You are on page 1of 6

Certified Information Systems Auditor CISA Exam Simulator

Software (2400 Questions + 2hr Video)


http://www.atiinfosecurity.com
Try The Program Now, 100% Risk Free, Exam Pass Guaranteed or
money back
http://www.atiinfosecurity.com

1) In general, disgruntled employees, or employees with financial/emotional problems, hackers,


contractors, past employees, maintenance, cleaning and security are involved in theft, abuse,
theft of copyright, embezzlement and crime. For the prevention of these actions it is
necessary:
A.
B.
C.
D.
E.

Network Access Controls;


Prevention Access Controls;
Criminal Employees Controls;
Physical Access Controls;
Theft and Abuse Controls.
Answer: D.

Explanation: Physical Access Controls Prevention of theft, abuse, theft of copyright,


embezzlement and crime: From: disgruntled employees, employees with financial/emotional
problems, hackers, contractors, past employees, maintenance, cleaning, security.
2) To the external organization users, such as customers, passwords, restrictions, signed
agreements and security audits must be passed through physical controls, such as physical
locks, ID badges, guards, logging, electronic locks, cameras and sign ins. What are the most
recommended places to put physical locks?
A.
B.
C.
D.
E.

Warehouse, supply areas, waste areas;


Disposal areas, warehouse, power areas;
Disposal areas, supply areas, power areas;
Warehouse, waste areas, audits areas;
Disposal areas, supply areas, audits areas.

Answer: C.
Explanation: External organization users Customers : passwords, restrictions, signed
agreements, security audits. Use Physical controls: physical locks, ID badges, guards, logging,
electronic locks, cameras, sign ins. Places to put physical locks Disposal areas, supply areas,
power areas.

3) Physical controls, such as physical locks, ID badges, guards, logging, electronic locks,
cameras and sign ins are in general in places like disposal areas, supply areas and power
areas. And Passwords, restrictions, signed agreements and security audits are used by?
A.
B.
C.
D.
E.

Internal organization users customers;


Physical organization users customers;
Security organization users customers;
External organization users customers;
Management organization users management;

Answer: D.
Explanation: External organization users Customers : passwords, restrictions, signed
agreements, security audits. Use Physical controls: physical locks, ID badges, guards, logging,
electronic locks, cameras, sign ins. Places to put physical locks Disposal areas, supply areas,
power areas.

4) Considering the brownouts, drop in voltage, dimming lights, temporary voltage increases
and/or decreases, such as physical failures like blackouts, earthquake, flood, we can say
Environmental Attacks can cause damage to equipment. To reduce likelihood of electrical
damage to these related problems, what should be done?
A.
B.
C.
D.
E.

Blackmails, Test environment, smoke and fire alert;


Chemical, smoke, test environment, and monitors alert;
Chemical, smoke, fire and flood alert monitors and fire interrupting systems;
Blackmails, fire and food alert monitors and smoke interrupting systems;
Chemical, smoke, fire and flood alert monitors and fire suppressing systems.

Answer: E.
Explanation: Environmental Attacks can cause damage to equipment Physical failures
blackouts, earthquake, flood, Brownouts drop in voltage (dimming lights), temporary voltage
increases and/or decreases; Reduce likelihood of electrical damage related problems. Chemical,
smoke, fire and flood alert monitors and fire suppressing systems.
5) When a complete failure happens, without having perspective of fixing it is necessary to
betake surge protection systems for uninterrupted power and supply emergency power in the
event of a failure, also to add multiple and backup sources of power. What else is necessary?
A.
B.
C.
D.

To add a backup and an interrupted protection system;


To add backup and power supply;
To add secondary storage systems and emergency power;
To add backup and secondary storage systems;

E. Nothing else is necessary.


Answer: D.
Explanation: Add backup and secondary storage systems. Add surge protection systems for
uninterrupted power supply and emergency power in the event of a failure. Add multiple and
backup sources of power.
6) If a failure problem happens, backup and secondary storage systems are added, also is added
multiple and backup sources of power. What is the surge protection systems are added for?
A.
B.
C.
D.
E.

For secondary storage systems and emergency power in the event of a failure;
For uninterrupted power supply and emergency power in the event of a failure;
For security protection and uninterrupted power supply;
For systems emergency power supply and uninterrupted event of failure;
For protection and emergency power in the event of failure.

