Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
CISA Interview Questions and Answers
Home
Questions
CISA
0
votes
Which of the following symmetric algorithms is a block cipher that the U.S. government adopted as AES to replace DES?
answered
May 20, 2023
in
CISA
by
Robindeniel
symmetric
algorithms
0
votes
An auditor should recommend the use of which of the following to determine the minimum level of service needed at an alternate site?
answered
May 20, 2023
in
CISA
by
Robindeniel
level
of
service
0
votes
From an auditing perspective, which of the following standards most closely maps to a Plan-Do-Check-Act (PDCA) approach?
answered
May 20, 2023
in
CISA
by
Robindeniel
cmm
0
votes
Where should an organization keep copies of the business continuity plan?
answered
May 20, 2023
in
CISA
by
Robindeniel
businesscontinuityplan
0
votes
In project management, which of the following is a task related to closing a project?
answered
May 20, 2023
in
CISA
by
Robindeniel
project
management
0
votes
Observation and testing can be used effectively in which of the following areas?
answered
May 20, 2023
in
CISA
by
Robindeniel
observation
testing
0
votes
During which step of the audit life cycle does an auditor identify which skills are needed for the audit, how many auditors are required, and what other resources are needed?
answered
May 20, 2023
in
CISA
by
Robindeniel
auditoridentify
0
votes
In the NIST version of the SDLC process, the system or program performs the work for which it was designed in which waterfall phase?
answered
May 20, 2023
in
CISA
by
Robindeniel
nist-version
0
votes
Which database-related term refers to the process of combining several low-sensitivity items to produce a high-sensitivity data item?
answered
May 20, 2023
in
CISA
by
Robindeniel
database-related
term
0
votes
When a system moves into production and changes are needed, which of the following is the final step in the change control process?
answered
May 20, 2023
in
CISA
by
Robindeniel
system
moves
0
votes
The network of an organization has been the victim of several intruders’ attacks. Which of the following measures would allow for the early detection of such incidents?
answered
May 20, 2023
in
CISA
by
Robindeniel
organizationnetwork
0
votes
A company has decided to implement an electronic signature scheme based on public key infrastructure. The user’s private key will be stored on the computer’s hard drive and protected by a
answered
May 20, 2023
in
CISA
by
Robindeniel
public
key
infrastructure
0
votes
An IS auditor selects a server for a penetration test that will be carried out by a technical specialist. Which of the following is MOST important?
answered
May 20, 2023
in
CISA
by
Robindeniel
is
auditor
0
votes
After observing suspicious activities in a server, a manager requests a forensic analysis.
answered
May 20, 2023
in
CISA
by
Robindeniel
forensic
analysis
0
votes
Which of the following would be the GREATEST cause for concern when data are sent over the Internet using HTTPS protocol?
answered
May 20, 2023
in
CISA
by
Robindeniel
https
protocol
0
votes
A firewall is being deployed at a new location. Which of the following is the MOST important factor in ensuring a successful deployment?
answered
May 20, 2023
in
CISA
by
Robindeniel
firewall
successful
deployment
0
votes
The human resources (HR) department has developed a system to allow employees to enroll in benefits via a web site on the corporate Intranet.
answered
May 20, 2023
in
CISA
by
Robindeniel
ssl
encryption
0
votes
What is the MOST prevalent security risk when an organization implements remote virtual private network (VPN) access to its network?is
answered
May 20, 2023
in
CISA
by
Robindeniel
vpn
logon
0
votes
The use of digital signatures:
answered
May 20, 2023
in
CISA
by
Robindeniel
digital
signatures
0
votes
The FIRST step in a successful attack to a system would be:
answered
May 20, 2023
in
CISA
by
Robindeniel
successful-attack
Help get things started by
asking a question
.
...