Topics
Products
Follow Us:
Hemangdoshi
Answered: Jun 04, 2020
B. implementing and enforcing good processes.

Change requires that good change management processes be implemented and enforced. Outsourcing the IS function is not directly related to the...Read More

1 Answer

254 views
Hemangdoshi
Answered: Jun 04, 2020
C. understanding the responsibilities and authority of individuals.

An organization chart provides information about the responsibilities and authority of individuals in the organization....Read More

1 Answer

254 views
Hemangdoshi
Answered: Jun 04, 2020
B. security log files.

Security administration procedures require read-only access to security log files to ensure that, once generated, the logs are not modified. Logs provide evidence...Read More

1 Answer

254 views
Hemangdoshi
Answered: Jun 04, 2020
A. The application owner was unaware of several changes applied to the application by the IT Department

Choice A is the most significant finding as it directly affects the integrity of the...Read More

1 Answer

253 views
Hemangdoshi
Answered: Jun 04, 2020
D. To improve performance.

Explanation: Prime objective for IT measurement process is to optimize the performance of IT services. An IT performance measurement process can be used to...Read More

1 Answer

253 views
Hemangdoshi
Answered: Jun 04, 2020
A. desired result or purpose of implementing specific control procedures.

Explanation: An IT control objective is defined as the statement of the desired result or purpose to be achieved by...Read More

1 Answer

252 views
Hemangdoshi
Answered: Jun 04, 2020
C. Hardening the server configuration

Hardening a system means to configure it in the most secure manner (install latest security patches, properly define the access authorization for...Read More

1 Answer

252 views
Bobby Rickets, Content Reviewer
Answered: Jan 02, 2019
Option B is correct - Report the risk associated with such process to IT steering committee.
If the IS auditor notice that the project team is skipping the validation and verification...Read More

3 Answers

251 views
Hemangdoshi
Answered: Jun 04, 2020
A. recovery time objective (RTO) is low.

A low RTO means disaster tolerance is also low. If this time gap is low, recovery strategies that can be implemented within a short period of time,...Read More

1 Answer

251 views
Hemangdoshi
Answered: Jun 04, 2020
A. authentication of the web site that will be surfed.

Authenticating the site to be surfed is the primary goal of a web certificate. Authentication of a user is achieved through passwords...Read More

1 Answer

251 views
Hemangdoshi
Answered: Jun 04, 2020
A. a product of the probability and impact.

Choice A takes into consideration the likelihood and magnitude of the impact and provides the best measure of the risk to an asset. Choice B...Read More

1 Answer

251 views
Hemangdoshi
Answered: Jun 04, 2020
B. the network servers are clustered in a site.

A clustered setup in one location makes the entire network vulnerable to natural disasters or other disruptive events. Dispersed...Read More

1 Answer

251 views
Hemangdoshi
Answered: Jun 04, 2020
A. inherent risk assessment.

The first step in a risk-based audit approach is to gather information about the business and industry to evaluate the inherent risks. After completing the...Read More

1 Answer

251 views
Rockzzzajay
Answered: Feb 17, 2020

A preventive maintenance plan is considered to be the most helpful when evaluating the effectiveness and adequacy of computer preventive maintenance program.

2 Answers

249 views
Hemangdoshi
Answered: Jun 04, 2020
B. Screened-subnet firewall

Out of all types of firewall implementation structures, Screened Subnet Firewall provides greatest security environment (as it implements 2 packet filtering...Read More

1 Answer

248 views

Related Topics Of CISA

Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.