Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CISA Topic 1 Question 78 Discussion

Actual exam question for Isaca's CISA exam
Question #: 78
Topic #: 1
[All CISA Questions]

Which of the following is an example of shadow IT?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Rosio
1 months ago
Ha! Option D is my pick. Using the company tablet for social media? That's just asking for trouble. IT is going to have a field day with that one.
upvoted 0 times
Kiley
4 days ago
That's definitely a risky move. IT is not going to be happy about that.
upvoted 0 times
...
Brittni
7 days ago
It's important to follow IT policies to protect company data.
upvoted 0 times
...
Lawrence
9 days ago
Definitely, it can open up security vulnerabilities.
upvoted 0 times
...
Reuben
14 days ago
I agree, using company resources for personal use is risky.
upvoted 0 times
...
...
Anglea
2 months ago
Definitely A. Using an unauthorized tool for business work is a big no-no. The IT department needs to know what's going on to keep things secure.
upvoted 0 times
Josphine
5 days ago
Shadow IT can create vulnerabilities that IT may not be able to protect against.
upvoted 0 times
...
Micaela
18 days ago
It's important for IT to be aware of all the tools being used in the company.
upvoted 0 times
...
Margart
22 days ago
I agree, using unauthorized tools can pose a security risk.
upvoted 0 times
...
...
Olene
2 months ago
I'm going with A as well. If IT doesn't know about the tool, it's definitely shadow IT. Trying to sneak around the system is a big no-no.
upvoted 0 times
Jutta
12 days ago
Shadow IT can cause security risks and compliance issues.
upvoted 0 times
...
Marylin
17 days ago
Definitely, it's important to follow company policies.
upvoted 0 times
...
Kaycee
1 months ago
I agree, using a tool without IT approval is risky.
upvoted 0 times
...
...
Rachael
2 months ago
Option A sounds like a clear case of shadow IT. Using an unapproved cloud tool for work without IT's knowledge is a textbook example.
upvoted 0 times
...
Mendy
3 months ago
I'm not sure, but I think C) An employee using personal email to communicate with clients without approval from IT could also be considered shadow IT.
upvoted 0 times
...
Lorrine
3 months ago
I agree with Nichelle, that definitely sounds like shadow IT.
upvoted 0 times
...
Nichelle
3 months ago
I think the answer is A) An employee using a cloud based order management tool without approval from IT.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77