To create a digital signature in a message using asymmetric encryption, it is necessary to:
Answer(s): D
During an audit of an access control system, an IS auditor finds that RFID card readers are not connected via the network to a central server. Which of the following is the GREATEST risk associated with this finding?
Answer(s): A
Invoking a business continuity plan (BCP) is demonstrating which type of control?
Answer(s): B
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
The results of an IS audit indicating the need to strengthen controls has been communicated to the appropriate stakeholders. Which of the following is the BEST way for management to enforce implementation of the recommendations?
Answer(s): C
Share your comments for ISACA CISA exam with other users:
the exam dumps are helping me get a solid foundation on the practical techniques and practices needed to be successful in the auditing world.
not bad but you question database from isaca
i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.