The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.
Table of Contents
- CISA Question 1921
- Question
- Answer
- CISA Question 1922
- Question
- Answer
- CISA Question 1923
- Question
- Answer
- CISA Question 1924
- Question
- Answer
- CISA Question 1925
- Question
- Answer
- CISA Question 1926
- Question
- Answer
- CISA Question 1927
- Question
- Answer
- CISA Question 1928
- Question
- Answer
- CISA Question 1929
- Question
- Answer
- CISA Question 1930
- Question
- Answer
CISA Question 1921
Question
Which of the following is the GREATEST threat to Voice-over Internet Protocol (VoIP) related to privacy release?
A. Incorrect routing
B. Eavesdropping
C. Call recording
D. Denial of service
Answer
B. Eavesdropping
CISA Question 1922
Question
Which of the following is a detective control?
A. Procedures for authorizing transactions
B. Echo checks in telecommunications
C. A router rule restricting a service
D. Programmed edit checks
Answer
B. Echo checks in telecommunications
CISA Question 1923
Question
A disk management system’s PRIMARY function is to:
A. monitor disk accesses for analytical review
B. deny access to disk resident data files
C. provide data on efficient disk usage
D. provide the method of control for disk usage
Answer
D. provide the method of control for disk usage
CISA Question 1924
Question
Which of the following is the GREATEST risk when relying on reports generated by end-user computing?
A. Data may be inaccurate
B. Reports may not work efficiently
C. Reports may not be timely
D. Historical data may not be available
Answer
A. Data may be inaccurate
CISA Question 1925
Question
When responding to an ongoing denial of service (DoS) attack, an organization’s FIRST course of action should be to:
A. restore service
B. minimize impact
C. analyze the attack path
D. investigate damage
Answer
B. minimize impact
CISA Question 1926
Question
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
A. System performance may be impacted by the migration.
B. Records past their retention period may not be migrated to the new system.
C. Data from the source and target system may have different data formats.
D. Data from the source and target system may be intercepted.
Answer
D. Data from the source and target system may be intercepted.
CISA Question 1927
Question
Which of the following provides nonrepudiation in an electronic communication session without confidentiality?
A. Message encryption
B. Log-on ID and password
C. Certification authority
D. Digital signature
Answer
D. Digital signature
CISA Question 1928
Question
For an organization which uses a VoIP telephony system exclusively, the GREATEST concern associated with leaving a connected telephone in an unmonitored public area is the possibility of:
A. connectivity issues when used with an analog local exchange carrier
B. unauthorized use leading to theft of services and financial loss
C. network compromise due to the introduction of malware
D. theft or destruction of an expensive piece of electronic equipment
Answer
B. unauthorized use leading to theft of services and financial loss
CISA Question 1929
Question
The use of control totals reduces the risk of:
A. incomplete processing.
B. improper backup.
C. posting to the wrong record.
D. improper authorization.
Answer
C. posting to the wrong record.
CISA Question 1930
Question
Which of the following is MOST important for an IS auditor to verify during a disaster recovery audit?
A. Roles and responsibilities are documented
B. Regular backups are made and stored offsite.
C. The disaster recovery plan (DRP) is updated on a regular basis.
D. Tabletop disaster recovery tests are conducted.
Answer
A. Roles and responsibilities are documented