ISACA.CISA.v2020-10-23.q332

試験コード:CISA
試験名称:Certified Information Systems Auditor
認証ベンダー:ISACA
無料問題の数:332
バージョン:v2020-10-23
等級:
ページの閲覧量:492
問題集の閲覧量:15726
テストを始める

有効的なCISA問題集はPasstest.jp提供され、CISA試験に合格することに役に立ちます!Passtest.jpは今最新CISA試験問題集を提供します。Passtest.jp CISA試験問題集はもう更新されました。ここでCISA問題集のテストエンジンを手に入れます。

最新版のアクセス
855問、30% ディスカウント、特別な割引コード:JPNshiken

コメントを発表する

あなたのメールアドレスは公開されません。必要な部分に * が付きます。

その他のバージョン
494 viewsISACA.CISA.v2021-01-03.q362
721 viewsISACA.CISA.v2020-10-27.q362
357 viewsISACA.CISA.v2020-10-13.q299
458 viewsISACA.CISA.v2020-10-09.q270
462 viewsISACA.CISA.v2020-09-15.q230
417 viewsISACA.CISA.v2020-09-07.q269
361 viewsISACA.CISA.v2020-08-13.q267
367 viewsISACA.CISA.v2020-07-31.q194
448 viewsISACA.CISA.v2020-03-25.q120
819 viewsISACA.CISA.v2020-02-05.q100
882 viewsISACA.CISA.v2019-05-09.q750
565 viewsISACA.CISA.v2019-05-08.q750
838 viewsISACA.CISA.v2019-02-23.q896
519 viewsISACA.CISA.v2019-02-20.q896
796 viewsISACA.CISA.v2018-10-27.q803
479 viewsISACA.CISA.v2018-08-12.q802
440 viewsISACA.CISA.v2018-07-02.q770
798 viewsISACA.CISA.v2018-09-19.q770
731 viewsISACA.Cisa.v2018-02-25.q1069
1255 viewsISACA.CISA.v2017-11-28.q1100
質問一覧
質問1 Which of the following is the MOST significant concerns when...
質問2 An IS auditor suspects an organization's computer may have b...
質問3 An IS auditor finds the timeliness and depth of information ...
質問4 An enterprise receiving email should have procedures to cont...
質問5 Which of the following is the MOST effective mechanism for e...
質問6 Which of the following documents would be MOST useful in det...
質問7 During a vulnerability assessment, an IS auditor finds a hig...
質問8 Which of the following is the BEST physical security solutio...
質問9 An IS auditor identifies key controls that have been overrid...
質問10 Which of the following occurs during the issues management p...
質問11 Which of the following would BEST detect that a distributed-...
質問12 Which of the following should be an IS auditor's FIRST activ...
質問13 Which of the following would be MOST helpful in ensuring sec...
質問14 A development team has designed a new application and incorp...
質問15 Which of the following is the BEST reason to perform root ca...
質問16 An IS auditor discovers that management has created a system...
質問17 A security administrator should have read-only access for wh...
質問18 Which of the following controls would BEST decrease the expo...
質問19 An organization has outsourced its data processing function ...
質問20 Which of the following is MOST important for an IS auditor t...
質問21 When introducing a maturity model to the IT management proce...
質問22 When determining the specifications for a server supporting ...
質問23 Which of the following roles combined with the role of a dat...
質問24 Which of the following is MOST important when an incident ma...
質問25 When physical destruction is not practical, which of the fol...
質問26 When auditing a quality assurance plan, an IS auditor should...
質問27 An IS auditor reviewing security incident processes realizes...
質問28 Which function in the purchasing module of an enterprise res...
質問29 Which of the following procedures should an IS auditor compl...
質問30 Which of the following should be a PRIMARY control objective...
質問31 An audit team has a completed schedule approved by the audit...
質問32 A database is denormalized in order to:...
質問33 Audit management has just completed the annual audit plan fo...
質問34 Which of the following is MOST important for the IS auditor ...
質問35 Which of the following is MOST important in the audit qualit...
質問36 Which of the following is MOST important when planning a net...
質問37 The quality assurance (QA) function should be prevented from...
質問38 Which of the following is the PRIMARY role of an IS auditor ...
質問39 Communicating which of the following would BEST encourage ma...
質問40 An organization is using a single account shared by personne...
質問41 When reviewing a disaster recovery plan (DRP) an IS auditor ...
質問42 Which of the following data would be used when performing a ...
質問43 Which of the following methods should be used to effectively...
質問44 A legacy application is running on an operating system that ...
質問45 Which of the following would provide the BEST evidence for a...
質問46 Which of the following should the IS auditor do FIRST to ens...
質問47 The recovery time objective (RTO) is normally determined on ...
質問48 Which of the following would provide the BEST assurance that...
質問49 When engaging services from external auditors, which of the ...
質問50 The MAIN reason an organization's incident management proced...
質問51 To help ensure the accuracy and completeness of end-user com...
質問52 An audit committee is reviewing an annual IT risk assessment...
質問53 A database administrator (DBA) extracts a user listing for a...
質問54 A large insurance company is about to replace a major financ...
質問55 Which of the following findings would have the GREATEST impa...
質問56 Which of the following would be MOST important to update onc...
質問57 Which of the following provides an IS auditor the MOST assur...
質問58 Reviewing which of the following would be MOST helpful in as...
質問59 Which of the following is the BEST key performance indicator...
質問60 During an audit, which of the following would be MOST helpfu...
質問61 During a network security review the system log indicates an...
質問62 Which of the following is MOST important to include in a con...
質問63 Which of the following is a key success factor for implement...
質問64 Buffer overflow in an Internet environment is of particular ...
質問65 A post-implementation review of a system implementation has ...
質問66 During a help desk review, an IS auditor determines the call...
質問67 Which of the following is MOST important to include in foren...
質問68 What is an IS auditor's BEST recommendation to management if...
質問69 Which of the following would provide the BEST evidence of su...
質問70 Which of the following would BEST detect logic bombs in new ...
質問71 MOST effective way to determine if IT is meeting business re...
質問72 An IS auditor is planning a risk-based audit of the human re...
質問73 An IS auditor learns that after each scheduled batch process...
質問74 The operations team of an organization has reported an IS se...
質問75 An IS auditor is examining a front-end sub ledger and a main...
質問76 Which of the following findings should hr of GREATEST concer...
質問77 An IS auditor notes that several users have not logged into ...
質問78 In which of the following cloud service models does the user...
質問79 In the IT department where segregation of duties is not feas...
質問80 An IS auditor is assessing a recent migration of mission cri...
質問81 An IS auditor is planning an audit of an organization s payr...
質問82 As part of an IS audit, the auditor notes the practices list...
質問83 Due to the increasing size of a database, user access times ...
質問84 To confirm integrity for a hashed message, the receiver shou...
質問85 A retirement system verifies that the field for employee sta...
質問86 An IS auditor is conducting a review of an organization s in...
質問87 Which of the following is the MOST critical characteristic o...
質問88 Previous audits have found that a large organization has had...
質問89 Which of the following poses the GREATEST risk to data secur...
質問90 Which of the following should be done FIRST when planning a ...
質問91 An advantage of object-oriented system development is that i...
質問92 Which of the following IS audit findings should be of GREATE...
質問93 Which of the following would be the MOST effective control t...
質問94 In a decentralized organization, the selection and purchase ...
質問95 When conducting a requirements analysis for a project, the B...
質問96 Which of the following is the KST source of information for ...
質問97 Which of the following would BEST prevent data from being or...
質問98 Which combination of access controls provides the BEST physi...
質問99 Which of the following is MOST important to helping incident...
質問100 An IS Auditor is performing a business continuity plan (BCP)...
質問101 Which of the following would BEST indicate the effectiveness...
質問102 For an organization which uses a VoIP telephony system exclu...
質問103 An IS auditor is assessing an organization's implementation ...
質問104 Which of the following is the GREATEST risk resulting from c...
質問105 Which of the following is the MAIN purpose of implementing a...
質問106 Which of the following attacks is BEST detected by an intrus...
質問107 An IS audit had identified that default passwords for a newl...
質問108 An IS auditor should ensure that an application's audit trai...
質問109 Within a payroll department, which of the following responsi...
質問110 When auditing the security architecture of an e-commerce env...
質問111 Which of the following BEST enables timely detection of chan...
質問112 An IS auditor is evaluating a virtual server environment and...
質問113 Which of the following procedures would BEST contribute to t...
質問114 An IS auditor finds ad hoc vulnerability scanning is in plac...
質問115 A sales representative is reviewing the organization's feedb...
質問116 An IS auditor is observing transaction processing and notes ...
質問117 Which of the following will BEST help to ensure that an in-h...
質問118 A potential risk of executing a program on an Internet site ...
質問119 An IS auditor was involved in the design phase for a new sys...
質問120 Which of the following should the IS auditor use to BEST det...
質問121 Which of the following is a reason for implementing a decent...
質問122 Which of the following provides the GREATEST assurance that ...
質問123 An organization implements a data loss prevention tool as a ...
質問124 Which of the following would be an IS auditor's GREATEST con...
質問125 Which of the following is the BEST development methodology t...
質問126 During an audit of an organization's financial statements, a...
質問127 Which of the following is MOST important to consider when re...
質問128 An IS auditor found that a company executive is encouraging ...
質問129 An internal audit has revealed a large number of incidents f...
質問130 Which of the following areas are the MOST likely cause of an...
質問131 An IS auditor has identified that some IT staff have adminis...
質問132 Which of the following is the GREATEST advantage of implemen...
質問133 Which of the following should be of MOST concern to an IS au...
質問134 An IS auditor has performed an agreed-upon procedures engage...
質問135 An IS auditor reviewing an incident management process ident...
質問136 Spreadsheets are used to calculate project cost estimates To...
質問137 Which of the following should be reviewed as part of a data ...
質問138 Which of the following BEST enables an audit department to i...
質問139 Prior to the migration of acquired software into production,...
質問140 An IS auditor auditing the effectiveness of utilizing a hot ...
質問141 An IS auditor observes that an organization s critical IT sy...
質問142 Which of the following is the MOST effective way for an IS a...
質問143 An IS auditor is reviewing an organization's implementation ...
質問144 Which of the following should MOST concern an IS auditor rev...
質問145 A financial institution suspects that a manager has been cre...
質問146 Which of the following should be of GREATEST concern to an I...
質問147 An organization is moving its on-site application servers to...
質問148 Which of the following is the BEST way to reduce the risk of...
質問149 After the release of an application system, an IS auditor wa...
質問150 During a review of an insurance company s claims system, the...
質問151 The MOST efficient way to confirm that an ERP system being i...
質問152 Of the following procedures for testing a disaster recovery ...
質問153 Which of the following is the MOST significant driver of eff...
質問154 Which of the following key performance indicators (KPIs) pro...
質問155 Reorganization of databases is undertaken PRIMARILY to:...
質問156 An organization is developing a web portal using some extern...
質問157 An employee transfers from an organization's risk management...
質問158 Which of the following requirements in a document control st...
質問159 Privileged account access is require to start an ad hoc batc...
質問160 Which of the following is the GREATEST risk associated with ...
質問161 Which of the following is the GREATEST concern with conducti...
質問162 Which of the following would provide the MOST reliable evide...
質問163 A review of Internet security disclosed that users have indi...
質問164 Which of the following activities would allow an IS auditor ...
質問165 An organization is choosing key performance indicators (KPIs...
質問166 An organization has performance metrics to track how well IT...
質問167 A recent audit identified duplicate software licenses and te...
質問168 Which of the following would BEST facilitate the detection o...
質問169 What is the purpose of using a write blocker during the acqu...
質問170 Which of the following would BEST assist senior management i...
質問171 An IS auditor is assigned to review the development of a spe...
質問172 Which of the following is MOST important for an IS auditor t...
質問173 Which of the following is the MOST effective way to identify...
質問174 An organization has decided to migrate payroll processing to...
質問175 An organization is deciding whether to outsource its custome...
質問176 A security company and service provider have merged and the ...
質問177 Following an IS audit recommendation, all Telnet and File Tr...
質問178 Which of the following is the PRIMARY benefit of implementin...
質問179 Which of the following metrics would BEST measure the agilit...
質問180 Which of the following is the PRIMARY benefit of using an in...
質問181 Which of the following would be an appropriate role of inter...
質問182 When planning for the implementation of a new system, an org...
質問183 Which of the following sampling techniques is commonly used ...
質問184 During an audit, it is discovered that several suppliers wit...
質問185 During an ERP post-implementation review, it was noted that ...
質問186 An IS auditor finds that the process for removing access for...
