FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2023-03-04.q546 Dumps
  • ««
  • «
  • …
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • …
  • »
  • »»
Download Now

Question 96

An example of a direct benefit to be derived from a proposed IT-related business investment is:

Correct Answer: D
Explanation/Reference:
Explanation:
A comprehensive business case for any proposed IT-related business investment should have clearly defined business benefits to enable the expected return to be calculated. These benefits usually fall into two categories: direct and indirect, or soft.Direct benefits usually comprise the quantifiable financial benefits that the new system is expected to generate. The potential benefits of enhanced reputation and enhanced staff morale are difficult to quantify, but should be quantified to the extent possible. IT investments should not be made just for the sake of new technology but should be based on a quantifiable business need.
insert code

Question 97

Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?

Correct Answer: B
insert code

Question 98

Which of the following type of lock uses a numeric keypad or dial to gain entry?

Correct Answer: B
Section: Protection of Information Assets
Explanation/Reference:
The combination door lock or cipher lock uses a numeric key pad, push button, or dial to gain entry, it is
often seen at airport gate entry doors and smaller server rooms. The combination should be changed at
regular interval or whenever an employee with access is transferred, fired or subject to disciplinary action.
This reduces risk of the combination being known by unauthorized people.
A cipher lock, is controlled by a mechanical key pad, typically 5 to 10 digits that when pushed in the right
combination the lock will releases and allows entry. The drawback is someone looking over a shoulder can
see the combination. However, an electric version of the cipher lock is in production in which a display
screen will automatically move the numbers around, so if someone is trying to watch the movement on the
screen they will not be able to identify the number indicated unless they are standing directly behind the
victim.
Remember locking devices are only as good as the wall or door that they are mounted in and if the frame
of the door or the door itself can be easily destroyed then the lock will not be effective. A lock will eventually
be defeated and its primary purpose is to delay the attacker.
For your exam you should know below types of lock
Bolting door lock - These locks required the traditional metal key to gain entry. The key should be stamped
"do not duplicate" and should be stored and issued under strict management control.
Biometric door lock - An individual's unique physical attribute such as voice, retina, fingerprint, hand
geometry or signature, activate these locks. This system is used in instances when sensitive facilities must
be protected such as in the military.
Electronic door lock - This system uses a magnetic or embedded chip based plastic card key or token
entered into a sensor reader to gain access. A special code internally stored in the card or token is read by
sensor device that then activates the door locking mechanism.
The following were incorrect answers:
Bolting door lock - These locks required the traditional metal key to gain entry. The key should be stamped
"do not duplicate" and should be stored and issued under strict management control.
Biometric door lock - An individual's unique body features such as voice, retina, fingerprint, hand geometry
or signature, activate these locks. This system is used in instances when extremely sensitive facilities must
be protected such as in the military.
Electronic door lock - This system uses a magnetic or embedded chip based plastic card key or token
entered into a sensor reader to gain access. A special code internally stored in the card or token is read by
sensor device that then activates the door locking mechanism.
Following reference(s) were/was used to create this question:
CISA review manual 2014 Page number 376
and
Hernandez CISSP, Steven (2012-12-21). Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2
Press) (Kindle Locations 25144-25150). Acerbic Publications. Kindle Edition.
insert code

Question 99

Disabling which of the following would make wireless local area networks more secure against unauthorized access?

Correct Answer: D
Explanation/Reference:
Explanation:
Disabling SSID broadcasting adds security by making it more difficult for unauthorized users to find the name of the access point. Disabling MAC address filtering would reduce security. Using MAC filtering makes it more difficult to access a WLAN, because it would be necessary to catch traffic and forge the MAC address. Disabling WPA reduces security. Using WPA adds security by encrypting the traffic.
Disabling LEAP reduces security. Using LEAP adds security by encrypting the wireless traffic.
insert code

Question 100

During a human resources (HR) audit, an IS auditor is informed that there is a verbal agreement between
the IT and HR departments as to the level of IT services expected. In this situation, what should the IS
auditor do FIRST?

Correct Answer: C
Section: Protection of Information Assets
Explanation:
An IS auditor should first confirm and understand the current practice before making any
recommendations. The agreement can be documented after it has been established that there is an
agreement in place. The fact that there is not a written agreement does not justify postponing the audit, and
reporting to senior management is not necessary at this stage of the audit. Drafting a service level
agreement (SLA) is not the IS auditor's responsibility.
insert code
  • ««
  • «
  • …
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2023-03-04.q546 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.