FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2024-03-31.q980 Dumps
  • ««
  • «
  • …
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • …
  • »
  • »»
Download Now

Question 611

.What is an effective control for granting temporary access to vendors and external support personnel? Choose the BEST answer.

Correct Answer: A
Creating user accounts that automatically expire by a predetermined date is an effective control for granting temporary access to vendors and external support personnel.
insert code

Question 612

The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:

Correct Answer: A
Explanation/Reference:
Explanation:
A checksum calculated on an amount field and included in the EDI communication can be used to identify unauthorized modifications. Authenticity and authorization cannot be established by a checksum alone and need other controls. Nonrepudiation can be ensured by using digital signatures.
insert code

Question 613

Information for detecting unauthorized input from a terminal would be BEST provided by the:

Correct Answer: B
Section: Protection of Information Assets
Explanation:
The transaction journal would record all transaction activity, which then could be compared to the
authorized source documents to identify any unauthorized input. A console log printout is not the best,
because it would not record activity from a specific terminal. An automated suspense file listing would only
list transaction activity where an edit error occurred, while the user error report would only list input that
resulted in an edit error.
insert code

Question 614

When reviewing an organization's approved software product list, which of the following is the MOST important thing to verify?

Correct Answer: A
Explanation/Reference:
Explanation:
Since the business conditions surrounding vendors may change, it is important for an organization to conduct periodic risk assessments of the vendor software list. This might be best incorporated into the IT risk management process. Choices B, C and D are possible considerations but would not be the most important.
insert code

Question 615

Which of the following protocol is developed jointly by VISA and Master Card to secure payment
transactions among all parties involved in credit card transactions on behalf of cardholders and merchants?

Correct Answer: C
Section: Protection of Information Assets
Explanation/Reference:
Secure Electronic Transaction(SET) is a protocol developed jointly by VISA and Master Card to secure
payment transaction among all parties involved in credit card transactions among all parties involved in
credit card transactions on behalf of cardholders and merchants. As an open system specification, SET is
an application-oriented protocol that uses trusted third party's encryption and digital-signature process, via
PKI infrastructure of trusted third party institutions, to address confidentiality of information, integrity of data,
cardholders authentication, merchant authentication and interoperability.
The following were incorrect answers:
S/MIME - Secure Multipurpose Internet Mail Extension (S/MIME) is a standard secure email protocol that
authenticates the identity of the sender and receiver, verifies message integrity, and ensures the privacy of
message's content's, including attachments.
SSH -A client server program that opens a secure, encrypted command-line shell session from the
Internet for remote logon. Similar to a VPN, SSH uses strong cryptography to protect data, including
password, binary files and administrative commands, transmitted between system on a network. SSH is
typically implemented between two parties by validating each other's credential via digital certificates. SSH
is useful in securing Telnet and FTP services, and is implemented at the application layer, as opposed to
operating at network layer (IPSec Implementation)
Secure Hypertext Transfer Protocol (S/HTTP) -As an application layer protocol, S/HTTP transmits
individual messages or pages securely between a web client and server by establishing SSL-type
connection. Using the https:// designation in the URL, instead of the standard http://, directs the message to
a secure port number rather than the default web port address. This protocol utilizes SSL secure features
but does so as a message rather than the session-oriented protocol.
The following reference(s) were/was used to create this question:
CISA review manual 2014 Page number 352 and 353
insert code
  • ««
  • «
  • …
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2024-03-31.q980 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.