Topics
Products
Follow Us:
Hemangdoshi
Answered: Feb 18, 2020
B. Bus

The bus topology is vulnerable to failure if one device fails. In line and bus networks, which are essentially the same thing, terminals are connected to a single cable. If this...Read More

2 Answers

217 views
C. Bernthal, Teacher
Answered: Jan 25, 2019
The first thing that the auditor should check is letter C. The auditor should know if the company is adhering to the legal and regulatory requirements available. There are different things that...Read More

2 Answers

217 views
Rockzzzajay
Answered: Feb 17, 2020

A preventive maintenance plan is considered to be the most helpful when evaluating the effectiveness and adequacy of computer preventive maintenance program.

2 Answers

213 views
Hemangdoshi
Answered: Feb 18, 2020
B. Message integrity

Digital signature provides integrity, authentication and non-repudiation for electronic message. It does not ensure message confidentiality. A digital signature...Read More

2 Answers

243 views
Matz Lewis Clark, College student
Answered: Dec 26, 2018
Correct answer is option A
Logging user activities is an example of an operating system access control function. Access controls are features that help control how users and systems c...Read More

2 Answers

203 views
Kcsreddyabhi
Answered: Oct 07, 2018

D

Itf provide large data inputs

1 Answer

208 views
Hemangdoshi
Answered: Feb 18, 2020
B. all the relevant vulnerabilities and threats are identified.

In developing a risk-based audit strategy, it is critical that the risks and vulnerabilities be understood. This will...Read More

1 Answer

231 views
Hemangdoshi
Answered: Feb 18, 2020
B. high-risk areas within the organization.

The first and most critical step in the process is to identify high-risk areas within the organization. Once high risk areas have been...Read More

1 Answer

351 views
Hemangdoshi
Answered: Feb 18, 2020
C. close firewall-2.

Traffic for the internal network that did not originate from the mail gateway is a sign that firewall-1 is not functioning properly. This may have been be caused by...Read More

1 Answer

221 views
Hemangdoshi
Answered: Feb 18, 2020
A. recovery time objective (RTO) is low.

A low RTO means disaster tolerance is also low. If this time gap is low, recovery strategies that can be implemented within a short period of time,...Read More

1 Answer

220 views
Hemangdoshi
Answered: Feb 18, 2020
C. key executives and representative from user management .

It includes key executives and representative from user management .

1 Answer

206 views
Hemangdoshi
Answered: Feb 18, 2020
A. Criticality of information asset.

The appropriate level of protection for an asset is determined based on the criticality of the assets. Other factors are not that relevant as compared...Read More

1 Answer

213 views
Hemangdoshi
Answered: Feb 18, 2020
C. circulated to users.

To be effective, an information security policy should reach all members of the staff. Storing the security policy offsite or in a safe place may be desirable, but...Read More

1 Answer

206 views
Hemangdoshi
Answered: Feb 18, 2020
D. identify and evaluate the existing controls.

It is important for an IS auditor to identify and evaluate the existing controls and security once the potential threats and possible impacts...Read More

1 Answer

211 views

Related Topics Of CISA

Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.