{"id":105199,"date":"2025-07-04T03:55:38","date_gmt":"2025-07-04T03:55:38","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=105199"},"modified":"2025-08-02T03:37:53","modified_gmt":"2025-08-02T03:37:53","slug":"cisa-dumps-v20-02-are-valid-for-exam-preparation-check-cisa-free-dumps-part-2-q41-q80-first","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/cisa-dumps-v20-02-are-valid-for-exam-preparation-check-cisa-free-dumps-part-2-q41-q80-first.html","title":{"rendered":"CISA Dumps (V20.02) Are Valid for Exam Preparation: Check CISA Free Dumps (Part 2, Q41-Q80) First"},"content":{"rendered":"<p>DumpsBase comes with up to one year of free updates, ensuring alignment with the most exam objectives, including the Certified Information Systems Auditor (CISA) exam dumps. The CISA dumps (V20.02) are available to provide everything needed for productive study and successful certification. We have shared the <a href=\"https:\/\/www.dumpsbase.com\/freedumps\/use-updated-cisa-dumps-v20-02-to-prepare-for-your-certified-information-systems-auditor-cisa-exam-on-your-terms-check-cisa-free-dumps-part-1-q1-q40-online.html\"><em><strong>CISA free dumps (Part 1, Q1-Q40) of V20.02<\/strong><\/em><\/a> online to help you check the quality. From these demo questions, you can find that DumpsBase should be your good partner, ensuring you pass the Certified Information Systems Auditor (CISA) exam successfully. Steady practicing with these updated CISA dumps (V20.02) significantly enhances your chances of nailing the Certified Information Systems Auditor (CISA) certification exam on the first attempt.<\/p>\n<h2>Check more demos, <em><span style=\"background-color: #00ff00;\">CISA free dumps (Part 2, Q41-Q80) below<\/span><\/em>, to verify the V20.02 online:<\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam9721\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-9721\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-9721\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-388079'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>A proper audit trail of changes to server start-up procedures would include evidence of:<\/div><input type='hidden' name='question_id[]' id='qID_1' value='388079' \/><input type='hidden' id='answerType388079' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388079[]' id='answer-id-1509196' class='answer   answerof-388079 ' value='1509196'   \/><label for='answer-id-1509196' id='answer-label-1509196' class=' answer'><span>subsystem structure.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388079[]' id='answer-id-1509197' class='answer   answerof-388079 ' value='1509197'   \/><label for='answer-id-1509197' id='answer-label-1509197' class=' answer'><span>program execution.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388079[]' id='answer-id-1509198' class='answer   answerof-388079 ' value='1509198'   \/><label for='answer-id-1509198' id='answer-label-1509198' class=' answer'><span>security control options.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388079[]' id='answer-id-1509199' class='answer   answerof-388079 ' value='1509199'   \/><label for='answer-id-1509199' id='answer-label-1509199' class=' answer'><span>operator overrides.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-388080'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>Which of the following would be a result of utilizing a top-down maturity model process?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='388080' \/><input type='hidden' id='answerType388080' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388080[]' id='answer-id-1509200' class='answer   answerof-388080 ' value='1509200'   \/><label for='answer-id-1509200' id='answer-label-1509200' class=' answer'><span>A means of benchmarking the effectiveness of similar processes with peers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388080[]' id='answer-id-1509201' class='answer   answerof-388080 ' value='1509201'   \/><label for='answer-id-1509201' id='answer-label-1509201' class=' answer'><span>A means of comparing the effectiveness of other processes within the enterprise<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388080[]' id='answer-id-1509202' class='answer   answerof-388080 ' value='1509202'   \/><label for='answer-id-1509202' id='answer-label-1509202' class=' answer'><span>Identification of older, more established processes to ensure timely review<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388080[]' id='answer-id-1509203' class='answer   answerof-388080 ' value='1509203'   \/><label for='answer-id-1509203' id='answer-label-1509203' class=' answer'><span>Identification of processes with the most improvement opportunities<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-388081'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>Which audit approach is MOST helpful in optimizing the use of IS audit resources?<\/div><input type='hidden' name='question_id[]' id='qID_3' value='388081' \/><input type='hidden' id='answerType388081' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388081[]' id='answer-id-1509204' class='answer   answerof-388081 ' value='1509204'   \/><label for='answer-id-1509204' id='answer-label-1509204' class=' answer'><span>Agile auditing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388081[]' id='answer-id-1509205' class='answer   answerof-388081 ' value='1509205'   \/><label for='answer-id-1509205' id='answer-label-1509205' class=' answer'><span>Continuous auditing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388081[]' id='answer-id-1509206' class='answer   answerof-388081 ' value='1509206'   \/><label for='answer-id-1509206' id='answer-label-1509206' class=' answer'><span>Outsourced auditing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388081[]' id='answer-id-1509207' class='answer   answerof-388081 ' value='1509207'   \/><label for='answer-id-1509207' id='answer-label-1509207' class=' answer'><span>Risk-based auditing<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-388082'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='388082' \/><input type='hidden' id='answerType388082' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388082[]' id='answer-id-1509208' class='answer   answerof-388082 ' value='1509208'   \/><label for='answer-id-1509208' id='answer-label-1509208' class=' answer'><span>Annual sign-off of acceptable use policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388082[]' id='answer-id-1509209' class='answer   answerof-388082 ' value='1509209'   \/><label for='answer-id-1509209' id='answer-label-1509209' class=' answer'><span>Regular monitoring of user access logs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388082[]' id='answer-id-1509210' class='answer   answerof-388082 ' value='1509210'   \/><label for='answer-id-1509210' id='answer-label-1509210' class=' answer'><span>Security awareness training<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388082[]' id='answer-id-1509211' class='answer   answerof-388082 ' value='1509211'   \/><label for='answer-id-1509211' id='answer-label-1509211' class=' answer'><span>Formalized disciplinary action<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-388083'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>Which of the following BEST guards against the risk of attack by hackers?<\/div><input type='hidden' name='question_id[]' id='qID_5' value='388083' \/><input type='hidden' id='answerType388083' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388083[]' id='answer-id-1509212' class='answer   answerof-388083 ' value='1509212'   \/><label for='answer-id-1509212' id='answer-label-1509212' class=' answer'><span>Tunneling<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388083[]' id='answer-id-1509213' class='answer   answerof-388083 ' value='1509213'   \/><label for='answer-id-1509213' id='answer-label-1509213' class=' answer'><span>Encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388083[]' id='answer-id-1509214' class='answer   answerof-388083 ' value='1509214'   \/><label for='answer-id-1509214' id='answer-label-1509214' class=' answer'><span>Message validation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388083[]' id='answer-id-1509215' class='answer   answerof-388083 ' value='1509215'   \/><label for='answer-id-1509215' id='answer-label-1509215' class=' answer'><span>Firewalls<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-388084'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>A system development project is experiencing delays due to ongoing staff shortages. <br \/>\r<br>Which of the following strategies would provide the GREATEST assurance of system quality at implementation?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='388084' \/><input type='hidden' id='answerType388084' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388084[]' id='answer-id-1509216' class='answer   answerof-388084 ' value='1509216'   \/><label for='answer-id-1509216' id='answer-label-1509216' class=' answer'><span>Implement overtime pay and bonuses for all development staff.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388084[]' id='answer-id-1509217' class='answer   answerof-388084 ' value='1509217'   \/><label for='answer-id-1509217' id='answer-label-1509217' class=' answer'><span>Utilize new system development tools to improve productivity.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388084[]' id='answer-id-1509218' class='answer   answerof-388084 ' value='1509218'   \/><label for='answer-id-1509218' id='answer-label-1509218' class=' answer'><span>Recruit IS staff to expedite system development.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388084[]' id='answer-id-1509219' class='answer   answerof-388084 ' value='1509219'   \/><label for='answer-id-1509219' id='answer-label-1509219' class=' answer'><span>Deliver only the core functionality on the initial target date.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-388085'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>Which of the following should be done FIRST when planning a penetration test?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='388085' \/><input type='hidden' id='answerType388085' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388085[]' id='answer-id-1509220' class='answer   answerof-388085 ' value='1509220'   \/><label for='answer-id-1509220' id='answer-label-1509220' class=' answer'><span>Execute nondisclosure agreements (NDAs).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388085[]' id='answer-id-1509221' class='answer   answerof-388085 ' value='1509221'   \/><label for='answer-id-1509221' id='answer-label-1509221' class=' answer'><span>Determine reporting requirements for vulnerabilities.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388085[]' id='answer-id-1509222' class='answer   answerof-388085 ' value='1509222'   \/><label for='answer-id-1509222' id='answer-label-1509222' class=' answer'><span>Define the testing scope.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388085[]' id='answer-id-1509223' class='answer   answerof-388085 ' value='1509223'   \/><label for='answer-id-1509223' id='answer-label-1509223' class=' answer'><span>Obtain management consent for the testing.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-388086'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. <br \/>\r<br>Which of the following is MOST important for the organization to ensure?<\/div><input type='hidden' name='question_id[]' id='qID_8' value='388086' \/><input type='hidden' id='answerType388086' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388086[]' id='answer-id-1509224' class='answer   answerof-388086 ' value='1509224'   \/><label for='answer-id-1509224' id='answer-label-1509224' class=' answer'><span>The policy includes a strong risk-based approach.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388086[]' id='answer-id-1509225' class='answer   answerof-388086 ' value='1509225'   \/><label for='answer-id-1509225' id='answer-label-1509225' class=' answer'><span>The retention period allows for review during the year-end audit.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388086[]' id='answer-id-1509226' class='answer   answerof-388086 ' value='1509226'   \/><label for='answer-id-1509226' id='answer-label-1509226' class=' answer'><span>The total transaction amount has no impact on financial reporting.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388086[]' id='answer-id-1509227' class='answer   answerof-388086 ' value='1509227'   \/><label for='answer-id-1509227' id='answer-label-1509227' class=' answer'><span>The retention period complies with data owner responsibilities.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-388087'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?<\/div><input type='hidden' name='question_id[]' id='qID_9' value='388087' \/><input type='hidden' id='answerType388087' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388087[]' id='answer-id-1509228' class='answer   answerof-388087 ' value='1509228'   \/><label for='answer-id-1509228' id='answer-label-1509228' class=' answer'><span>Rollback strategy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388087[]' id='answer-id-1509229' class='answer   answerof-388087 ' value='1509229'   \/><label for='answer-id-1509229' id='answer-label-1509229' class=' answer'><span>Test cases<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388087[]' id='answer-id-1509230' class='answer   answerof-388087 ' value='1509230'   \/><label for='answer-id-1509230' id='answer-label-1509230' class=' answer'><span>Post-implementation review objectives<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388087[]' id='answer-id-1509231' class='answer   answerof-388087 ' value='1509231'   \/><label for='answer-id-1509231' id='answer-label-1509231' class=' answer'><span>Business case<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-388088'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization's goals?<\/div><input type='hidden' name='question_id[]' id='qID_10' value='388088' \/><input type='hidden' id='answerType388088' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388088[]' id='answer-id-1509232' class='answer   answerof-388088 ' value='1509232'   \/><label for='answer-id-1509232' id='answer-label-1509232' class=' answer'><span>Balanced scorecard<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388088[]' id='answer-id-1509233' class='answer   answerof-388088 ' value='1509233'   \/><label for='answer-id-1509233' id='answer-label-1509233' class=' answer'><span>Enterprise dashboard<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388088[]' id='answer-id-1509234' class='answer   answerof-388088 ' value='1509234'   \/><label for='answer-id-1509234' id='answer-label-1509234' class=' answer'><span>Enterprise architecture (EA)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388088[]' id='answer-id-1509235' class='answer   answerof-388088 ' value='1509235'   \/><label for='answer-id-1509235' id='answer-label-1509235' class=' answer'><span>Key performance indicators (KPIs)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-388089'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not <br \/>\r<br>been performed. The auditor should FIRST<\/div><input type='hidden' name='question_id[]' id='qID_11' value='388089' \/><input type='hidden' id='answerType388089' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388089[]' id='answer-id-1509236' class='answer   answerof-388089 ' value='1509236'   \/><label for='answer-id-1509236' id='answer-label-1509236' class=' answer'><span>perform a business impact analysis (BIA).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388089[]' id='answer-id-1509237' class='answer   answerof-388089 ' value='1509237'   \/><label for='answer-id-1509237' id='answer-label-1509237' class=' answer'><span>issue an intermediate report to management.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388089[]' id='answer-id-1509238' class='answer   answerof-388089 ' value='1509238'   \/><label for='answer-id-1509238' id='answer-label-1509238' class=' answer'><span>evaluate the impact on current disaster recovery capability.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388089[]' id='answer-id-1509239' class='answer   answerof-388089 ' value='1509239'   \/><label for='answer-id-1509239' id='answer-label-1509239' class=' answer'><span>conduct additional compliance testing.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-388090'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?<\/div><input type='hidden' name='question_id[]' id='qID_12' value='388090' \/><input type='hidden' id='answerType388090' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388090[]' id='answer-id-1509240' class='answer   answerof-388090 ' value='1509240'   \/><label for='answer-id-1509240' id='answer-label-1509240' class=' answer'><span>Monitor access to stored images and snapshots of virtual machines.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388090[]' id='answer-id-1509241' class='answer   answerof-388090 ' value='1509241'   \/><label for='answer-id-1509241' id='answer-label-1509241' class=' answer'><span>Restrict access to images and snapshots of virtual machines.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388090[]' id='answer-id-1509242' class='answer   answerof-388090 ' value='1509242'   \/><label for='answer-id-1509242' id='answer-label-1509242' class=' answer'><span>Limit creation of virtual machine images and snapshots.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388090[]' id='answer-id-1509243' class='answer   answerof-388090 ' value='1509243'   \/><label for='answer-id-1509243' id='answer-label-1509243' class=' answer'><span>Review logical access controls on virtual machines regularly.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-388091'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>An IS auditor is examining a front-end subledger and a main ledger. <br \/>\r<br>Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?<\/div><input type='hidden' name='question_id[]' id='qID_13' value='388091' \/><input type='hidden' id='answerType388091' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388091[]' id='answer-id-1509244' class='answer   answerof-388091 ' value='1509244'   \/><label for='answer-id-1509244' id='answer-label-1509244' class=' answer'><span>Double-posting of a single journal entry<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388091[]' id='answer-id-1509245' class='answer   answerof-388091 ' value='1509245'   \/><label for='answer-id-1509245' id='answer-label-1509245' class=' answer'><span>Inability to support new business transactions<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388091[]' id='answer-id-1509246' class='answer   answerof-388091 ' value='1509246'   \/><label for='answer-id-1509246' id='answer-label-1509246' class=' answer'><span>Unauthorized alteration of account attributes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388091[]' id='answer-id-1509247' class='answer   answerof-388091 ' value='1509247'   \/><label for='answer-id-1509247' id='answer-label-1509247' class=' answer'><span>Inaccuracy of financial reporting<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-388092'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>What is MOST important to verify during an external assessment of network vulnerability?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='388092' \/><input type='hidden' id='answerType388092' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388092[]' id='answer-id-1509248' class='answer   answerof-388092 ' value='1509248'   \/><label for='answer-id-1509248' id='answer-label-1509248' class=' answer'><span>Update of security information event management (SIEM) rules<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388092[]' id='answer-id-1509249' class='answer   answerof-388092 ' value='1509249'   \/><label for='answer-id-1509249' id='answer-label-1509249' class=' answer'><span>Regular review of the network security policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388092[]' id='answer-id-1509250' class='answer   answerof-388092 ' value='1509250'   \/><label for='answer-id-1509250' id='answer-label-1509250' class=' answer'><span>Completeness of network asset inventory<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388092[]' id='answer-id-1509251' class='answer   answerof-388092 ' value='1509251'   \/><label for='answer-id-1509251' id='answer-label-1509251' class=' answer'><span>Location of intrusion detection systems (IDS)<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-388093'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>A data breach has occurred due lo malware. <br \/>\r<br>Which of the following should be the FIRST course of action?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='388093' \/><input type='hidden' id='answerType388093' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388093[]' id='answer-id-1509252' class='answer   answerof-388093 ' value='1509252'   \/><label for='answer-id-1509252' id='answer-label-1509252' class=' answer'><span>Notify the cyber insurance company.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388093[]' id='answer-id-1509253' class='answer   answerof-388093 ' value='1509253'   \/><label for='answer-id-1509253' id='answer-label-1509253' class=' answer'><span>Shut down the affected systems.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388093[]' id='answer-id-1509254' class='answer   answerof-388093 ' value='1509254'   \/><label for='answer-id-1509254' id='answer-label-1509254' class=' answer'><span>Quarantine the impacted systems.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388093[]' id='answer-id-1509255' class='answer   answerof-388093 ' value='1509255'   \/><label for='answer-id-1509255' id='answer-label-1509255' class=' answer'><span>Notify customers of the breach.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-388094'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>Which of the following should an IS auditor be MOST concerned with during a post-implementation review?<\/div><input type='hidden' name='question_id[]' id='qID_16' value='388094' \/><input type='hidden' id='answerType388094' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388094[]' id='answer-id-1509256' class='answer   answerof-388094 ' value='1509256'   \/><label for='answer-id-1509256' id='answer-label-1509256' class=' answer'><span>The system does not have a maintenance plan.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388094[]' id='answer-id-1509257' class='answer   answerof-388094 ' value='1509257'   \/><label for='answer-id-1509257' id='answer-label-1509257' class=' answer'><span>The system contains several minor defects.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388094[]' id='answer-id-1509258' class='answer   answerof-388094 ' value='1509258'   \/><label for='answer-id-1509258' id='answer-label-1509258' class=' answer'><span>The system deployment was delayed by three weeks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388094[]' id='answer-id-1509259' class='answer   answerof-388094 ' value='1509259'   \/><label for='answer-id-1509259' id='answer-label-1509259' class=' answer'><span>The system was over budget by 15%.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-388095'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?<\/div><input type='hidden' name='question_id[]' id='qID_17' value='388095' \/><input type='hidden' id='answerType388095' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388095[]' id='answer-id-1509260' class='answer   answerof-388095 ' value='1509260'   \/><label for='answer-id-1509260' id='answer-label-1509260' class=' answer'><span>Frequent testing of backups<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388095[]' id='answer-id-1509261' class='answer   answerof-388095 ' value='1509261'   \/><label for='answer-id-1509261' id='answer-label-1509261' class=' answer'><span>Annual walk-through testing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388095[]' id='answer-id-1509262' class='answer   answerof-388095 ' value='1509262'   \/><label for='answer-id-1509262' id='answer-label-1509262' class=' answer'><span>Periodic risk assessment<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388095[]' id='answer-id-1509263' class='answer   answerof-388095 ' value='1509263'   \/><label for='answer-id-1509263' id='answer-label-1509263' class=' answer'><span>Full operational test<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-388096'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>Which of the following is the BEST way to mitigate the impact of ransomware attacks?<\/div><input type='hidden' name='question_id[]' id='qID_18' value='388096' \/><input type='hidden' id='answerType388096' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388096[]' id='answer-id-1509264' class='answer   answerof-388096 ' value='1509264'   \/><label for='answer-id-1509264' id='answer-label-1509264' class=' answer'><span>Invoking the disaster recovery plan (DRP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388096[]' id='answer-id-1509265' class='answer   answerof-388096 ' value='1509265'   \/><label for='answer-id-1509265' id='answer-label-1509265' class=' answer'><span>Backing up data frequently<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388096[]' id='answer-id-1509266' class='answer   answerof-388096 ' value='1509266'   \/><label for='answer-id-1509266' id='answer-label-1509266' class=' answer'><span>Paying the ransom<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388096[]' id='answer-id-1509267' class='answer   answerof-388096 ' value='1509267'   \/><label for='answer-id-1509267' id='answer-label-1509267' class=' answer'><span>Requiring password changes for administrative accounts<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-388097'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. <br \/>\r<br>Which of the following is the IS auditor's BEST recommendation?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='388097' \/><input type='hidden' id='answerType388097' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388097[]' id='answer-id-1509268' class='answer   answerof-388097 ' value='1509268'   \/><label for='answer-id-1509268' id='answer-label-1509268' class=' answer'><span>Ensure corrected program code is compiled in a dedicated server.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388097[]' id='answer-id-1509269' class='answer   answerof-388097 ' value='1509269'   \/><label for='answer-id-1509269' id='answer-label-1509269' class=' answer'><span>Ensure change management reports are independently reviewed.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388097[]' id='answer-id-1509270' class='answer   answerof-388097 ' value='1509270'   \/><label for='answer-id-1509270' id='answer-label-1509270' class=' answer'><span>Ensure programmers cannot access code after the completion of program edits.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388097[]' id='answer-id-1509271' class='answer   answerof-388097 ' value='1509271'   \/><label for='answer-id-1509271' id='answer-label-1509271' class=' answer'><span>Ensure the business signs off on end-to-end user acceptance test (UAT) results.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-388098'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>Documentation of workaround processes to keep a business function operational during recovery of <br \/>\r<br>IT systems is a core part of a:<\/div><input type='hidden' name='question_id[]' id='qID_20' value='388098' \/><input type='hidden' id='answerType388098' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388098[]' id='answer-id-1509272' class='answer   answerof-388098 ' value='1509272'   \/><label for='answer-id-1509272' id='answer-label-1509272' class=' answer'><span>business impact analysis (BIA).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388098[]' id='answer-id-1509273' class='answer   answerof-388098 ' value='1509273'   \/><label for='answer-id-1509273' id='answer-label-1509273' class=' answer'><span>threat and risk assessment.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388098[]' id='answer-id-1509274' class='answer   answerof-388098 ' value='1509274'   \/><label for='answer-id-1509274' id='answer-label-1509274' class=' answer'><span>business continuity plan (BCP).<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388098[]' id='answer-id-1509275' class='answer   answerof-388098 ' value='1509275'   \/><label for='answer-id-1509275' id='answer-label-1509275' class=' answer'><span>disaster recovery plan (DRP).<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-388099'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>Which of the following strategies BEST optimizes data storage without compromising data retention practices?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='388099' \/><input type='hidden' id='answerType388099' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388099[]' id='answer-id-1509276' class='answer   answerof-388099 ' value='1509276'   \/><label for='answer-id-1509276' id='answer-label-1509276' class=' answer'><span>Limiting the size of file attachments being sent via email<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388099[]' id='answer-id-1509277' class='answer   answerof-388099 ' value='1509277'   \/><label for='answer-id-1509277' id='answer-label-1509277' class=' answer'><span>Automatically deleting emails older than one year<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388099[]' id='answer-id-1509278' class='answer   answerof-388099 ' value='1509278'   \/><label for='answer-id-1509278' id='answer-label-1509278' class=' answer'><span>Moving emails to a virtual email vault after 30 days<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388099[]' id='answer-id-1509279' class='answer   answerof-388099 ' value='1509279'   \/><label for='answer-id-1509279' id='answer-label-1509279' class=' answer'><span>Allowing employees to store large emails on flash drives<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-388100'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?<\/div><input type='hidden' name='question_id[]' id='qID_22' value='388100' \/><input type='hidden' id='answerType388100' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388100[]' id='answer-id-1509280' class='answer   answerof-388100 ' value='1509280'   \/><label for='answer-id-1509280' id='answer-label-1509280' class=' answer'><span>Align service level agreements (SLAs) with current needs.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388100[]' id='answer-id-1509281' class='answer   answerof-388100 ' value='1509281'   \/><label for='answer-id-1509281' id='answer-label-1509281' class=' answer'><span>Monitor customer satisfaction with the change.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388100[]' id='answer-id-1509282' class='answer   answerof-388100 ' value='1509282'   \/><label for='answer-id-1509282' id='answer-label-1509282' class=' answer'><span>Minimize costs related to the third-party agreement.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388100[]' id='answer-id-1509283' class='answer   answerof-388100 ' value='1509283'   \/><label for='answer-id-1509283' id='answer-label-1509283' class=' answer'><span>Ensure right to audit is included within the contract.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-388101'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>To confirm integrity for a hashed message, the receiver should use:<\/div><input type='hidden' name='question_id[]' id='qID_23' value='388101' \/><input type='hidden' id='answerType388101' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388101[]' id='answer-id-1509284' class='answer   answerof-388101 ' value='1509284'   \/><label for='answer-id-1509284' id='answer-label-1509284' class=' answer'><span>the same hashing algorithm as the sender's to create a binary image of the file.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388101[]' id='answer-id-1509285' class='answer   answerof-388101 ' value='1509285'   \/><label for='answer-id-1509285' id='answer-label-1509285' class=' answer'><span>a different hashing algorithm from the sender's to create a binary image of the file.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388101[]' id='answer-id-1509286' class='answer   answerof-388101 ' value='1509286'   \/><label for='answer-id-1509286' id='answer-label-1509286' class=' answer'><span>the same hashing algorithm as the sender's to create a numerical representation of the file.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388101[]' id='answer-id-1509287' class='answer   answerof-388101 ' value='1509287'   \/><label for='answer-id-1509287' id='answer-label-1509287' class=' answer'><span>a different hashing algorithm from the sender's to create a numerical representation of the file.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-388102'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>Which of the following is MOST important to ensure when planning a black box penetration test?<\/div><input type='hidden' name='question_id[]' id='qID_24' value='388102' \/><input type='hidden' id='answerType388102' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388102[]' id='answer-id-1509288' class='answer   answerof-388102 ' value='1509288'   \/><label for='answer-id-1509288' id='answer-label-1509288' class=' answer'><span>The management of the client organization is aware of the testing.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388102[]' id='answer-id-1509289' class='answer   answerof-388102 ' value='1509289'   \/><label for='answer-id-1509289' id='answer-label-1509289' class=' answer'><span>The test results will be documented and communicated to management.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388102[]' id='answer-id-1509290' class='answer   answerof-388102 ' value='1509290'   \/><label for='answer-id-1509290' id='answer-label-1509290' class=' answer'><span>The environment and penetration test scope have been determined.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388102[]' id='answer-id-1509291' class='answer   answerof-388102 ' value='1509291'   \/><label for='answer-id-1509291' id='answer-label-1509291' class=' answer'><span>Diagrams of the organization's network architecture are available.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-388103'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>Which of the following is the BEST method to safeguard data on an organization's laptop computers?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='388103' \/><input type='hidden' id='answerType388103' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388103[]' id='answer-id-1509292' class='answer   answerof-388103 ' value='1509292'   \/><label for='answer-id-1509292' id='answer-label-1509292' class=' answer'><span>Disabled USB ports<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388103[]' id='answer-id-1509293' class='answer   answerof-388103 ' value='1509293'   \/><label for='answer-id-1509293' id='answer-label-1509293' class=' answer'><span>Full disk encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388103[]' id='answer-id-1509294' class='answer   answerof-388103 ' value='1509294'   \/><label for='answer-id-1509294' id='answer-label-1509294' class=' answer'><span>Biometric access control<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388103[]' id='answer-id-1509295' class='answer   answerof-388103 ' value='1509295'   \/><label for='answer-id-1509295' id='answer-label-1509295' class=' answer'><span>Two-factor authentication<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-388104'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>An IS auditor is planning an audit of an organization's accounts payable processes. <br \/>\r<br>Which of the following controls is MOST important to assess in the audit?<\/div><input type='hidden' name='question_id[]' id='qID_26' value='388104' \/><input type='hidden' id='answerType388104' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388104[]' id='answer-id-1509296' class='answer   answerof-388104 ' value='1509296'   \/><label for='answer-id-1509296' id='answer-label-1509296' class=' answer'><span>Segregation of duties between issuing purchase orders and making payments.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388104[]' id='answer-id-1509297' class='answer   answerof-388104 ' value='1509297'   \/><label for='answer-id-1509297' id='answer-label-1509297' class=' answer'><span>Segregation of duties between receiving invoices and setting authorization limits<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388104[]' id='answer-id-1509298' class='answer   answerof-388104 ' value='1509298'   \/><label for='answer-id-1509298' id='answer-label-1509298' class=' answer'><span>Management review and approval of authorization tiers<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388104[]' id='answer-id-1509299' class='answer   answerof-388104 ' value='1509299'   \/><label for='answer-id-1509299' id='answer-label-1509299' class=' answer'><span>Management review and approval of purchase orders<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-388105'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='388105' \/><input type='hidden' id='answerType388105' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388105[]' id='answer-id-1509300' class='answer   answerof-388105 ' value='1509300'   \/><label for='answer-id-1509300' id='answer-label-1509300' class=' answer'><span>Incident monitoring togs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388105[]' id='answer-id-1509301' class='answer   answerof-388105 ' value='1509301'   \/><label for='answer-id-1509301' id='answer-label-1509301' class=' answer'><span>The ISP service level agreement<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388105[]' id='answer-id-1509302' class='answer   answerof-388105 ' value='1509302'   \/><label for='answer-id-1509302' id='answer-label-1509302' class=' answer'><span>Reports of network traffic analysis<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388105[]' id='answer-id-1509303' class='answer   answerof-388105 ' value='1509303'   \/><label for='answer-id-1509303' id='answer-label-1509303' class=' answer'><span>Network topology diagrams<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-388106'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. <br \/>\r<br>During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='388106' \/><input type='hidden' id='answerType388106' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388106[]' id='answer-id-1509304' class='answer   answerof-388106 ' value='1509304'   \/><label for='answer-id-1509304' id='answer-label-1509304' class=' answer'><span>Review system and error logs to verify transaction accuracy.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388106[]' id='answer-id-1509305' class='answer   answerof-388106 ' value='1509305'   \/><label for='answer-id-1509305' id='answer-label-1509305' class=' answer'><span>Review input and output control reports to verify the accuracy of the system decisions.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388106[]' id='answer-id-1509306' class='answer   answerof-388106 ' value='1509306'   \/><label for='answer-id-1509306' id='answer-label-1509306' class=' answer'><span>Review signed approvals to ensure responsibilities for decisions of the system are well defined.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388106[]' id='answer-id-1509307' class='answer   answerof-388106 ' value='1509307'   \/><label for='answer-id-1509307' id='answer-label-1509307' class=' answer'><span>Review system documentation to ensure completeness.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-388107'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>What is the BEST control to address SQL injection vulnerabilities?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='388107' \/><input type='hidden' id='answerType388107' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388107[]' id='answer-id-1509308' class='answer   answerof-388107 ' value='1509308'   \/><label for='answer-id-1509308' id='answer-label-1509308' class=' answer'><span>Unicode translation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388107[]' id='answer-id-1509309' class='answer   answerof-388107 ' value='1509309'   \/><label for='answer-id-1509309' id='answer-label-1509309' class=' answer'><span>Secure Sockets Layer (SSL) encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388107[]' id='answer-id-1509310' class='answer   answerof-388107 ' value='1509310'   \/><label for='answer-id-1509310' id='answer-label-1509310' class=' answer'><span>Input validation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388107[]' id='answer-id-1509311' class='answer   answerof-388107 ' value='1509311'   \/><label for='answer-id-1509311' id='answer-label-1509311' class=' answer'><span>Digital signatures<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-388108'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. <br \/>\r<br>Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='388108' \/><input type='hidden' id='answerType388108' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388108[]' id='answer-id-1509312' class='answer   answerof-388108 ' value='1509312'   \/><label for='answer-id-1509312' id='answer-label-1509312' class=' answer'><span>Assign responsibility for improving data quality.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388108[]' id='answer-id-1509313' class='answer   answerof-388108 ' value='1509313'   \/><label for='answer-id-1509313' id='answer-label-1509313' class=' answer'><span>Invest in additional employee training for data entry.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388108[]' id='answer-id-1509314' class='answer   answerof-388108 ' value='1509314'   \/><label for='answer-id-1509314' id='answer-label-1509314' class=' answer'><span>Outsource data cleansing activities to reliable third parties.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388108[]' id='answer-id-1509315' class='answer   answerof-388108 ' value='1509315'   \/><label for='answer-id-1509315' id='answer-label-1509315' class=' answer'><span>Implement business rules to validate employee data entry.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-388109'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>Which of the following components of a risk assessment is MOST helpful to management in determining the level of risk mitigation to apply?<\/div><input type='hidden' name='question_id[]' id='qID_31' value='388109' \/><input type='hidden' id='answerType388109' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388109[]' id='answer-id-1509316' class='answer   answerof-388109 ' value='1509316'   \/><label for='answer-id-1509316' id='answer-label-1509316' class=' answer'><span>Risk identification<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388109[]' id='answer-id-1509317' class='answer   answerof-388109 ' value='1509317'   \/><label for='answer-id-1509317' id='answer-label-1509317' class=' answer'><span>Risk classification<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388109[]' id='answer-id-1509318' class='answer   answerof-388109 ' value='1509318'   \/><label for='answer-id-1509318' id='answer-label-1509318' class=' answer'><span>Control self-assessment (CSA)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388109[]' id='answer-id-1509319' class='answer   answerof-388109 ' value='1509319'   \/><label for='answer-id-1509319' id='answer-label-1509319' class=' answer'><span>Impact assessment<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-388110'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>Which of the following would BEST facilitate the successful implementation of an IT-related framework?<\/div><input type='hidden' name='question_id[]' id='qID_32' value='388110' \/><input type='hidden' id='answerType388110' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388110[]' id='answer-id-1509320' class='answer   answerof-388110 ' value='1509320'   \/><label for='answer-id-1509320' id='answer-label-1509320' class=' answer'><span>Aligning the framework to industry best practices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388110[]' id='answer-id-1509321' class='answer   answerof-388110 ' value='1509321'   \/><label for='answer-id-1509321' id='answer-label-1509321' class=' answer'><span>Establishing committees to support and oversee framework activities<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388110[]' id='answer-id-1509322' class='answer   answerof-388110 ' value='1509322'   \/><label for='answer-id-1509322' id='answer-label-1509322' class=' answer'><span>Involving appropriate business representation within the framework<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388110[]' id='answer-id-1509323' class='answer   answerof-388110 ' value='1509323'   \/><label for='answer-id-1509323' id='answer-label-1509323' class=' answer'><span>Documenting IT-related policies and procedures<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-388111'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. <br \/>\r<br>The auditor's NEXT step should be to:<\/div><input type='hidden' name='question_id[]' id='qID_33' value='388111' \/><input type='hidden' id='answerType388111' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388111[]' id='answer-id-1509324' class='answer   answerof-388111 ' value='1509324'   \/><label for='answer-id-1509324' id='answer-label-1509324' class=' answer'><span>note the noncompliance in the audit working papers.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388111[]' id='answer-id-1509325' class='answer   answerof-388111 ' value='1509325'   \/><label for='answer-id-1509325' id='answer-label-1509325' class=' answer'><span>issue an audit memorandum identifying the noncompliance.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388111[]' id='answer-id-1509326' class='answer   answerof-388111 ' value='1509326'   \/><label for='answer-id-1509326' id='answer-label-1509326' class=' answer'><span>include the noncompliance in the audit report.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388111[]' id='answer-id-1509327' class='answer   answerof-388111 ' value='1509327'   \/><label for='answer-id-1509327' id='answer-label-1509327' class=' answer'><span>determine why the procedures were not followed.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-388112'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?<\/div><input type='hidden' name='question_id[]' id='qID_34' value='388112' \/><input type='hidden' id='answerType388112' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388112[]' id='answer-id-1509328' class='answer   answerof-388112 ' value='1509328'   \/><label for='answer-id-1509328' id='answer-label-1509328' class=' answer'><span>Assurance that the new system meets functional requirements<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388112[]' id='answer-id-1509329' class='answer   answerof-388112 ' value='1509329'   \/><label for='answer-id-1509329' id='answer-label-1509329' class=' answer'><span>More time for users to complete training for the new system<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388112[]' id='answer-id-1509330' class='answer   answerof-388112 ' value='1509330'   \/><label for='answer-id-1509330' id='answer-label-1509330' class=' answer'><span>Significant cost savings over other system implemental or approaches<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388112[]' id='answer-id-1509331' class='answer   answerof-388112 ' value='1509331'   \/><label for='answer-id-1509331' id='answer-label-1509331' class=' answer'><span>Assurance that the new system meets performance requirements<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-388113'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:<\/div><input type='hidden' name='question_id[]' id='qID_35' value='388113' \/><input type='hidden' id='answerType388113' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388113[]' id='answer-id-1509332' class='answer   answerof-388113 ' value='1509332'   \/><label for='answer-id-1509332' id='answer-label-1509332' class=' answer'><span>establish criteria for reviewing alerts.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388113[]' id='answer-id-1509333' class='answer   answerof-388113 ' value='1509333'   \/><label for='answer-id-1509333' id='answer-label-1509333' class=' answer'><span>recruit more monitoring personnel.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388113[]' id='answer-id-1509334' class='answer   answerof-388113 ' value='1509334'   \/><label for='answer-id-1509334' id='answer-label-1509334' class=' answer'><span>reduce the firewall rules.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388113[]' id='answer-id-1509335' class='answer   answerof-388113 ' value='1509335'   \/><label for='answer-id-1509335' id='answer-label-1509335' class=' answer'><span>fine tune the intrusion detection system (IDS).<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-36' style=';'><div id='questionWrap-36'  class='   watupro-question-id-388114'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>36. <\/span>Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?<\/div><input type='hidden' name='question_id[]' id='qID_36' value='388114' \/><input type='hidden' id='answerType388114' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388114[]' id='answer-id-1509336' class='answer   answerof-388114 ' value='1509336'   \/><label for='answer-id-1509336' id='answer-label-1509336' class=' answer'><span>Assignment of responsibility for each project to an IT team member<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388114[]' id='answer-id-1509337' class='answer   answerof-388114 ' value='1509337'   \/><label for='answer-id-1509337' id='answer-label-1509337' class=' answer'><span>Adherence to best practice and industry approved methodologies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388114[]' id='answer-id-1509338' class='answer   answerof-388114 ' value='1509338'   \/><label for='answer-id-1509338' id='answer-label-1509338' class=' answer'><span>Controls to minimize risk and maximize value for the IT portfolio<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388114[]' id='answer-id-1509339' class='answer   answerof-388114 ' value='1509339'   \/><label for='answer-id-1509339' id='answer-label-1509339' class=' answer'><span>Frequency of meetings where the business discusses the IT portfolio<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-37' style=';'><div id='questionWrap-37'  class='   watupro-question-id-388115'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>37. <\/span>Which of the following should be the PRIMARY basis for prioritizing follow-up audits?<\/div><input type='hidden' name='question_id[]' id='qID_37' value='388115' \/><input type='hidden' id='answerType388115' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388115[]' id='answer-id-1509340' class='answer   answerof-388115 ' value='1509340'   \/><label for='answer-id-1509340' id='answer-label-1509340' class=' answer'><span>Audit cycle defined in the audit plan<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388115[]' id='answer-id-1509341' class='answer   answerof-388115 ' value='1509341'   \/><label for='answer-id-1509341' id='answer-label-1509341' class=' answer'><span>Complexity of management's action plans<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388115[]' id='answer-id-1509342' class='answer   answerof-388115 ' value='1509342'   \/><label for='answer-id-1509342' id='answer-label-1509342' class=' answer'><span>Recommendation from executive management<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388115[]' id='answer-id-1509343' class='answer   answerof-388115 ' value='1509343'   \/><label for='answer-id-1509343' id='answer-label-1509343' class=' answer'><span>Residual risk from the findings of previous audits<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-38' style=';'><div id='questionWrap-38'  class='   watupro-question-id-388116'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>38. <\/span>Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?<\/div><input type='hidden' name='question_id[]' id='qID_38' value='388116' \/><input type='hidden' id='answerType388116' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388116[]' id='answer-id-1509344' class='answer   answerof-388116 ' value='1509344'   \/><label for='answer-id-1509344' id='answer-label-1509344' class=' answer'><span>File level encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388116[]' id='answer-id-1509345' class='answer   answerof-388116 ' value='1509345'   \/><label for='answer-id-1509345' id='answer-label-1509345' class=' answer'><span>File Transfer Protocol (FTP)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388116[]' id='answer-id-1509346' class='answer   answerof-388116 ' value='1509346'   \/><label for='answer-id-1509346' id='answer-label-1509346' class=' answer'><span>Instant messaging policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388116[]' id='answer-id-1509347' class='answer   answerof-388116 ' value='1509347'   \/><label for='answer-id-1509347' id='answer-label-1509347' class=' answer'><span>Application-level firewalls<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-39' style=';'><div id='questionWrap-39'  class='   watupro-question-id-388117'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>39. <\/span>Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?<\/div><input type='hidden' name='question_id[]' id='qID_39' value='388117' \/><input type='hidden' id='answerType388117' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388117[]' id='answer-id-1509348' class='answer   answerof-388117 ' value='1509348'   \/><label for='answer-id-1509348' id='answer-label-1509348' class=' answer'><span>Blocking attachments in IM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388117[]' id='answer-id-1509349' class='answer   answerof-388117 ' value='1509349'   \/><label for='answer-id-1509349' id='answer-label-1509349' class=' answer'><span>Blocking external IM traffic<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388117[]' id='answer-id-1509350' class='answer   answerof-388117 ' value='1509350'   \/><label for='answer-id-1509350' id='answer-label-1509350' class=' answer'><span>Allowing only corporate IM solutions<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388117[]' id='answer-id-1509351' class='answer   answerof-388117 ' value='1509351'   \/><label for='answer-id-1509351' id='answer-label-1509351' class=' answer'><span>Encrypting IM traffic<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-40' style=';'><div id='questionWrap-40'  class='   watupro-question-id-388118'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>40. <\/span>Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?<\/div><input type='hidden' name='question_id[]' id='qID_40' value='388118' \/><input type='hidden' id='answerType388118' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388118[]' id='answer-id-1509352' class='answer   answerof-388118 ' value='1509352'   \/><label for='answer-id-1509352' id='answer-label-1509352' class=' answer'><span>Portfolio management<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388118[]' id='answer-id-1509353' class='answer   answerof-388118 ' value='1509353'   \/><label for='answer-id-1509353' id='answer-label-1509353' class=' answer'><span>Business plans<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388118[]' id='answer-id-1509354' class='answer   answerof-388118 ' value='1509354'   \/><label for='answer-id-1509354' id='answer-label-1509354' class=' answer'><span>Business processes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-388118[]' id='answer-id-1509355' class='answer   answerof-388118 ' value='1509355'   \/><label for='answer-id-1509355' id='answer-label-1509355' class=' answer'><span>IT strategic plans<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-41'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons9721\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"9721\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-04-13 17:32:29\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1776101549\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"388079:1509196,1509197,1509198,1509199 | 388080:1509200,1509201,1509202,1509203 | 388081:1509204,1509205,1509206,1509207 | 388082:1509208,1509209,1509210,1509211 | 388083:1509212,1509213,1509214,1509215 | 388084:1509216,1509217,1509218,1509219 | 388085:1509220,1509221,1509222,1509223 | 388086:1509224,1509225,1509226,1509227 | 388087:1509228,1509229,1509230,1509231 | 388088:1509232,1509233,1509234,1509235 | 388089:1509236,1509237,1509238,1509239 | 388090:1509240,1509241,1509242,1509243 | 388091:1509244,1509245,1509246,1509247 | 388092:1509248,1509249,1509250,1509251 | 388093:1509252,1509253,1509254,1509255 | 388094:1509256,1509257,1509258,1509259 | 388095:1509260,1509261,1509262,1509263 | 388096:1509264,1509265,1509266,1509267 | 388097:1509268,1509269,1509270,1509271 | 388098:1509272,1509273,1509274,1509275 | 388099:1509276,1509277,1509278,1509279 | 388100:1509280,1509281,1509282,1509283 | 388101:1509284,1509285,1509286,1509287 | 388102:1509288,1509289,1509290,1509291 | 388103:1509292,1509293,1509294,1509295 | 388104:1509296,1509297,1509298,1509299 | 388105:1509300,1509301,1509302,1509303 | 388106:1509304,1509305,1509306,1509307 | 388107:1509308,1509309,1509310,1509311 | 388108:1509312,1509313,1509314,1509315 | 388109:1509316,1509317,1509318,1509319 | 388110:1509320,1509321,1509322,1509323 | 388111:1509324,1509325,1509326,1509327 | 388112:1509328,1509329,1509330,1509331 | 388113:1509332,1509333,1509334,1509335 | 388114:1509336,1509337,1509338,1509339 | 388115:1509340,1509341,1509342,1509343 | 388116:1509344,1509345,1509346,1509347 | 388117:1509348,1509349,1509350,1509351 | 388118:1509352,1509353,1509354,1509355\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"388079,388080,388081,388082,388083,388084,388085,388086,388087,388088,388089,388090,388091,388092,388093,388094,388095,388096,388097,388098,388099,388100,388101,388102,388103,388104,388105,388106,388107,388108,388109,388110,388111,388112,388113,388114,388115,388116,388117,388118\";\nWatuPROSettings[9721] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 9721;\t    \nWatuPRO.post_id = 105199;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.86266800 1776101549\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(9721);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n<p>&nbsp;<\/p>\n<h3>If you want to read more free demos, continue to check the <a href=\"https:\/\/www.dumpsbase.com\/freedumps\/cisa-free-dumps-part-3-q81-q120-are-available-online-to-help-you-continue-to-check-the-cisa-dumps-v20-02-prepare-well-with-the-most-updated-materials.html\"><span style=\"background-color: #00ff00;\"><em>CISA free dumps (Part 3, Q81-Q120) of V20.02<\/em><\/span><\/a> online.<\/h3>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DumpsBase comes with up to one year of free updates, ensuring alignment with the most exam objectives, including the Certified Information Systems Auditor (CISA) exam dumps. The CISA dumps (V20.02) are available to provide everything needed for productive study and successful certification. We have shared the CISA free dumps (Part 1, Q1-Q40) of V20.02 online [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[430,429],"tags":[19235,8619],"class_list":["post-105199","post","type-post","status-publish","format-standard","hentry","category-cisa-certificaton","category-isaca","tag-cisa-demo-questions","tag-cisa-free-dumps"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/105199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=105199"}],"version-history":[{"count":3,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/105199\/revisions"}],"predecessor-version":[{"id":107053,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/105199\/revisions\/107053"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=105199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=105199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=105199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}