IsacaIsaca
CISA · Question #295
CISA Question #295: Real Exam Question with Answer & Explanation
Sign in or unlock CISA to reveal the answer and full explanation for question #295. The question stem and answer options stay visible for context.
Submitted by anna_se· Apr 18, 2026Protection of Information Assets
Question
An organization intends to automate the identification of multiple transactions by the same user originating from geographically different IP addresses. Which of following techniques would MOST efficiently enable this control?
Options
- ASystem snapshots
- BLog analysis
- CAudit hooks
- DIP address activity review
Unlock CISA to see the answer
You've previewed enough free CISA questions. Unlock CISA for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Log analysis#Security monitoring#Anomaly detection#Automated controls