The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.
Table of Contents
- CISA Question 731
- Question
- Answer
- CISA Question 732
- Question
- Answer
- CISA Question 733
- Question
- Answer
- CISA Question 734
- Question
- Answer
- CISA Question 735
- Question
- Answer
- CISA Question 736
- Question
- Answer
- CISA Question 737
- Question
- Answer
- CISA Question 738
- Question
- Answer
- CISA Question 739
- Question
- Answer
- CISA Question 740
- Question
- Answer
CISA Question 731
Question
Due to the cost restrains, a company defers the replacement of hardware supporting core application. Which of the following represents the GREATEST risk?
A. Maintenance costs may rise.
B. Future upgrades may not be possible.
C. Systems availability may suffer.
D. Eventual replacement may be more expensive.
Answer
C. Systems availability may suffer.
CISA Question 732
Question
Which of the following would BEST detect that a distributed-denial-of-service attack (DDoS) is occurring?
A. Server crashes
B. Automated monitoring of logs
C. Penetration testing
D. Customer service complaints
Answer
B. Automated monitoring of logs
CISA Question 733
Question
The PRIMARY benefit of using secure shell (SSH) to access a server on a network is that it:
A. provides better session reliability.
B. prevents man-in-the-middle attacks.
C. provides confidentiality of transmitted data.
D. facilitates communication across platforms.
Answer
C. provides confidentiality of transmitted data.
CISA Question 734
Question
Reorganization of databases is undertaken PRIMARILY to:
A. reduce backout and recovery times.
B. eliminate duplicates and perform data backup.
C. reduce simultaneous update time and index validation.
D. improve data access and retrieval times.
Answer
D. improve data access and retrieval times.
CISA Question 735
Question
To ensure the integrity of a recovered database, which of the following would be MOST useful?
A. Before-and-after transaction images
B. Database defragmentation tools
C. A copy of the data dictionary
D. Application transaction logs
Answer
A. Before-and-after transaction images
CISA Question 736
Question
A sales representative is reviewing the organization’s feedback blog and gets redirected to a site that sells illegal prescription drugs. The blog site is MOST likely susceptible to which of the following types of attacks?
A. Directory harvesting
B. SQL injection
C. Cross-site scripting
D. Phishing attack.
Answer
C. Cross-site scripting
CISA Question 737
Question
Nonrepudiation of the client for e-commerce transactions is accomplished through which of the following control mechanisms?
A. Password security
B. Internet protocol (IP) address verification
C. Public key infrastructure (PKI)
D. Secure Sockets Layer (SSL)
Answer
C. Public key infrastructure (PKI)
CISA Question 738
Question
Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization’s security policy?
A. Analyzing how the configuration changes are performed
B. Performing penetration testing
C. Analyzing log files
D. Reviewing the rule base
Answer
B. Performing penetration testing
CISA Question 739
Question
An enterprise receiving email should have procedures to control:
A. insufficient end-points.
B. unsolicited executable code.
C. outdated protocols.
D. insufficient connectivity.
Answer
B. unsolicited executable code.
CISA Question 740
Question
The lack of which of the following represents the GREATEST risk to the quality of developed software?
A. Code reviews
B. Periodic internal audits
C. Load testing
D. An enterprise architecture
Answer
A. Code reviews