Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISA Certified Information Systems Auditor is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISA Practice Questions

Certified Information Systems Auditor

Last Update 4 days ago
Total Questions : 1524

Dive into our fully updated and stable CISA practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISA. Use this test to pinpoint which areas you need to focus your study on.

CISA PDF

CISA PDF (Printable)
$69.65
$199

CISA Testing Engine

CISA PDF (Printable)
$78.75
$225

CISA PDF + Testing Engine

CISA PDF (Printable)
$87.15
$249
Question # 51

Which of the following is the BEST method to prevent wire transfer fraud by bank employees?

Options:

A.  

Independent reconciliation

B.  

Re-keying of wire dollar amounts

C.  

Two-factor authentication control

D.  

System-enforced dual control

Discussion 0
Question # 52

An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?

Options:

A.  

Note the exception in a new report as the item was not addressed by management.

B.  

Recommend alternative solutions to address the repeat finding.

C.  

Conduct a risk assessment of the repeat finding.

D.  

Interview management to determine why the finding was not addressed.

Discussion 0
Question # 53

Which of the following BEST describes an audit risk?

Options:

A.  

The company is being sued for false accusations.

B.  

The financial report may contain undetected material errors.

C.  

Employees have been misappropriating funds.

D.  

Key employees have not taken vacation for 2 years.

Discussion 0
Question # 54

Which of the following is MOST important when planning a network audit?

Options:

A.  

Determination of IP range in use

B.  

Analysis of traffic content

C.  

Isolation of rogue access points

D.  

Identification of existing nodes

Discussion 0
Question # 55

An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?

Options:

A.  

Review the documentation of recant changes to implement sequential order numbering.

B.  

Inquire with management if the system has been configured and tested to generate sequential order numbers.

C.  

Inspect the system settings and transaction logs to determine if sequential order numbers are generated.

D.  

Examine a sample of system generated purchase orders obtained from management

Discussion 0
Question # 56

An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?

Options:

A.  

Loss of application support

B.  

Lack of system integrity

C.  

Outdated system documentation

D.  

Developer access 1o production

Discussion 0
Question # 57

Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?

Options:

A.  

Review of program documentation

B.  

Use of test transactions

C.  

Interviews with knowledgeable users

D.  

Review of source code

Discussion 0
Question # 58

Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?

Options:

A.  

Testing incident response plans with a wide range of scenarios

B.  

Prioritizing incidents after impact assessment.

C.  

Linking incidents to problem management activities

D.  

Training incident management teams on current incident trends

Discussion 0
Question # 59

Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?

Options:

A.  

CCTV recordings are not regularly reviewed.

B.  

CCTV cameras are not installed in break rooms

C.  

CCTV records are deleted after one year.

D.  

CCTV footage is not recorded 24 x 7.

Discussion 0
Question # 60

Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?

Options:

A.  

Utilize a network-based firewall.

B.  

Conduct regular user security awareness training.

C.  

Perform domain name system (DNS) server security hardening.

D.  

Enforce a strong password policy meeting complexity requirement.

Discussion 0
Question # 61

The PRIMARY objective of value delivery in reference to IT governance is to:

Options:

A.  

promote best practices

B.  

increase efficiency.

C.  

optimize investments.

D.  

ensure compliance.

Discussion 0
Question # 62

Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?

Options:

A.  

Rotating backup copies of transaction files offsite

B.  

Using a database management system (DBMS) to dynamically back-out partially processed transactions

C.  

Maintaining system console logs in electronic formal

D.  

Ensuring bisynchronous capabilities on all transmission lines

Discussion 0
Question # 63

Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?

Options:

A.  

Temperature sensors

B.  

Humidity sensors

C.  

Water sensors

D.  

Air pressure sensors

Discussion 0
Question # 64

A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.

Options:

A.  

A formal request for proposal (RFP) process

B.  

Business case development procedures

C.  

An information asset acquisition policy

D.  

Asset life cycle management.

Discussion 0
Question # 65

Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?

Options:

A.  

Improved disaster recovery

B.  

Better utilization of resources

C.  

Stronger data security

D.  

Increased application performance

Discussion 0
Question # 66

Which of the following presents the GREATEST challenge to the alignment of business and IT?

Options:

A.  

Lack of chief information officer (CIO) involvement in board meetings

B.  

Insufficient IT budget to execute new business projects

C.  

Lack of information security involvement in business strategy development

D.  

An IT steering committee chaired by the chief information officer (CIO)

Discussion 0
Question # 67

A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?

Options:

A.  

Separate authorization for input of transactions

B.  

Statistical sampling of adjustment transactions

C.  

Unscheduled audits of lost stock lines

D.  

An edit check for the validity of the inventory transaction

Discussion 0
Question # 68

Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?

Options:

A.  

Restricting evidence access to professionally certified forensic investigators

B.  

Documenting evidence handling by personnel throughout the forensic investigation

C.  

Performing investigative procedures on the original hard drives rather than images of the hard drives

D.  

Engaging an independent third party to perform the forensic investigation

Discussion 0
Question # 69

Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?

Options:

A.  

Mobile device tracking program

B.  

Mobile device upgrade program

C.  

Mobile device testing program

D.  

Mobile device awareness program

Discussion 0
Question # 70

During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?

Options:

A.  

Leverage the work performed by external audit for the internal audit testing.

B.  

Ensure both the internal and external auditors perform the work simultaneously.

C.  

Request that the external audit team leverage the internal audit work.

D.  

Roll forward the general controls audit to the subsequent audit year.

Discussion 0
Question # 71

An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:

Options:

A.  

some of the identified throats are unlikely to occur.

B.  

all identified throats relate to external entities.

C.  

the exercise was completed by local management.

D.  

neighboring organizations operations have been included.

Discussion 0
Question # 72

Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''

Options:

A.  

Use an electronic vault for incremental backups

B.  

Deploy a fully automated backup maintenance system.

C.  

Periodically test backups stored in a remote location

D.  

Use both tape and disk backup systems

Discussion 0
Question # 73

Which of the following is the BEST way to ensure that an application is performing according to its specifications?

Options:

A.  

Unit testing

B.  

Pilot testing

C.  

System testing

D.  

Integration testing

Discussion 0
Question # 74

An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?

Options:

A.  

Users are not required to change their passwords on a regular basis

B.  

Management does not review application user activity logs

C.  

User accounts are shared between users

D.  

Password length is set to eight characters

Discussion 0
Question # 75

Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?

Options:

A.  

SIEM reporting is customized.

B.  

SIEM configuration is reviewed annually

C.  

The SIEM is decentralized.

D.  

SIEM reporting is ad hoc.

Discussion 0
Question # 76

An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?

Options:

A.  

Inability of the network intrusion detection system (IDS) to monitor virtual server-lo-server communications

B.  

Vulnerability in the virtualization platform affecting multiple hosts

C.  

Data center environmental controls not aligning with new configuration

D.  

System documentation not being updated to reflect changes in the environment

Discussion 0
Question # 77

When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.

Options:

A.  

each information asset is to a assigned to a different classification.

B.  

the security criteria are clearly documented for each classification

C.  

Senior IT managers are identified as information owner.

D.  

the information owner is required to approve access to the asset

Discussion 0
Question # 78

An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?

Options:

A.  

Network penetration tests are not performed

B.  

The network firewall policy has not been approved by the information security officer.

C.  

Network firewall rules have not been documented.

D.  

The network device inventory is incomplete.

Discussion 0
Question # 79

What should an IS auditor do FIRST when management responses

to an in-person internal control questionnaire indicate a key internal

control is no longer effective?

Options:

A.  

Determine the resources required to make the controleffective.

B.  

Validate the overall effectiveness of the internal control.

C.  

Verify the impact of the control no longer being effective.

D.  

Ascertain the existence of other compensating controls.

Discussion 0
Question # 80

Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?

Options:

A.  

Server room access history

B.  

Emergency change records

C.  

IT security incidents

D.  

Penetration test results

Discussion 0
Question # 81

If enabled within firewall rules, which of the following services would present the GREATEST risk?

Options:

A.  

Simple mail transfer protocol (SMTP)

B.  

Simple object access protocol (SOAP)

C.  

Hypertext transfer protocol (HTTP)

D.  

File transfer protocol (FTP)

Discussion 0
Question # 82

An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that

Options:

A.  

security parameters are set in accordance with the manufacturer s standards.

B.  

a detailed business case was formally approved prior to the purchase.

C.  

security parameters are set in accordance with the organization's policies.

D.  

the procurement project invited lenders from at least three different suppliers.

Discussion 0
Question # 83

Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?

Options:

A.  

Ensure that paper documents arc disposed security.

B.  

Implement an intrusion detection system (IDS).

C.  

Verify that application logs capture any changes made.

D.  

