Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 390

Mary Smith

Sat, 24 May 2025

CISA—Certified Information Systems Auditor - Part 390

1. Business applications should be selected for disaster recovery testing on the basis of:

A) the results of contingency desktop checks
B) the number of failure points that are being tested
C) recovery time objectives (RTOs)
D) criticality to the enterprise



2. When performing a data classification project, an information security manager should:

A) assign information critically and sensitivity
B) identify information owners
C) identify information custodians
D) assign information access privileges



3. A third-party service provider has proposed a data loss prevention (DLP) solution. Which of the following MUST be in place for this solution to be relevant to the organization?

A) An adequate data testing environment
B) Senior management support
C) A business case
D) A data classification



4. Which of the following is the BEST way to identify the potential impact of a successful attack on an organization's mission critical applications?

A) Execute regular vulnerability scans
B) Conduct penetration testing
C) Perform application vulnerability review
D) Perform independent code review



5. Which of the following needs be established FIRST in order to categorize data properly?

A) A data protection policy
B) A data classification framework
C) A data asset inventory
D) A data asset protection standard



1. Right Answer: C
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: B
Explanation:

5. Right Answer: B
Explanation:

0 Comments

Leave a comment