Free CISA Exam Braindumps (page: 16)

Page 15 of 457

A manager identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor in this scenario?

  1. Hacktivists
  2. Deleted log data
  3. Terminated staff
  4. Unauthorized access

Answer(s): C



An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be the GREATEST concern?

  1. Audit logging is not enabled.
  2. Single sign-on is not enabled.
  3. Complex passwords are not required.
  4. Security baseline is not consistently applied.

Answer(s): A



Which of the following findings from an IT governance review should be of GREATEST concern?

  1. IT value analysis has not been completed.
  2. All IT services are provided by third parties.
  3. IT supports two different operating systems.
  4. The IT budget is not monitored.

Answer(s): B



What would be an IS auditor's BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?

  1. Ensure the open issues are retained in the audit results.
  2. Recommend compensating controls for open issues.
  3. Evaluate the residual risk due to open issues.
  4. Terminate the follow-up because open issues are not resolved.

Answer(s): C






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts