Free CISA Exam Braindumps (page: 40)

Page 40 of 457

Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?

  1. Blocking external IM traffic
  2. Blocking attachments in IM
  3. Allowing only corporate IM solutions
  4. Encrypting IM traffic

Answer(s): C



An IS auditor noted that a change to a critical calculation was placed into the production environment without being tested. Which of the following is the BEST way to obtain assurance that the calculation functions correctly?

  1. Check regular execution of the calculation batch job.
  2. Interview the lead system developer.
  3. Obtain post-change approval from management.
  4. Perform substantive testing using computer-assisted audit techniques (CAATs).

Answer(s): D



The use of cookies constitutes the MOST significant security threat when they are used for:

  1. obtaining a public key from a certification authority (CA).
  2. forwarding email and Internet Protocol (IP) addresses.
  3. authenticating using username and password.
  4. downloading files from the host server.

Answer(s): C



To address issues related to privileged users identified in an IS audit, management implemented a security information and event management (SIEM) system.
Which type of control is in place?

  1. Directive
  2. Detective
  3. Preventive
  4. Corrective

Answer(s): B






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts