Free CISA Exam Braindumps (page: 37)

Page 37 of 457

What is the BEST method for securing credit card numbers stored temporarily on a file server prior to transmission to the downstream system for payment processing?

  1. Masking the full credit card number
  2. Encryption with strong cryptography
  3. Truncating the credit card number
  4. One-way hash with strong cryptography

Answer(s): B



When removing a financial application system from production, which of the following is MOST important?

  1. Media used by the retired system has been sanitized.
  2. Software license agreements are retained.
  3. End-user requests for changes are recorded and tracked.
  4. Data retained for regulatory purposes can be retrieved.

Answer(s): D



In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to "never expire." Which of the following recommendations would BEST address the risk with minimal disruption to the business?

  1. Schedule downtime to implement password changes.
  2. Introduce database access monitoring into the environment.
  3. Modify the access management policy to make allowances for application accounts.
  4. Modify applications to no longer require direct access to the database.

Answer(s): C



The risk of communication failure in an e-commerce environment is BEST minimized through the use of:

  1. alternative or diverse routing.
  2. compression software to minimize transmission duration.
  3. functional or message acknowledgments.
  4. a packet filtering firewall to reroute messages

Answer(s): A






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts