CISA Certified Information Systems Auditor – Question2648

Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization’s security policy?

A.
Analyzing how the configuration changes are performed
B. Performing penetration testing
C. Analyzing log files
D. Reviewing the rule base

Correct Answer: B

CISA Certified Information Systems Auditor – Question2644

Which of the following management decisions presents the GREATEST risk associated with data leakage?

A.
Security awareness training is not provided to staff.
B. There is no requirement for desktops to be encrypted.
C. Security policies have not been updated in the past year.
D. Staff are allowed to work remotely.

Correct Answer: A

CISA Certified Information Systems Auditor – Question2643

Which of the following is the MOST effective control to ensure electronic records beyond their retention periods are deleted from IT systems?

A.
Review the record retention register regularly to initiate data deletion.
B. Build in system logic to trigger data deletion at predefined times.
C. Perform a sample check of current data against the retention schedule.
D. Execute all data deletions at a predefined month during the year.

Correct Answer: B

CISA Certified Information Systems Auditor – Question2642

Which of the following is the MOST important reason to periodically review data that has already been classified?

A.
The associated risk may change over time.
B. Additional data may have been added to the inventory.
C. Older data may need to be archived on removable media.
D. The classification nomenclature has changed.

Correct Answer: D

CISA Certified Information Systems Auditor – Question2639

Digital signatures are an effective control method for information exchange over an insecure network because they:

A.
enable nonrepudiation.
B. are under the sole custody of the receiver.
C. are constant over time.
D. authenticate the user biometrically.

Correct Answer: A