ISACA.CISA.v2020-09-15.q230

試験コード:CISA
試験名称:Certified Information Systems Auditor
認証ベンダー:ISACA
無料問題の数:230
バージョン:v2020-09-15
等級:
ページの閲覧量:438
問題集の閲覧量:12582
テストを始める

有効的なCISA問題集はPasstest.jp提供され、CISA試験に合格することに役に立ちます!Passtest.jpは今最新CISA試験問題集を提供します。Passtest.jp CISA試験問題集はもう更新されました。ここでCISA問題集のテストエンジンを手に入れます。

最新版のアクセス
855問、30% ディスカウント、特別な割引コード:JPNshiken

コメントを発表する

あなたのメールアドレスは公開されません。必要な部分に * が付きます。

その他のバージョン
354 viewsISACA.CISA.v2021-01-03.q362
672 viewsISACA.CISA.v2020-10-27.q362
444 viewsISACA.CISA.v2020-10-23.q332
332 viewsISACA.CISA.v2020-10-13.q299
423 viewsISACA.CISA.v2020-10-09.q270
405 viewsISACA.CISA.v2020-09-07.q269
354 viewsISACA.CISA.v2020-08-13.q267
356 viewsISACA.CISA.v2020-07-31.q194
437 viewsISACA.CISA.v2020-03-25.q120
792 viewsISACA.CISA.v2020-02-05.q100
878 viewsISACA.CISA.v2019-05-09.q750
561 viewsISACA.CISA.v2019-05-08.q750
814 viewsISACA.CISA.v2019-02-23.q896
517 viewsISACA.CISA.v2019-02-20.q896
786 viewsISACA.CISA.v2018-10-27.q803
464 viewsISACA.CISA.v2018-08-12.q802
427 viewsISACA.CISA.v2018-07-02.q770
794 viewsISACA.CISA.v2018-09-19.q770
716 viewsISACA.Cisa.v2018-02-25.q1069
1215 viewsISACA.CISA.v2017-11-28.q1100
質問一覧
質問1 Which of the following is the GREATEST risk posed by denial-...
質問2 Which of the following controls will MOST effectively detect...
質問3 Which of the following is the GREATEST concern with conducti...
質問4 Which of the following would be an auditor's GREATEST concer...
質問5 To preserve chain-of-custody following an internal server co...
質問6 Which of the following should the IS auditor use to BEST det...
質問7 ..risk that the IS auditor will not find an error that has o...
質問8 Which of the following provides the BEST evidence of the eff...
質問9 Which of the following is the BEST type of backup to minimiz...
質問10 An organization uses two data centers. Which of the followin...
質問11 Which of the following is the BEST way to control the concur...
質問12 After an external IS audit, which of the following should be...
質問13 While reviewing similar issues in an organization s help des...
質問14 Spreadsheets are used to calculate project cost estimates To...
質問15 When reviewing a disaster recovery plan (DRP) an IS auditor ...
質問16 An IS auditor has discovered that a cloud-based application ...
質問17 During an audit, which of the following would be MOST helpfu...
質問18 Which of the following should be reviewed as part of a data ...
質問19 During an audit of a mission-critical system hosted in an ou...
質問20 Documentation of workaround processes to keep a business fun...
質問21 An IS auditor conducts a review of a third-party vendor's re...
質問22 An IS auditor learns a server administration team regularly ...
質問23 The BEST way to prevent fraudulent payments is to implement ...
質問24 Which of the following scenarios would enable a forensic inv...
質問25 The BEST method an organization can employ to align its busi...
質問26 Which of the following should be an IS auditor's PRIMARY foc...
質問27 Which type of risk would MOST influence the selection of a s...
質問28 mission-critical applications with a low recovery time objec...
質問29 Which of the following could be determined by an entity-rela...
質問30 The MAJOR reason for segregating test programs from producti...
質問31 While reviewing an organization s business continuity plan (...
質問32 The maturity level of an organization s problem management s...
質問33 An IS auditor is involved in the user testing phase of a dev...
質問34 An IS auditor discovered abnormalities in a monthly report g...
質問35 During the planning stage of compliance audit, an IS auditor...
質問36 Due to cost restraints, a company defers the replacement of ...
質問37 What is an IS auditor's BEST recommendation for management i...
質問38 An is auditor discovers a recurring software control process...
質問39 A CIO has asked an IS to implement several security controls...
質問40 An organization allows its employees to use personal mobile ...
質問41 Both statistical and nonstatistical sampling techniques:...
質問42 Which of the following features can be provided only by asym...
質問43 During a network security review the system log indicates an...
質問44 During an ERP post-implementation review, it was noted that ...
質問45 Which of the following procedures should be implemented prio...
質問46 An IS auditor has been asked to advise on the design and imp...
質問47 Which of the following is MOST important for an IS auditor t...
質問48 Which of the following would be MOST important for an IS aud...
質問49 Which of the following is the MOST likely cause of a success...
質問50 An organization has purchased a replacement mainframe comput...
質問51 Before concluding that internal controls can be relied upon,...
質問52 An IS auditor has been asked to audit the proposed acquisiti...
質問53 Which of the following is the BEST indication of an effectiv...
質問54 Which of the following is MOST likely to be prevented by a f...
質問55 An organization considers implementing a system that uses a ...
質問56 While reviewing the project plan for a new system prior to g...
質問57 Which of the following is MOST likely to enable a hacker to ...
質問58 Which of the following is MOST important to consider when cr...
質問59 Which of the following controls is MOST appropriate against ...
質問60 Which of the following should be the PRIMARY consideration f...
質問61 Which of the following is a key success factor for implement...
質問62 IT service engineers at a large organization are unable to e...
質問63 An organization has implemented a control to help ensure dat...
質問64 An IS auditor finds that periodic reviews of read-only users...
質問65 The scheduling of audit follow-ups should be based PRIMARILY...
質問66 The quality assurance (QA) function should be prevented from...
質問67 An IS auditor observes an organization is performing data ba...
質問68 An IS audit manager finds that data manipulation logic devel...
質問69 Which of the following provides an IS auditor the MOST assur...
質問70 Which of the following is the BEST detective control for a j...
質問71 Which of the following is the MOST effective control to ensu...
質問72 Which of the following should be of concern to an IS auditor...
質問73 Which of the following is MOST likely to result from complia...
質問74 What is the PRIMARY benefit of prototyping as a method of sy...
質問75 A sales representative is reviewing the organization's feedb...
質問76 Management decided to accept the residual risk of an audit f...
質問77 Loss-site scripting (XSS) attacks are BEST prevented through...
質問78 Which of the following will BEST protect the confidentiality...
質問79 Which of the following is the PRIMARY role of an IS auditor ...
質問80 To ensure efficient and economic use of limited resources in...
質問81 To create a digital signature in a message using asymmetric ...
質問82 Which of the following is MOST important to ensure when plan...
質問83 The IS auditor's PRIMARY role in control self-assessment (CS...
質問84 Which of the following BEST provides continuous availability...
質問85 Digital signatures are an effective control method for infor...
質問86 An organization has established hiring policies and procedur...
質問87 A typical network architecture used for e-commerce, a load b...
質問88 When designing metrics for information security, the MOST im...
質問89 Which of the following provides the GREATEST assurance that ...
質問90 During audit planning, an IS auditor walked through the desi...
質問91 An IS auditor is evaluating the log management system for an...
質問92 An IS auditor has found that a vendor has gone out of busine...
質問93 Which of the following is a detective control?...
質問94 To confirm integrity for a hashed message, the receiver shou...
質問95 An IS auditor can BEST help management fulfill risk manageme...
質問96 An organization has implemented an automated match between p...
質問97 Which of the following IS audit findings should be of GREATE...
質問98 An intruder accesses an application server and makes changes...
質問99 A vulnerability in which of the following virtual systems wo...
質問100 Which of the following methodologies is MOST appropriate to ...
質問101 An organization allows employees to use personally owned mob...
質問102 Which of the following would an IS auditor recommend as the ...
質問103 Which of the following is MOST important for an IS auditor t...
質問104 Which of the following is a reason for implementing a decent...
質問105 An organization was recently notified by its regulatory body...
質問106 Which of the following group is MOST likely responsible for ...
質問107 Capacity management enables organizations to:...
質問108 Which of the following is the GREATEST risk resulting from c...
質問109 Which of the following is corrective control?...
質問110 A PRIMARY benefit derived by an organization employing contr...
質問111 Due to the small size of the payroll department, an organiza...
質問112 Which of the following is BEST addressed when using a timest...
質問113 An IS auditor has completed a review of an outsourcing agree...
質問114 Which of the following is a directive control?...
質問115 Which of the following is the BEST way to facilitate proper ...
質問116 Which of the following is MOST important for an IS auditor t...
質問117 Which of the following is the BEST reason for an organizatio...
質問118 When introducing a maturity model to the IT management proce...
質問119 Nonrepudiation of the client for e-commerce transactions is ...
質問120 What is the MOST important business concern when an organiza...
質問121 A company has implemented an IT segregation of duties policy...
質問122 An organization offers an online information security awaren...
質問123 The demilitarized zone (DMZ) is the part of a network where ...
質問124 Which of the following is MOST important to include in a bus...
質問125 At a project steering committee meeting, it is stated that a...
質問126 An IS auditor concludes that a local area network's (LAN's) ...
質問127 Which of the following would BEST indicate the effectiveness...
質問128 An employee transfers from an organization's risk management...
質問129 Which of the following should be an IS auditor's PRIMARY con...
質問130 A review of an organization's IT portfolio revealed several ...
質問131 During an audit, it is discovered that several suppliers wit...
質問132 During an audit of a data center, an IS auditor's BEST way t...
質問133 A large insurance company is about to replace a major financ...
質問134 Which of the following entities is BEST suited to define the...
質問135 Which of the following is the BEST approach to identify whet...
質問136 Which of the following BEST determines if a batch update job...
質問137 On a daily basis, an in-house development team moves duplica...
質問138 Which of the following controls should be implemented to BES...
質問139 Which of the following should be of GREATEST concern to an I...
質問140 MOST critical security weakness of a packet level firewall i...
質問141 A user of a telephone banking system has forgotten his perso...
質問142 An auditor is creating an audit program in which the objecti...
質問143 Which of the following is the BEST source of information whe...
質問144 An organization implements a data loss prevention tool as a ...
質問145 An organization wants to test business continuity using a sc...
質問146 Software quality assurance (QA) reviews are planned as part ...
質問147 The BEST data backup strategy for mobile users is to:...
質問148 Which of the following controls would BEST ensure that payro...
質問149 To BEST evaluate the effectiveness of a disaster recovery pl...
質問150 The GREATEST risk of database renormalization is:...
質問151 An employee loses a mobile device resulting in loss of sensi...
質問152 The objectives of business process improvement should PRIMAR...
質問153 Which of the following protects against the impact of tempor...
質問154 The grants management system is used to calculate grant paym...
質問155 Which of the following is the GREATEST concern associated wi...
質問156 An organization has installed blade server technology in its...
質問157 Which of the following is the MOST important consideration w...
質問158 Which of the following should be of MOST concern to an IS au...
質問159 Which of the following cloud deployment models would BEST me...
質問160 While performing a risk-based audit, which of the following ...
質問161 Which of the following a the MOST important prerequisite for...
質問162 An IS auditor notes that the anticipated benefits from an on...
質問163 An IS auditor has assessed a payroll service provider's secu...
質問164 To help ensure the organization s information assets are ade...
