Free CISA Exam Braindumps (page: 27)

Page 27 of 457

An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done
FIRST?

  1. Implement additional firewalls to protect the system.
  2. Decommission the server.
  3. Implement a new system that can be patched.
  4. Evaluate the associated risk.

Answer(s): D



During a review of an organization's network threat response process, the IS auditor noticed that the majority of alerts were closed without resolution.
Management responded that those alerts were unworkable due to lack of actionable intelligence, and therefore the support team is allowed to close them. What is the BEST way for the auditor to address this situation?

  1. Further review closed unactioned alerts to identify mishandling of threats.
  2. Reopen unactioned alerts and report to the audit committee.
  3. Recommend that management enhance the policy and improve threat awareness training.
  4. Omit the finding from the report as this practice is in compliance with the current policy.

Answer(s): A



Which of the following BEST helps to ensure data integrity across system interfaces?

  1. Reconciliations
  2. Environment segregation
  3. Access controls
  4. System backups

Answer(s): A



Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?

  1. Require written authorization for all payment transactions.
  2. Review payment transaction history.
  3. Reconcile payment transactions with invoices.
  4. Restrict payment authorization to senior staff members.

Answer(s): A






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts