ISACA.CISA.v2021-01-03.q362

試験コード:CISA
試験名称:Certified Information Systems Auditor
認証ベンダー:ISACA
無料問題の数:362
バージョン:v2021-01-03
等級:
ページの閲覧量:413
問題集の閲覧量:14066
テストを始める

有効的なCISA問題集はPasstest.jp提供され、CISA試験に合格することに役に立ちます!Passtest.jpは今最新CISA試験問題集を提供します。Passtest.jp CISA試験問題集はもう更新されました。ここでCISA問題集のテストエンジンを手に入れます。

最新版のアクセス
855問、30% ディスカウント、特別な割引コード:JPNshiken

最新のコメント (最新のコメントはトップにあります。)

コメントを発表する

あなたのメールアドレスは公開されません。必要な部分に * が付きます。

その他のバージョン
688 viewsISACA.CISA.v2020-10-27.q362
463 viewsISACA.CISA.v2020-10-23.q332
341 viewsISACA.CISA.v2020-10-13.q299
432 viewsISACA.CISA.v2020-10-09.q270
445 viewsISACA.CISA.v2020-09-15.q230
406 viewsISACA.CISA.v2020-09-07.q269
354 viewsISACA.CISA.v2020-08-13.q267
364 viewsISACA.CISA.v2020-07-31.q194
446 viewsISACA.CISA.v2020-03-25.q120
803 viewsISACA.CISA.v2020-02-05.q100
880 viewsISACA.CISA.v2019-05-09.q750
562 viewsISACA.CISA.v2019-05-08.q750
823 viewsISACA.CISA.v2019-02-23.q896
518 viewsISACA.CISA.v2019-02-20.q896
788 viewsISACA.CISA.v2018-10-27.q803
471 viewsISACA.CISA.v2018-08-12.q802
435 viewsISACA.CISA.v2018-07-02.q770
795 viewsISACA.CISA.v2018-09-19.q770
719 viewsISACA.Cisa.v2018-02-25.q1069
1226 viewsISACA.CISA.v2017-11-28.q1100
質問一覧
質問1 An IS auditor has observed gaps in the data available to the...
質問2 An IS auditor finds that a company is using a payroll provid...
質問3 Which of the following is MOST important when an incident ma...
質問4 Which of the following is the FIRST step when conducting a b...
質問5 Which of the following would help to ensure the completeness...
質問6 Which of the following would be the MOST effective method to...
質問7 The MOST efficient way to confirm that an ERP system being i...
質問8 Which of the following is an advantage of decentralized secu...
質問9 Which of the following is an IS auditor's BEST recommendatio...
質問10 Which of the following BEST supports an organization's plann...
質問11 In a small organization, an IS auditor finds that security a...
質問12 Which of the following stakeholders should be PRIMARILY resp...
質問13 Which of the following is the BEST way to facilitate proper ...
質問14 An organization plans to receive an automated data feed into...
質問15 Which of the following should be of MOST concern to an IS au...
質問16 Which of the following would an IS auditor consider to be th...
質問17 To BEST determine if a project is successfully addressing bu...
質問18 Communicating which of the following would BEST encourage ma...
質問19 Within a payroll department, which of the following responsi...
質問20 Which of the following are BEST suited for continuous auditi...
質問21 Which of the following should be restricted from a network a...
質問22 An IS auditor is evaluating the access controls at a multina...
質問23 Which of the following is the MOST important reason to use s...
質問24 An organization that has suffered a cyber attack is performi...
質問25 The prioritization of incident response actions should be PR...
質問26 An IT management group has developed a standardized security...
質問27 A user of a telephone banking system has forgotten his perso...
質問28 Which of the following would BEST facilitate the successful ...
質問29 The PRIMARY purpose for an IS auditor to review previous aud...
質問30 To test the integrity of the data in the accounts receivable...
質問31 What is an IS auditor's BEST recommendation for management i...
質問32 An IS auditor has discovered that a cloud-based application ...
質問33 The scheduling of audit follow-ups should be based PRIMARILY...
質問34 Which of the following MOST efficiently protects computer eq...
質問35 A typical network architecture used for e-commerce, a load b...
質問36 Which of the following would be the MOST effective control t...
質問37 The demilitarized zone (DMZ) is the part of a network where ...
質問38 An advantage of installing a thin client architecture in a l...
質問39 Which of the following BEST provides audit management with a...
質問40 Which of the following projects would be MOST important to r...
質問41 An IS auditor finds that a mortgage origination team receive...
質問42 An internal audit has revealed a large number of incidents f...
質問43 Software quality assurance (QA) reviews are planned as part ...
質問44 Which of the following is an indication of possible hacker a...
質問45 Which function in the purchasing module of an enterprise res...
質問46 Based on the Guidance of internal audit, an IT steering comm...
質問47 Which of the following should be an IS auditor's FIRST activ...
質問48 Stress testing should ideally be carried out under a:...
質問49 While following up on a prior audit report, an IS auditor de...
質問50 Which of the following would provide the BEST evidence of su...
質問51 Which of the following is the BEST source for describing the...
質問52 While evaluating an organization's program for tracking syst...
質問53 An IS auditor finds that periodic reviews of read-only users...
質問54 Which of the following is the MOST significant risk associat...
質問55 One advantage of monetary unit sampling is the fact that:...
質問56 During a disaster recovery audit, an IS auditor finds that a...
質問57 A CIO has asked an IS auditor to implement several security ...
質問58 Which of the following controls should be implemented to BES...
質問59 Which of the following is MOST important for an IS auditor t...
質問60 Which of the following is MOST important for successful inci...
質問61 During audit planning, an IS auditor walked through the desi...
質問62 Which of the following should be of GREATEST concern to an I...
質問63 An IS auditor can BEST help management fulfill risk manageme...
質問64 A region where an organization conducts business has announc...
質問65 When connecting to an organization's intranet from the Inter...
質問66 An IS auditor finds multiple situations where the help desk ...
質問67 Which of the following is the BEST physical security solutio...
質問68 What is the MOST difficult aspect of access control in a mul...
質問69 To preserve chain-of-custody following an internal server co...
質問70 Reviewing which of the following would be MOST helpful in as...
質問71 Which of the following is MOST important to include in an or...
質問72 An IS auditor is performing a post-implementation review of ...
質問73 A review of Internet security disclosed that users have indi...
質問74 A security administrator should have read-only access for wh...
質問75 Due to cost restraints, a company defers the replacement of ...
質問76 To achieve desired objectives, which of the following is MOS...
質問77 Which of the following is the BEST approach to identify whet...
質問78 Management decided to accept the residual risk of an audit f...
質問79 Which of the following would be of GREATEST concern to an IS...
質問80 An advantage of object-oriented system development is that i...
質問81 An organization using instant messaging to communicate with ...
質問82 An IS auditor has performed an agreed-upon procedures engage...
質問83 An IS auditor s role in privacy and security is to:...
質問84 The quality assurance (QA) function should be prevented from...
質問85 Which of the following factors constitutes a strength in reg...
質問86 Which of the following is MOST likely to be spoofed in an em...
質問87 An IS auditor finds that firewalls are outdated and not supp...
質問88 An IS auditor is following upon a finding that determined el...
質問89 When replacing a critical software application, which of the...
質問90 Which of the following will provide the GREATEST assurance t...
質問91 Which of the following access control situations represents ...
質問92 Which of the following activities is MOST important to consi...
質問93 When reviewing a newly implemented quality management system...
質問94 Which of the following would be considered the BEST compensa...
質問95 Which of the following findings should hr of GREATEST concer...
質問96 Which of the following is the BEST approach for performing a...
質問97 An IS auditor notes that several users have not logged into ...
質問98 Which of the following is MOST helpful when establishing the...
質問99 An IS auditor is assessing an organization's data loss preve...
質問100 An organization has implemented a distributed security admin...
質問101 An organization globally distributes a free phone applicatio...
質問102 The purpose of a checksum on an amount field in an electroni...
質問103 While reviewing a hot site, the IS auditor discovers that on...
質問104 Which of the following IT processes is likely to have the in...
質問105 Which of the following provides the MOST assurance that a ne...
質問106 When reviewing a database supported by a third-party service...
質問107 Which of the following would be of MOST concern during an au...
質問108 Which combination of access controls provides the BEST physi...
質問109 Which of the following should an IS auditor recommend as MOS...
質問110 An IS Auditor is performing a business continuity plan (BCP)...
質問111 Which of the following access fights presents the GREATEST r...
質問112 To create a digital signature in a message using asymmetric ...
質問113 The CIO of an organization is concerned that the information...
質問114 Using swipe cards to limit employee access to restricted are...
質問115 Which of ihe following is the BEST way to control scope cree...
質問116 During an audit of an organization's financial statements, a...
質問117 Which of the following would BEST detect that a distributed-...
質問118 An e-commerce enterprise's disaster recovery (DR) site has 3...
質問119 Which of the following provides the BEST evidence that netwo...
質問120 Which of the following is MOST important when planning a net...
質問121 Which of the following controls can BEST detect accidental c...
質問122 An IT service desk has recorded several incidents related to...
質問123 Which of the following procedures would BEST contribute to t...
質問124 An audit report notes that terminated employees have been re...
質問125 Which of the following is the BEST control to protect an org...
質問126 Prior to the migration of acquired software into production,...
質問127 Which of the following should MOST concern an IS auditor rev...
質問128 An organization is replacing its financial processing system...
質問129 Which of the following factors will BEST promote effective i...
質問130 A company has implemented an IT segregation of duties policy...
質問131 To ensure confidentiality through the use of asymmetric encr...
質問132 Which of the following is MOST important for the successful ...
質問133 Audit management has just completed the annual audit plan fo...
質問134 Which of the following would be the MOST appropriate reason ...
質問135 Which of the following is the MOST significant concerns when...
質問136 A company laptop has been stolen and all photos on the lapto...
質問137 An audit report that specifies responsibility for the closur...
質問138 An organization wants to reuse company-provided smartphones ...
質問139 The PRIMARY objective of parallel testing an application is ...
質問140 During a vulnerability assessment, an IS auditor finds a hig...
質問141 Which of the following could be determined by an entity-rela...
質問142 Which of the following procedures should be implemented prio...
質問143 Which of the following is the BEST key performance indicator...
質問144 Which of the following sampling techniques is commonly used ...
質問145 An organization wants to classify database tables according ...
質問146 Which of the following metrics would BEST measure the agilit...
質問147 What should be the PRIMARY basis for scheduling a follow-up ...
質問148 Which of the following should be an IS auditor's GREATEST co...
質問149 maturity model is useful in the assessment of IT service man...
質問150 Following an acquisition, it was decided that legacy applica...
質問151 Which of the following is MOST important for an IS auditor t...
質問152 During an audit of a reciprocal disaster recovery agreement ...
質問153 The performance of an order-processing system can be measure...
質問154 Which of the following is the MOST effective control to miti...
質問155 Which of the following tasks should be performed during an o...
質問156 Which of the following controls will MOST effectively detect...
質問157 During the planning stage of compliance audit, an IS auditor...
質問158 Electrical surge protectors BEST...
質問159 Which of the following should an IS auditor recommend to red...
質問160 Since data storage of a critical business application is on ...
質問161 An IS audit manager finds that data manipulation logic devel...
質問162 When developing a risk-based IS audit plan, the PRIMARY focu...
質問163 When reviewing an organization s IT governance processes, wh...
