exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 650 discussion

Actual exam question from Isaca's CISA
Question #: 650
Topic #: 1
[All CISA Questions]

A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:

  • A. use a proxy server to filter out Internet sites that should not be accessed.
  • B. keep a manual log of Internet access.
  • C. include a statement in its security policy about Internet use.
  • D. monitor remote access activities.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Swallows
5 months, 3 weeks ago
Selected Answer: A
It is important to first implement a proxy server to control access to certain internet sites, and then update your security policies to clarify the rules and regulations for internet usage.
upvoted 1 times
...
topikal
6 months, 1 week ago
Selected Answer: D
I vote for D
upvoted 1 times
...
Yejide03
10 months, 1 week ago
Selected Answer: C
C. include a statement in its security policy about Internet use
upvoted 2 times
...
JONESKA
1 year, 5 months ago
I think its C. Before implementing any technical controls or monitoring measures, it is essential for the organization to establish clear policies and guidelines regarding Internet use. By including a statement in its security policy about Internet use, the organization sets expectations and provides employees with guidelines on acceptable and secure Internet usage.
upvoted 3 times
...
3008
1 year, 6 months ago
Selected Answer: A
the organization should FIRST use a proxy server to filter out Internet sites that should not be accessed, as this provides an effective means of controlling access to the Internet and preventing users from accessing non-business-related websites or services that could compromise the security of the corporate network.
upvoted 3 times
starzuu
1 year, 5 months ago
yeah to have the proxy server set like that you need a policy first. It's C.
upvoted 2 times
3008
1 year, 3 months ago
C, including a statement in the security policy about Internet use, is important but is not a complete solution in itself. A policy statement alone does not provide a mechanism for enforcing the policy, and it may not be sufficient to prevent users from accessing non-business-related websites or services.
upvoted 5 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago