ISACA.CISA.v2020-10-13.q299

試験コード:CISA
試験名称:Certified Information Systems Auditor
認証ベンダー:ISACA
無料問題の数:299
バージョン:v2020-10-13
等級:
ページの閲覧量:327
問題集の閲覧量:11002
テストを始める

有効的なCISA問題集はPasstest.jp提供され、CISA試験に合格することに役に立ちます!Passtest.jpは今最新CISA試験問題集を提供します。Passtest.jp CISA試験問題集はもう更新されました。ここでCISA問題集のテストエンジンを手に入れます。

最新版のアクセス
855問、30% ディスカウント、特別な割引コード:JPNshiken

コメントを発表する

あなたのメールアドレスは公開されません。必要な部分に * が付きます。

その他のバージョン
318 viewsISACA.CISA.v2021-01-03.q362
659 viewsISACA.CISA.v2020-10-27.q362
435 viewsISACA.CISA.v2020-10-23.q332
418 viewsISACA.CISA.v2020-10-09.q270
429 viewsISACA.CISA.v2020-09-15.q230
397 viewsISACA.CISA.v2020-09-07.q269
353 viewsISACA.CISA.v2020-08-13.q267
345 viewsISACA.CISA.v2020-07-31.q194
432 viewsISACA.CISA.v2020-03-25.q120
783 viewsISACA.CISA.v2020-02-05.q100
877 viewsISACA.CISA.v2019-05-09.q750
560 viewsISACA.CISA.v2019-05-08.q750
809 viewsISACA.CISA.v2019-02-23.q896
517 viewsISACA.CISA.v2019-02-20.q896
784 viewsISACA.CISA.v2018-10-27.q803
460 viewsISACA.CISA.v2018-08-12.q802
423 viewsISACA.CISA.v2018-07-02.q770
792 viewsISACA.CISA.v2018-09-19.q770
713 viewsISACA.Cisa.v2018-02-25.q1069
1204 viewsISACA.CISA.v2017-11-28.q1100
質問一覧
質問1 The PRIMARY purpose of an internal audit department's qualit...
質問2 An IS auditor has assessed a payroll service provider's secu...
質問3 Which of the following is the BEST way to reduce the risk of...
質問4 Privileged account access is require to start an ad hoc batc...
質問5 An IS auditor discovers that validation controls in a web ap...
質問6 When reviewing the effectiveness of data center operations, ...
質問7 Which of the following should be reviewed as part of a data ...
質問8 Which of the following is the BEST reason to utilize blockch...
質問9 Which of the following would BEST detect logic bombs in new ...
質問10 An IS auditor is asked to review a large organization's chan...
質問11 An organization using instant messaging to communicate with ...
質問12 An IS auditor is analysing a sample of assesses recorded on ...
質問13 An IS auditor is conducting a pre-implementation review to d...
質問14 Which of the following would BEST enable effective IT resour...
質問15 Which of the following is the MOST significant concerns when...
質問16 Buffer overflow in an Internet environment is of particular ...
質問17 Which of the following is an example of audit risk?...
質問18 Which of the following BEST describes a common risk in imple...
質問19 In a small organization, an IS auditor finds that security a...
質問20 Two organizations will share ownership of a new enterprise r...
質問21 Which of the following access control situations represents ...
質問22 Following the sale of a business division, employees will be...
質問23 Which of the following would be of MOST concern during an au...
質問24 The CIO of an organization is concerned that the information...
質問25 Which of the following activities is MOST important to consi...
質問26 Which of the following is a substantive test procedure?...
質問27 An IS audit report highlighting inadequate network internal ...
質問28 Which of the following would be the MOST effective method to...
質問29 When testing segregation of duties, which of the following a...
質問30 The objectives of business process improvement should PRIMAR...
質問31 Which of the following would BEST assist senior management i...
質問32 Which of the following is an IS auditor's BEST course of act...
質問33 In assessing the priority given to systems covered in an org...
質問34 Which of the following should be the PRIMARY consideration f...
質問35 A technology service organization has recently acquired a ne...
質問36 Which of the following is the BEST detective control for a j...
質問37 What is an IS auditor's BEST recommendation to management if...
質問38 When conducting a post implementation review which of the fo...
質問39 Which of the following would provide the MOST assurance that...
質問40 Which of the following sampling techniques is commonly used ...
質問41 Which of the following BEST determines if a batch update job...
質問42 Which of the following is the BEST source for describing the...
質問43 Which of the following stakeholders should be PRIMARILY resp...
質問44 When developing a business continuity plan (BCP), which of t...
質問45 Which of the following is MOST important for an IS auditor t...
質問46 Which of the following should be of GREATEST concern to an I...
質問47 Which of the following would provide the BEST evidence for u...
質問48 Which of the following activities should an IS auditor perfo...
質問49 When reviewing business continuity plan (BCP) test results, ...
質問50 Which of the following access rights in the production envir...
質問51 An organization using development operations (DevOps) proces...
質問52 An IS auditor discovers instances where software with the sa...
質問53 Which of the following is MOST important for the successful ...
質問54 Within a payroll department, which of the following responsi...
質問55 Which of the following is the GREATEST risk posed by denial-...
質問56 A security review reveals an organization b struggling with ...
質問57 Which the following is MOST critical for the effective imple...
質問58 The performance of an order-processing system can be measure...
質問59 An organization recently experienced a phishing attack that ...
質問60 Which of the following would be MOST helpful when assessing ...
質問61 Reorganization of databases is undertaken PRIMARILY to:...
質問62 When developing a business continuity plan (BCP) business un...
質問63 Which of the following controls MOST effectively reduces the...
質問64 A company laptop has been stolen and all photos on the lapto...
質問65 During an audit, which of the following would be MOST helpfu...
質問66 An organization has agreed to perform remediation related to...
質問67 A company has implemented an IT segregation of duties policy...
質問68 Which of the following is MOST likely to be prevented by a f...
質問69 Which of the following BEST supports an organization's plann...
質問70 An accounts receivable data entry routine prevents the entry...
質問71 Which of the following should the IS auditor do FIRST to ens...
質問72 What is the MOST difficult aspect of access control in a mul...
質問73 When preparing to evaluate the effectiveness of an organizat...
質問74 Which of the following is the PRIMARY responsibility of an o...
質問75 An organization transmits large amount of data from one inte...
質問76 Which of the following would be the GREATEST concern to an I...
質問77 In reviewing the project timeline for a significant applicat...
質問78 The MAJOR reason for segregating test programs from producti...
質問79 An IS auditor has discovered that unauthorized customer mana...
質問80 After the release of an application system, an IS auditor wa...
質問81 Which of the following is MOST likely to improve the portabi...
質問82 Which of the following would MOST effectively minimize the r...
質問83 During an audit of an organization s incident management pro...
質問84 An IS auditor reviews change control tickets and finds an em...
質問85 Which of the following is a reason for implementing a decent...
質問86 Which of the following observations should be of concern to ...
質問87 An organization is considering replacing physical backup tap...
質問88 Which of the following is the MOST important factor when an ...
質問89 A review of Internet security disclosed that users have indi...
質問90 Which of the following roles combined with the role of a dat...
質問91 Which of the following would MOST effectively and executive ...
質問92 In a decentralized organization, the selection and purchase ...
質問93 Which of the following is the PRIMARY advantage of using vir...
質問94 Which of the following is the GREATEST risk associated with ...
質問95 The PRIMARY advantage of object oriented technology is enhan...
質問96 Which of the following is the BEST time for an IS auditor to...
質問97 Which of the following should an IS auditor use when verifyi...
質問98 When conducting a follow-up audit on an organization s firew...
質問99 An IS auditor discovers that management has created a system...
質問100 When migrating critical systems to a cloud provider, the GRE...
質問101 Which of the following is a key success factor for implement...
質問102 To ensure the integrity of a recovered database, which of th...
質問103 An IS auditor is using data analytics for an accounts payabl...
質問104 Which of the following is the MOST appropriate document for ...
質問105 The risk that is created if a single sign-on is implemented ...
質問106 An IS auditor concludes that a local area network (LAN) acce...
質問107 An organization has implemented a distributed security admin...
質問108 Which of the following is the PRIMARY benefit of including I...
質問109 Which of the following is MOST important for an IS auditor t...
質問110 An audit group is conducting a risk assessment as part of a ...
質問111 An IS auditor concludes that a local area network's (LAN's) ...
質問112 Which of the following BEST enables an audit department to i...
質問113 An IS auditor has completed a service level management audit...
質問114 An organization is in the process of deciding whether to all...
質問115 What is the BEST way for an IS auditor to address the risk a...
質問116 Which of the following control? MOST efficiently ensures tha...
質問117 An organization allows employees to use personally owned mob...
質問118 As part of business continuity planning. Which of the follow...
質問119 To test the integrity of the data in the accounts receivable...
質問120 A bank is selecting a server for its retail accounts applica...
質問121 When using a wireless device, which of the following BEST en...
質問122 Which of the following it BEST enabled by following a config...
質問123 An organization has outsourced its data leakage monitoring t...
質問124 An IS auditor is using data analytics in an audit and has ob...
質問125 Which of the following access fights presents the GREATEST r...
質問126 Which of the following should an IS auditor verify when audi...
質問127 An IS auditor learns a server administration team regularly ...
質問128 Which of the following will BEST help to ensure that an in-h...
質問129 Which of the following should an IS auditor recommend as MOS...
質問130 During a follow-up audit, an IS auditor finds that some crit...
質問131 An organization performs nightly backups but does not have a...
質問132 Which of the following is MOST important for an IS auditor t...
質問133 An organization s data retention policy states that all data...
質問134 An IS auditor discovered abnormalities in a monthly report g...
質問135 A 5 year audit plan provides for general audits every year a...
質問136 Which of the following presents the GREATEST security risk t...
質問137 A vendor service level agreement (SLA) requires backup to be...
質問138 Management has agreed to perform multiple remediation action...
質問139 Which of the following is a prerequisite to help ensure that...
質問140 Which of the following is the MOST effective way to minimize...
質問141 Which of the following would be MOST helpful in ensuring sec...
質問142 During a security audit, which of the following is MOST impo...
質問143 An organization wants to reuse company-provided smartphones ...
質問144 An IS auditor was involved in the design phase for a new sys...
質問145 Which of the following could be used to evaluate the effecti...
質問146 Which of the following is the BEST time for an IS auditor to...
質問147 Which of the following would be the MOST likely reason for a...
質問148 Following a breach, what is the BEST source to determine the...
質問149 When developing metrics to measure the contribution of IT to...
質問150 As part of a post-implementation review, the BEST way to ass...
質問151 An IS auditor finds the timeliness and depth of information ...
質問152 The information security function in a large organization is...
質問153 A new regulatory standard for data privacy requires an organ...
質問154 An IS auditor discovered that a firewall has more services t...
質問155 The objective of using coding standards for systems developm...
質問156 Which of the following is the MOST appropriate action to for...
質問157 A database is denormalized in order to:...
質問158 Adopting a service-oriented architecture would MOST likely:...
質問159 Which of the following would BEST prevent data from being or...
質問160 An employee transfers from an organization's risk management...
質問161 A retirement system verifies that the field for employee sta...
質問162 When reviewing a contract for a disaster recovery hot site, ...
質問163 An advantage of installing a thin client architecture in a l...
質問164 Which of the following auditing techniques would be used to ...
質問165 A maturity model can be used to aid the implementation of IT...
質問166 An IS auditor finds that confidential company data has been ...
質問167 During an integrated audit at a retail bank, an IS auditor i...
質問168 Which of the following key performance indicators (KPIs) pro...
質問169 When replacing a critical software application, which of the...
質問170 A database administrator (DBA) extracts a user listing for a...
質問171 Which of the following is MOST important for an IS auditor t...
質問172 Which of the following attacks is BEST detected by an intrus...
質問173 An organization was recently notified by its regulatory body...
質問174 An organization has implemented application whitelisting in ...
質問175 Which of the following should be of MOST concern to an IS au...
質問176 Which of the following is the BEST indication of an effectiv...
質問177 The MOST important reason for documenting all aspects of a d...
質問178 A small organization is experiencing rapid growth and plans ...
質問179 select a sample for testing, which must include the 80 large...
質問180 Which of ihe following should be done FIRST to effectively d...
質問181 An organization is currently replacing its accounting system...
質問182 Which of the following is MOST helpful in preventing a syste...
質問183 Which of the following would BEST facilitate the detection o...
質問184 After an external IS audit, which of the following should be...
質問185 While reviewing similar issues in an organization's help des...
質問186 Which of the following components of a scheduling tool BEST ...
質問187 Which of the following is MOST important to include in foren...
質問188 Which of the following should be of concern to an IS auditor...
質問189 An internal audit department recently established a quality ...
質問190 An IS auditor is a member of an application development team...
質問191 Assessments of critical information systems are based on a c...
質問192 Which of the following findings should hr of GREATEST concer...
質問193 A security company and service provider have merged and the ...
質問194 Which of the following are BEST suited for continuous auditi...
質問195 IT help desk statistics show a high number of recurring inci...
質問196 Which type of control is being implemented when a biometric ...
質問197 An IS auditor is reviewing IT policies and found that most p...
質問198 Which of the following controls should be implemented to BES...
質問199 An IS auditor is reviewing the upgrading of an operating sys...
質問200 Which of the following is the PRIMARY advantage of the IT po...
質問201 An organization is choosing key performance indicators (KPIs...
質問202 Which of the following is MOST likely to enable a hacker to ...
質問203 An employee loses a mobile device resulting in loss of sensi...
質問204 Which of the following is MOST influential when defining dis...
質問205 Which of the following is the MOST important consideration w...
質問206 A PRIMARY benefit derived by an organization employing contr...
質問207 Which of the following reflects inadequate segregation of du...
質問208 Which of the following is the MOST likely cause of a success...
質問209 The IS auditor's PRIMARY role in control self-assessment (CS...
質問210 Which of the following is MOST important for an IS auditor t...
質問211 An audit team has a completed schedule approved by the audit...
質問212 During an audit of a mission-critical system hosted in an ou...
質問213 internal IS auditor recommends that incoming accounts payabl...
質問214 During an audit of an organization's financial statements, a...
質問215 An IS auditor finds that the process for removing access for...
質問216 Which of the following is the MOST effective control to mini...
質問217 When an intrusion into an organizations network is detected,...
質問218 An organization's IT security policy states that user ID's m...
質問219 An IS auditor reviewing an incident management process ident...
質問220 What is the purpose of using a write blocker during the acqu...
質問221 During a review of system access, an IS auditor notes that a...
質問222 Which of the following could an IS auditor recommend to impr...
質問223 Which of the following is MOST important to the effective ma...
質問224 Which of the following is the MOST important consideration w...
質問225 Which of the following an IS audit, which of the following t...
質問226 A security review focused on data loss prevention (DLP) reve...
質問227 Which of the following is the BEST physical security solutio...
質問228 Which of the following is the BEST approach to help ensure e...
質問229 Which of the following is the MOST significant obstacle to e...
質問230 An information systems security officer's PRIMARY responsibi...
質問231 Which of the following BEST ensures that only authorized sof...
質問232 Which of the following would be an IS auditor's GREATEST con...
質問233 Which of the following indicates the HIGHEST level of maturi...
質問234 A system administrator recently informed the IS auditor abou...
質問235 An operations manager has recently moved to internal audit W...
質問236 An IS auditor finds ad hoc vulnerability scanning is in plac...
質問237 During a network security review the system log indicates an...
質問238 When auditing the effectiveness of a biometric system, which...
質問239 During an audit of information security procedures of a larg...
質問240 Which of the following is the BEST development methodology t...
質問241 An IS auditor has observed gaps in the data available to the...
質問242 While reviewing an organization s business continuity plan (...
質問243 When reviewing user access to an application containing sens...
質問244 An organization wants to test business continuity using a sc...
質問245 The quality assurance (QA) function should be prevented from...
質問246 Which of the following tasks should be performed during an o...
質問247 Which of the following should an IS auditor be MOST concerne...
質問248 Which of the following provides the MOST assurance that a ne...
質問249 The maturity level of an organization s problem management s...
質問250 An organization has software that is not compliant with data...
質問251 Digital signatures are an effective control method for infor...
質問252 A disk management system's PRIMARY function is to:...
質問253 Which of the following requirements in a document control st...
質問254 An IS auditor determines that an online retailer processing ...
質問255 Which of the following BEST demonstrates to an IS auditor th...
質問256 Which of the following provides the BEST evidence of the eff...
質問257 A review of an organization's IT portfolio revealed several ...
質問258 An IS auditor is evaluating the log management system for an...
質問259 An organization plans to allow third parties to collect cust...
質問260 Which of the following is the PRIMARY concern if a business ...
質問261 Which of the following should be reviewed FIRST when plannin...
質問262 What is an IS auditor's BEST course of action when provided ...
質問263 Which of the following is MOST important for an IS auditor t...
質問264 An auditor is creating an audit program in which the objecti...
質問265 An IS auditor has discovered that a cloud-based application ...
質問266 Which of the following should an IS auditor recommend to red...
質問267 An IS auditor has found that an organization is unable to ad...
質問268 Due to cost restraints, a company defers the replacement of ...
質問269 An IS auditor is reviewing an organization's implementation ...
質問270 Which of the following is the GREATEST concern when an organ...
質問271 mission-critical applications with a low recovery time objec...
質問272 Which of the following would BEST enable alignment of IT wit...
質問273 Which of the following is MOST important to ensure when plan...
質問274 When connecting to an organization's intranet from the Inter...
質問275 During a vulnerability assessment, an IS auditor finds a hig...
質問276 Which of the following should be an IS auditor's PRIMARY con...
質問277 When evaluating the recent implementation of an intrusion de...
質問278 Which of the following could be determined by an entity-rela...
質問279 While planning a security audit, an IS auditor is made aware...
質問280 To help ensure the organization s information assets are ade...
質問281 Internal audit reports should be PRIMARILY written for and c...
質問282 When physical destruction is not practical, which of the fol...
質問283 Both statistical and nonstatistical sampling techniques:...
質問284 maturity model is useful in the assessment of IT service man...
質問285 Which of the following is MOST important for the improvement...
質問286 When designing metrics for information security, the MOST im...
質問287 Which of the following is MOST important for an IS auditor t...
質問288 Which of the following should be the PRIMARY consideration w...
質問289 An IS auditor determines that a business continuity plan has...
質問290 Which of the following is the MOST important process to ensu...
質問291 Which of the following projects would be MOST important to r...
質問292 Which of the following would BEST indicate the effectiveness...
質問293 The prioritization of incident response actions should be PR...
質問294 As part of a mergers and acquisitions activity, an acquiring...
質問295 A recent audit concluded that an organization's information ...
質問296 Which of the following findings should be of MOST concern to...
質問297 During an audit, the client learns that the IS auditor has r...
質問298 Which procedure provides the GREATEST assurance that correct...
質問299 Which of the following communication modes should be of GREA...