FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2024-03-31.q980 Dumps
  • ««
  • «
  • …
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • …
  • »
  • »»
Download Now

Question 306

A firm is considering using biometric fingerprint identification on all PCs that access critical datA. This requires:

Correct Answer: A
Explanation/Reference:
Explanation:
The fingerprints of accredited users need to be read, identified and recorded, i.e., registered, before a user may operate the system from the screened PCs. Choice B is incorrect, as the false- acceptance risk of a biometric device may be optimized, but will never be zero because this would imply an unacceptably high risk of false rejection. Choice C is incorrect, as the fingerprint device reads the token (the user's fingerprint) and does not need to be protected in itself by a password. Choice Dis incorrect because the usage of biometric protection on PCs does not guarantee that other potential security weaknesses in the system may not be exploited to access protected data.
insert code

Question 307

Senior management has allocated funding to each of the organization's divisions to address information security vulnerabilities. The funding is based on each division's technology budget from the previous fiscal year. Which of the following should be of GREATEST concern to the information security manager?

Correct Answer: C
Section: Information System Operations, Maintenance and Support
insert code

Question 308

What are often the primary safeguards for systems software and data?

Correct Answer: B
Explanation/Reference:
Explanation:
Logical access controls are often the primary safeguards for systems software and datA.
insert code

Question 309

"Under the concept of ""defense in depth"", subsystems should be designed to:"

Correct Answer: B
Section: Protection of Information Assets
Explanation:
"With 0""defense in depth"", more than one subsystem needs to be compromised to compromise the
security of the system and the information it holds. Subsystems should default to secure settings, and
wherever possible should be designed to ""fail secure"" rather than ""fail insecure"".
insert code

Question 310

An organization is considering connecting a critical PC-based system to the Internet. Which of the following
would provide the BEST protection against hacking?

Correct Answer: A
Section: Protection of Information Assets
Explanation:
An application-level gateway is the best way to protect against hacking because it can define with detail
rules that describe the type of user or connection that is or is not permitted, it analyzes in detail each
package, not only in layers one through four of the OSI model but also layers five through seven, which
means that it reviews the commands of each higher-level protocol (HTTP, FTP, SNMP, etc.). For a remote
access server, there is a device (server) that asks for a username and password before entering the
network. This is good when accessing private networks, but it can be mapped or scanned from the Internet
creating security exposure. Proxy servers can provide protection based on the IP address and ports.
However, an individual is needed who really knows how to do this, and applications can use different ports
for the different sections of the program. Port scanning works when there is a very specific task to
complete, but not when trying to control what comes from the Internet, or when all the ports available need
to be controlled. For example, the port for Ping (echo request) could be blocked and the IP addresses
would be available for the application and browsing, but would not respond to Ping.
insert code
  • ««
  • «
  • …
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2024-03-31.q980 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.