CISA Certified Information Systems Auditor – Question2676

An employee loses a mobile device resulting in loss of sensitive corporate data. Which of the following would have BEST prevented data leakage?

A.
Awareness training for mobile device users
B. Data encryption on the mobile device
C. The triggering of remote data wipe capabilities
D. Complex password policy for mobile devices

Correct Answer: C

CISA Certified Information Systems Auditor – Question2675

An organization has installed blade server technology in its data center. To determine whether higher cooling demands are maintained, which of the following should the IS auditor review?

A.
Ventilation systems
B. Uninterruptible power supply (UPS) systems
C. Air conditioning capacity
D. Duct maintenance

Correct Answer: C

CISA Certified Information Systems Auditor – Question2674

An IS auditor is unable to directly test privacy controls for a client’s cloud-based application. The MOST effective alternative to direct testing is to review:

A.
the provider’s internal audit reports.
B. the provider’s statement of assurance.
C. formal privacy certification.
D. independent audit reports.

Correct Answer: D

CISA Certified Information Systems Auditor – Question2673

The demilitarized zone (DMZ) is the part of a network where servers that are placed are:

A.
running internal department applications.
B. running mission-critical, non-web applications.
C. interacting with the public Internet.
D. external to the organization.

Correct Answer: C

CISA Certified Information Systems Auditor – Question2672

Which of the following provides the GREATEST assurance that any confidential information on a disk is no longer accessible but the device is still usable by other internal users?

A.
Reformatting the disk
B. Erasing the disk
C. Degaussing the disk
D. Password-protecting the disk

Correct Answer: A

CISA Certified Information Systems Auditor – Question2670

Based on the guidance of internal audit, an IT steering committee is considering the use of a balanced scorecard to evaluate its project management process. Which of the following is the GREATEST advantage to using this approach?

A.
Project schedule and budget management will improve.
B. Performance is measured from different perspectives.
C. Information is provided in a consistent and timely manner.
D. Project will be prioritized based on value.

Correct Answer: B

CISA Certified Information Systems Auditor – Question2669

Which of the following is the MOST significant concern when backup tapes are encrypted?

A.
Loss of the encryption key
B. Lack of physical security over the tapes
C. Incompatibility with future software versions
D. Inaccurate data due to encryption processing

Correct Answer: A