Free CISA Exam Braindumps (page: 25)

Page 25 of 457

Cross-site scripting (XSS) attacks are BEST prevented through:

  1. secure coding practices.
  2. use of common industry frameworks.
  3. a three-tier web architecture.
  4. application firewall policy settings.

Answer(s): A



Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?

  1. Present the issue to executive management.
  2. Report the disagreement to the board.
  3. Accept management's decision and continue the follow-up.
  4. Report the issue to IS audit management.

Answer(s): D



An IS auditor observes that a bank's web page address is prefixed "https://". The auditor would be correct to conclude that:

  1. the bank has established a virtual private network (VPN).
  2. transactions are encrypted.
  3. the bank has a restricted Internet protocol (IP) address.
  4. the customer is connected to the bank's intranet.

Answer(s): B



Which of the following is the BEST control to mitigate attacks that redirect Internet traffic to an unauthorized website?

  1. Utilize a network-based firewall.
  2. Conduct regular user security awareness training.
  3. Enforce a strong password policy meeting complexity requirements.
  4. Perform domain name system (DNS) server security hardening.

Answer(s): D






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts