Isaca CISA - Certified Information Systems Auditor
Which of the following is the PRIMARY benefit of a tabletop exercise for an incident response plan?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
Retention periods and conditions for the destruction of personal data should be determined by the.
An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?
Which type of attack poses the GREATEST risk to an organization's most sensitive data?
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?
Which of the following metrics is the BEST indicator of the performance of a web application
Which of the following would BEST indicate the effectiveness of a security awareness training program?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
Which of the following is the PRIMARY basis on which audit objectives are established?
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.
Which of the following is the BEST course of action to address this issue?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
Which of the following is the BEST data integrity check?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
Which of the following strategies BEST optimizes data storage without compromising data retention practices?