ISACA.CISA.v2020-09-07.q269

試験コード:CISA
試験名称:Certified Information Systems Auditor
認証ベンダー:ISACA
無料問題の数:269
バージョン:v2020-09-07
等級:
ページの閲覧量:405
問題集の閲覧量:16412
テストを始める

有効的なCISA問題集はPasstest.jp提供され、CISA試験に合格することに役に立ちます!Passtest.jpは今最新CISA試験問題集を提供します。Passtest.jp CISA試験問題集はもう更新されました。ここでCISA問題集のテストエンジンを手に入れます。

最新版のアクセス
855問、30% ディスカウント、特別な割引コード:JPNshiken

コメントを発表する

あなたのメールアドレスは公開されません。必要な部分に * が付きます。

その他のバージョン
345 viewsISACA.CISA.v2021-01-03.q362
666 viewsISACA.CISA.v2020-10-27.q362
444 viewsISACA.CISA.v2020-10-23.q332
332 viewsISACA.CISA.v2020-10-13.q299
423 viewsISACA.CISA.v2020-10-09.q270
437 viewsISACA.CISA.v2020-09-15.q230
354 viewsISACA.CISA.v2020-08-13.q267
349 viewsISACA.CISA.v2020-07-31.q194
436 viewsISACA.CISA.v2020-03-25.q120
790 viewsISACA.CISA.v2020-02-05.q100
878 viewsISACA.CISA.v2019-05-09.q750
561 viewsISACA.CISA.v2019-05-08.q750
814 viewsISACA.CISA.v2019-02-23.q896
517 viewsISACA.CISA.v2019-02-20.q896
786 viewsISACA.CISA.v2018-10-27.q803
464 viewsISACA.CISA.v2018-08-12.q802
427 viewsISACA.CISA.v2018-07-02.q770
794 viewsISACA.CISA.v2018-09-19.q770
716 viewsISACA.Cisa.v2018-02-25.q1069
1215 viewsISACA.CISA.v2017-11-28.q1100
質問一覧
質問1 Which of the following is MOST important to consider when cr...
質問2 Which of the following controls MOST effectively reduces the...
質問3 Which of the following requirements in a document control st...
質問4 Which of the following is the PRIMARY reason for database op...
質問5 During an audit of the organization's data privacy policy, t...
質問6 Which of the following is the BEST method for converting a f...
質問7 A CIO has asked an IS auditor to implement several security ...
質問8 Which of the following should be an IS auditor's PRIMARY con...
質問9 Which of the following is the PRIMARY benefit of implementin...
質問10 An organization is currently replacing its accounting system...
質問11 A company has implemented an IT segregation of duties policy...
質問12 Which of the following BEST enables an IS auditor to identif...
質問13 Which of the following is an IS auditor s GREATEST concern w...
質問14 When testing segregation of duties, which of the following a...
質問15 A security administrator should have read-only access for wh...
質問16 Which of the following is an example of a data analytics use...
質問17 During a security audit, which of the following is MOST impo...
質問18 Which of the following should an IS auditor verify when audi...
質問19 Which of the following is the BEST method for uncovering sha...
質問20 The MAJOR reason for segregating test programs from producti...
質問21 An IS auditor has discovered that unauthorized customer mana...
質問22 Which of the following is the GREATEST risk of cloud computi...
質問23 Which of the following is MOST important to helping incident...
質問24 One advantage of monetary unit sampling is the fact that:...
質問25 While executing follow-up activities, an IS auditor is conce...
質問26 Which of the following BEST describes an audit risk?...
質問27 Which of the following would be the MOST appropriate reason ...
質問28 Which of the following would be MOST helpful in ensuring sec...
質問29 The IS auditor of a power company finds that the radio link ...
質問30 What is the FIRST step an auditor should take when beginning...
質問31 To preserve chain-of-custody following an internal server co...
質問32 Which of the following entities is BEST suited to define the...
質問33 An IS auditor finds that a mortgage origination team receive...
質問34 Which of the following should an IS auditor use when verifyi...
質問35 Which of the following is the BEST way to address ongoing co...
質問36 A small startup organization does not have the resources to ...
質問37 Which of the following components of a scheduling tool BEST ...
質問38 Which of the following occurs during the issues management p...
質問39 Which of the following should an IS auditor recommend to red...
質問40 An organization is considering outsourcing the processing of...
質問41 Which of the following BEST indicates the effectiveness of a...
質問42 Which of the following validation techniques would BEST prev...
質問43 A review of an organization's IT portfolio revealed several ...
質問44 Which of the following is MOST important for an IS auditor t...
質問45 The BEST way to evaluate a shared control environment is to ...
質問46 An IS auditor finds that confidential company data has been ...
質問47 An organization recently implemented an industry-recognized ...
質問48 An IS auditor learns a server administration team regularly ...
質問49 Adopting a service-oriented architecture would MOST likely:...
質問50 Assessments of critical information systems are based on a c...
質問51 Which of the following methods should be used to purge confi...
質問52 An employee transfers from an organization's risk management...
質問53 The MOST effective method for an IS auditor to determine whi...
質問54 Which of the following MOST efficiently protects computer eq...
質問55 An IS auditor notes that application super-user activity was...
質問56 Which of the following is MOST important to ensure that elec...
質問57 What is an IS auditor's BEST recommendation for management i...
質問58 Which of the following is the PRIMARY advantage of the IT po...
質問59 While reviewing similar issues in an organization s help des...
質問60 A legacy application is running on an operating system that ...
質問61 Which of the following is the MOST critical characteristic o...
質問62 An organization has decided to migrate payroll processing to...
質問63 Which of the following methods should be used to effectively...
質問64 An organization was recently notified by its regulatory body...
質問65 An organization's plans to implement a virtualization strate...
質問66 An IS auditor has been asked to perform a post-implementatio...
質問67 Which of the following is MOST important when planning a net...
質問68 IS audit is asked 10 explain how local area network (LAN) se...
質問69 Which of the following provides the BEST audit evidence that...
質問70 The lack of which of the following represents the GREATEST r...
質問71 An organization plans to launch a social media presence as p...
質問72 Which of the following would BEST provide executive manageme...
質問73 Which of the following would be MOST important to include in...
質問74 Which of the following is the MOST effective way to minimize...
質問75 A previously agreed-upon recommendation was not implemented ...
質問76 An accounting department uses a spreadsheet to calculate sen...
質問77 Which of the following will BEST protect the confidentiality...
質問78 During a vulnerability assessment, an IS auditor finds a hig...
質問79 Which of the following would BEST prevent data from being or...
質問80 To create a digital signature in a message using asymmetric ...
質問81 Which of the following is the MOST effective way to assess w...
質問82 Which of the following is a reason for implementing a decent...
質問83 During a review of a production schedule, an IS auditor obse...
質問84 A recent audit identified duplicate software licenses and te...
質問85 Which of the following observations noted during a review of...
質問86 Which of the following should be an IS auditor's FIRST actio...
質問87 Which of the following is MOST important to include in a bus...
質問88 Which of the following is MOST important to include in foren...
質問89 Which of the following is corrective control?...
質問90 ..risk that the IS auditor will not find an error that has o...
質問91 Which of the following IS audit findings should be of GREATE...
質問92 An IS auditor concludes that a local area network's (LAN's) ...
質問93 Which of the following methodologies is MOST appropriate to ...
質問94 To maintain the confidentiality of information moved between...
質問95 An IS auditor finds multiple situations where the help desk ...
質問96 Due to the small size of the payroll department, an organiza...
質問97 Which of the following would BEST facilitate the detection o...
質問98 Following a security breach, in which a hacker exploited a w...
質問99 Which of the following a the MOST important prerequisite for...
質問100 During an audit of a payroll system, an IS auditor identifie...
質問101 Which of the following procedures should be implemented prio...
質問102 The GREATEST risk of database renormalization is:...
質問103 An IS auditor begins an assignment and identifies audit comp...
質問104 An IS auditor was involved in the design phase for a new sys...
質問105 The IS auditor's PRIMARY role in control self-assessment (CS...
質問106 What is the MOST important business concern when an organiza...
質問107 When designing metrics for information security, the MOST im...
質問108 An organization using instant messaging to communicate with ...
質問109 An IS auditor identifies key controls that have been overrid...
質問110 The PRIMARY reason an IS department should analyze past inci...
質問111 An IS auditor performing an audit of backup procedures obser...
質問112 On a daily basis, an in-house development team moves duplica...
質問113 An organization is using a single account shared by personne...
質問114 During an audit of information security procedures of a larg...
質問115 A large insurance company is about to replace a major financ...
質問116 internal IS auditor recommends that incoming accounts payabl...
質問117 An IS auditor notes that several users have not logged into ...
質問118 Which of the following is the MOST important process to ensu...
質問119 An IS auditor is evaluating a virtual server environment and...
質問120 maturity model is useful in the assessment of IT service man...
質問121 Which of the following would an IS auditor recommend as the ...
質問122 Which of the following is the MOST effective control to ensu...
質問123 Since data storage of a critical business application is on ...
質問124 Which of the following is the MOST important reason to use s...
質問125 The quality assurance (QA) function should be prevented from...
質問126 An IS auditor discovered abnormalities in a monthly report g...
質問127 After an external IS audit, which of the following should be...
質問128 Which of the following presents the GREATEST concern when im...
質問129 Which of the following cloud deployment models would BEST me...
質問130 Which of the following is the MOST effective control to mini...
質問131 During the implementation of an upgraded enterprise resource...
質問132 Which of the following is the BEST approach to identify whet...
質問133 An IS auditor has found that an organization is unable to ad...
質問134 Which of the following is MOST important to ensure when plan...
質問135 An IS auditor found that a company executive is encouraging ...
質問136 Which of the following would BEST enable effective IT resour...
質問137 Which of the following provides the GREATEST assurance that ...
質問138 The BEST data backup strategy for mobile users is to:...
質問139 mission-critical applications with a low recovery time objec...
質問140 When engaging services from external auditors, which of the ...
質問141 Which of the following is the MOST important consideration f...
質問142 An IS auditor discovers that validation controls in a web ap...
質問143 An organization has agreed to perform remediation related to...
質問144 Which of the following is the MOST significant risk associat...
質問145 As part of an IS audit, the auditor notes the practices list...
質問146 What would be an IS auditors GREATEST concern when using a t...
質問147 Which of the following will BEST help to ensure that an in-h...
質問148 The MOST important reason for documenting all aspects of a d...
質問149 A multinational organization is integrating its existing pay...
質問150 What is the GREASTEST concern for an IS auditory reviewing c...
質問151 An IS auditor finds that firewalls are outdated and not supp...
質問152 Which of the following poses the GREATEST risk to the enforc...
質問153 The PRIMARY advantage of object oriented technology is enhan...
質問154 During audit planning, an IS auditor walked through the desi...
質問155 An organization offers an online information security awaren...
質問156 The GREATEST benefit of risk-based auditing is that it:...
質問157 A security regulation requires the disabling of direct admin...
質問158 During a review of information security procedures for disab...
質問159 Which type of control is being implemented when a biometric ...
質問160 A sales representative is reviewing the organization's feedb...
質問161 Which of the following is MOST important in the audit qualit...
質問162 Which of the following should be performed immediately after...
質問163 A vulnerability in which of the following virtual systems wo...
質問164 In a typical SDLC, which group is PRIMARILY responsible for ...
質問165 Which of the following would an IS auditor consider to be th...
質問166 What should an IS auditor do when informed that some recomme...
質問167 The information security function in a large organization is...
質問168 An IS auditor has discovered that a cloud-based application ...
質問169 An organization transmits large amount of data from one inte...
質問170 Which of the following controls should be implemented to BES...
質問171 Which of the following is the GREATEST concern when an organ...
質問172 An organization has outsourced its data leakage monitoring t...
質問173 Which of the following would be MOST critical for an IS audi...
質問174 While evaluating an organization's program for tracking syst...
質問175 Following the sale of a business division, employees will be...
質問176 Which of the following should be of GREATEST concern to an o...
質問177 A start-up company acquiring for its order-taking system is ...
質問178 An IS auditor observes that an organization s critical IT sy...
質問179 Which of the following is the GREATEST benefit of implementi...
質問180 An organization has software that is not compliant with data...
質問181 Which of the following would be an IS auditor's GREATEST con...
質問182 Which of the following is the BEST reason to perform root ca...
質問183 An internal audit department recently established a quality ...
質問184 An IS auditor reviewing an incident management process ident...
質問185 Which of the following is the BEST approach to help ensure e...
質問186 A technology service organization has recently acquired a ne...
質問187 Which of the following should MOST concern an IS auditor rev...
質問188 Which of the following is the GREATEST risk resulting from c...
質問189 An IS auditor is conducting a review of an organization s in...
質問190 An effective implementation of security roles and responsibi...
質問191 An organization recently experienced a phishing attack that ...
質問192 Which of the following is the BEST way to control the concur...
質問193 Which of the following it BEST enabled by following a config...
