CISA Certified Information Systems Auditor – Question2658

Which of the following methods should be used to effectively erase sensitive data from portable storage devices that are to be reused?

A.
Formatting the portable device
B. Using media sanitization software
C. Overwriting the sensitive data
D. Exposing the portable device to a magnetic field

Correct Answer: C

CISA Certified Information Systems Auditor – Question2655

Due to the cost restrains, a company defers the replacement of hardware supporting core application. Which of the following represents the GREATEST risk?

A.
Maintenance costs may rise.
B. Future upgrades may not be possible.
C. Systems availability may suffer.
D. Eventual replacement may be more expensive.

Correct Answer: C

CISA Certified Information Systems Auditor – Question2653

The PRIMARY benefit of using secure shell (SSH) to access a server on a network is that it:

A.
provides better session reliability.
B. prevents man-in-the-middle attacks.
C. provides confidentiality of transmitted data.
D. facilitates communication across platforms.

Correct Answer: C

CISA Certified Information Systems Auditor – Question2650

A sales representative is reviewing the organization’s feedback blog and gets redirected to a site that sells illegal prescription drugs. The blog site is MOST likely susceptible to which of the following types of attacks?

A.
Directory harvesting
B. SQL injection
C. Cross-site scripting
D. Phishing attack.

Correct Answer: C

CISA Certified Information Systems Auditor – Question2649

Nonrepudiation of the client for e-commerce transactions is accomplished through which of the following control mechanisms?

A.
Password security
B. Internet protocol (IP) address verification
C. Public key infrastructure (PKI)
D. Secure Sockets Layer (SSL)

Correct Answer: C