CISA Protection of Information Assets Practice Exam
- 5 Practice Tests
- Full lifetime access
- Access on mobile
Get your team access to 4,000+ top Udemy courses anytime, anywhere.Try Udemy for Business
- Any one who want to do CISA Protection of Information Assets Practice Exam
Q) Which of the following functions should be performed by the heads of the applications in order to ensure a proper separation of functions between end users and IS?
a) Analysis of the system
b) Data Access Authorization
c) application programming
d) data Management
Q) Responsibility for maintaining adequate security over information assets resides with:
a) Security Administrator
b) system administrator
c) data and proprietary systems.
d) systems operating group.
Q) The greatest risk when end users have access to a database to its system level, rather than through the application, users can:
a) unauthorized changes to the database directly, without an audit trail.
b) make use of a system query language (SQL) to access information.
c) remotely access the database.
d) update data without authentication.
Q) To determine who has been given permission to use a particular system resource, an IS auditor should review:
a) task lists
b) access control lists.
c) access lists ID
d) password lists.
Q) Which of the following is the most effective control in grant temporary access to providers?
a) access provider corresponds to the service level agreement (SLA)
b) User accounts are created with expiration dates and are based on services provided.
c) Administrator access is provided for a limited period.
d) User IDs are deleted when the job is completed.
- Those who want to get knowledge on Certification & Check your Skill Test while attend this Practice Test