Free Practice Mock Questions Set 441-445 (Quiz # 89) for Isaca CISA Exam, according to official Isaca Certified Information Systems Auditor exam syllabus topic # 8
Creating which of the following is how a hacker can insure his ability to return to the hacked system at will?
Answer : D
A trojan horse simply cannot operate autonomously.
Answer : A
Which of the following refers to the collection of policies and procedures for implementing controls capable of restricting access to computer software and data files?
Answer : C
As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (B1A)?
Answer : B
IT disaster recovery lime objectives (RTOs) should be based on [he: