Free CISA Exam Braindumps (page: 35)

Page 35 of 457

Which of the following cloud deployment models would BEST meet the needs of a startup software development organization with limited initial capital?

  1. Community
  2. Hybrid
  3. Private
  4. Public

Answer(s): D



Which of the following is MOST effective in detecting an intrusion attempt?

  1. Using packet filter software
  2. Using smart cards with one-time passwords
  3. Installing biometrics-based authentication
  4. Analyzing system logs

Answer(s): D



The MOST important reason why an IT risk assessment should be updated on a regular basis is to:

  1. utilize IT resources in a cost-effective manner.
  2. react to changes in the IT environment.
  3. comply with data classification changes.
  4. comply with risk management policies.

Answer(s): B



An organization's strategy to source certain IT functions from a software as a service (SaaS) provider should be approved by the:

  1. IT steering committee.
  2. chief financial officer (CFO).
  3. IT operations manager.
  4. chief risk officer (CRO).

Answer(s): A






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts