Free CISA Exam Braindumps (page: 29)

Page 29 of 457

An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?

  1. The standard is met as long as a supervisor reviews the new auditors' work.
  2. The standard is met as long as one member has a globally recognized audit certification.
  3. Team member assignments must be based on individual competencies.
  4. Technical co-sourcing must be used to help the new staff.

Answer(s): C



Which of the following is a social engineering attack method?

  1. A hacker walks around an office building using scanning tools to search for a wireless network to gain access.
  2. An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.
  3. An unauthorized person attempts to gain access to secure premises by following an authorized person through a secure door.
  4. An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.

Answer(s): B



Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?

  1. Rotating backup copies of transaction files offsite
  2. Ensuring bisynchronous capabilities on all transmission lines
  3. Maintaining system console logs in electronic format
  4. Using a database management system (DBMS) to dynamically back-out partially processed transactions

Answer(s): D



Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?

  1. FM-200
  2. Dry pipe
  3. Carbon dioxide
  4. Halon

Answer(s): C






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts