Skip to Content

ISACA CISA Certified Information Systems Auditor Exam Questions and Answers – 11

The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.

ISACA Certified Information Systems Auditor (CISA) Exam Questions and Answers

CISA Question 1111

Question

Which of the following would MOST likely require a business continuity plan to be invoked?

A. A distributed denial of service attack on an email server
B. An unauthorized visitor discovered in the data center
C. An epidemic preventing staff from performing job functions
D. A hacker holding personally identifiable information hostage.

Answer

C. An epidemic preventing staff from performing job functions

CISA Question 1112

Question

Which of the following is an example of a change to the external threat landscape?

A. Organizational security standards have been modified.
B. A commonly used encryption algorithm has been compromised.
C. New legislation has been enacted in a region where the organization does business.
D. Infrastructure changes to the organization have been implemented.

Answer

B. A commonly used encryption algorithm has been compromised.

CISA Question 1113

Question

Which of the following is the PRIMARY reason social media has become a popular target for attack?

A. The accessibility of social media from multiple locations
B. The prevalence of strong perimeter protection
C. The reduced effectiveness of access controls
D. The element of trust created by social media

Answer

A. The accessibility of social media from multiple locations

CISA Question 1114

Question

Which of the following tools BEST demonstrate the effectiveness of the information security program?

A. A security balanced scorecard
B. Management satisfaction surveys
C. Risk heat map
D. Key risk indicators (KRIs)

Answer

A. A security balanced scorecard

CISA Question 1115

Question

Which of the following threats is prevented by using token-based authentication?

A. Password sniffing attack on the network
B. Session eavesdropping attack on the network
C. Man-in-the-middle attack on the client
D. Denial of service attack over the network

Answer

A. Password sniffing attack on the network

CISA Question 1116

Question

Which of the following is the MOST effective approach for integrating security into application development?

A. Including security in user acceptance testing sign-off
B. Performing vulnerability scans
C. Developing security models in parallel
D. Defining security requirements

Answer

D. Defining security requirements

CISA Question 1117

Question

Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of integrity?

A. Ensuring encryption for data in transit
B. Implementing a data classification schema
C. Utilizing a formal change management process
D. Enforcing service level agreements (SLAs)

Answer

C. Utilizing a formal change management process

CISA Question 1118

Question

Which of the following is MOST important to consider when developing a disaster recovery plan?

A. Business continuity plan (BCP)
B. Feasibility assessment
C. Business impact analysis (BIA)
D. Cost-benefit analysis

Answer

C. Business impact analysis (BIA)

CISA Question 1119

Question

Which of the following is MOST effective against system intrusions?

A. Continuous monitoring
B. Layered protection
C. Penetration testing
D. Two-factor authentication

Answer

B. Layered protection

CISA Question 1120

Question

Meeting which of the following security objectives BEST ensures that information is protected against unauthorized modification?

A. Availability
B. Authenticity
C. Confidentiality
D. Integrity

Answer

D. Integrity