FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2023-03-04.q546 Dumps
  • ««
  • «
  • …
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • …
  • »
  • »»
Download Now

Question 376

When performing an IS strategy audit, an IS auditor should review both short-term (one- year) and long-
term (three-to five-year) IS strategies, interview appropriate corporate management personnel, and ensure
that the external environment has been considered. The auditor should especially focus on procedures in
an audit of IS strategy. True or false?

Correct Answer: B
Section: Protection of Information Assets
Explanation:
When performing an IS strategy audit, an IS auditor should review both short-term (one-year) and long-
term (three-to five-year) IS strategies, interview appropriate corporate management personnel, and ensure
that the external environment has been considered.
insert code

Question 377

After observing suspicious activities in a server, a manager requests a forensic analysis. Which of the following findings should be of MOST concern to the investigator?

Correct Answer: D
Audit logs can provide evidence which is required to proceed with an investigation and should not be disabled. For business needs, a server can be a member of a workgroup and, therefore, not a concern. Having a guest account enabled on a system is apoor security practice but not a forensic investigation concern. Recently creating 100 users in the server may have been required to meet business needs and should not be a concern.
insert code

Question 378

Which of the following is best suited for searching for address field duplications?

Correct Answer: B
Explanation/Reference:
Explanation:
Generalized audit software can be used to search for address field duplications.
insert code

Question 379

Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?

Correct Answer: C
insert code

Question 380

Which of the following virus prevention techniques can be implemented through hardware?

Correct Answer: A
Remote booting (e.g., diskless workstations) is a method of preventing viruses, and can be implemented through hardware. Choice C is a detection, not a prevention, although it is hardware-based. Choices B and D are not hard ware-based.
insert code
  • ««
  • «
  • …
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2023-03-04.q546 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.