Free CISA Exam Braindumps (page: 34)

Page 34 of 457

An IS auditors reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance that both incoming and outgoing internet traffic is controlled?

  1. Load batancer
  2. Security information and event management (SIEM) system
  3. Intrusion detection system (IDS)
  4. Statetul firewall

Answer(s): D



An organization needs to comply with data privacy regulations forbidding the display of personally identifiable information (PII) on customer bills or receipts.
However, it is a business requirement to display at least one attribute so that customers can verify the bills or receipts are intended for them. What is the BEST recommendation?

  1. Data sanitization
  2. Data masking
  3. Data encryption
  4. Data tokenization

Answer(s): B



Which of the following development practices would BEST mitigate the risk associated with theft of user credentials transmitted between mobile devices and the corporate network?

  1. Enforce the validation of digital certificates used in the communication sessions.
  2. Release mobile applications in debugging mode to allow for easy troubleshooting.
  3. Embed cryptographic keys within the mobile application source code.
  4. Allow persistent sessions behveen mobile applications and the corporate network.

Answer(s): A



Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization's goals?

  1. Enterprise architecture (EA)
  2. Key performance indicators (KPIs)
  3. Balanced scorecard
  4. Enterprise dashboard

Answer(s): C






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts