Handsome Savings - Limited Time Offer 30% OFF - Ends In 0d 0h 0m 0s Coupon code: 50OFF
Welcome to QA4Exam
Logo

- Trusted Worldwide Questions & Answers

Isaca CISA Exam Actual Questions

The questions for CISA were last updated on Oct 3, 2024.
  • Viewing page 1 out of 239 pages.
  • Viewing questions 1-5 out of 1196 questions
Unlock Access to All 1196 Questions & Answers
Question No. 1

An organization considering the outsourcing of a business application should FIRST:

Show Answer Hide Answer
Correct Answer: D

An RFP is a document used to solicit bids from potential vendors and to outline the requirements for a particular project. It typically includes a description of the project, a list of the requirements, and the criteria for evaluating the bids. The RFP outlines the bidding process and contract terms and establishes a strong foundation for the organization in a procurement process


Question No. 2

Which of the following is an example of a preventive control for physical access?

Show Answer Hide Answer
Correct Answer: B

A fingerprint-based access control system is an example of a preventive control for physical access, as it requires authentication of the user's identity before granting access to the building. Other preventive controls for physical access include using locks and keys, using biometric systems, and using CCTV cameras.


Question No. 3

The BEST way to evaluate the effectiveness of a newly developed application is to:

Show Answer Hide Answer
Correct Answer: D

Acceptance testing is the process of ensuring that a developed application meets the specified requirements and is fit for purpose. This type of testing is usually performed by the customer or users of the application, and is often used to determine if the application is ready for production. Reviewing the results of the acceptance testing is the best way to evaluate the effectiveness of a newly developed application.


Question No. 5

Which type of attack targets security vulnerabilities in web applications to gain access to data sets?

Show Answer Hide Answer
Correct Answer: B

SQL injection is a type of attack that targets security vulnerabilities in web applications to gain access to data sets. It is accomplished by injecting malicious SQL code into user-supplied data fields, allowing the attacker to gain access to and manipulate the underlying database. In addition to gaining access to data, SQL injection can also be used to modify existing data or even delete it. According to ISACA's Certified Information Systems Auditor (CISA) Study Guide, 'SQL injection attacks are the most common type of attack against web applications and databases, and they are a major security concern.'


Product Image

Unlock All Questions for Isaca CISA Exam

Full Exam Access, Actual Exam Questions, Validated Answers, Anytime Anywhere, No Download Limits, No Practice Limits

Get All 1196 Questions & Answers