Search Header Logo

CISA 2.7.24

Authored by jane porn

Business

Professional Development

Used 1+ times

CISA 2.7.24
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

When an intrusion into an organization's network is detected, which of the following should be done FIRST?

Contact law enforcement.

Identify nodes that have been compromised.

Block all compromised network nodes.

Notify senior management

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an audit reviewer's PRIMARY role with regard to evidence?

Ensuring appropriate statistical sampling methods were used

Ensuring evidence is labeled to show it was obtained from an approved source

Ensuring unauthorized individuals do not tamper with evidence after it has been captured

Ensuring evidence is sufficient to support audit conclusions

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would be MOST useful to an IS auditor assessing the effectiveness of IT resource planning?

Budget execution status

A capacity analysis of IT operations

A succession plan for key IT personnel

A list of new applications to be implemented

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following MOST effectively minimizes downtime during system conversions?

Phased approach

Parallel run

Direct cutover

Pilot study

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the MOST important reason for IS auditors to perform post-implementation reviews for critical IT projects?

To determine whether vendors should be paid for project deliverables

To provide the audit committee with an assessment of project team performance

To provide guidance on the financial return on investment (ROI) of projects

To determine whether the organization's objectives were met as expected

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the PRIMARY role of the IS auditor in an organization's information classification process?

Securing information assets in accordance with the classification assigned

Validating that assets are protected according to assigned classification

Ensuring classification levels align with regulatory guidelines

Defining classification levels for information assets within the organization

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Management receives information indicating a high level of risk associated with potential flooding near the organization's data center with in the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?

Risk reduction

Risk acceptance

Risk transfer

Risk avoidance

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?