Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 388

Mary Smith

Sat, 24 May 2025

CISA—Certified Information Systems Auditor - Part 388

1. An IS auditor is performing a consulting engagement and needs to make a recommendation for securing all doors to a data center to prevent unauthorized access. Which of the following access control techniques would be MOST difficult for an intruder to compromise?

A) Dead-man door and swipe card
B) Smart card and numeric keypad
C) USB token and password
D) Biometrics and PIN



2. Invoking a business continuity plan (BCP) is demonstrating which type of control?

A) Corrective
B) Preventive
C) Detective
D) Directive



3. Which of the following is necessary to determine what would constitute a disaster for an organization?

A) Backup strategy analysis
B) Threat probability analysis
C) Risk analysis
D) Recovery strategy analysis



4. Which of the following should be an information security manager's PRIMARY role when an organization initiates a data classification process?

A) Assign the asset classification level.
B) Define the classification structure to be implemented.
C) Verify that assets have been appropriately classified.
D) Apply security in accordance with specific classification.



5. Which of the following would BEST protect against web-based cross-domain attacks?

A) Network addressing scheme
B) Database hardening
C) Encryption controls
D) Application controls



1. Right Answer: D
Explanation:

2. Right Answer: B
Explanation:

3. Right Answer: D
Explanation:

4. Right Answer: B
Explanation:

5. Right Answer: D
Explanation:

0 Comments

Leave a comment