質問164 Which of the following is MOST important for an IS auditor t...
質問165 When reviewing user access to an application containing sens...
質問166 To protect information assets, which of the following should...
質問167 What is the MOST important role of a certificate authority (...
質問168 An organization's IT security policy requires annual securit...
質問169 Which of the following would BEST detect logic bombs in new ...
質問170 Which of the following activities would allow an IS auditor ...
質問171 Which of the following is MOST important to include in a bus...
質問172 Which of the following is MOST important in the audit qualit...
質問173 An employee transfers from an organization's risk management...
質問174 ..control that MOST effectively addresses the risk of piggyb...
質問175 Assessments of critical information systems are based on a c...
質問176 An organization using development operations (DevOps) proces...
質問177 A development team has designed a new application and incorp...
質問178 Which of the following test approaches would utilize data an...
質問179 The risk that is created if a single sign-on is implemented ...
質問180 An organization uses two data centers. Which of the followin...
質問181 Which of the following would be MOST important to update onc...
質問182 An IS auditor is evaluating the log management system for an...
質問183 Which of the following is MOST influential when defining dis...
質問184 What should be an IS auditor s NEXT course of action when a ...
質問185 Which of the following is the PRIMARY advantage of single si...
質問186 In an organization that has a staff-rotation policy, the MOS...
質問187 Spreadsheets are used to calculate project cost estimates To...
質問188 An organization is moving its on-site application servers to...
質問189 Two organizations will share ownership of a new enterprise r...
質問190 Which of the following BEST enables an IS auditor to identif...
質問191 When planning an application audit, it is MOST important to ...
質問192 Which of the following should be an IS auditor's PRIMARY con...
質問193 Following an IT audit, management has decided to accept the ...
質問194 Which of the following ensures components of an IT system ar...
質問195 Which of ihe following BEST indicates a need to review an or...
質問196 A system administrator recently informed the IS auditor abou...
質問197 At which stage of the software development life cycle should...
質問198 Which of the following would provide the BEST evidence for u...
質問199 Adopting a service-oriented architecture would MOST likely:...
質問200 An IS auditor is planning on utilizing attribute sampling to...
質問201 Which of the following is MOST important for an organization...
質問202 Which of the following control? MOST efficiently ensures tha...
質問203 Which of the following is an example of a data analytics use...
質問204 While reviewing similar issues in an organization s help des...
質問205 An organization was recently notified by its regulatory body...
質問206 Which of the following findings should be of MOST concern to...
質問207 Which of the following is the MOST important reason to perio...
質問208 Which of the following is the MOST efficient solution for a ...
質問209 Which of the following will enable a customer to authenticat...
質問210 Which type of risk would MOST influence the selection of a s...
質問211 An IS auditor is examining a front-end sub ledger and a main...
質問212 An organization has outsourced its data leakage monitoring t...
1コメント質問213 When preparing to evaluate the effectiveness of an organizat...
質問214 Which of the following methodologies is MOST appropriate to ...
質問215 Which of the following is the BEST reason for an organizatio...
質問216 Which of the following procedures should an IS auditor compl...
質問217 An organization is running servers with critical business ap...
質問218 While executing follow-up activities, an IS auditor is conce...
質問219 An IS auditor plans to review all access attempts to a video...
質問220 Which of the following BEST determines if a batch update job...
質問221 An IS auditor is reviewing the upgrading of an operating sys...
質問222 Which of the following is the GREATEST risk associated with ...
質問223 As part of business continuity planning. Which of the follow...
質問224 Of the following, who should authorize a project management ...
質問225 Internal audit reports should be PRIMARILY written for and c...
質問226 Which of the following should an IS auditor do FIRST when de...
質問227 Which of the following is the BEST indication that an inform...
質問228 An IS auditor performs a follow-up audit and learns the appr...
質問229 An IS auditor is performing a routine procedure to test for ...
