Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 36

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 36

1. Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?

A) Patch management
B) Log monitoring
C) Antivirus software
D) Intrusion detection



2. Which of the following is MOST likely to be included in computer operating procedures in a large data center?

A) Instructions for job scheduling
B) Procedures for resequencing source code
C) Procedures for utility configuration
D) Guidance on setting security parameters



3. What is the PRIMARY benefit to executive management when audit, risk, and security functions are aligned?

A) More efficient incident handling
B) Reduced number of assurance reports
C) More effective decision making
D) More timely risk reporting



4. Reevaluation of risk is MOST critical when there is:

A) resistance to the implementation of mitigating controls
B) a change in security policy
C) a management request for updated security reports
D) a change in the threat landscape



5. Which of the following is the MOST important role of the information security manager when the organization is in the process of adopting emerging technologies?

A) Understanding the impact on existing resources
B) Assessing how peer organizations using the same technologies have been impacted
C) Developing training for end users to familiarize them with the new technology
D) Reviewing vendor documentation and service levels agreements



1. Right Answer: A
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: D
Explanation:

5. Right Answer: A
Explanation:

0 Comments

Leave a comment