Free ISACA CISA Exam Braindumps (page: 85)

When evaluating the ability of a disaster recovery plan (DRP) to enable the recovery of IT processing capabilities, it is MOST important for the IS auditor to verify the plan is:

  1. stored at an offsite location.
  2. communicated to department heads.
  3. regularly reviewed.
  4. periodically tested.

Answer(s): D



During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST:

  1. conduct additional compliance testing.
  2. issue an intermediate report to management.
  3. perform a business impact analysis (BIA).
  4. evaluate the impact on current disaster recovery capability.

Answer(s): D



During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser.
Which of the following is the auditor's BEST recommendation to help prevent unauthorized access?

  1. Utilize strong anti-malware controls on all computing devices.
  2. Implement an intrusion detection system (IDS).
  3. Update security policies and procedures.
  4. Implement multi-factor authentication.

Answer(s): D



To create a digital signature in a message using asymmetric encryption, it is necessary to:

  1. encrypt the authentication sequence using a public key.
  2. first use a symmetric algorithm for the authentication sequence.
  3. transmit the actual digital signature in unencrypted clear text.
  4. encrypt the authentication sequence using a private key.

Answer(s): D



Viewing page 85 of 457
Viewing questions 337 - 340 out of 1823 questions



Post your Comments and Discuss ISACA CISA exam prep with other Community members:

CISA Exam Discussions & Posts