Free ISACA CISA Exam Braindumps (page: 60)

Several unattended laptops containing sensitive customer data were stolen from personnel offices. Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?

  1. Enhance physical security.
  2. Require the use of cable locks.
  3. Require two-factor authentication.
  4. Encrypt the disk drive.

Answer(s): D



When classifying information, it is MOST important to align the classification to:

  1. business risk.
  2. data retention requirements.
  3. industry standards.
  4. security policy.

Answer(s): A



An organization's information security department has recently created a centralized governance model to ensure that network-related findings are remediated within the service level agreement (SLA). What should the IS auditor use to assess the maturity and capability of this governance model?

  1. Key risk indicators (KRIs)
  2. Key process controls
  3. Key data elements
  4. Key performance indicators (KPIs)

Answer(s): D



The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:

  1. risk management review.
  2. control self-assessment (CSA).
  3. service level agreement (SLA).
  4. balanced scorecard.

Answer(s): D



Viewing page 60 of 457
Viewing questions 237 - 240 out of 1823 questions



Post your Comments and Discuss ISACA CISA exam prep with other Community members:

CISA Exam Discussions & Posts