FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2022-02-26.q471 Dumps
  • ««
  • «
  • …
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • …
  • »
  • »»
Download Now

Question 106

IS audits should be selected through a risk analysis process to concentrate on:

Correct Answer: A
Audits are typically selected through a risk analysis process to concentrate on those areas of greatest risk and opportunity for improvements.
Audit topics are supposed to be chosen based on potential for cost savings and service improvements.
insert code

Question 107

You should know the difference between an exploit and a vulnerability. Which of the following refers to a weakness in the system?

Correct Answer: B
You should know the difference between an exploit and a vulnerability. An exploit refers to software, data, or commands capable of taking advantage of a bug, glitch or vulnerability in order to cause unintended behavior. Vulnerability in this sense refers to a weakness in the system.
insert code

Question 108

An IS auditor is reviewing a sample of production incidents and notes that root cause analysis is not being performed. Which of the following is the GREATEST risk associated with this finding?

Correct Answer: C
Section: The process of Auditing Information System
insert code

Question 109

Which of the following protocol is developed jointly by VISA and Master Card to secure payment
transactions among all parties involved in credit card transactions on behalf of cardholders and merchants?

Correct Answer: C
Section: Protection of Information Assets
Explanation/Reference:
Secure Electronic Transaction(SET) is a protocol developed jointly by VISA and Master Card to secure
payment transaction among all parties involved in credit card transactions among all parties involved in
credit card transactions on behalf of cardholders and merchants. As an open system specification, SET is
an application-oriented protocol that uses trusted third party's encryption and digital-signature process, via
PKI infrastructure of trusted third party institutions, to address confidentiality of information, integrity of data,
cardholders authentication, merchant authentication and interoperability.
The following were incorrect answers:
S/MIME - Secure Multipurpose Internet Mail Extension (S/MIME) is a standard secure email protocol that
authenticates the identity of the sender and receiver, verifies message integrity, and ensures the privacy of
message's content's, including attachments.
SSH -A client server program that opens a secure, encrypted command-line shell session from the
Internet for remote logon. Similar to a VPN, SSH uses strong cryptography to protect data, including
password, binary files and administrative commands, transmitted between system on a network. SSH is
typically implemented between two parties by validating each other's credential via digital certificates. SSH
is useful in securing Telnet and FTP services, and is implemented at the application layer, as opposed to
operating at network layer (IPSec Implementation)
Secure Hypertext Transfer Protocol (S/HTTP) -As an application layer protocol, S/HTTP transmits
individual messages or pages securely between a web client and server by establishing SSL-type
connection. Using the https:// designation in the URL, instead of the standard http://, directs the message to
a secure port number rather than the default web port address. This protocol utilizes SSL secure features
but does so as a message rather than the session-oriented protocol.
The following reference(s) were/was used to create this question:
CISA review manual 2014 Page number 352 and 353
insert code

Question 110

Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?

Correct Answer: A
Section: Information System Operations, Maintenance and Support
insert code
  • ««
  • «
  • …
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2022-02-26.q471 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.