質問194 Due to cost restraints, a company defers the replacement of ...
質問195 An organization has established hiring policies and procedur...
質問196 An IS auditor is a member of an application development team...
質問197 What is an IS auditor's BEST recommendation to management if...
質問198 An organization allows employees to use personally owned mob...
質問199 Which of the following group is MOST likely responsible for ...
質問200 An IS auditor performing an application development review a...
質問201 An audit team has a completed schedule approved by the audit...
質問202 Which of the following would be MOST important to update onc...
質問203 Which of the following would be MOST helpful when assessing ...
質問204 Which of the following should the IS auditor do FIRST to ens...
質問205 Which of the following is the PRIMARY responsibility of an i...
質問206 An IT department installed critical patches provided by the ...
質問207 An IS auditor plans to review all access attempts to a video...
質問208 Which of the following should an IS auditor recommend to fac...
質問209 Which of the following is the MOST appropriate action to for...
質問210 The risk that the IS auditor will not find an error that has...
質問211 Which of the following is the BEST physical security solutio...
質問212 An organization has implemented an automated match between p...
質問213 An IS auditor is assessing an organization's data loss preve...
質問214 Which of the following is the PRIMARY objective of the IS au...
質問215 Which of the following is the GREATEST concern with conducti...
質問216 To help ensure the organization s information assets are ade...
質問217 Which of the following is MOST likely to be prevented by a f...
質問218 Of the following, who should authorize a project management ...
質問219 MOST effective way to determine if IT is meeting business re...
質問220 Previous audits have found that a large organization has had...
質問221 Which of the following provides the BEST evidence of the eff...
質問222 Buffer overflow in an Internet environment is of particular ...
質問223 Which of ihe following should be done FIRST to effectively d...
質問224 Capacity management enables organizations to:...
質問225 An airlines online booking system uses an automated script t...
質問226 When reviewing the effectiveness of data center operations, ...
質問227 Which of the following is MOST important for an IS auditor t...
質問228 Which of the following BEST demonstrates to an IS auditor th...
質問229 Which of the following should be of GREATEST concern to an I...
質問230 An organization is developing data classification standards ...
質問231 When an organization is having new software implemented unde...
質問232 Which of the following is MOST likely to be included in a po...
質問233 During an audit, it is discovered that several suppliers wit...
質問234 Which of the following is the BEST type of backup to minimiz...
質問235 An IS auditor auditing the effectiveness of utilizing a hot ...
質問236 Which of the following activities would allow an IS auditor ...
質問237 An IS auditor is reviewing the upgrading of an operating sys...
質問238 An IS auditor has completed a review of an outsourcing agree...
質問239 An IS auditor has performed an agreed-upon procedures engage...
質問240 Which of the following is MOST important for an IS auditor t...
質問241 Which of the following would be the GREATEST concern to an I...
質問242 Which of the following types of controls would BEST facilita...
質問243 In a decentralized organization, the selection and purchase ...
質問244 An IS auditor is using data analytics in an audit and has ob...
質問245 Which of the following is the MOST efficient solution for a ...
質問246 An organization s data retention policy states that all data...
質問247 The BEST method an organization can employ to align its busi...
質問248 For an organization which uses a VoIP telephony system exclu...
質問249 An IS auditor discovers instances where software with the sa...
質問250 Which of the following access rights in the production envir...
質問251 During a database audit, an IS auditor notes frequent proble...
質問252 An IS auditor concludes that a local area network (LAN) acce...
質問253 Which of the following could be determined by an entity-rela...
質問254 Which of the following is MOST important for an IS auditor t...
質問255 Which of the following is the MOST effective way for an IS a...
質問256 The MAIN reason an organization's incident management proced...
質問257 Which of the following should be performed FIRST when prepar...
質問258 Attribute sampling is BEST suited to estimate:...
質問259 An IS Auditor is performing a business continuity plan (BCP)...
質問260 Which of the following activities is MOST important to consi...
質問261 Which of ihe following is the BEST way to control scope cree...
質問262 When preparing to evaluate the effectiveness of an organizat...
質問263 Which of the following system deployments requires the cloud...
質問264 Which of the following IS functions can be performed by the ...
質問265 What is the PRIMARY advantage of prototyping as part of syst...
質問266 Which of the following is MOST important for an IS auditor t...
質問267 When introducing a maturity model to the IT management proce...
質問268 While performing a risk-based audit, which of the following ...
質問269 Which of the following is BEST addressed when using a timest...