Free CISA Exam Braindumps (page: 43)

Page 43 of 457

Which of the following is the BEST source of information for an IS auditor to use when determining whether an organization's information security policy is adequate?

  1. Risk assessment results
  2. Penetration test results
  3. Industry benchmarks
  4. Information security program plans

Answer(s): A



Which of the following is the MOST significant risk associated with the use of virtualization?

  1. Insufficient network bandwidth
  2. Single point of failure
  3. Inadequate configuration
  4. Performance issues of hosts

Answer(s): B



Which of the following is MOST important to consider when scheduling follow-up audits?

  1. The impact if corrective actions are not taken
  2. The amount of time the auditee has agreed to spend with auditors
  3. The efforts required for independent verification with new auditors
  4. Controls and detection risks related to the observations

Answer(s): A



Secure code reviews as part of a continuous deployment program are which type of control?

  1. Detective
  2. Corrective
  3. Logical
  4. Preventive

Answer(s): D






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts