The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.
Table of Contents
- CISA Question 1111
- Question
- Answer
- CISA Question 1112
- Question
- Answer
- CISA Question 1113
- Question
- Answer
- CISA Question 1114
- Question
- Answer
- CISA Question 1115
- Question
- Answer
- CISA Question 1116
- Question
- Answer
- CISA Question 1117
- Question
- Answer
- CISA Question 1118
- Question
- Answer
- CISA Question 1119
- Question
- Answer
- CISA Question 1120
- Question
- Answer
CISA Question 1111
Question
Which of the following would MOST likely require a business continuity plan to be invoked?
A. A distributed denial of service attack on an email server
B. An unauthorized visitor discovered in the data center
C. An epidemic preventing staff from performing job functions
D. A hacker holding personally identifiable information hostage.
Answer
C. An epidemic preventing staff from performing job functions
CISA Question 1112
Question
Which of the following is an example of a change to the external threat landscape?
A. Organizational security standards have been modified.
B. A commonly used encryption algorithm has been compromised.
C. New legislation has been enacted in a region where the organization does business.
D. Infrastructure changes to the organization have been implemented.
Answer
B. A commonly used encryption algorithm has been compromised.
CISA Question 1113
Question
Which of the following is the PRIMARY reason social media has become a popular target for attack?
A. The accessibility of social media from multiple locations
B. The prevalence of strong perimeter protection
C. The reduced effectiveness of access controls
D. The element of trust created by social media
Answer
A. The accessibility of social media from multiple locations
CISA Question 1114
Question
Which of the following tools BEST demonstrate the effectiveness of the information security program?
A. A security balanced scorecard
B. Management satisfaction surveys
C. Risk heat map
D. Key risk indicators (KRIs)
Answer
A. A security balanced scorecard
CISA Question 1115
Question
Which of the following threats is prevented by using token-based authentication?
A. Password sniffing attack on the network
B. Session eavesdropping attack on the network
C. Man-in-the-middle attack on the client
D. Denial of service attack over the network
Answer
A. Password sniffing attack on the network
CISA Question 1116
Question
Which of the following is the MOST effective approach for integrating security into application development?
A. Including security in user acceptance testing sign-off
B. Performing vulnerability scans
C. Developing security models in parallel
D. Defining security requirements
Answer
D. Defining security requirements
CISA Question 1117
Question
Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of integrity?
A. Ensuring encryption for data in transit
B. Implementing a data classification schema
C. Utilizing a formal change management process
D. Enforcing service level agreements (SLAs)
Answer
C. Utilizing a formal change management process
CISA Question 1118
Question
Which of the following is MOST important to consider when developing a disaster recovery plan?
A. Business continuity plan (BCP)
B. Feasibility assessment
C. Business impact analysis (BIA)
D. Cost-benefit analysis
Answer
C. Business impact analysis (BIA)
CISA Question 1119
Question
Which of the following is MOST effective against system intrusions?
A. Continuous monitoring
B. Layered protection
C. Penetration testing
D. Two-factor authentication
Answer
B. Layered protection
CISA Question 1120
Question
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized modification?
A. Availability
B. Authenticity
C. Confidentiality
D. Integrity
Answer
D. Integrity