Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
CISA Interview Questions and Answers
Home
Questions
CISA
0
votes
Q: Which of the following symmetric algorithms is a block cipher that the U.S. government adopted as AES to replace DES?
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
symmetric
algorithms
0
votes
Q: An auditor should recommend the use of which of the following to determine the minimum level of service needed at an alternate site?
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
level
of
service
0
votes
Q: From an auditing perspective, which of the following standards most closely maps to a Plan-Do-Check-Act (PDCA) approach?
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
cmm
0
votes
Q: Where should an organization keep copies of the business continuity plan?
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
businesscontinuityplan
0
votes
Q: In project management, which of the following is a task related to closing a project?
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
project
management
0
votes
Q: Observation and testing can be used effectively in which of the following areas?
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
observation
testing
0
votes
Q: During which step of the audit life cycle does an auditor identify which skills are needed for the audit, how many auditors are required, and what other resources are needed?
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
auditoridentify
0
votes
Q: In the NIST version of the SDLC process, the system or program performs the work for which it was designed in which waterfall phase?
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
nist-version
0
votes
Q: Which database-related term refers to the process of combining several low-sensitivity items to produce a high-sensitivity data item?
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
database-related
term
0
votes
Q: When a system moves into production and changes are needed, which of the following is the final step in the change control process?
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
system
moves
0
votes
Q: The network of an organization has been the victim of several intruders’ attacks. Which of the following measures would allow for the early detection of such incidents?
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
organizationnetwork
0
votes
Q: A company has decided to implement an electronic signature scheme based on public key infrastructure. The user’s private key will be stored on the computer’s hard drive and protected by a
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
public
key
infrastructure
0
votes
Q: An IS auditor selects a server for a penetration test that will be carried out by a technical specialist. Which of the following is MOST important?
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
is
auditor
0
votes
Q: After observing suspicious activities in a server, a manager requests a forensic analysis.
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
forensic
analysis
0
votes
Q: Which of the following would be the GREATEST cause for concern when data are sent over the Internet using HTTPS protocol?
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
https
protocol
0
votes
Q: A firewall is being deployed at a new location. Which of the following is the MOST important factor in ensuring a successful deployment?
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
firewall
successful
deployment
0
votes
Q: The human resources (HR) department has developed a system to allow employees to enroll in benefits via a web site on the corporate Intranet.
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
ssl
encryption
0
votes
Q: What is the MOST prevalent security risk when an organization implements remote virtual private network (VPN) access to its network?is
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
vpn
logon
0
votes
Q: The use of digital signatures:
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
digital
signatures
0
votes
Q: The FIRST step in a successful attack to a system would be:
answered
May 20
in
CISA
by
Robindeniel
(
20.8k
points)
successful-attack
Help get things started by
asking a question
.
...