Discount Offer
Go Back on CISA Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

CISA Practice Test


Page 8 out of 204 Pages

Topic 1: Exam Pool A

During an external assessment of network vulnerability which of the following activities should be performed FIRST


A.

implement an intrusion detection system (IDS)


B.

Review policies


C.

Monitor the network


D.

Collect network information





B.
  

Review policies



The BEST way to evaluate the effectiveness of a newly developed application is to:


A.

perform a post-implementation review,


B.

review acceptance-testing results


C.

analyze load-testing results,


D.

perform a pre-implementation renew.





B.
  

review acceptance-testing results



While planning a security audit, an IS auditor is made aware of a security review carried out by external consultants. It is MOST implement for the auditor to:


A.

Re-perform the security review


B.

Asses the objectively and competence of the consultant


C.

Review similar reports issued by the consultants.


D.

Accept the finding and conclusion of the consultants





C.
  

Review similar reports issued by the consultants.



Which of the following procedures would BEST contribute to the reliability of information in a data warehouse?


A.

Retaining only current data.


B.

Maintain archive data


C.

Maintaining current metadata


D.

Storing only a single type of data





C.
  

Maintaining current metadata



Which of the following will BEST help to ensure that an in-house application in the production environment is current?


A.

Version control procedures


B.

Change management


C.

Production access control


D.

Quality assurance





A.
  

Version control procedures




Page 8 out of 204 Pages
Previous