The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.
Table of Contents
- CISA Question 1911
- Question
- Answer
- CISA Question 1912
- Question
- Answer
- CISA Question 1913
- Question
- Answer
- CISA Question 1914
- Question
- Answer
- CISA Question 1915
- Question
- Answer
- CISA Question 1916
- Question
- Answer
- CISA Question 1917
- Question
- Answer
- CISA Question 1918
- Question
- Answer
- CISA Question 1919
- Question
- Answer
- CISA Question 1920
- Question
- Answer
CISA Question 1911
Question
The BEST way to avoid session hijacking is to use:
A. a reverse lookup
B. a secure protocol
C. a firewall
D. strong password controls
Answer
B. a secure protocol
CISA Question 1912
Question
Senior management has approved employees working off-site by using a virtual private network (VPN) connection. It is MOST important for the information security manager to periodically:
A. review firewall configuration
B. review the security policy
C. perform a cost-benefit analysis
D. perform a risk assessment
Answer
D. perform a risk assessment
CISA Question 1913
Question
An employee uses a personal mobile device to access corporate data and email, but also allows friends to use it as a mobile hotspot for Internet access when not at work. The information security manager is concerned this situation may expose confidential data. The manager’s FIRST step should be to:
A. update the mobile device usage standards to address the issue and communicate to all employees
B. activate the incident response plan to mitigate the impact and stop the compromise
C. review the associated risks to determine if additional controls are needed
D. implement additional security controls that will mitigate the situation and then reassess risks
Answer
A. update the mobile device usage standards to address the issue and communicate to all employees
CISA Question 1914
Question
An information security manager has observed multiple exceptions for a number of different security controls. Which of the following should be the information security manager’s FIRST course of action?
A. Design mitigating controls for the exceptions.
B. Prioritize the risk and implement treatment options.
C. Inform respective risk owners of the impact of exceptions.
D. Report the noncompliance to the board of directors.
Answer
B. Prioritize the risk and implement treatment options.
CISA Question 1915
Question
The PRIMARY benefit of a centralized time server is that it:
A. reduces individual time-of-day requests by client applications
B. is required by password synchronization programs
C. allows decentralized logs to be kept in synchronization
D. decreases the likelihood of an unrecoverable systems failure
Answer
C. allows decentralized logs to be kept in synchronization
CISA Question 1916
Question
Which of the following is the GREATEST security threat when an organization allows remote access to a virtual private network (VPN)?
A. Client logins are subject to replay attack.
B. VPN traffic could be sniffed and captured.
C. Compromised VPN clients could impact the network.
D. Attackers could compromise the VPN gateway.
Answer
C. Compromised VPN clients could impact the network.
CISA Question 1917
Question
Which of the following is the BEST defense against a brute force attack?
A. Discretionary access control
B. Intruder detection lockout
C. Mandatory access control
D. Time-of-day restrictions
Answer
D. Time-of-day restrictions
CISA Question 1918
Question
An IT department has given a vendor remote access to the internal network for troubleshooting network performance problems. After discovering the remote activity during a firewall log review, which of the following is the BEST course of action for an information security manager?
A. Revoke the access.
B. Review the related service level agreement (SLA).
C. Determine the level of access granted.
D. Declare a security incident.
Answer
C. Determine the level of access granted.
CISA Question 1919
Question
Which of the following is the GREATEST risk of single sign-on?
A. Password carelessness by one user may render the entire infrastructure vulnerable
B. Integration of single sign-on with the rest of the infrastructure is complicated
C. It is a single point of failure for an enterprise access control process
D. One administrator maintains the single sign-on solutions without segregation of duty
Answer
B. Integration of single sign-on with the rest of the infrastructure is complicated
CISA Question 1920
Question
The MOST effective control to detect fraud inside an organization’s network, is to:
A. implement an intrusion detection system (IDS)
B. apply two-factor authentication
C. review access logs
D. segregate duties
Answer
C. review access logs