Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Quiz CISA

Recent Comments

  1. Jan Dowsky on which type of Layer 2 attack can you intercept traffic …
  2. Joao on Which happens if the swap file of a virtual machine is …
  3. P.C.S.O.R. on What could cause this error?
  4. mur on Which two statements about administrative access to the Cisco Secure ACS SE are true?
  5. rubik on Which GPOs will apply to User2 when the user signs in t…

Quiz CISA

Quiz CISA, Certified Information Systems Auditor

The MOST likely explanation for a successful social engineering attack is:

The purpose of a deadman door controlling access to a computer facility is primarily to:

Which of the following is the MOST reliable form of single factor personal identification?

Which of the following is MOST important to protect the computing assets in the center?

Which of the following physical access controls effectively reduces the risk of piggybacking?

The MOST effective biometric control system is the one:

Which of the following is the BEST way to satisfy a two-factor user authentication?

What should an organization do before providing an external agency physical access to its information processing facilities (IPFs)?

Regarding the access card system, the IS auditor should be MOST concerned that:

Which of the following is the BEST way to handle obsolete magnetic tapes before disposing of them?

Posts navigation

Previous 1 … 369 370 371 … 427 Next
Equizzing
    Privacy Policy

© 2025 Equizzing