Free ISACA CISA Exam Braindumps (page: 86)

During an audit of an access control system, an IS auditor finds that RFID card readers are not connected via the network to a central server. Which of the following is the GREATEST risk associated with this finding?

  1. Lost or stolen cards cannot be disabled immediately.
  2. Card reader firmware updates cannot be rolled out automatically.
  3. The system is not easily scalable to accommodate a new device.
  4. Incidents cannot be investigated without a centralized log file.

Answer(s): A



Invoking a business continuity plan (BCP) is demonstrating which type of control?

  1. Preventive
  2. Corrective
  3. Directive
  4. Detective

Answer(s): B



When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?

  1. Project plan
  2. Requirements analysis
  3. Implementation plan
  4. Project budget provisions

Answer(s): B



The results of an IS audit indicating the need to strengthen controls has been communicated to the appropriate stakeholders. Which of the following is the BEST way for management to enforce implementation of the recommendations?

  1. Copy senior management on communications related to the audit
  2. Have stakeholders develop a business case for control changes
  3. Assign ownership to each remediation activity
  4. Request auditors to design a roadmap for closure

Answer(s): C



Viewing page 86 of 457
Viewing questions 341 - 344 out of 1823 questions



Post your Comments and Discuss ISACA CISA exam prep with other Community members:

CISA Exam Discussions & Posts