Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 70

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 70

1. Which of the following is MOST important for an information security manager to ensure is included in a business case for a new system?

A) Intangible benefits of the system
B) Risk associated with the system
C) Effectiveness of controls
D) Audit-logging capabilities



2. During a post-incident review. the sequence and correlation of actions must be analyzed PRIMARLY based on:

A) interviews with personnel
B) a consolidated event time line
C) logs from systems involved
D) documents created during the incident



3. Which of the following BEST enables effective closure of noncompliance issues?

A) Insuring against the risk
B) Performing control self-assessments
C) Capturing issues in a risk register
D) Executing an approved mitigation plan



4. The BEST way to obtain funding from senior management for a security awareness program is to:

A) meet regulatory requirements
B) produce an impact analysis report of potential breaches
C) demonstrate that the program will adequately reduce risk
D) produce a report of organizational risks



5. In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?

A) Data encryption
B) Access to the hardware
C) Compressed customer data
D) Non-standard event logs



1. Right Answer: A
Explanation:

2. Right Answer: C
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: B
Explanation:

5. Right Answer: B
Explanation:

0 Comments

Leave a comment