Discount Offer
Go Back on CISA Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

CISA Practice Test


Page 11 out of 204 Pages

Topic 1: Exam Pool A

An advantage of installing a thin client architecture in a local area network (LAN) is that this would:


A.

stabilize network bandwidth requirements


B.

reduce the risk of a single point of failure


C.

facilitate the updating of software versions.


D.

ensure application availability when the server is down.





A.
  

stabilize network bandwidth requirements



Which of the following is an IS auditor s GREATEST concern when an organization does not regularly update software on individual workstations in the internal environment?


A.

The organization may be more susceptible to cyber-attacks.


B.

The organization may not be in compliance with licensing agreement.


C.

System functionality may not meet business requirements.


D.

The system may have version control issues.





A.
  

The organization may be more susceptible to cyber-attacks.



The information security function in a large organization is MOST effective when:


A.

partnered with the IS development team to determine access rights


B.

decentralized as close to the user as possible


C.

established at a corporate-wide level.


D.

the function reports directly to the IS operations manager.





C.
  

established at a corporate-wide level.



Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?


A.

Complexity of business processes identified in the audit


B.

Peak activity periods for the business


C.

Remediation dates included m management responses


D.

Availability of IS audit resources





C.
  

Remediation dates included m management responses



Which of the following would be the MOST likely reason for an intrusion prevention system (IPS) being unable to block an ongoing web attack?


A.

Monitoring personnel are not proactive


B.

The network design contains flaws.


C.

Signatures are outdated


D.

The firewall is not configured propert





C.
  

Signatures are outdated




Page 11 out of 204 Pages
Previous