CISA Exam Question 291

During a post-incident review. the sequence and correlation of actions must be analyzed PRIMARLY based on:
  • CISA Exam Question 292

    Which of the following occurs during the issues management process for a system development project?
  • CISA Exam Question 293

    As an auditor it is very important to ensure confidentiality, integrity, authenticity and availability are implemented appropriately in an information system. Which of the following definitions incorrectly describes these parameters?
    1. Authenticity - A third party must be able to verify that the content of a message has been sent by a specific entity and nobody else.
    2. Non-repudiation - The origin or the receipt of a specific message must be verifiable by a third party. A person cannot deny having sent a message if the message is signed by the originator.
    3. Accountability - The action of an entity must be uniquely traceable to different entities
    4. Availability - The IT resource must be available on a timely basis to meet mission requirements or to avoid substantial losses.
  • CISA Exam Question 294

    Distributed denial-of-service (DDOS) attacks on Internet sites are typically evoked by hackers using which of the following?
  • CISA Exam Question 295

    The security level of a private key system depends on the number of: