Free CISA Exam Braindumps (page: 4)

Page 3 of 457

Which of the following should be the FIRST step in managing the impact of a recently discovered zero-day attack?

  1. Estimating potential damage
  2. Identifying vulnerable assets
  3. Evaluating the likelihood of attack
  4. Assessing the impact of vulnerabilities

Answer(s): B



Which of the following is the BEST way to ensure that an application is performing according to its specifications?

  1. Pilot testing
  2. System testing
  3. Integration testing
  4. Unit testing

Answer(s): B



Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?

  1. Conceal data devices and information labels.
  2. Issue an access card to the vendor.
  3. Monitor and restrict vendor activities.
  4. Restrict use of portable and wireless devices.

Answer(s): C



An employee loses a mobile device resulting in loss of sensitive corporate data. Which of the following would have BEST prevented data leakage?

  1. Data encryption on the mobile device
  2. The triggering of remote data wipe capabilities
  3. Awareness training for mobile device users
  4. Complex password policy for mobile devices

Answer(s): A






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts