ISACA.CISA.v2020-10-09.q270

Exam Code:CISA
Exam Name:Certified Information Systems Auditor
Certification Provider:ISACA
Free Question Number:270
Version:v2020-10-09
Rating:
# of views:193
# of Questions views:7511
Start Practice Test

Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam! PrepAwayExam.com now offer the newest CISA exam dumps, the PrepAwayExam.com CISA exam questions have been updated and answers have been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine here:

Access Premium Version
(1038 Q&As Dumps, 40%OFF Special Discount: freecram)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Other Version
132 viewsISACA.CISA.v2020-10-27.q362
151 viewsISACA.CISA.v2020-10-23.q332
174 viewsISACA.CISA.v2020-10-13.q299
277 viewsISACA.CISA.v2020-09-15.q230
250 viewsISACA.CISA.v2020-09-07.q269
238 viewsISACA.CISA.v2020-08-13.q267
227 viewsISACA.CISA.v2020-07-31.q194
645 viewsISACA.CISA.v2020-02-05.q100
800 viewsISACA.CISA.v2019-05-09.q750
687 viewsISACA.CISA.v2019-02-23.q896
707 viewsISACA.CISA.v2018-10-27.q803
691 viewsISACA.CISA.v2018-09-19.q770
629 viewsISACA.Cisa.v2018-02-25.q1069
1020 viewsISACA.CISA.v2017-11-28.q1100
Exam Question List
Question 1: During a review of system access, an IS auditor notes that a...
Question 2: Which of the following would be the MOST efficient audit app...
Question 3: An organization has implemented a distributed security admin...
Question 4: A development team has designed a new application and incorp...
Question 5: An internal review reveals an out-of-support human resources...
Question 6: Which of the following is the BEST method for uncovering sha...
Question 7: The MOST effective method for an IS auditor to determine whi...
Question 8: A disk management system's PRIMARY function is to:...
Question 9: An IS auditor has found that a vendor has gone out of busine...
Question 10: Which of the following control? MOST efficiently ensures tha...
Question 11: A database administrator (DBA) extracts a user listing for a...
Question 12: An IS auditor has performed an agreed-upon procedures engage...
Question 13: Which of the following is MOST important when an incident ma...
Question 14: The IS auditor has identified a potential fraud perpetrated ...
Question 15: Which of the following is the KST source of information for ...
Question 16: Which of the following is MOST likely to result from complia...
Question 17: Which of the following is the BEST guidance from an IS audit...
Question 18: A complex IS environment which of the following tasks should...
Question 19: In reviewing the project timeline for a significant applicat...
Question 20: Which audit technique provides the GREATEST assurance that i...
Question 21: During a software acquision review, an IS auditor should rec...
Question 22: The BEST data backup strategy for mobile users is to:...
Question 23: Which of the following activities is MOST important to consi...
Question 24: When evaluating the recent implementation of an intrusion de...
Question 25: The lack of which of the following represents the GREATEST r...
Question 26: During an audit of identity and access management, an IS aud...
Question 27: Which of the following controls will BEST ensure that the bo...
Question 28: Which of the following is the MOST effective control to mini...
Question 29: Which of the following will BEST protect the confidentiality...
Question 30: Which of the following controls should be implemented to BES...
Question 31: Buffer overflow in an Internet environment is of particular ...
Question 32: Which of the following should an IS auditor recommend as MOS...
Question 33: Which of the following indicates the HIGHEST level of maturi...
Question 34: An organization was recently notified by its regulatory body...
Question 35: A typical network architecture used for e-commerce, a load b...
Question 36: During the implementation of an upgraded enterprise resource...
Question 37: In assessing the priority given to systems covered in an org...
Question 38: An IS auditor finds multiple situations where the help desk ...
Question 39: Which of the following key performance indicators (KPIs) pro...
Question 40: Which of the following is MOST important for the successful ...
Question 41: A security company and service provider have merged and the ...
Question 42: A region where an organization conducts business has announc...
Question 43: Which of the following should be of MOST concern to an IS au...
Question 44: The PRIMARY reason an IS department should analyze past inci...
Question 45: Which of the following should be the MOST important consider...
Question 46: Which of the following is MOST important to helping incident...
Question 47: An IS auditor is a member of an application development team...
Question 48: Overall responsibility for approving logical access rights t...
Question 49: An IS auditor performs a follow-up audit and learns the appr...
Question 50: During a help desk review, an IS auditor determines the call...
Question 51: During a review of an organization's network threat response...
Question 52: Which of the following is MOST helpful in preventing a syste...
Question 53: Which of the following activities is MOST important in deter...
Question 54: Which of the following is the BEST approach to identify whet...
Question 55: Which of the following should be an IS auditor's PRIMARY con...
Question 56: An organization recently experienced a phishing attack that ...
Question 57: Audit management has just completed the annual audit plan fo...
Question 58: The MOST important reason for documenting all aspects of a d...
Question 59: Which of the following would BEST assist senior management i...
Question 60: Which of the following is the PRIMARY purpose of documenting...
Question 61: An IS auditor has observed gaps in the data available to the...
Question 62: Requiring that passwords contain a combination of numeric an...
Question 63: Which of the following scenarios would enable a forensic inv...
Question 64: Which of the following is the BEST physical security solutio...
Question 65: Which of the following procedures would BEST contribute to t...
Question 66: An IS auditor performing an audit of backup procedures obser...
Question 67: A PRIMARY benefit derived by an organization employing contr...
Question 68: What is the MOST important business concern when an organiza...
Question 69: The MAJOR reason for segregating test programs from producti...
Question 70: An IS auditor is involved in the user testing phase of a dev...
Question 71: A large insurance company is about to replace a major financ...
Question 72: What is the purpose of a hypervisor?...
Question 73: An organization has implemented an automated match between p...
Question 74: An IS auditor concludes that a local area network's (LAN's) ...
Question 75: An IS auditor has found that an organization is unable to ad...
Question 76: Which of the following would be an auditor's GREATEST concer...
Question 77: During a review of a production schedule, an IS auditor obse...
Question 78: Which of the following should be of MOST concern to an IS au...
Question 79: An organization has software that is not compliant with data...
Question 80: While reviewing the project plan for a new system prior to g...
Question 81: Which of the following is the BEST way to minimize leakage o...
Question 82: Which of the following is MOST likely to be prevented by a f...
Question 83: Which of the following would be MOST important for an IS aud...
Question 84: An IS auditor performing an application development review a...
Question 85: A company laptop has been stolen and all photos on the lapto...
Question 86: An organization with high availability resource requirements...
Question 87: The CIO of an organization is concerned that the information...
Question 88: To ensure efficient and economic use of limited resources in...
Question 89: Which of the following would BEST indicate the effectiveness...
Question 90: Which of the following tasks should be performed during an o...
Question 91: During an audit, the client learns that the IS auditor has r...
Question 92: Which of the following is MOST important to the effective ma...
Question 93: An IS auditor notes that application super-user activity was...
Question 94: Which of the following is the MOST effective mechanism for e...
Question 95: Which of the following is the MOST important process to ensu...
Question 96: While planning a security audit, an IS auditor is made aware...
Question 97: Which of the following is BEST addressed when using a timest...
Question 98: Which of the following should be an IS auditor's FIRST actio...
Question 99: The FIRST step in establishing a firewall security policy is...
Question 100: Which of the following is the MOST important consideration w...
Question 101: Which of the following controls would BEST decrease the expo...
Question 102: MOST critical security weakness of a packet level firewall i...
Question 103: A company has implemented an IT segregation of duties policy...
Question 104: Which of the following is the MOST important consideration w...
Question 105: During an audit of a reciprocal disaster recovery agreement ...
Question 106: During an audit of the organization's data privacy policy, t...
Question 107: Which of the following is the MOST effective way to minimize...
Question 108: What would be an IS auditors GREATEST concern when using a t...
Question 109: An organization performs nightly backups but does not have a...
Question 110: Which of the following is the MOST effective control for a u...
Question 111: select a sample for testing, which must include the 80 large...
Question 112: Which of the following poses the GREATEST risk to the enforc...
Question 113: Which of the following should an IS auditor do FIRST when de...
Question 114: Which of the following BEST ensures that only authorized sof...
Question 115: A start-up company acquiring for its order-taking system is ...
Question 116: Which of the following would BEST provide executive manageme...
Question 117: In a follow-up audit, an IS auditor notes that management ha...
Question 118: An IS auditor is assessing an organization's data loss preve...
Question 119: An IT service desk has recorded several incidents related to...
Question 120: Which of the following is the FIRST step when conducting a b...
Question 121: Which of the following factors will BEST promote effective i...
Question 122: An employee transfers from an organization's risk management...
Question 123: A retirement system verifies that the field for employee sta...
Question 124: Which of the following is MOST important for the IS auditor ...
