Free ISACA CISA Exam Braindumps (page: 62)

Which type of attack poses the GREATEST risk to an organization's most sensitive data?

  1. Spear phishing attack
  2. Insider attack
  3. Password attack
  4. Eavesdropping attack

Answer(s): B



Using swipe cards to limit employee access to restricted areas requires implementing which additional control?

  1. Physical sign-in of all employees for access to restricted areas
  2. Initial escort of all new hires by a current employee
  3. Periodic review of access profiles by management
  4. Employee-access criteria determined on the basis of IS experience

Answer(s): C



To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?

  1. Include strategic objectives in IT staff performance objectives.
  2. Review IT staff job descriptions for alignment.
  3. Identify required IT skill sets that support key business processes.
  4. Develop quarterly training for each IT staff member.

Answer(s): C



An internal audit department reports directly to the chief financial officer (CFO) of an organization. This MOST likely leads to:

  1. audit findings becoming more business-oriented.
  2. concern over the independence of the auditor.
  3. audit recommendations receiving greater attention.
  4. biased audit findings and recommendations

Answer(s): B



Viewing page 62 of 457
Viewing questions 245 - 248 out of 1823 questions



Post your Comments and Discuss ISACA CISA exam prep with other Community members:

CISA Exam Discussions & Posts