CISA Exam Question 446

A sender of an e-mail message applies a digital signature to the digest of the message. This action provides assurance of the:
  • CISA Exam Question 447

    Which of the following reports should an IS auditor use to check compliance with a service level
    agreements (SLA) requirement for uptime?
  • CISA Exam Question 448

    Which of the following is the GREATEST risk to the effectiveness of application system controls?
  • CISA Exam Question 449

    E-mail traffic from the Internet is routed via firewall-1 to the mail gateway. Mail is routed from the mail gateway, via firewall-2, to the mail recipients in the internal network. Other traffic is not allowed. For example, the firewalls do not allow direct traffic from the Internet to the internal network.

    The intrusion detection system (IDS) detects traffic for the internal network that did not originate from the mail gateway. The FIRST action triggered by the IDS should be to:
  • CISA Exam Question 450

    During an audit of a mission-critical system hosted in an outsourced data center, an IS auditor discovers that contracted routine maintenance for the alternate power generator was not performed. Which of the following should be the auditor's MAIN concern?