Answer: B.
Explanation: Add backup and secondary storage systems. Add surge protection systems for
uninterrupted power supply and emergency power in the event of a failure. Add multiple and
backup sources of power.
7) Considering a possible failure, and the multiple backup sources of power, how must proceed
the backing up systems?
A. Scheduled, systematic, update frequently using RPO as a guide, with
documentation;
B. Scheduled, synchronic, update frequently using RPO as a guide, with
documentation;
C. Synchronic, systematic, outdated frequently using RPO as a guide, with
documentation;
D. Scheduled, systematic, outdated frequently using RPO as a guide, with
documentation;
E. Scheduled, systematic, synchronic, outdated frequently using RPO as a
appropriate documentation;

appropriate
appropriate
appropriate
appropriate
guide, with

Answer: A.
Explanation: Backing up systems: Scheduled, systematic, update frequently using RPO as a
guide, with appropriate documentation.
8) Procedure guides, documentation, sources, reports and detailed descriptions of inventory are
part of what kind of storage?

A.
B.
C.
D.
E.

Insite Storage;
Outside Storage;
Stand-up Storage;
Offsite Storage;
Outstanding Storage.

Answer: B.
Explanation: Offsite storage procedure guides, documentation, sources, reports and through
detailed descriptions of inventory.
9) Regarding the Offsite storage, we can consider the documentation, the sources and the
reports through detailed descriptions. What is missing on that list?
A.
B.
C.
D.
E.

Data Storage;
Offsite Security;
Offsite Synchronicity;
Procedure Guides;
Offsite Sources.

Answer: D.
Explanation: Offsite storage procedure guides, documentation, sources, reports and through
detailed descriptions of inventory.
10) What needs to be compatible, to have a secure media and transfer to data banks for storage,
and then secure dispose in accordance with laws of outdated data?
A.
B.
C.
D.
E.

Data Storage;
Data Resources;
Data Security;
Data Media;
Data Backup.

Answer: E.
Explanation: Data Backup: Compatible, secure media and transfer to data banks for storage.
Then secure dispose in accordance with laws of outdated data.

Certified Information Systems Auditor CISA Exam Simulator


Software (2400 Questions + 2hr Video)
http://www.atiinfosecurity.com
Try The Program Now, 100% Risk Free, Exam Pass Guaranteed or
money back

http://www.atiinfosecurity.com
11) Considering the actions when an incident occurs, such as plan, detect, record, contain,
remove, recovery, report and review, and the Contract Provisions, such as change
management, availability, insurance, time usage, warranties, testing and reliability, how must
be the insurance?
A.
B.
C.
D.
E.

Available, accurately shows the complete cost for organization to recover;


Clear, accurately shows the complete cost for organization to recover;
Clear, available to complete the cost for organization to recover;
Accurately shows the complete cost for organization to outbreak;
Clear, available to complete the cost for organization to outbreak.

Answer: B.
Explanation: Incidents Plan, detect, record, contain, remove, recovery, report, review. Contract
Provisions Change management, availability, insurance, time usage, warranties, testing and
reliability. Insurance clear, accurately shows the complete cost for organization to recover.
12) How is called the actions of change management, availability, insurance, time usage,
warranties, testing and reliability?
A.
B.
C.
D.
E.

Incidents;
Insurance;
Contract Provisions;
Management;
Incidents Provisions;

Answer: C.
Explanation: Incidents Plan, detect, record, contain, remove, recovery, report, review. Contract
Provisions Change management, availability, insurance, time usage, warranties, testing and
reliability. Insurance clear, accurately shows the complete cost for organization to recover.
13) What is clear and accurately shows the complete cost for organization to recover, if a failure
case happens?
A.
B.
C.
D.
E.

Incidents;
Insurance;
Contract Provisions;
Management;
Incidents Provisions;
Answer: B.

Explanation: Incidents Plan, detect, record, contain, remove, recovery, report, review. Contract
Provisions Change management, availability, insurance, time usage, warranties, testing and
reliability. Insurance clear, accurately shows the complete cost for organization to recover.
14) How is called the business risks that can stop de business from performing essential business
services, losing assets, and damage employees or property?
A. Business Continuity Disaster Recovery;
B. Business Continuity Planning;
C. Business Planning Disaster Recovery;
D. Business Disaster Recovery Continuity;
E. Business Disaster Recovery Planning.
Answer: A.
Explanation: Business Continuity Disaster Recovery; Business risks that can stop the business
from performing essential business services, losing assets, damage, employees or property.
15) The idea of decreasing impact to business when there is a disruption effecting business
critical functions or long term company goals, and to assemble all events that can impact the
continuation of business if they were to occur, is a part of:
A.
B.
C.
D.
E.

Business Continuity Disaster Recovery;


Business Planning Disaster Recovery;
Business Continuity Planning;
Business Disaster Planning;
Business Disaster Recovery;

Answer: C.
Explanation: Business Continuity Planning: Decrease impact to business when there is a
disruption effecting business critical functions or long term company goals. All events that can
impact the continuation of business if they were to occur.

Certified Information Systems Auditor CISA Exam Simulator


Software (2400 Questions + 2hr Video)
http://www.atiinfosecurity.com
Try The Program Now, 100% Risk Free, Exam Pass Guaranteed or
money back
http://www.atiinfosecurity.com

You might also like