ISACA
Op zoek naar een samenvatting op de ISACA? Op Stuvia vind je meer dan 39 samenvattingen, aantekeningen en andere studiedocumenten voor alle vakken op de ISACA.
-
39
- 0
-
4
Vakken op de ISACA
Er zijn samenvattingen beschikbaar voor deze vakken op de ISACA
Studies op de ISACA
Er zijn samenvattingen beschikbaar voor de volgende opleidingen op ISACA
-
ISACA 39
Nieuwste samenvattingen ISACA
Certified Information Systems Auditor Cisa Exam Questions And Answers Latest Update
Cisa Exam 1 Questions And Answers Latest Update
Isaca Cisa Certification Sample Questions And Answers Latest Update
Cisa Practice Exam Questions And Answers Latest Update
Cisa Practice Exam Questions And Answers Latest Update 2024
CISA Practice Questions And Answers Latest Update
Three common controls used to protect availablity. 
a) redundancy, backups and access control 
b. Encryption, file permissions and access controls. 
c. Access controls, logging and digital signatures. 
d. Hashes, logging and backups. - A. Redundancy, backups and access control 
Governance has several goals including: 
a. providing strategic direction 
b. ensuring that objectives are achieved 
c. verifying that organizational resources are being used appropriately 
d. directing and monitoring sec...
Topic 1, Main Questions (240 Main Questions) 
 
 
 
IS management has decided to rewrite a legacy customer relations system using fourth generation languages (4GLs). Which of the following risks is MOST often associated with system development using 4GLs? 
 
A.	Inadequate screen/report design facilities 
B.	Complex programming language subsets 
C.	Lack of portability across operating systems 
D.	Inability to perform data intensive operations 
 
Answer: D Explanation: 
4GLs are usually not suitab...
Confidentiality 
Protection from unauthorized access 
integrity 
Protection from unauthorized modification 
Availability 
protection from disruptions in access 
Cybersecurity 
the protection of information assets (digital assets) by addressing threats to information processed, stored, and transported by internetworked information systems 
NIST Functions to Protect Digital Assets 
IPDRR 1) Identify 2) Protect 3) Detect 4) Respond 5) Recover 
Nonrepudiation 
Def: ensuring that a message or other p...
NEW QUESTION 1 
- (Exam Topic 3) 
Which of the following would be a risk practitioner's BEST course of action when a project team has accepted a risk outside the established risk appetite? 
A.	Reject the risk acceptance and require mitigating controls. 
B.	Monitor the residual risk level of the accepted risk. 
C.	Escalate the risk decision to the project sponsor for review. 
D.	Document the risk decision in the project risk register. 
NEW QUESTION 2 
- (Exam Topic 3) 
Which of the following con...