The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.
Table of Contents
- CISA Question 151
- Question
- Answer
- CISA Question 152
- Question
- Answer
- CISA Question 153
- Question
- Answer
- CISA Question 154
- Question
- Answer
- CISA Question 155
- Question
- Answer
- CISA Question 156
- Question
- Answer
- CISA Question 157
- Question
- Answer
- CISA Question 158
- Question
- Answer
- CISA Question 159
- Question
- Answer
- CISA Question 160
- Question
- Answer
CISA Question 151
Question
An organization’s sensitive data is stored in a cloud computing environment and is encrypted. Which of the following findings should be of GREATEST concern to an IS auditor?
A. Symmetric keys are used for encryption.
B. Encryption keys are not rotated on a regular basis.
C. Test data encryption keys are being used in production.
D. Data encryption keys are accessible to the service provider.
Answer
B. Encryption keys are not rotated on a regular basis.
CISA Question 152
Question
What is the BEST type of network topology to reduce the risk of network faults?
A. Bus network
B. Star network
C. Ring network
D. Mesh network
Answer
D. Mesh network
CISA Question 153
Question
Which of the following is the BEST way to minimize the impact of a ransomware attack?
A. Grant system access based on least privilege.
B. Provide user awareness training on ransomware attacks.
C. Perform more frequent system backups.
D. Maintain a regular schedule for patch updates.
Answer
B. Provide user awareness training on ransomware attacks.
CISA Question 154
Question
An IS auditor is reviewing environmental controls and finds extremely high levels of humidity in the data center. Which of the following is the PRIMARY risk to computer equipment from this condition?
A. Brownout
B. Fire
C. Static electricity
D. Corrosion
Answer
D. Corrosion
CISA Question 155
Question
Which of the following would BEST help management maintain a current and effective business continuity plan (BCP)?
A. Update the critical business software list on an annual basis.
B. Perform a periodic recovery test and include a lessons-learned summary.
C. Perform an annual walk-through and verify resources at the recovery site.
D. Verify vendor restore requirements are consistent with the recovery plan.
Answer
B. Perform a periodic recovery test and include a lessons-learned summary.
CISA Question 156
Question
Which of the following is the BEST control to reduce the likelihood that a spear phishing attack will be successful?
A. Tools for users to report suspicious emails and unusual financial transactions
B. Spam filtering for emails containing external hyperlinks sent to mass recipient lists
C. Automated alerts to security managers identifying confidential information transferred externally
D. Education for staff and high-profile users on social engineering
Answer
D. Education for staff and high-profile users on social engineering
CISA Question 157
Question
Which of the following would provide the BEST evidence of the adequacy of firewall rules?
A. Performing penetration tests
B. Reviewing intrusion detection system (IDS) logs
C. Reviewing network logs
D. Verifying firewall configuration
Answer
A. Performing penetration tests
CISA Question 158
Question
What is the PRIMARY reason for including a clause requiring source code escrow in an application vendor agreement?
A. Protect the organization from copyright disputes.
B. Ensure source code changes are recorded.
C. Segregate system development and live environments.
D. Ensure the source code remains available.
Answer
A. Protect the organization from copyright disputes.
CISA Question 159
Question
Which of the following controls would BEST help to protect an organization from social engineering attacks?
A. Email monitoring
B. Social media access restrictions
C. Security awareness training
D. Firewall access control list reviews
Answer
C. Security awareness training
CISA Question 160
Question
What is the MAIN objective when implementing security controls within an application?
A. To minimize reputational risk to the organization
B. To minimize the exposure to the fullest extent possible
C. To optimize the level of data protection achieved against cost
D. To optimize user functionality of the application
Answer
C. To optimize the level of data protection achieved against cost