FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2024-12-27.q999 Dumps
  • ««
  • «
  • …
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • …
  • »
  • »»
Download Now

Question 626

Which of the following is the MOST robust method for disposing of magnetic media that contains confidential information?

Correct Answer: D
Destroying magnetic media is the only way to assure that confidential information cannot be recovered. Degaussing or demagnetizing is not sufficient to fully erase information from magnetic mediA . The purpose of defragmentation is to eliminate fragmentation in file systems and does not remove information. Erasing or deleting magnetic media does not remove the information; this method simply changes a file's indexing information.
insert code

Question 627

An IS auditor is reviewing an artificial intelligence (Al) and expert system application. The system has produced several critical errors with severe impact. Which of the following should the IS auditor do NEXT to understand the cause of the errors?

Correct Answer: C
insert code

Question 628

A start-up organization is expecting to leverage application components provided by different software vendors and to scale up rapidly. Which of the following enterprise IT architectures would BEST ensure that the organization can easily add and reuse components to deliver its own services?

Correct Answer: A
insert code

Question 629

The information security policy that states 'each individual must have their badge read at every controlled
door' addresses which of the following attack methods?

Correct Answer: A
Section: Protection of Information Assets
Explanation:
Piggybacking refers to unauthorized persons following authorized persons, either physically or virtually, into
restricted areas. This policy addresses the polite behavior problem of holding doors open for a stranger, if
every employee must have their badge read at every controlled door no unauthorized person could enter
the sensitive area. Looking over the shoulder of a user to obtain sensitive information could be done by an
unauthorized person who has gained access to areas using piggybacking, but this policy specifically refers
to physical access control. Shoulder surfing would not be prevented by the implementation of this policy.
Dumpster diving, looking through an organization's trash for valuable information, could be done outside
the company's physical perimeter; therefore, this policy would not address this attack method.
Impersonation refers to a social engineer acting as an employee, trying to retrieve the desired information.
Some forms of social engineering attacks could join an impersonation attack and piggybacking, but this
information security policy does not address the impersonation attack.
insert code

Question 630

During a disaster recovery test, an IS auditor observes that the performance of the
disaster recovery site's server is slow. To find the root cause of this, the IS auditor should FIRST review the:

Correct Answer: D
Since the configuration of the system is the most probable cause, the IS auditor should review that first. If the issue cannot be clarified, the IS auditor should then review the event error log. The disaster recovery test plan and the disaster recovery plan (DRP) would not contain information about the system configuration.
insert code
  • ««
  • «
  • …
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2024-12-27.q999 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.