CISA Practice Questions
Certified Information Systems Auditor
Last Update 4 days ago
Total Questions : 1524
Dive into our fully updated and stable CISA practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.
Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISA. Use this test to pinpoint which areas you need to focus your study on.
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
The PRIMARY objective of value delivery in reference to IT governance is to:
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
Which of the following would be MOST useful when analyzing computer performance?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
Which of the following is necessary for effective risk management in IT governance?
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