質問165 When engaging services from external auditors, which of the ...
質問166 internal IS auditor recommends that incoming accounts payabl...
質問167 Which of the following would be the PRIMARY benefit of repla...
質問168 An organization's IT security policy requires annual securit...
質問169 During a vulnerability assessment, an IS auditor finds a hig...
質問170 An IS auditor is mapping controls to risk for an accounts pa...
質問171 A 5 year audit plan provides for general audits every year a...
質問172 An IS auditor is analysing a sample of assesses recorded on ...
質問173 Which of the following should be of GREATEST concern to an I...
質問174 Which of the following would be the MOST appropriate reason ...
質問175 Which of the following is the MOST important requirement for...
質問176 What is the FIRST step an auditor should take when beginning...
質問177 The MOST efficient way to confirm that an ERP system being i...
質問178 An IS auditor conducting audit follow-up activities learns t...
質問179 Which of the following should be reviewed FIRST when plannin...
質問180 An IS auditor is conducting a review of an organization s in...
質問181 Which of the following IS audit recommendations would BEST h...
質問182 Which of the following components of a scheduling tool BEST ...
質問183 Which of the following would BEST detect logic bombs in new ...
質問184 Which of the following are BEST suited for continuous auditi...
質問185 When determining the specifications for a server supporting ...
質問186 Which of the following is the PRIMARY benefit of including I...
質問187 A legacy application is running on an operating system that ...
質問188 Which of the following would be MOST helpful when assessing ...
質問189 The risk that the IS auditor will not find an error that has...
質問190 After the release of an application system, an IS auditor wa...
質問191 Which of the following would BEST detect that a distributed-...
質問192 The use of the Transport Layer Security (TLS) protocol enabl...
質問193 An IS auditor is reviewing the upgrading of an operating sys...
質問194 An organization is in the process of deciding whether to all...
質問195 Which of the following activities is MOST important to consi...
質問196 ..control that MOST effectively addresses the risk of piggyb...
質問197 Which of the following sampling techniques is commonly used ...
質問198 Which of the following would be the MOST likely reason for a...
質問199 An IS auditor auditing the effectiveness of utilizing a hot ...
質問200 As part of business continuity planning. Which of the follow...
質問201 An IT governance framework provides an organization with:...
質問202 An IS auditor has completed a service level management audit...
質問203 Which of the following a recent internal data breach, an IS ...
質問204 Which of the following management decisions presents the GRE...
質問205 Which of the following is a prerequisite to help ensure that...
質問206 Following a security breach, in which a hacker exploited a w...
質問207 What is the GREASTEST concern for an IS auditory reviewing c...
質問208 Which of the following findings should be of MOST concern to...
質問209 As part of an IS audit, the auditor notes the practices list...
質問210 A database administrator (DBA) extracts a user listing for a...
質問211 Inherent risk rating are determined by assessing the impact ...
質問212 An organization using instant messaging to communicate with ...
質問213 Which of the following is the PRIMARY advantage of single si...
質問214 An organization is replacing its financial processing system...
質問215 An organization has decided to migrate payroll processing to...
質問216 Which of the following is an example of audit risk?...
質問217 When conducting a requirements analysis for a project, the B...
質問218 Which of the following is the MOST significant concerns when...
質問219 An airlines online booking system uses an automated script t...
質問220 During a review of an application system, an IS auditor iden...
質問221 Which of the following should an IS auditor be MOST concerne...
質問222 Intrusion detection systems (IDSs) can:...
質問223 An organization is considering replacing physical backup tap...
質問224 When auditing a quality assurance plan, an IS auditor should...
質問225 An IS auditor is a member of an application development team...
質問226 An IS auditor plans to review all access attempts to a video...
質問227 During business process reengineering (BPR) of a bank's tell...
質問228 Which of the following would BEST assist senior management i...
質問229 Due to the increasing size of a database, user access times ...
質問230 Which of the following is MOST important when an incident ma...