Download Certified Information Systems Auditor.CISA.Dump4Pass.2020-11-02.3108q.vcex

Vendor: ISACA
Exam Code: CISA
Exam Name: Certified Information Systems Auditor
Date: Nov 02, 2020
File Size: 2 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
A shared resource matrix is a technique commonly used to locate:
  1. Malicious code
  2. Security flaws
  3. Trap doors
  4. Covert channels
Correct answer: D
Question 2
You are part of a security staff at a highly profitable bank and each day, all traffic on the network is logged for later review. Every Friday when major deposits are made you're seeing a series of bits placed in the "Urgent Pointer" field of a TCP packet. This is only 16 bits which isn't much but it concerns you because:
  1. This could be a sign of covert channeling in bank network communications and should be investigated.
  2. It could be a sign of a damaged network cable causing the issue.
  3. It could be a symptom of malfunctioning network card or drivers and the source system should be checked for the problem.
  4. It is normal traffic because sometimes the previous fields 16-bit checksum value can over run into the urgent pointer's 16-bit field causing the condition.
Correct answer: A
Question 3
John is the product manager for an information system. His product has undergone under security review by an IS auditor. John has decided to apply appropriate security controls to reduce the security risks suggested by an IS auditor. Which of the following technique is used by John to treat the identified risk provided by an IS auditor?
  1. Risk Mitigation
  2. Risk Acceptance
  3. Risk Avoidance
  4. Risk transfer
Correct answer: A
Question 4
Sam is the security Manager of a financial institute. Senior management has requested he performs a risk analysis on all critical vulnerabilities reported by an IS auditor. After completing the risk analysis, Sam has observed that for a few of the risks, the cost benefit analysis shows that risk mitigation cost (countermeasures, controls, or safeguard) is more than the potential lost that could be incurred. What kind of a strategy should Sam recommend to the senior management to treat these risks?
  1. Risk Mitigation
  2. Risk Acceptance
  3. Risk Avoidance
  4. Risk transfer
Correct answer: B
Question 5
Which of the following risk handling technique involves the practice of being proactive so that the risk in question is not realized?
  1. Risk Mitigation
  2. Risk Acceptance
  3. Risk Avoidance
  4. Risk transfer
Correct answer: C
Question 6
Which of the following control is intended to discourage a potential attacker?
  1. Deterrent
  2. Preventive
  3. Corrective
  4. Recovery
Correct answer: A
Question 7
Which of the following security control is intended to avoid an incident from occurring?
  1. Deterrent
  2. Preventive
  3. Corrective
  4. Recovery
Correct answer: B
Question 8
Which of the following control fixes a component or system after an incident has occurred?
  1. Deterrent
  2. Preventive
  3. Corrective
  4. Recovery
Correct answer: C
Question 9
Which of the following security control is intended to bring environment back to regular operation?
  1. Deterrent
  2. Preventive
  3. Corrective
  4. Recovery
Correct answer: D
Question 10
Which of the following control helps to identify an incident’s activities and potentially an intruder?
  1. Deterrent 
  2. Preventive
  3. Detective
  4. Compensating
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!