Skip to Content

ISACA CISA Certified Information Systems Auditor Exam Questions and Answers – 18

The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.

ISACA Certified Information Systems Auditor (CISA) Exam Questions and Answers

CISA Question 1891

Question

Which of the following is the PRIMARY advantage of single sign-on (SSO)?

A. Improves system performance
B. Ensures good password practices
C. Improves security
D. Reduces administrative workload.

Answer

D. Reduces administrative workload.

CISA Question 1892

Question

What is the purpose of a hypervisor?

A. Monitoring the performance of virtual machines
B. Cloning virtual machines
C. Deploying settings to multiple machines simultaneously
D. Running the virtual machine environment

Answer

D. Running the virtual machine environment

CISA Question 1893

Question

Which of the following would be considered the BEST compensating control to use when an emergency process, rather than the established control procedures, is used for database changes?

A. Using an emergency user account with the access to make changes to the database
B. Using the administrator’s own account to make out-of-hours changes
C. Logging detailed before-and-after images for later review by the administrator
D. Logging user’s ID and change details for later review by the administrator

Answer

C. Logging detailed before-and-after images for later review by the administrator

CISA Question 1894

Question

A potential risk of executing a program on an Internet site is that it may:

A. install executable code on the computer.
B. lack version control, which may result in the use of an older program.
C. overwrite system files with older versions.
D. be browser-dependent, and therefore abort.

Answer

A. install executable code on the computer.

CISA Question 1895

Question

Which of the following tasks should be performed during an organization’s business continuity plan (BCP) test?

A. Evaluate the security at the offsite facility.
B. Review the coverage of insurance.
C. Assess the critical information retrieval capability.
D. Review the alternate processing site contract.

Answer

C. Assess the critical information retrieval capability.

CISA Question 1896

Question

Which of the following is the PRIMARY reason for database optimization in an environment with a high volume of transactions?

A. Improving availability
B. Maintaining integrity
C. Preventing data leakage
D. Improving performance

Answer

D. Improving performance

CISA Question 1897

Question

What is the MOST important business concern when an organization is about to migrate a mission-critical application to a virtual environment?

A. The organization’s experience with virtual applications
B. Adequacy of the fallback procedures
C. Confidentiality of network traffic
D. Adequacy of the virtual architecture

Answer

D. Adequacy of the virtual architecture

CISA Question 1898

Question

Which of the following is the GREATEST concern with conducting penetration testing on an internally developed application in the production environment?

A. The testing could create application availability issues.
B. The testing may identify only known operating system vulnerabilities.
C. The issues identified during the testing may require significant remediation efforts.
D. Internal security staff may not be qualified to conduct application penetration testing.

Answer

D. Internal security staff may not be qualified to conduct application penetration testing.

CISA Question 1899

Question

Intrusion detection systems (IDSs) can:

A. substitute for a firewall.
B. compensate for weak authentication mechanisms.
C. conduct investigations of attacks from within the network.
D. provide information to enhance the security infrastructure.

Answer

D. provide information to enhance the security infrastructure.

CISA Question 1900

Question

Which of the following is the MOST likely cause of a successful firewall penetration?

A. Use of a Trojan to bypass the firewall
B. Loophole in firewall vendor’s code
C. Virus infection
D. Firewall misconfiguration by the administrator

Answer

D. Firewall misconfiguration by the administrator

Alex Lim is a certified IT Technical Support Architect with over 15 years of experience in designing, implementing, and troubleshooting complex IT systems and networks. He has worked for leading IT companies, such as Microsoft, IBM, and Cisco, providing technical support and solutions to clients across various industries and sectors. Alex has a bachelor’s degree in computer science from the National University of Singapore and a master’s degree in information security from the Massachusetts Institute of Technology. He is also the author of several best-selling books on IT technical support, such as The IT Technical Support Handbook and Troubleshooting IT Systems and Networks. Alex lives in Bandar, Johore, Malaysia with his wife and two chilrdren. You can reach him at [email protected] or follow him on Website | Twitter | Facebook

    Ads Blocker Image Powered by Code Help Pro

    Your Support Matters...

    We run an independent site that is committed to delivering valuable content, but it comes with its challenges. Many of our readers use ad blockers, causing our advertising revenue to decline. Unlike some websites, we have not implemented paywalls to restrict access. Your support can make a significant difference. If you find this website useful and choose to support us, it would greatly secure our future. We appreciate your help. If you are currently using an ad blocker, please consider disabling it for our site. Thank you for your understanding and support.