質問187 A manufacturing company is implementing application software...
質問188 The BEST method an organization can employ to align its busi...
質問189 An IS auditor is using data analytics in an audit and has ob...
質問190 While reviewing similar issues in an organization s help des...
質問191 Which of the following is the BEST way to control the concur...
質問192 Which of the following is the MOST important consideration w...
質問193 Using swipe cards to limit employee access to restricted are...
質問194 Which of the following provides the BEST audit evidence that...
質問195 MOST critical security weakness of a packet level firewall i...
質問196 The grants management system is used to calculate grant paym...
質問197 The BEST way to prevent fraudulent payments is to implement ...
質問198 Which of the following controls can BEST detect accidental c...
質問199 Which of the following should be the PRIMARY consideration w...
質問200 While reviewing an organization s business continuity plan (...
質問201 Which of the following should an IS auditor be MOST concerne...
質問202 Which of the following is the MOST effective means of helpin...
質問203 internal IS auditor recommends that incoming accounts payabl...
質問204 An airlines online booking system uses an automated script t...
質問205 Which of the following system deployments requires the cloud...
質問206 An organization is replacing a mission-critical system. Whic...
質問207 An organization using instant messaging to communicate with ...
質問208 Which of the following would represent an acceptable test of...
質問209 Which of the following is the BEST IS audit strategy?...
質問210 Which of the following is the FIRST consideration when devel...
質問211 An IS auditor notes that the anticipated benefits from an on...
質問212 An IS auditor is reviewing an organization's method to trans...
質問213 Which of the following is the MOST important reason for upda...
質問214 Which of the following should an IS auditor do FIRST when de...
質問215 Which of the following should be an IS auditor's PRIMARY foc...
質問216 The demilitarized zone (DMZ) is the part of a network where ...
質問217 A system administrator recently informed the IS auditor abou...
質問218 In a small organization, an IS auditor finds that security a...
質問219 Which of the following is the MOST important process to ensu...
質問220 What is the MOST important role of a certificate authority (...
質問221 Which of the following is MOST likely to result from complia...
質問222 Which of the following is corrective control?...
質問223 The CIO of an organization is concerned that the information...
質問224 As part of a mergers and acquisitions activity, an acquiring...
質問225 An IS auditor is assessing an organization's data loss preve...
質問226 During a review of system access, an IS auditor notes that a...
質問227 After an external IS audit, which of the following should be...
質問228 Which of the following would BEST enable alignment of IT wit...
質問229 An IS auditor discovers that validation controls in a web ap...
質問230 During an audit, the client learns that the IS auditor has r...
質問231 An organization uses two data centers. Which of the followin...
質問232 When testing segregation of duties, which of the following a...
質問233 To restore service at a large processing facility after a di...
質問234 Which of the following BEST indicates the effectiveness of a...
質問235 When designing a data analytics process, which of the follow...
質問236 When an organization is having new software implemented unde...
質問237 Which of the following would BEST facilitate the successful ...
質問238 A small organization is experiencing rapid growth and plans ...
質問239 An IS auditor reviewing the acquisition of new equipment wou...
質問240 When preparing to evaluate the effectiveness of an organizat...
質問241 An operations manager has recently moved to internal audit W...
質問242 Which of the following tasks should be performed during an o...
質問243 An organization with high security requirements is evaluatin...
質問244 Which of the following stakeholders should be PRIMARILY resp...
質問245 A government organization uses standard Wi-Fi Protected Acce...
質問246 An IS auditor notes that a number of application plug-ins cu...
質問247 An IS auditor notes that due to the small size of the organi...
質問248 Which of the following cloud deployment models would BEST me...
質問249 To effectively classify data, which of the following MUST be...
質問250 A technology service organization has recently acquired a ne...
質問251 Which of the following is a prerequisite to help ensure that...
質問252 Which of the following should an IS auditor verify when audi...
質問253 An IS auditor has discovered that unauthorized customer mana...
質問254 Which of the following is an IS auditor s GREATEST concern w...
質問255 Which of the following poses the GREATEST risk to the enforc...
質問256 An IS auditor is evaluating the risks and controls associate...
質問257 An IS auditor notes that help desk personnel are required to...
質問258 An IS auditor performing an application development review a...
質問259 Requiring that passwords contain a combination of numeric an...
質問260 An organization has established three IS processing environm...
質問261 When initiating an IT project, which of the following should...
質問262 Which of the following access rights in the production envir...
質問263 Which of the following is a passive attack on a network?...
質問264 Which of the following is the GREATEST risk associated with ...
質問265 A small startup organization does not have the resources to ...
質問266 Which of the following controls would BEST ensure that payro...
質問267 Which of the following activities is MOST important to consi...
質問268 Which of the following findings should be an IS auditor's GR...
質問269 Which of the following is the BCST way to determine the effe...
質問270 Which of the following auditing techniques would be used to ...
質問271 An information systems security officer's PRIMARY responsibi...
質問272 Which of the following is MOST likely to improve the portabi...
質問273 Which of the following is the BEST evidence that an organiza...
質問274 Which of the following controls is MOST appropriate against ...
質問275 Which of the following is the MOST important consideration w...
質問276 An organization considers implementing a system that uses a ...
質問277 Which of the following should be of GREATEST concern to an I...
質問278 Which of the following is the PRIMARY function of technology...
質問279 Which of the following is MOST important for an IS auditor t...
質問280 Which of the following would be the MOST appropriate reason ...
質問281 Which of the following is the GREATEST risk of cloud computi...
質問282 Which of the following is the BEST way to ensure enterprise ...
質問283 An IS auditor previously worked in an organization s IT depa...
質問284 Loss-site scripting (XSS) attacks are BEST prevented through...
質問285 Which of the following sampling methods is the BEST approach...
質問286 When connecting to an organization's intranet from the Inter...
質問287 Two organizations will share ownership of a new enterprise r...
質問288 Which of the following group is MOST likely responsible for ...
質問289 Which of the following controls MOST effectively reduces the...
質問290 What is the MOST difficult aspect of access control in a mul...
質問291 Following a breach, what is the BEST source to determine the...
質問292 Which of the following would be considered the BEST compensa...
質問293 Which of the following metrics would be MOST helpful to an I...
質問294 As part of business continuity planning. Which of the follow...
質問295 An organization was recently notified by its regulatory body...
質問296 Which of the following is the BEST way to detect potentially...
質問297 Which of the following BEST describes the relationship betwe...
質問298 When reviewing a contract for a disaster recovery hot site, ...
質問299 The PRIMARY purpose of an internal audit department's qualit...
質問300 Which of the following tools is MOST helpful in estimating b...
質問301 An IS auditor would MOST likely recommend that IT management...
質問302 Which of the following BEST determines if a batch update job...
質問303 Which of the following should be of GREATEST concern to an I...
質問304 An IT governance body wants to determine whether IT service ...
質問305 Which of the following helps to ensure the integrity of data...
質問306 Which of the following functions is MOST likely to be perfor...
質問307 An IS auditor performing an audit of backup procedures obser...
質問308 An organization is considering outsourcing the processing of...
質問309 When assessing a business case as part of a post-implementat...
質問310 Which audit technique provides the GREATEST assurance that i...
質問311 Which of the following will BEST ensure that a proper cutoff...
質問312 A digital signature addresses which of the following concern...
質問313 An IS auditor has assessed a payroll service provider's secu...
質問314 The PRIMARY advantage of object oriented technology is enhan...
質問315 An IS auditor plans to review all access attempts to a video...
質問316 Which of the following would MOST effectively and executive ...
質問317 Which of the following is an example of a data analytics use...
質問318 Which of the following is MOST important for an IS auditor t...
質問319 An IS auditor finds that an organization's data loss prevent...
質問320 The risk that the IS auditor will not find an error that has...
質問321 An organization transmits large amount of data from one inte...
質問322 Which of the following presents the GREATEST concern when im...
質問323 Which of the following would be an auditor's GREATEST concer...
質問324 An IS auditor has observed gaps in the data available to the...
質問325 Which of the following communication modes should be of GREA...
質問326 What is the GREASTEST concern for an IS auditory reviewing c...
質問327 In attribute sampling, what is the relationship between expe...
質問328 An IS auditor is planning to audit an organization's infrast...
質問329 Which of the following is the PRIMARY advantage of using vir...
質問330 IT service engineers at a large organization are unable to e...
質問331 An organization recently experienced a phishing attack that ...
質問332 Which of the following is the PRIMARY objective of the IS au...