Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Isaca Certified Information Systems Auditor CISA Question # 399 Topic 40 Discussion

Isaca Certified Information Systems Auditor CISA Question # 399 Topic 40 Discussion

CISA Exam Topic 40 Question 399 Discussion:
Question #: 399
Topic #: 40

An IS auditor has traced the source of a transaction fraud to the desktop system of an e-business staff member who is on leave. Which of the following is the BEST way for the auditor to ensure the success of the investigation?


A.

Create an image of the attacked system and dump the memory to a file for review.


B.

Immediately seal off the attacked system and block all access until after the investigation.


C.

Reboot the attacked system and promptly review log files and file timestamps.


D.

Interview the business staff and ask them to provide details of recent system activities.


Get Premium CISA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.