CISA Exam Question 16
Which of the following is the GREATEST concern associated with control self-assessments (CSAs)?
CISA Exam Question 17
An IS auditor is reviewing an organization's implementation of a bring your own device (BYOD) program. Which of the following would be the BEST recommendation to help ensure sensitive data is protected if a device is in the possession of an unauthorized individual?
CISA Exam Question 18
Which of the following systems-based approaches would a financial processing company employ to monitor spending patterns to identify abnormal patterns and report them?
CISA Exam Question 19
Common implementations of strong authentication may use which of the following factors in their authentication efforts (choose all that apply):
CISA Exam Question 20
Which of the following provides the strongest authentication for physical access control?