Free ISACA CISA Exam Questions (page: 71)

When responding to an ongoing denial of service (DoS) attack, an organization's FIRST course of action should be to:

  1. minimize impact.
  2. investigate damage.
  3. analyze the attack path.
  4. restore service.

Answer(s): A



Which of the following BEST describes an audit risk?

  1. The financial report may contain undetected material errors.
  2. Employees have been misappropriating funds.
  3. The company is being sued for false accusations.
  4. Key employees have not taken vacation for 2 years.

Answer(s): A



In an IT organization where many responsibilities are shared, which of the following is the BEST control for detecting unauthorized data changes?

  1. Users are required to periodically rotate responsibilities.
  2. Segregation of duties conflicts are periodically reviewed.
  3. Data changes are logged in an outside application.
  4. Data changes are independently reviewed by another group.

Answer(s): D



End users have been demanding the ability to use their own devices for work, but want to keep personal information out of corporate control. Which of the following would be MOST effective at reducing the risk of security incidents while satisfying end user requirements?

  1. Encrypt corporate data on the devices.
  2. Enable remote wipe capabilities for the devices.
  3. Require complex passwords.
  4. Implement an acceptable use policy.

Answer(s): A



Viewing page 71 of 457



Post your Comments and Discuss ISACA CISA exam prep with other Community members:

CISA Exam Discussions & Posts