FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2022-02-26.q471 Dumps
  • ««
  • «
  • …
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • …
  • »
  • »»
Download Now

Question 91

Which of the following manages the digital certificate life cycle to ensure adequate security and controls
exist in digital signature applications related to e-commerce?

Correct Answer: B
Section: Protection of Information Assets
Explanation:
The certificate authority maintains a directory of digital certificates for the reference of those receiving
them, it manages the certificate life cycle, including certificate directory maintenance and certificate
revocation list maintenance and publication. Choice A is not correct because a registration authority is an
optional entity that is responsible for the administrative tasks associated with registering the end entity that
is the subject of the certificate issued by the CA. Choice C is incorrect since a CRL is an instrument for
checking the continued validity of the certificates for which the CA has responsibility. Choice D is incorrect
because a certification practice statement is a detailed set of rules governing the certificate authority's
operations.
insert code

Question 92

Naming conventions for system resources are important for access control because they:

Correct Answer: B
Naming conventions for system resources are important for the efficient administration of security controls. The conventions can be structured, so resources beginning with the same high-level qualifier can be governed by one or more generic rules. This reduces the number of rules required to adequately protect resources, which in turn facilitates security administration and maintenance efforts. Reducing the number of rules required to protect resources allows for the grouping of resources and files by application, which makes it easier to provide access. Ensuring that resource names are not ambiguous cannot be achieved through the use of naming conventions. Ensuring the clear and unique identification of user access to resources is handledby access control rules, not naming conventions. Internationally recognized names are not required to control access to resources. Naming conventions tend to be based on how each organization wants to identify its resources.
insert code

Question 93

Which of the following is MOST relevant for an information security manager to communicate to IT operations?

Correct Answer: D
Section: Protection of Information Assets
insert code

Question 94

Many IT projects experience problems because the development time and/or resource requirements are
underestimated. Which of the following techniques would provide the GREATEST assistance in developing
an estimate of project duration?

Correct Answer: B
Section: Protection of Information Assets
Explanation:
A PERT chart will help determine project duration once all the activities and the work involved with those
activities are known. Function point analysis is a technique for determining the size of a development task
based on the number of function points. Function points are factors such as inputs, outputs, inquiries,
logical internal files, etc. While this will help determine the size of individual activities, it will not assist in
determining project duration since there are many overlapping tasks. Rapid application development is a
methodology that enables organizations to develop strategically important systems faster while reducing
development costs and maintaining quality, while object-oriented system development is the process of
solution specification and modeling.
insert code

Question 95

An organization s data retention policy states that all data will be backed up, retained for 10 years, and then destroyed. When conducting an audit of the long-term offsite backup program, an IS auditor should:

Correct Answer: C
insert code
  • ««
  • «
  • …
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2022-02-26.q471 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.