, despite similar internal audits having reported no exceptions in the past. Which of the following is the IS auditor's BEST course of action to improve the internal audit process in the future?

Become a Premium Member for full access
  Unlock Premium Member

Question 962

Report Export Collapse

An IS auditor is supporting a forensic investigation. An image of affected storage media has been captured while collecting digital forensic evidence. Which of the following techniques would BEST enable an IS auditor to verify that the captured image is an exact, unchanged replica of the original media?

Become a Premium Member for full access
  Unlock Premium Member

Question 963

Report Export Collapse

Which of the following measures BEST mitigates the risk of data exfiltration during a cyberattack?

Become a Premium Member for full access
  Unlock Premium Member

Question 964

Report Export Collapse

Having knowledge in which of the following areas is MOST relevant for an IS auditor reviewing public key infrastructure (PKI)?

Become a Premium Member for full access
  Unlock Premium Member

Question 965

Report Export Collapse

A small business unit is implementing a control self-assessment (CSA) program and leveraging the internal audit function to test its internal controls annually. Which of the following is the MOST significant benefit of this approach?

Become a Premium Member for full access
  Unlock Premium Member

Question 966

Report Export Collapse

Which of the following is an IS auditor's BEST recommendation to mitigate the risk of eavesdropping associated with an application programming interface (API) integration implementation?

Become a Premium Member for full access
  Unlock Premium Member

Question 967

Report Export Collapse

Which of the following is MOST critical to the success of an information security program?

Become a Premium Member for full access
  Unlock Premium Member

Question 968

Report Export Collapse

Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?

Become a Premium Member for full access
  Unlock Premium Member

Question 969

Report Export Collapse

Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?

Become a Premium Member for full access
  Unlock Premium Member

Question 970

Report Export Collapse

When planning an internal penetration test, which of the following is the MOST important step prior to finalizing the scope of testing?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.402 questions
Go to page: of 141
Search

Related questions