Question 125: Which of the following is the MOST effective way to assess w...
Question 126: Which of the following is a passive attack on a network?...
Question 127: Which of the following is the MOST effective way for an IS a...
Question 128: Which of the following is MOST important to include in an or...
Question 129: During a vulnerability assessment, an IS auditor finds a hig...
Question 130: An IS auditor has been asked to perform a post-implementatio...
Question 131: An IS auditor is using data analytics for an accounts payabl...
Question 132: An employee loses a mobile device resulting in loss of sensi...
Question 133: An organization has agreed to perform remediation related to...
Question 134: Which procedure provides the GREATEST assurance that correct...
Question 135: Which of the following human resources management practices ...
Question 136: An organization allows its employees to use personal mobile ...
Question 137: Following a breach, what is the BEST source to determine the...
Question 138: Inherent risk rating are determined by assessing the impact ...
Question 139: The BEST way to evaluate a shared control environment is to ...
Question 140: The grants management system is used to calculate grant paym...
Question 141: An IS auditor can BEST help management fulfill risk manageme...
Question 142: Which of the following would be of MOST concern during an au...
Question 143: Which of the following should be restricted from a network a...
Question 144: Which of the following control checks would utilize data ana...
Question 145: Which of the following is the MOST critical step prior to pe...
Question 146: Which of the following would be MOST critical for an IS audi...
Question 147: To ensure confidentiality through the use of asymmetric encr...
Question 148: An organization has recently converted its infrastructure to...
Question 149: During a review of an application system, an IS auditor iden...
Question 150: Which of the following should be reviewed as part of a data ...
Question 151: Which of the following management decisions presents the GRE...
Question 152: When migrating critical systems to a cloud provider, the GRE...
Question 153: Which of the following is MOST likely to enable a hacker to ...
Question 154: Which of the following is MOST helpful when establishing the...
Question 155: Which of the following is MOST influential when defining dis...
Question 156: When reviewing a disaster recovery plan (DRP) an IS auditor ...
Question 157: Which of the following could be used to evaluate the effecti...
Question 158: A vendor service level agreement (SLA) requires backup to be...
Question 159: Performance monitoring tools report that servers are consist...
Question 160: Which of the following presents the GREATEST concern when im...
Question 161: An organization offers an online information security awaren...
Question 162: Which of the following would be the MOST effective method to...
Question 163: Which of the following requires a consensus by key stakehold...
Question 164: Which of the following is the BEST detective control for a j...
Question 165: Which of the following is the BEST indicator that an applica...
Question 166: Loss-site scripting (XSS) attacks are BEST prevented through...
Question 167: Which the following is MOST critical for the effective imple...
Question 168: Which of the following approaches would utilize data analyti...
Question 169: Which of the following is the BEST approach for performing a...
Question 170: The quality assurance (QA) function should be prevented from...
Question 171: An IS auditor finds that periodic reviews of read-only users...
Question 172: Which of the following provides the BEST audit evidence that...
Question 173: While reviewing a hot site, the IS auditor discovers that on...
Question 174: Which of the following is the GREATEST concern associated wi...
Question 175: Which of the following would represent an acceptable test of...
Question 176: Which of the following is the BEST way to help ensure the se...
Question 177: mission-critical applications with a low recovery time objec...
Question 178: Which of the following procedures should an IS auditor compl...
Question 179: Which of the following could an IS auditor recommend to impr...
Question 180: An e-commerce enterprise's disaster recovery (DR) site has 3...
Question 181: An organization implements a data loss prevention tool as a ...
Question 182: When an intrusion into an organizations network is detected,...
Question 183: Which of the following would be the MOST effective method to...
Question 184: A CIO has asked an IS to implement several security controls...
Question 185: The maturity level of an organization s problem management s...
Question 186: When auditing the IT governance of an organization planning ...
Question 187: Which of the following would provide the BEST evidence of su...
Question 188: During an external assessment of network vulnerability, whic...
Question 189: Which of the following would BEST enable an IS auditor to pe...
Question 190: Which of the following findings should be an IS auditor's GR...
Question 191: The recovery time objective (RTO) is normally determined on ...
Question 192: Since data storage of a critical business application is on ...
Question 193: Which of the following is the BEST approach to help ensure e...
Question 194: An IS auditor has been asked to advise on the design and imp...
Question 195: A user of a telephone banking system has forgotten his perso...
Question 196: An organization using instant messaging to communicate with ...
