Free CISA Exam Braindumps (page: 33)

Page 33 of 457

Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?

  1. Mobile device testing program
  2. Mobile device upgrade program
  3. Mobile device awareness program
  4. Mobile device tracking program

Answer(s): C



An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?

  1. The data model is not clearly documented.
  2. The vendor development team is located overseas.
  3. The cost of outsourcing is lower than in-house development.
  4. A training plan for business users has not been developed.

Answer(s): A



An employee has accidentally posted confidential data to the company's social media page. Which of the following is the BEST control to prevent this from recurring?

  1. Establish two-factor access control for social media accounts.
  2. Implement a moderator approval process.
  3. Require all updates to be made by the marketing director.
  4. Perform periodic audits of social media updates.

Answer(s): B



Which of the following is MOST important to include in a contract with a software development service provider?

  1. A list of key performance indicators (KPIs)
  2. Service level agreement (SLA)
  3. Ownership of intellectual property
  4. Explicit contract termination requirements

Answer(s): C






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts