FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2024-03-31.q980 Dumps
  • ««
  • «
  • …
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • …
  • »
  • »»
Download Now

Question 81

When preparing to evaluate the effectiveness of an organizations IT strategy, an IS auditor should FIRST review;

Correct Answer: B
insert code

Question 82

An internal audit has revealed a large number of incidents for which root cause analysis has not been performed. Which of the following is MOST important for the IS auditor to verify to determine whether there is an audit issue?

Correct Answer: D
Section: The process of Auditing Information System
insert code

Question 83

When transmitting a payment instruction, which of the following will help verify that the instruction was not
duplicated?

Correct Answer: D
Section: Protection of Information Assets
Explanation:
When transmitting data, a sequence number and/or time stamp built into the message to make it unique
can be checked by the recipient to ensure that the message was not intercepted and replayed. This is
known as replay protection, and could be used to verify that a payment instruction was not duplicated. Use
of a cryptographic hashing algorithm against the entire message helps achieve data integrity. Enciphering
the message digest using the sender's private key, which signs the sender's digital signature to the
document, helps in authenticating the transaction. When the message is deciphered by the receiver using
the sender's public key, it ensures that the message could only have come from the sender. This process
of sender authentication achieves nonrepudiation.
insert code

Question 84

Which of the following types of attack often take advantage of curiosity or greed to deliver malware?

Correct Answer: A
Explanation/Reference:
Explanation:
Gimmes take advantage of curiosity or greed to deliver malware. Also known as a Trojan Horse, gimmes can arrive as an email attachment promising anything. The recipient is expected to give in to the need to the program and open the attachment. In addition, many users will blindly click on any attachments they receive that seem even mildly legitimate.
insert code

Question 85

Stress testing should ideally be earned out under a:

Correct Answer: A
Explanation
Stress testing is a type of performance testing that evaluates the behavior and reliability of a system under extreme conditions, such as high workload, limited resources, or concurrent users. Stress testing should ideally be carried out under a test environment with production workloads, as this would simulate the most realistic and demanding scenario for the system without affecting the actual production environment. A production environment with production workloads is not suitable for stress testing, as it could cause disruption or damage to the system and its users. A production environment with test data is not suitable for stress testing, as it could compromise the integrity and security of the production data. A test environment with test data is not suitable for stress testing, as it could underestimate the potential issues and risks that could occur in the production environment. References:
CISA Review Manual, 27th Edition, pages 471-4721
CISA Review Questions, Answers & Explanations Database, Question ID: 261
insert code
  • ««
  • «
  • …
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2024-03-31.q980 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.