質問230 While auditing an IT department s cloud service provider, th...
質問231 An IS auditor is using data analytics in an audit and has ob...
質問232 A PRIMARY benefit derived by an organization employing contr...
質問233 An organization is currently replacing its accounting system...
質問234 An IS auditor reviewing a recently implemented virtual envir...
質問235 An organization's current end-user computing practices inclu...
質問236 Which of the following is the MOST effective control to rest...
質問237 A retailer normally uses a scanner to read product labels an...
質問238 A manufacturing company is implementing application software...
質問239 During a follow-up audit for a finding related to change man...
質問240 Which of the following should be an IS auditor's PRIMARY foc...
質問241 An IS auditor is conducting a review of an organization s in...
質問242 Which of ihe following should be done FIRST to effectively d...
質問243 Which of the following is the BEST development methodology t...
質問244 During an external assessment of network vulnerability which...
質問245 Which of the following is the BEST sampling method to use wh...
質問246 Which of the following is the PRIMARY reason for an IS audit...
質問247 An IS auditor conducts a review of a third-party vendor's re...
質問248 An IS auditor has discovered that unauthorized customer mana...
質問249 A database administrator (DBA) extracts a user listing for a...
質問250 Privileged account access is require to start an ad hoc batc...
質問251 The maturity level of an organization s problem management s...
質問252 An IS auditor is assigned to review the development of a spe...
質問253 Which of the following is MOST important with regard to an a...
質問254 The BEST reason for implementing a virtual private network (...
質問255 Which of the following is the MOST effective control to ensu...
質問256 An IT steering committee assists the board of directors to f...
質問257 An internal audit department recently established a quality ...
質問258 Which of the following is a reason for implementing a decent...
質問259 During a review of system access, an IS auditor notes that a...
質問260 When reviewing an organization's data protection practices, ...
質問261 Which of the following should be the PRIMARY basis for plann...
質問262 An IS auditor has completed a service level management audit...
質問263 In assessing the priority given to systems covered in an org...
質問264 Which of the following is the PRIMARY benefit of including I...
質問265 Which of the following should be of GREATEST concern to an I...
質問266 Which of the following would be an appropriate role of inter...
質問267 The business owner's approval of software changes being move...
質問268 An IS auditor finds ad hoc vulnerability scanning is in plac...
質問269 Which of the following is the BEST indicator that an applica...
質問270 An IS auditor is assigned to review the IS department's qual...
質問271 When an intrusion into an organizations network is detected,...
質問272 An organization was recently notified by its regulatory body...
質問273 Which of the following is MOST important for an IS auditor t...
質問274 During an audit, it is discovered that several suppliers wit...
質問275 When removing a financial application system from production...
質問276 In an environment where most IT services have been outsource...
質問277 Which of the following is the MOST important benefit of invo...
質問278 An organization plans to launch a social media presence as p...
質問279 In an IS auditor's review of an organization s configuration...
質問280 Which of the following mechanisms for process improvement in...
質問281 When using a wireless device, which of the following BEST en...
質問282 Which of the following is the BEST indication that an organi...
質問283 A maturity model can be used to aid the implementation of IT...
質問284 Which of the following types of controls would BEST facilita...
質問285 During a software acquision review, an IS auditor should rec...
質問286 Which of the following helps to ensure the integrity of data...
質問287 A post-implementation review of a system implementation has ...
質問288 An intruder accesses an application server and makes changes...
質問289 An auditor is creating an audit program in which the objecti...
質問290 Which of the following should be an IS auditor's PRIMARY con...
質問291 Which of the following a recent internal data breach, an IS ...
質問292 When designing metrics for information security, the MOST im...
質問293 Which of the following findings would be of MOST concern to ...
質問294 Which of the following should be an IS auditor's PRIMARY con...
質問295 Which of the following would provide the useful input to IS ...
質問296 Which of the following BEST ensures that only authorized sof...
質問297 The operations team of an organization has reported an IS se...
質問298 An organization has purchased a replacement mainframe comput...
質問299 An IS auditor has found that an organization is unable to ad...
質問300 An IS auditor is unable to directly test privacy controls fo...
質問301 An organization offers an online information security awaren...
質問302 Which of the following is the BEST way to address ongoing co...
質問303 Which of the following should be performed FIRST when prepar...
質問304 Which of the following would BEST indicate the effectiveness...
質問305 Which of the following would BEST deter the theft of corpora...
質問306 A design company has multiple name and address files for its...
質問307 During an audit of the organization's data privacy policy, t...
質問308 An IS auditor has assessed a payroll service provider's secu...
質問309 During a help desk review, an IS auditor determines the call...
質問310 Which of the following would provide the MOST important inpu...
質問311 Which of the following is the GREATEST cause for concern whe...
質問312 Buffer overflow in an Internet environment is of particular ...
質問313 Which of the following is the MOST important step in the dev...
質問314 An IS auditor is reviewing standards and compliance requirem...
質問315 Which of the following is the BEST way to evaluate the effec...
質問316 An enterprise receiving email should have procedures to cont...
質問317 Which of the following is MOST likely to be prevented by a f...
質問318 An organization uses electronic funds transfer (EFT) to pay ...
質問319 An audit committee is reviewing an annual IT risk assessment...
質問320 Which audit technique provides the GREATEST assurance that i...
質問321 Following a security breach, in which a hacker exploited a w...
質問322 Which the following is MOST critical for the effective imple...
質問323 An IS auditor previously worked in an organization s IT depa...
質問324 internal IS auditor recommends that incoming accounts payabl...
質問325 Management has agreed to perform multiple remediation action...
質問326 When implementing a software product (middleware) to pass da...
質問327 Which of the following is the PRIMARY reason for database op...
質問328 Which of the following should an IS auditor verify when audi...
質問329 An organization has software that is not compliant with data...
質問330 During an audit of a payroll system, an IS auditor identifie...
質問331 Which of the following audit procedures would BEST assist an...
質問332 An organization's IT security policy states that user ID's m...
質問333 Which of the following is a substantive test procedure?...
質問334 Which of the following is the MOST important reason for upda...
質問335 Which of the following is the MOST effective way to minimize...
質問336 Which of the following is the PRIMARY concern if a business ...
質問337 An IS auditor attempts to sample for variables in a populati...
質問338 An organization has implemented application whitelisting in ...
質問339 When auditing the security architecture of an e-commerce env...
質問340 Which of the following is the PRIMARY responsibility of an o...
質問341 At what point in software development should the user accept...
質問342 An IS auditor is conducting a pre-implementation review to d...
質問343 Which of the following is the BEST guidance from an IS audit...
質問344 The risk that the IS auditor will not find an error that has...
質問345 An IS auditor is a member of an application development team...
質問346 Which of the following is the GREATEST concern when an organ...
質問347 Which of the following is the BEST indication that an organi...
質問348 Which of the following would be MOST important for an IS aud...
質問349 Which of the following is MOST important to include in a con...
質問350 Which of the following areas are the MOST likely cause of an...
質問351 The use of the Transport Layer Security (TLS) protocol enabl...
質問352 Which of the following should an IS auditor review FIRST whe...
質問353 Which of the following key performance indicators (KPIs) pro...
質問354 Which of the following should be of GREATEST concern to an I...
質問355 During a post-implementation review, a step in determining w...
質問356 A database is denormalized in order to:...
質問357 Which of the following will BEST help to ensure that an in-h...
質問358 Which of the following is a detective control that can be us...
質問359 Which of the following is the GREATEST benefit of implementi...
質問360 In the IT department where segregation of duties is not feas...
質問361 Which of the following is the MOST effective mechanism for e...
質問362 Which of the following is MOST important for an IS auditor t...