CISA Exam Question 51
An IS auditor observes that an organization's systems are being used for cryptocurrency mining on a regular basis. Which of the following is the auditor's FIRST course of action?
CISA Exam Question 52
Which of the following is the BEST approach to help organizations address risks associated with shadow IT?
CISA Exam Question 53
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
CISA Exam Question 54
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
CISA Exam Question 55
An IS auditor is reviewing an organization that performs backups on local database servers every two weeks and does not have a formal policy to govern data backup and restoration procedures. Which of the following findings presents the GREATEST risk to the organization?
