itexamable.com

CISA Exam-Test 9

/30
312

CISA EXAM-TEST 9

1 / 30

1. Data analytics Tools are BEST suited for which of the following purposes?

2 / 30

2. Which of the following is MOST influential when defining disaster recovery strategies?

3 / 30

3. Which of the following should be of GREATEST concern to an IS auditor when reviewing an information security policy? The policy:

4 / 30

4. A project team evaluated vendor responses to a request for proposal (RFP). An IS auditor
reviewing the evaluation process would expect the team to have considered each vendor's:

5 / 30

5. Which of the following would impair the independence of a quality assurance team?

6 / 30

6. Which of the following findings would be of GREATEST concern to an IS auditor performing an information security audit of critical server log management activities?

7 / 30

7. A comprehensive and effective email policy should address the issues of email structure, policy enforcement, monitoring and:

8 / 30

8. A vulnerability in which of the following virtual systems would be of GREATEST concern to the IS auditor?

9 / 30

9. When developing a formal enterprise security program, the MOST critical success factor (CSF) would be the:

10 / 30

10. When reviewing the development of information security policies, the PRIMARY focus of an IS auditor should be on assuring that these policies:

11 / 30

11. An IS auditor found that the enterprise architecture (EA) recently adopted by an organization has an adequate current-state representation. However, the organization has started a separate project to develop a future-state representation. The IS auditor should:

12 / 30

12. When developing a security architecture, which of the following steps should be executed FIRST?

13 / 30

13. Corporate IT policy for a call center requires that all users be assigned unique user accounts. On discovering that this is not the case for all current users, what is the MOST appropriate recommendation?

14 / 30

14. Which of the following is the initial step in creating a firewall policy?

15 / 30

15. To ensure that an organization is complying with privacy requirements, an IS auditor should FIRST review:

16 / 30

16. For a health care organization, which one of the following reasons would MOST likely indicate that the patient benefit data warehouse should remain in-house rather than be outsourced to an offshore operation?

17 / 30

17. : An IS auditor finds that application servers had inconsistent configurations leading to potential security vulnerabilities. Which of the following should the auditor recommend FIRST?

18 / 30

18. An IS auditor identifies that reports on product profitability produced by an organization's finance and marketing departments give different results. Further investigation reveals that the product definition being used by the two departments is different. What should the IS auditor recommend?

19 / 30

19. An organization issues digital certificates to employees to enable connectivity to a web-based
application.
Which of the following public key infrastructure (PKI) components MUST be included in the
application architecture for determining the on-going validity of connections?

20 / 30

20. Which of the following should be included in an organization's information security policy?

21 / 30

21. The BEST way to validate whether a malicious act has actually occurred in an application is to review:

22 / 30

22. Which of the following would MOST likely indicate that a customer data warehouse should remain in-house rather than be outsourced to an offshore operation?

23 / 30

23. In an organization where an IT security baseline has been defined, an IS auditor should FIRST ensure:

24 / 30

24. A top-down approach to the development of operational policies helps ensure:

25 / 30

25. Which of the following is responsible for the approval of an information security policy?

26 / 30

26. Which of the following is the GREATEST concern with conducting penetration testing on an
internally developed application in the production environment?

27 / 30

27. Which of the following is the BEST way to ensure that organizational policies comply with legal requirements?

28 / 30

28. The management of an organization has decided to establish a security awareness program. Which of the following would MOST likely be a part of the program?

29 / 30

29. From a risk management perspective, which of the following is MOST important to be tracked in continuous monitoring?

30 / 30

30. Which of the following is MOST critical for the successful implementation and maintenance of a security policy?