The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.
Table of Contents
- CISA Question 101
- Question
- Answer
- CISA Question 102
- Question
- Answer
- CISA Question 103
- Question
- Answer
- CISA Question 104
- Question
- Answer
- CISA Question 105
- Question
- Answer
- CISA Question 106
- Question
- Answer
- CISA Question 107
- Question
- Answer
- CISA Question 108
- Question
- Answer
- CISA Question 109
- Question
- Answer
- CISA Question 110
- Question
- Answer
CISA Question 101
Question
A healthcare facility offers patients health tracking devices that can be monitored remotely by healthcare professionals. Which of the following is the BEST way to protect patient personal information from unauthorized exfiltration?
A. Restrict the devices to using Internet Protocol (IP) version 6 only
B. Add a digital certificate to the devices that limits communication to specific servers
C. Provide the patients with Internet security training and education programs
D. Configure the devices to reboot automatically every 7 days
Answer
B. Add a digital certificate to the devices that limits communication to specific servers
CISA Question 102
Question
Critical processes are not defined in an organization’s business continuity plan (BCP). Which of the following would have MOST likely identified the gap?
A. Updating the risk register
B. Reviewing the business continuity strategy
C. Reviewing the business impact analysis (BIA)
D. Testing the incident response plan
Answer
D. Testing the incident response plan
CISA Question 103
Question
Which of the following recommendations by an IS auditor is the BEST control to protect an organization’s corporate network from the guest wireless network?
A. Hide the service set identifier (SSID) of the guest network
B. Place the guest network in its own virtual local area network (LAN)
C. Authenticate devices connecting to the guest network
D. Ensure the guest access point is running the latest software
Answer
B. Place the guest network in its own virtual local area network (LAN)
CISA Question 104
Question
Which of the following would BEST protect the confidentiality of sensitive data in transit between multiple offices?
A. Public key infrastructure (PKI)
B. Kerberos
C. Digital signatures
D. Hash algorithms
Answer
A. Public key infrastructure (PKI)
CISA Question 105
Question
Which of the following is the PRIMARY protocol for protecting outbound content from tampering and eavesdropping?
A. Transport Layer Security (TLS)
B. Point-to-Point Protocol (PPP)
C. Secure Shell (SSH)
D. Internet Key Exchange (IKE)
Answer
A. Transport Layer Security (TLS)
CISA Question 106
Question
As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (BIA)?
A. Risk appetite
B. Recovery scenarios
C. Completeness of critical asset inventory
D. Critical applications in the cloud
Answer
C. Completeness of critical asset inventory
CISA Question 107
Question
Which of the following statements appearing in an organization’s acceptable use policy BEST demonstrates alignment with data classification standards related to the protection of information assets?
A. Information assets should only be accessed by persons with a justified need
B. All information assets must be encrypted when stored on the organization’s systems
C. Any information assets transmitted over a public network must be approved by executive management
D. All information assets will be assigned a clearly defined level to facilitate proper employee handling
Answer
D. All information assets will be assigned a clearly defined level to facilitate proper employee handling
CISA Question 108
Question
Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?
A. Custom-developed applications can be tested more accurately.
B. The testing produces a lower number of false positive results.
C. The testing process can be automated to cover large groups of assets.
D. Network bandwidth is utilized more efficiently.
Answer
C. The testing process can be automated to cover large groups of assets.
CISA Question 109
Question
Which of the following is the BEST way to ensure payment transaction data is restricted to the appropriate users?
A. Using a single menu for sensitive application transactions
B. Restricting access to transactions using network security software
C. Implementing two-factor authentication
D. Implementing role-based access at the application level
Answer
B. Restricting access to transactions using network security software
CISA Question 110
Question
During a database security audit, an IS auditor is reviewing the process used to upload source data. Which of the following is the MOST significant risk area for the auditor to focus on?
A. Data integrity
B. Data sensitivity
C. Data resilience
D. Data normalization
Answer
C. Data resilience