FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2024-12-27.q999 Dumps
  • ««
  • «
  • …
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • …
  • »
  • »»
Download Now

Question 656

During Involuntary termination of an employee, which of the following is the MOST important step to be considered?

Correct Answer: B
Explanation/Reference:
For CISA exam you should know below information about Terminated Employee Access Termination of employment can occur in the following circumstances:
On the request of the employee (Voluntary resignation from service)
Scheduled (On retirement or completion of contract)
Involuntary (forced by management in special circumstances)
In case of an involuntary termination of employment, the logical and physical access rights of employees to the IT infrastructure should either be withdrawn completely or highly restricted as early as possible, before the employee become aware of termination or its likelihood.
This ensures that terminated employees cannot continue to access potentially confidential or damaging information from the IT resources or perform any action that would result in damage of any kind of IT infrastructure, applications and data. Similar procedure in place to terminate access for third parties upon terminating their activities with the organization.
When it is necessary for employee to continue to have accesses, such access must be monitored carefully and continuously and should take place with senior management's knowledge and authorization.
In case of a voluntary or scheduled termination of employment, it is management's prerogative to decide whether access is restricted or withdrawn. This depends on:
The specific circumstances associated with each case
The sensitivity of employee's access to the IT infrastructure and resources The requirement of the organization's information security policies, standards and procedure.
The following were incorrect answers:
The other options presented are incorrectly describes about involuntary termination.
The following reference(s) were/was used to create this question:
CISA review manual 2014 Page number 361 and 362
insert code

Question 657

What is the key distinction between encryption and hashing algorithms?

Correct Answer: B
Explanation/Reference:
Explanation:
A key distinction between encryption and hashing algorithms is that hashing algorithms are irreversible.
insert code

Question 658

Who is responsible for providing adequate physical and logical security for IS program, data and
equipment?

Correct Answer: D
Section: Protection of Information Assets
Explanation/Reference:
Security administrator are responsible for providing adequate physical and logical security for IS programs,
data and equipment.
For CISA exam you should know below roles in an organization
Data Owners - These peoples are generally managers and directors responsible for using information for
running and controlling the business. Their security responsibilities include authorizing access, ensuring
that access rules are updated when personnel changes occur, and regularly review access rule for the data
for which they are responsible.
Data Custodian or Data Steward - These people are responsible for storing and safeguarding the data,
and include IS personnel such as system analysis and computer operators.
Security Administrator -Security administrator is responsible for providing adequate physical and logical
security for IS programs, data and equipment.
Data Users - Data users, including internal and external user community, are the actual user of
computerized data. Their level of access into the computer should be authorized by data owners, and
restricted and monitor by security administrator.
The following were incorrect answers:
Data Owner- These peoples are generally managers and directors responsible for using information for
running and controlling the business.
Data Users - Data users, including internal and external user community, are the actual user of
computerized data.
Data custodian is responsible for storing and safeguarding the data, and include IS personnel such as
system analyst and computer operators.
The following reference(s) were/was used to create this question:
CISA review manual 2014 Page number 361
insert code

Question 659

A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed Which of the following is the MOST important requirement to include In the vendor contract to ensure continuity?

Correct Answer: C
Explanation
Source code for the software must be placed in escrow is the most important requirement to include in the vendor contract to ensure continuity. Source code is the original code of a software program that can be modified or enhanced by programmers. Placing source code in escrow means depositing it with a trusted third party who can release it to the customer under certain conditions, such as vendor bankruptcy, breach of contract, or failure to provide support. This can help to ensure continuity of the software product and its maintenance in case of vendor unavailability or dispute. The other options are less important requirements to include in the vendor contract, as they may involve support availability, disaster recovery plan, or staff training. References:
CISA Review Manual (Digital Version), Chapter 5, Section 5.51
CISA Review Questions, Answers & Explanations Database, Question ID 228
insert code

Question 660

Which of the following will help detect changes made by an intruder to the system log of a server?

Correct Answer: B
A write-once CD cannot be overwritten. Therefore, the system log duplicated on the disk could be compared to the original log to detect differences, which could be the result of changes made by an intruder. Write-protecting the system log does not prevent deletion or modification, since the superuser can override the write protection. Backup and mirroring may overwrite earlier files and may not be current.
insert code
  • ««
  • «
  • …
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2024-12-27.q999 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.