Valid CISA Dumps shared by ExamDiscuss.com for Helping Passing CISA Exam! ExamDiscuss.com now offer the newest CISA exam dumps, the ExamDiscuss.com CISA exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com CISA dumps with Test Engine here:

Access CISA Dumps Premium Version
(1435 Q&As Dumps, 35%OFF Special Discount Code: freecram)

<< Prev Question Next Question >>

Question 116/309

Which of the following features can be provided only by asymmetric encryption?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (309q)
Question 1: Reconciliations have identified data discrepancies between a...
Question 2: Which of the following are BEST suited for continuous auditi...
Question 3: When conducting a requirements analysis for a project the BE...
Question 4: Due to a global pandemic, a health organization has instruct...
Question 5: Which of the following should an IS auditor validate FIRST w...
Question 6: Which of the following MOST effectively mitigates the risk o...
Question 7: A manager identifies active privileged accounts belonging to...
Question 8: Which of the following is a directive control?...
Question 9: Which of the following should be of GREATEST concern to an I...
Question 10: An IS auditor is planning on utilizing attribute sampling to...
Question 11: Which of the following is the GREATEST risk associated with ...
Question 12: An organization plans to receive an automated data feed into...
Question 13: What is the PRIMARY benefit of prototyping as a method of sy...
Question 14: An IS auditor finds that an organization's data toss prevent...
Question 15: Data analytics Tools are BEST suited for which of the follow...
Question 16: Which of the following controls BEST ensures appropriate seg...
Question 17: Which of the following should be included in a business impa...
Question 18: Which of the following control techniques BEST ensures the i...
Question 19: To create a digital signature in a message using asymmetric ...
Question 20: Within the context of an IT-related governance framework, wh...
Question 21: What is the BEST justification for allocating more funds to ...
Question 22: An IS auditor has completed an audit on the organization's I...
Question 23: To ensure efficient and economic use of limited resources in...
Question 24: An IS auditor is using data analytics in an audit and has ob...
Question 25: An organization is deciding whether to outsource its custome...
Question 26: An IS auditor is evaluating the risk associated with moving ...
Question 27: Which of the following is the PRIMARY purpose of quality ass...
Question 28: When evaluating the recent implementation of an intrusion de...
Question 29: An IS auditor is evaluating a virtual server environment and...
Question 30: During recent post-implementation reviews, an IS auditor has...
Question 31: Which of the following is the MAIN risk associated with addi...
Question 32: Which of the following is MOST important for an IS auditor t...
Question 33: Which of the following should be the PRIMARY objective of a ...
Question 34: During a follow-up audit, an IS auditor finds that some crit...
Question 35: Which of the following is MOST important for an IS auditor t...
Question 36: Which of the following should be defined in an audit chatter...
Question 37: Compared to developing a system in-house, acquiring a softwa...
Question 38: Which of the following is a concern associated with virtuali...
Question 39: Following the sale of a business division, employees will be...
Question 40: An IS auditor will be testing accounts payable controls by p...
Question 41: Which of the following would BEST facilitate the detection o...
Question 42: Which of the following should be the PRIMARY basis for prior...
Question 43: Which of the following would BEST provide executive manageme...
Question 44: Which of the following provides the BEST evidence of the eff...
Question 45: In a situation where the recovery point objective (RPO) is 0...
Question 46: What is the BEST population to select from when testing that...
Question 47: Which of the following would be the MOST effective method to...
Question 48: An effective implementation of security roles and responsibi...
Question 49: Which of the following is MOST likely to result from complia...
Question 50: Which of the following network management toots should an IS...
Question 51: Which of the following would be the MOST significant factor ...
Question 52: Which of the following should be done FIRST to effectively d...
Question 53: During a review of a production schedule, an IS auditor obse...
Question 54: When determining whether a project in the design phase will ...
Question 55: An IS auditor finds the timeliness and depth of information ...
Question 56: Which of the following is MOST important lo have in place fo...
Question 57: An IS auditor intends to accept a management position in the...
Question 58: Which of the following is the BEST incident of an effective ...
Question 59: An IS auditor finds that corporate mobile devices used by em...
Question 60: The information security function in a large organization is...
Question 61: Which of the following BEST demonstrates the degree of align...
Question 62: An organization has recently implemented a Voice-over IP (Vo...
Question 63: Which of the following is the BEST way to mitigate the impac...
Question 64: An organization's security policy mandates that all new empl...
Question 65: An organization processing high volumes of financial transac...
Question 66: An organization is planning to re-purpose workstations mat w...
Question 67: An information systems security officer's PRIMARY responsibi...
Question 68: An organization has agreed to perform remediation related to...
Question 69: Which of the following is the BEST sampling method when perf...
Question 70: Which of the following is the BEST way to mitigate risk to a...
Question 71: Which of the following should occur EARLIEST in a business c...
Question 72: An organization has replaced all of the storage devices at i...
Question 73: A bank recently experienced fraud where unauthorized payment...
Question 74: An IS auditor is reviewing an industrial control system (ICS...
Question 75: An organization's business function wants to capture custome...
Question 76: An employee approaches an IS auditor and expresses concern a...
Question 77: Which of the following is the BEST way to achieve high avail...
Question 78: Which of the following should be an IS auditor's PRIMARY foc...
Question 79: An IS auditor attempts to sample for variables in a populati...
Question 80: An IS auditor performs a follow-up audit and learns the appr...
Question 81: Which of the following is a detective control that can be us...
Question 82: The activation of a pandemic response plan has resulted in a...
Question 83: Which of the following is an IS auditor's BEST recommendatio...
Question 84: An organization's software developers need access to persona...
Question 85: Which of the following is the PRIMARY objective of baselinin...
Question 86: Which of the following is the BEST indication of the complet...
Question 87: To BEST evaluate the effectiveness of a disaster recovery pl...
Question 88: Which of the following is the MOST significant operational r...
Question 89: Which of the following approaches provides the BEST assuranc...
Question 90: A legacy application is running on an operating system that ...
Question 91: Which of the following validation techniques would BEST prev...
Question 92: Which of the following poses the GREATEST security risk when...
Question 93: Which of the following should be of GREATEST concern to an I...
Question 94: After an employee termination, a network account was removed...
Question 95: Which of the following controls is BEST implemented through ...
Question 96: Which of the following is the PRIMARY role of key performanc...
Question 97: When engaging services from external auditors, which of the ...
Question 98: Following a breach, what is the BEST source 10 determine the...
Question 99: Which of the following is a determine security control that ...
Question 100: Secure code reviews as part of a conbnuous deployment progra...
Question 101: An organization wants to change its project methodology to a...
Question 102: Which of the following is a PRIMARY role of an IS auditor in...
Question 103: Which of the following is the BEST way to address ongoing co...
Question 104: A month after a company purchased and implemented system and...
Question 105: The PRIMARY objective of value delivery in reference to IT g...
Question 106: During a security audit, an IS auditor is tasked with review...
Question 107: Which of the following BEST indicates that an organization h...
Question 108: Following a significant merger and acquisition, which of the...
Question 109: An IS auditor is performing a follow-up audit for findings i...
Question 110: Which of the following provides the BEST method for maintain...
Question 111: An organization that has suffered a cyber attack is performi...
Question 112: An IS auditor noted that a change to a critical calculation ...
Question 113: When determining which IS audits to conduct during the upcom...
Question 114: An algorithm in an email program analyzes traffic to quarant...
Question 115: An IS auditor should ensure that an application's audit trai...
Question 116: Which of the following features can be provided only by asym...
Question 117: Which of the following provides an IS auditor the MOST assur...
Question 118: Which of the following observations should be of GREATEST co...
Question 119: Which of the following metrics is MOST useful to an IS audit...
Question 120: Which of the following is the GREATEST security risk associa...
Question 121: Which of the following human resources management practices ...
Question 122: Which of the following group is MOST likely responsible for ...
Question 123: During a routine check, a system administrator identifies un...
Question 124: During which IT project phase is it MOST appropriate to cond...
Question 125: The CIO of an organization is concerned that the information...
Question 126: What is the MAIN purpose of an organization's internal IS au...
Question 127: Management has decided to include a compliance manager in th...
Question 128: IS management has recently disabled certain referential inte...
Question 129: During an audit of an access control system an IS auditor fi...
Question 130: An existing system is being replaced with a new application ...
Question 131: An IS auditor finds that the process for removing access for...
Question 132: Which of the following measures BEST mitigates the risk of e...
Question 133: The PRIMARY reason to follow up on prior-year audit reports ...
Question 134: Which of the following is an objective of data transfer cont...
Question 135: An organization wants to replace its suite of legacy applica...
Question 136: The use of cookies constitutes the MOST significant security...
Question 137: Which of the following is the GREATEST concern when using a ...
Question 138: When aligning IT projects with organizational objectives, it...
Question 139: A new application will require multiple interfaces. Which of...
Question 140: When reviewing backup policies, an IS auditor MUST verify th...
Question 141: Which of the following poses the GREATEST risk to a company ...
Question 142: An IS auditor has assessed a payroll service provider's secu...
Question 143: After an external IS audit, which of the following should be...
Question 144: Which of the following procedures for testing a disaster rec...
Question 145: Which of the following provides the MOST reliable audit evid...
Question 146: Which of the following cloud deployment models would BEST me...
Question 147: Which of the following is the MOST significant risk associat...
Question 148: An IS auditor finds that terminated users have access to fin...
Question 149: A system development project is experiencing delays due to o...
Question 150: An organization is in the process of deciding whether to all...
Question 151: Which of the following BEST demonstrates that IT strategy is...
Question 152: An IS auditor is reviewing the implementation of an internat...
Question 153: An organization maintains an inventory of the IT application...
Question 154: Which of the following is the GREATEST benefit of utilizing ...
Question 155: After the release of an application system, an IS auditor wa...
Question 156: An IS auditor finds the log management system is overwhelmed...
Question 157: Which of the following observations noted during a review of...
Question 158: Which of the following BEST enables an IS auditor to combine...
Question 159: During a business process re-engineering (BPR) program, IT c...
Question 160: An employee has accidentally posted confidential data to the...
Question 161: When evaluating the management practices at a third-party or...
Question 162: A third-party service provider is hosting a private cloud fo...
Question 163: What should be the PRIMARY basis for scheduling a follow-up ...
Question 164: An IS auditor is conducting a post-implementation review of ...
Question 165: Which of the following should be an IS auditor's PRIMARY con...
Question 166: Which of the following development practices would BEST miti...
Question 167: An organization's IT security policy requires annual securit...
Question 168: An IS auditor notes that IT and the business have different ...
Question 169: An IS auditor is following up on prior period items and find...
Question 170: The PRIMARY benefit of using secure shell (SSH) to access a ...
Question 171: Which of the following should an IS auditor expect to find w...
Question 172: The BEST way to prevent fraudulent payments is to implement ...
Question 173: An IS auditof notes the transaction processing times in an o...
Question 174: Which of the following would be the MOST appropriate reason ...
Question 175: A client/server configuration will:...
Question 176: An IS auditor reviewing a purchase accounting system notices...
Question 177: Which of the following is the GREATEST advantage of vulnerab...
Question 178: Which of the following should be the PRIMARY basis for proce...
Question 179: Which of the following is an example of a control that is bo...
Question 180: A user of a telephone banking system has forgotten his perso...
Question 181: A software development organization with offshore personnel ...
Question 182: Which of the following development practices would BEST miti...
Question 183: Which of the following is an example of a corrective control...
Question 184: Which of the following is MOST useful for determining whethe...
Question 185: An organization has begun using social media to communicate ...
Question 186: Which of the following is the MOST effective sampling method...
Question 187: Coding standards provide which of the following?...
Question 188: Which of the following is the BEST source of information for...
Question 189: An IS audit manager has been asked to perform a quality revi...
Question 190: Which of the following should be of GREATEST concern to an I...
Question 191: Which of the following should be defined in an audit charter...
Question 192: Which control type would provide the MOST useful input to a ...
Question 193: An organization with high availability resource requirements...
Question 194: An IS auditor s role in privacy and security is to:...
Question 195: Which of the following is the MOST important determining fac...
Question 196: Which of the following security risks can be reduced by a pr...
Question 197: When is the BEST time to commence continuity planning for a ...
Question 198: When planning an end-user computing (EUC) audit, it is MOST ...
Question 199: What is the PRIMARY reason for conducting a risk assessment ...
Question 200: Which of the following situations would impair the independe...
Question 201: Which of the following is the PRIMARY objective of implement...
Question 202: In the risk assessment process, which of the following shoul...
Question 203: During a disaster recovery audit, an IS auditor finds that a...
Question 204: Which of the following access rights presents the GREATEST r...
Question 205: An organization seeks to control costs related to storage me...
Question 206: Which of the following provides an IS auditor with the BEST ...
Question 207: An IS auditor is assigned to review the development of a spe...
Question 208: Batch processes running in multiple countries are merged to ...
Question 209: What information within change records would provide an IS a...
Question 210: The operations team of an organization has reported an IS se...
Question 211: Several unattended laptops containing sensitive customer dat...
Question 212: A company converted its payroll system from an external serv...
Question 213: Which of the following is MOST important to ensure that elec...
Question 214: Which of the following is the BEST way to mitigate the risk ...
Question 215: An organization recently implemented a cloud document storag...
Question 216: Which of the following would be an IS auditor's GREATEST con...
Question 217: A USB device containing sensitive production data was lost b...
Question 218: During a review, an IS auditor notes that an organization's ...
Question 219: Which of the following is MOST important for an IS auditor t...
Question 220: An IS auditor finds that firewalls are outdated and not supp...
Question 221: During an audit of a data classification policy, an IS audit...
Question 222: Which of the following would an IS auditor consider the GREA...
Question 223: Which of the following would be MOST useful to an IS auditor...
Question 224: Which of the following should be an IS auditor's BEST recomm...
Question 225: During an audit of an organization's financial statements, a...
Question 226: Which type of attack poses the GREATEST risk to an organizat...
Question 227: Which of the following conditions would be of MOST concern t...
Question 228: Which of the following must be in place before an IS auditor...
Question 229: Which of the following is the BEST control to help prevent s...
Question 230: Which of the following would lead an IS auditor to conclude ...
Question 231: The BEST way to determine whether programmers have permissio...
Question 232: Data anonymizabon helps to prevent which types of attacks in...
Question 233: The use of symmetric key encryption controls to protect sens...
Question 234: An organization considers implementing a system that uses a ...
Question 235: Which of the following is MOST helpful in preventing a syste...
Question 236: An IS auditor determines that a business continuity plan has...
Question 237: When conducting a post-implementation review of a new softwa...
Question 238: The PRIMARY benefit of information asset classification is t...
Question 239: At what point in software development should the user accept...
Question 240: A financial institution suspects that a manager has been cre...
Question 241: A new regulation in one country of a global organization has...
Question 242: During data migration, which of the following BEST prevents ...
Question 243: Which of the following observations should be of GREATEST co...
Question 244: An IS auditor is performing a follow-up audit for findings i...
Question 245: Which of the following MUST be completed before selecting an...
Question 246: The MOST important reason why an IT risk assessment should b...
Question 247: Malicious program code was found in an application and corre...
Question 248: An e-commerce enterprise's disaster recovery (DR) site has 3...
Question 249: An organization has recently converted its infrastructure to...
Question 250: During a review of IT service desk practices, an IS auditor ...
Question 251: A financial institution has a system interface that is used ...
Question 252: Which of the following indicates that an internal audit orga...
Question 253: An IT governance body wants to determine whether IT service ...
Question 254: An accounts receivable data entry routine prevents the entry...
Question 255: Using swipe cards to limit employee access to restricted are...
Question 256: Which of the following should be of GREATEST concern to an I...
Question 257: In a database management system (DBMS) normalization is used...
Question 258: An IS auditor observes that exceptions have been approved (o...
Question 259: In planning a major system development project, function poi...
Question 260: The PRIMARY reason an IS department should analyze past inci...
Question 261: An organization experienced a domain name system (DNS) attac...
Question 262: An organization is migrating its human resources (HR) applic...
Question 263: Which of the following features of a library control softwar...
Question 264: A financial institution is launching a mobile banking servic...
Question 265: servDuring an internal audit review of a human resources (HR...
Question 266: What would be of GREATEST concern to an IS auditor observing...
Question 267: Which of the following would MOST likely impair the independ...
Question 268: Which of the following is a preventive control related to ch...
Question 269: Which of the following is the MOST important consideration f...
Question 270: Which of the following provides for the GREATEST cost reduct...
Question 271: An IS auditor learns a server administration team regularly ...
Question 272: An IS auditor evaluating a three-tier client/server architec...
Question 273: Which of the following communication modes should be of GREA...
Question 274: Which of the following is the BEST source of information for...
Question 275: Which of the following is the MOST important consideration w...
Question 276: To develop meaningful recommendations for findings, which of...
Question 277: Which of the following is the GREATEST concern when an organ...
Question 278: An IS auditor performing an application development review a...
Question 279: To address issues related to privileged users identified in ...
Question 280: Which of the following is the MOST important difference betw...
Question 281: Which of the following BEST enables alignment of IT with bus...
Question 282: Which of the following is MOST effective in detecting an int...
Question 283: Due to a high volume of customer orders, an organization pla...
Question 284: During the implementation of an upgraded enterprise resource...
Question 285: Internal audit is conducting an audit of customer transactio...
Question 286: Which of the following BEST enables an IS auditor to detect ...
Question 287: Which type of control is being implemented when a biometric ...
Question 288: The GREATEST benefit of using a prototyping approach in soft...
Question 289: During an audit, the client learns that the IS auditor has r...
Question 290: Which of the following analytical methods would be MOST usef...
Question 291: Which of the following would BEST enable an organization to ...
Question 292: Which of the following practices BEST ensures that archived ...
Question 293: Which of the following is the MAIN benefit of using data ana...
Question 294: Which of the following should be of GREATEST concern to an I...
Question 295: An IS auditor identifies key controls that have been overrid...
Question 296: The PRIMARY reason for an IS auditor to use data analytics t...
Question 297: An IS auditor has found that an organization is unable to ad...
Question 298: Which of the following provides the MOST useful information ...
Question 299: The members of an emergency incident response team should be...
Question 300: During a post-implementation review, an IS auditor learns th...
Question 301: Which of the following is the MOST effective control to ensu...
Question 302: An IS auditor performing an audit of backup procedures obser...
Question 303: What is the MOST critical finding when reviewing an organiza...
Question 304: What is the MOST difficult aspect of access control in a mul...
Question 305: Which of the following BEST facilitates detection of zero-da...
Question 306: Which of the following fire suppression systems needs to be ...
Question 307: The performance, risks, and capabilities of an IT infrastruc...
Question 308: A warehouse employee of a retail company has been able to co...
Question 309: Which of the following is the MAIN purpose of an information...