Validate that all data files contain digital watermarks

Discussion 0
Question # 84

Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?

Options:

A.  

The IT strategy is modified in response to organizational change.

B.  

The IT strategy is approved by executive management.

C.  

The IT strategy is based on IT operational best practices.

D.  

The IT strategy has significant impact on the business strategy

Discussion 0
Question # 85

Which of the following would be MOST useful when analyzing computer performance?

Options:

A.  

Statistical metrics measuring capacity utilization

B.  

Operations report of user dissatisfaction with response time

C.  

Tuning of system software to optimize resource usage

D.  

Report of off-peak utilization and response time

Discussion 0
Question # 86

Which of the following is the BEST metric to measure the alignment of IT and business strategy?

Options:

A.  

Level of stakeholder satisfaction with the scope of planned IT projects

B.  

Percentage of enterprise risk assessments that include IT-related risk

C.  

Percentage of stat satisfied with their IT-related roles

D.  

Frequency of business process capability maturity assessments

Discussion 0
Question # 87

What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?

Options:

A.  

Notify law enforcement of the finding.

B.  

Require the third party to notify customers.

C.  

The audit report with a significant finding.

D.  

Notify audit management of the finding.

Discussion 0
Question # 88

Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?

Options:

A.  

The BCP's contact information needs to be updated

B.  

The BCP is not version controlled.

C.  

The BCP has not been approved by senior management.

D.  

The BCP has not been tested since it was first issued.

Discussion 0
Question # 89

Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?

Options:

A.  

Review a report of security rights in the system.

B.  

Observe the performance of business processes.

C.  

Develop a process to identify authorization conflicts.

D.  

Examine recent system access rights violations.

Discussion 0
Question # 90

Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?

Options:

A.  

Process and resource inefficiencies

B.  

Irregularities and illegal acts

C.  

Noncompliance with organizational policies

D.  

Misalignment with business objectives

Discussion 0
Question # 91

Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?

Options:

A.  

Risk avoidance

B.  

Risk transfer

C.  

Risk acceptance

D.  

Risk reduction

Discussion 0
Question # 92

Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?

Options:

A.  

Restricting program functionality according to user security profiles

B.  

Restricting access to update programs to accounts payable staff only

C.  

Including the creator’s user ID as a field in every transaction record created

D.  

Ensuring that audit trails exist for transactions

Discussion 0
Question # 93

An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?

Options:

A.  

The applications are not included in business continuity plans (BCFs)

B.  

The applications may not reasonably protect data.

C.  

The application purchases did not follow procurement policy.

D.  

The applications could be modified without advanced notice.

Discussion 0
Question # 94

Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?

Options:

A.  

Identify approved data workflows across the enterprise.

B.  

Conduct a threat analysis against sensitive data usage.

C.  

Create the DLP pcJc.es and templates

D.  

Conduct a data inventory and classification exercise

Discussion 0
Question # 95

Which of the following is necessary for effective risk management in IT governance?

Options:

A.  

Local managers are solely responsible for risk evaluation.

B.  

IT risk management is separate from corporate risk management.

C.  

Risk management strategy is approved by the audit committee.

D.  

Risk evaluation is embedded in management processes.

Discussion 0
Question # 96

An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?

Options:

A.  

Analyze a new application that moots the current re

B.  

Perform an analysis to determine the business risk

C.  

Bring the escrow version up to date.

D.  

Develop a maintenance plan to support the application using the existing code

Discussion 0
Question # 97

Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?

Options:

A.  

IT steering committee minutes

B.  

Business objectives

C.  

Alignment with the IT tactical plan

D.  

Compliance with industry best practice

Discussion 0
Question # 98

An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?

Options:

A.  

Users can export application logs.

B.  

Users can view sensitive data.

C.  

Users can make unauthorized changes.

D.  

Users can install open-licensed software.

Discussion 0
Question # 99

Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?

Options:

A.  

Assign the security risk analysis to a specially trained member of the project management office.

B.  

Deploy changes in a controlled environment and observe for security defects.

C.  

Include a mandatory step to analyze the security impact when making changes.

D.  

Mandate that the change analyses are documented in a standard format.

Discussion 0
Question # 100

An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?

Options:

A.  

The quality of the data is not monitored.

B.  

Imported data is not disposed frequently.

C.  

The transfer protocol is not encrypted.

D.  

The transfer protocol does not require authentication.

Discussion 0
Get CISA dumps and pass your exam in 24 hours!

Free Exams Sample Questions