CISA Practice Exam Questions and Answers Rated A+
CISA Practice Exam Questions and Answers Rated A+ "Their security responsibilities include authorizing access, ensuring that access rules are updated when personnel changes occur, and regularly review access rules for the data for which they are responsible." Identify the appropriate role for the above mentioned responsibility. Data Users Data Custodians Data Owners Security Administrator C The mentioned responsibility falls under the remit of data owners. Data owners are usually business leaders responsible for using information for running and controlling the business. Data custodians are people responsible for storing and safeguarding the data and include IT personnel. Data users include the user communities with access levels authorized by the data owners. Security administrators have the responsibility to provide physical and logical security for data, software, and hardware. A comprehensive IS audit policy should include guidelines detailing what involvement the internal audit team should have? in the development and coding of major OS applications. in the acquisition and maintenance of major WEB applications. in the human resource management cycle of the application development project. None of the choices. in the development, acquisition, conversion, and testing of major applications. E The audit policy should include guidelines detailing what involvement internal audit will have in the development, acquisition, conversion, and testing of major applications. Such a policy must be approved by top management for it to be effective. A computer system is no more secure than the human systems responsible for its operation. Malicious individuals have regularly penetrated well-designed, secure computer systems by taking advantage of the carelessness of trusted individuals, or by deliberately deceiving them. zombie computers are being HEAVILY relied upon on by which of the following types of attack? ATP Social Engineering DDoS Eavedropping DoS C "Distributed denial of service (DDoS) attacks are common, where a large number of compromised hosts (""zombie computers"") are used to flood a target system with network requests, thus attempting to render it unusable through resource exhaustion." A major portion of what is required to address nonrepudiation is accomplished through the use of: strong methods for authorization and ensuring data integrity. None of the choices. strong methods for authentication and ensuring data validity strong methods for authentication and ensuring data reliability. strong methods for authentication and ensuring data integrity E A major portion of what is required to address nonrepudiation is accomplished through the use of strong methods for authentication and ensuring data integrity. A substantive test to verify that tape library inventory records are accurate is: checking if receipts and issues of tapes are accurately recorded. determining whether the movement of tapes is authorized. conducting a physical count of the tape inventory. determining whether bar code readers are installed. C A successful risk-based IT audit program should
Geschreven voor
- Instelling
- CISA Practice
- Vak
- CISA Practice
Documentinformatie
- Geüpload op
- 8 juni 2024
- Aantal pagina's
- 232
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
cisa practice exam questions and answers rated a
Ook beschikbaar in voordeelbundel