Question 197: During an audit, which of the following would be MOST helpfu...
Question 198: Which of the following is the MOST important consideration f...
Question 199: A company uses a standard form to document and approve all c...
Question 200: Based on the Guidance of internal audit, an IT steering comm...
Question 201: During a review of an insurance company s claims system, the...
Question 202: The information security function in a large organization is...
Question 203: The objectives of business process improvement should PRIMAR...
Question 204: Which of the following is the BEST time for an IS auditor to...
Question 205: A technology service organization has recently acquired a ne...
Question 206: An organization s data retention policy states that all data...
Question 207: IS management has decided to replace the current single-serv...
Question 208: Which of the following should be an IS auditor's PRIMARY con...
Question 209: Which of the following is MOST important for an IS auditor t...
Question 210: Which of the following controls MOST effectively reduces the...
Question 211: Which of the following is the MOST effective control to miti...
Question 212: Which of the following is the BEST way to evaluate the effec...
Question 213: Which of the following could be determined by an entity-rela...
Question 214: Which of the following is the MOST important consideration w...
Question 215: Which of the following is the MOST significant risk associat...
Question 216: Which of the following is MOST important to ensure that elec...
Question 217: Which of the following would BEST prevent data from being or...
Question 218: An accounting department uses a spreadsheet to calculate sen...
Question 219: Which of the following is the BEST indicator of a mature qua...
Question 220: A legacy application is running on an operating system that ...
Question 221: Which of the following should be of GREATEST concern to an I...
Question 222: The objective of using coding standards for systems developm...
Question 223: When conducting a post implementation review which of the fo...
Question 224: An IS auditor finds that confidential company data has been ...
Question 225: The operations team of an organization has reported an IS se...
Question 226: The MOST efficient way to confirm that an ERP system being i...
Question 227: A security review focused on data loss prevention (DLP) reve...
Question 228: Which of the following would help determine the maturity of ...
Question 229: During an audit of information security procedures of a larg...
Question 230: Which of the following is the PRIMARY responsibility of an i...
Question 231: Which of the following is the MOST important factor when an ...
Question 232: Which of the following is the GREATEST benefit of implementi...
Question 233: An IS auditor finds that a company is using a payroll provid...
Question 234: internal IS auditor recommends that incoming accounts payabl...
Question 235: Which of the following is MOST likely to be included in a po...
Question 236: An organization has established hiring policies and procedur...
Question 237: An IS auditor was involved in the design phase for a new sys...
Question 238: Management has agreed to perform multiple remediation action...
Question 239: An IS auditor finds that firewalls are outdated and not supp...
Question 240: Performance monitoring tools report that servers are signifi...
Question 241: An IS auditor is observing transaction processing and notes ...
Question 242: Which of the following is MOST important for an IS auditor t...
Question 243: The MAIN reason an organization's incident management proced...
Question 244: An IS auditor would be concerned if the quality assurance (Q...
Question 245: The PRIMARY benefit of using secure shell (SSH) to access a ...
Question 246: Which of the following is MOST important to include in foren...
Question 247: An organization transmits large amount of data from one inte...
Question 248: An organization that has suffered a cyber attack is performi...
Question 249: Which of the following is an IS auditor's BEST course of act...
Question 250: An IS auditor is asked to review a large organization's chan...
Question 251: Which of the following is the PRIMARY benefit of including I...
Question 252: An organization has installed blade server technology in its...
Question 253: Which of the following audit procedures would be MOST conclu...
Question 254: An organization's plans to implement a virtualization strate...
Question 255: An IS auditor learns that after each scheduled batch process...
Question 256: A bank is relocating its servers to a vendor that provides d...
Question 257: An organization is considering outsourcing the processing of...
Question 258: Which of the following should an IS auditor be MOST concerne...
Question 259: An organization wants to reuse company-provided smartphones ...
Question 260: When evaluating whether the expected benefits of a project h...
Question 261: During an audit of a payroll system, an IS auditor identifie...
Question 262: An organization using instant messaging to communicate with ...
Question 263: Which of the following projects would be MOST important to r...
Question 264: Which of the following should be an IS auditor's FIRST activ...
Question 265: In a typical SDLC, which group is PRIMARILY responsible for ...
Question 266: During a network security review the system log indicates an...
Question 267: Which type of control is being implemented when a biometric ...
Question 268: When engaging services from external auditors, which of the ...
Question 269: An organization is replacing a mission-critical system. Whic...
Question 270: Which of the following is MOST important for an IS auditor t...