Free CISA Exam Braindumps (page: 36)

Page 36 of 457

An organization experienced a domain name system (DNS) attack caused by default user accounts not being removed from one of the servers. Which of the following would have been the BEST way to mitigate the risk of this DNS attack?

  1. Require all employees to attend training for secure configuration management.
  2. Have a third party configure the virtual servers.
  3. Configure the servers from an approved standard configuration.
  4. Configure the intrusion prevention system (IPS) to identify DNS attacks.

Answer(s): C



The BEST indicator of an optimized quality management system (QMS) is that it:

  1. is endorsed by senior management
  2. aligns with an industry recognized framework.
  3. is integrated and enforced in all IT activities.
  4. defines and monitors all IT QMS activities.

Answer(s): C



When developing customer-facing IT applications, in which stage of the system development life cycle (SLC) MOST beneficial to consider data privacy principles?

  1. User acceptance testing (UAT)
  2. Systems design and architecture
  3. Requirements definition
  4. Software selection and acquisition

Answer(s): C



An organization is shifting to a remote workforce. In preparation, the IT department is performing stress and capacity testing of remote access infrastructure and systems. What type of control is being implemented?

  1. Directive
  2. Detective
  3. Preventive
  4. Compensating

Answer(s): C






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts