Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISA Certified Information Systems Auditor is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISA Practice Questions

Certified Information Systems Auditor

Last Update 4 days ago
Total Questions : 1524

Dive into our fully updated and stable CISA practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISA. Use this test to pinpoint which areas you need to focus your study on.

CISA PDF

CISA PDF (Printable)
$69.65
$199

CISA Testing Engine

CISA PDF (Printable)
$78.75
$225

CISA PDF + Testing Engine

CISA PDF (Printable)
$87.15
$249
Question # 201

Which of the following is an IS auditor's BEST recommendation for mitigating risk associated with inadvertent disclosure of sensitive information by employees?

Options:

A.  

Intrusion prevention system (IPS) and firewalls

B.  

Data loss prevention (DLP) technologies

C.  

Cryptographic protection

D.  

Email phishing simulation exercises

Discussion 0
Question # 202

After areas have been appropriately scoped, what is the IS auditor's NEXT step in the selection for sampling?

Options:

A.  

Define the population for sampling.

B.  

Determine the sampling method.

C.  

Calculate the sample size.

D.  

Pull the sample.

Discussion 0
Question # 203

A source code repository should be designed to:

Options:

A.  

prevent changes from being incorporated into existing code.

B.  

prevent developers from accessing secure source code.

C.  

provide secure versioning and backup capabilities for existing code.

D.  

provide automatic incorporation and distribution of modified code.

Discussion 0
Question # 204

Which of the following should be the GREATEST concern for an IS auditor performing a post-implementation review for a major system upgrade?

Options:

A.  

Changes are promoted to production by the development group.

B.  

Object code can be accessed by the development group.

C.  

Developers have access to the testing environment.

D.  

Change approvals are not formally documented.

Discussion 0
Question # 205

Which of the following is the MOST important consideration of any disaster response plan?

Options:

A.  

Lost revenue

B.  

Personnel safety

C.  

IT asset protection

D.  

Adequate resource capacity

Discussion 0
Question # 206

Which of the following is the GREATEST risk associated with lack of IT involvement in the organization's strategic planning initiatives?

Options:

A.  

Business strategies may not align with IT capabilities.

B.  

Business strategies may not consider emerging technologies.

C.  

IT strategies may not align with business strategies.

D.  

IT strategic goals may not be considered by the business.

Discussion 0
Question # 207

Who should be the FIRST to evaluate an audit report prior to issuing it to the project steering committee?

Options:

A.  

IS audit manager

B.  

Audit committee

C.  

Business owner

D.  

Project sponsor

Discussion 0
Question # 208

Which type of testing is used to identify security vulnerabilities in source code in the development environment?

Options:

A.  

Interactive application security testing (IAST)

B.  

Runtime application self-protection (RASP)

C.  

Dynamic analysis security testing (DAST)

D.  

Static analysis security testing (SAST)

Discussion 0
Question # 209

Which of the following is MOST important to consider when defining disaster recovery strategies?

Options:

A.  

Maximum tolerable downtime (MTD)

B.  

Mean time to restore (MTTR)

C.  

Mean time to acknowledge

D.  

Maximum time between failures (MTBF)

Discussion 0
Question # 210

Which of the following measures BEST mitigates the risk of data exfiltration during a cyberattack?

Options:

A.  

Data loss prevention (DLP) system

B.  

Network access controls (NAC)

C.  

Perimeter firewall

D.  

Hashing of sensitive data

Discussion 0
Question # 211

Which of the following BEST demonstrates alignment of the IT department with the corporate mission?

Options:

A.  

Analysis of IT department functionality

B.  

Biweekly reporting to senior management

C.  

Annual board meetings

D.  

Quarterly steering committee meetings

Discussion 0
Question # 212

An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?

Options:

A.  

Evaluate key performance indicators (KPIs).

B.  

Conduct a gap analysis.

C.  

Develop a maturity model.

D.  

Implement a control self-assessment (CSA).

Discussion 0
Question # 213

Using swipe cards to limit employee access to restricted areas requires implementing which additional control?

Options:

A.  

Physical sign-in of all employees for access to restricted areas

B.  

Implementation of additional PIN pads

C.  

Periodic review of access profiles by management

D.  

Installation of closed-circuit television (CCTV)

Discussion 0
Question # 214

An IS auditor is reviewing an organizations release management practices and observes inconsistent and inaccurate estimation of the size and complexity of business application development projects. Which of the following should the auditor recommend to address this issue?

Options:

A.  

Critical path methodology

B.  

Agile development approach

C.  

Function point analysis

D.  

Rapid application development

Discussion 0
Question # 215

The process of applying a hash function to a message and obtaining and ciphering a digest refers to:

Options:

A.  

digital certificates.

B.  

digital signatures.

C.  

public key infrastructure (PKI).

D.  

authentication.

Discussion 0
Question # 216

Which of the following technology trends can lead to more robust data loss prevention (DLP) tools?

Options:

A.  

Cloud computing

B.  

Robotic process automation (RPA)

C.  

Internet of Things (IoT)

D.  

Machine learning algorithms

Discussion 0
Question # 217

A cloud access security broker (CASB) administers the user access of a Software as a Service {SaaS) on behalf of the customer organization. When conducting an audit of the service, which of the following is MOST important for the IS auditor to confirm?

Options:

A.  

The CASB logs the access request as a service record that is reviewed after granting access.

B.  

The CASB verifies the access request from a named customer contact before granting access.

C.  

The CASB manages secure access to the federated directory service used by the SaaS application.

D.  

The CASB conducts periodic audits of access requests to ensure compliance with customer policy.

Discussion 0
Question # 218

When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:

Options:

A.  

a risk management process.

B.  

an information security framework.

C.  

past information security incidents.

D.  

industry best practices.

Discussion 0
Question # 219

Cross-site scripting (XSS) attacks are BEST prevented through:

Options:

A.  

application firewall policy settings.

B.  

a three-tier web architecture.

C.  

secure coding practices.

D.  

use of common industry frameworks.

Discussion 0
Question # 220

During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?

Options:

A.  

Enterprise risk manager

B.  

Project sponsor

C.  

Information security officer

D.  

Project manager

Discussion 0
Question # 221

Which of the following would be a result of utilizing a top-down maturity model process?

Options:

A.  

A means of benchmarking the effectiveness of similar processes with peers

B.  

A means of comparing the effectiveness of other processes within the enterprise

C.  

Identification of older, more established processes to ensure timely review

D.  

Identification of processes with the most improvement opportunities

Discussion 0
Question # 222

An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?

Options:

A.  

The data is taken directly from the system.

B.  

There is no privacy information in the data.

C.  

The data can be obtained in a timely manner.

D.  

The data analysis tools have been recently updated.

Discussion 0
Question # 223

An IS auditor has been asked to perform a post-implementation review of a newly developed system. When reviewing the testing phase results, the auditor observed that separate modules of the system tested correctly in the user acceptance testing (UAT) phase, but some features did not work as expected when moved to production. Which of the following was MOST likely omitted prior to implementation?

Options:

A.  

Integration testing

B.  

End-user training

C.  

Full unit testing

D.  

Parallel testing

Discussion 0
Question # 224

An IS auditor finds ad hoc vulnerability scanning is in place with no clear alignment to the organization's wider security threat and vulnerability management program.

Which of the following would BEST enable the organization to work toward improvement in this area?

Options:

A.  

Implementing security logging to enhance threat and vulnerability management

B.  

Maintaining a catalog of vulnerabilities that may impact mission-critical systems

C.  

Using a capability maturity model to identify a path to an optimized program

D.  

Outsourcing the threat and vulnerability management function to a third party

Discussion 0
Question # 225

Which of the following protocols should be used when transferring data via the internet?

Options:

A.  

User Datagram Protocol (UDP)

B.  

Hypertext Transfer Protocol (HTTP)

C.  

Secure File Transfer Protocol (SFTP)

D.  

Remote Desktop Protocol (RDP)

Discussion 0
Question # 226

Which of the following should be the PRIMARY purpose of conducting tabletop exercises when re-viewing a security incident response plan?

Options:

A.  

To provide efficiencies for alignment with incident response test scenarios

B.  

To determine process improvement options for the incident response plan

C.  

To gather documentation for responding to security audit inquiries

D.  

To confirm that technology is in place to support the incident response plan

Discussion 0
Question # 227

Which of the following is the GREATEST risk associated with utilizing spreadsheets for financial reporting in end-user computing (EUC)?

Options:

A.  

Lack of password protection

B.  

Lack of processing integrity

C.  

Increase in regulatory violations

D.  

Increase in operational incidents

Discussion 0
Question # 228

Which of the following would be of GREATEST concern to an IS auditor reviewing the feasibility study for a new application system?

Options:

A.  

Security requirements have not been defined.

B.  

Conditions under which the system will operate are unclear.

C.  

The business case does not include well-defined strategic benefits.

D.  

System requirements and expectations have not been clarified.

Discussion 0
Question # 229

Which of the following job scheduling schemes for operating system updates is MOST likely to adequately balance protection of workstations with user requirements?

Options:

A.  

Automated patching jobs and immediate restart

B.  

Automated patching jobs followed by a scheduled restart outside of business hours

C.  

End users can initiate patching including subsequent system restarts

D.  

Applying only those patches not requiring a system restart

Discussion 0
Question # 230

A business application's database is copied to a replication server within minutes. Which of the following processes taking place during business hours will MOST benefit from this architecture?

Options:

A.  

Rolling forward of transactions when a production server fails

B.  

Ad hoc batch reporting jobs from the replication server

C.  

Analysis of application performance degradation

D.  

Hardware replacement work involving databases

Discussion 0
Question # 231

Which type of security testing is MOST efficient for finding hidden errors in software and facilitating source code optimization?

Options:

A.  

User acceptance testing (UAT)

B.  

Black box testing

C.  

White box testing

D.  

Penetration testing

Discussion 0
Question # 232

An IS auditor is planning a review of an organizations cybersecurity incident response maturity Which of the following methodologies would provide the MOST reliable conclusions?

Options:

A.  

Judgmental sampling

B.  

Data analytics testing

C.  

Variable sampling

D.  

Compliance testing

Discussion 0
Question # 233

When reviewing an organization's finalized risk assessment process, what would be the MAIN reason for an IS auditor to compare acceptable risk level with residual risk?

Options:

A.  

To identify omissions made in the completed risk assessment

B.  

To identify new risks the organization may have to address

C.  

To recommend control enhancements for further risk reduction

D.  

To advise management on risk appetite levels

Discussion 0
Question # 234

A security review focused on data loss prevention (DLP) revealed the organization has no visibility to data stored in the cloud. What is the IS auditor's BEST recommendation to address this

issue?

Options:

A.  

Enhance the firewall at the network perimeter.

B.  

Implement a file system scanner to discover data stored in the cloud.

C.  

Employ a cloud access security broker (CASB).

D.  

Utilize a DLP tool on desktops to monitor user activities.

Discussion 0
Question # 235

Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?

Options:

A.  

Periodic vendor reviews

B.  

Dual control

C.  

Independent reconciliation

D.  

Re-keying of monetary amounts

E.  

Engage an external security incident response expert for incident handling.

Discussion 0
Question # 236

Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?

Options:

A.  

Real-time audit software

B.  

Performance data

C.  

Quality assurance (QA) reviews

D.  

Participative management techniques

Discussion 0
Question # 237

During recent post-implementation reviews, an IS auditor has noted that several deployed applications are not being used by the business. The MOST likely cause would be the lack of:

Options:

A.  

IT portfolio management.

B.  

IT resource management.

C.  

system support documentation.

D.  

change management.

Discussion 0
Question # 238

Which of the following is the PRIMARY benefit of effective implementation of appropriate data classification?

Options:

A.  

Ability to meet business requirements

B.  

Assurance that sensitive data is encrypted

C.  

Increased accuracy of sensitive data

D.  

Management of business risk to sensitive data

Discussion 0
Question # 239

A national bank recently migrated a large number of business-critical applications to the cloud. Which of the following is MOST important to ensuring the resiliency of the applications?

Options:

A.  

Negotiating a nondisclosure agreement (NDA) with the provider

B.  

Conducting periodic system stress testing

C.  

Creating restore points for critical applications

D.  

Using a monitoring tool to assess uptime

Discussion 0
Question # 240

An IS auditor finds that a number of key patches have not been applied in a timely manner due to re-source constraints. Which of the following is the GREATEST risk to the organization in this

situation?

Options:

A.  

Systems may not be supported by the vendor.

B.  

Known security vulnerabilities may not be mitigated.

C.  

Different systems may not be compatible.

D.  

The systems may not meet user requirements.

Discussion 0
Question # 241

Which of the following risk scenarios is BEST mitigated through the use of a data loss prevention (DLP) tool?

Options:

A.  

An employee is sending company documents to an external email to increase productivity.

B.  

A former employee retains access to an application that authenticates via single sign-on

C.  

An employee uses production data in a test environment.

D.  

An employee selects the incorrect data classification on documents.

Discussion 0
Question # 242

Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's information security governance?

Options:

A.  

Risk assessments of information assets are not periodically performed.

B.  

All Control Panel Items

C.  

The information security policy does not extend to service providers.

D.  

There is no process to measure information security performance.

E.  

The information security policy is not reviewed by executive management.

Discussion 0
Question # 243

Which of the following is the MOST important reason for an organization to automate data purging?

Options:

A.  

Protection against privacy breaches

B.  

Storage cost reduction

C.  

Disaster recovery planning

D.  

Ransomware protection

Discussion 0
Question # 244

An organization has decided to reengineer business processes to improve the performance of overall IT service delivery. Which of the following recommendations from the project team should be the GREATEST concern to the IS auditor?

Options:

A.  

Disable operational logging to enhance the processing speed and save storage.

B.  

Adopt a service delivery model based on insights from peer organizations.

C.  

Delegate business decisions to the chief risk officer (CRO).

D.  

Eliminate certain reports and key performance indicators (KPIs)

Discussion 0
Question # 245

During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the

associated risk?

Options:

A.  

Increased vulnerability due to anytime, anywhere accessibility

B.  

Increased need for user awareness training

C.  

The use of the cloud negatively impacting IT availability

D.  

Lack of governance and oversight for IT infrastructure and applications

Discussion 0
Question # 246

An organization saves confidential information in a file with password protection and the file is placed in a shared folder. An attacker has stolen this information by obtaining the password through social engineering. Implementing which of the following would BEST enable the organization to prevent this type of incident in the future?

Options:

A.  

Multi-factor authentication (MFA)

B.  

Security awareness programs for employees

C.  

Access history log review by the business manager

D.  

File encryption along with password protection

Discussion 0
Question # 247

IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?

Options:

A.  

More frequent data backups

B.  

Periodic table link checks

C.  

Concurrent access controls

D.  

Performance monitoring tools

Discussion 0
Question # 248

Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?

Options:

A.  

The IS auditor provided consulting advice concerning application system best practices.

B.  

The IS auditor participated as a member of the application system project team, but did not have operational responsibilities.

C.  

The IS auditor designed an embedded audit module exclusively for auditing the application system.

D.  

The IS auditor implemented a specific control during the development of the application system.

Discussion 0
Question # 249

An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:

Options:

A.  

recommend that the option to directly modify the database be removed immediately.

B.  

recommend that the system require two persons to be involved in modifying the database.

C.  

determine whether the log of changes to the tables is backed up.

D.  

determine whether the audit trail is secured and reviewed.

Discussion 0
Question # 250

An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor's NEXT course of action?

Options:

A.  

Report the mitigating controls.

B.  

Report the security posture of the organization.

C.  

Determine the value of the firewall.

D.  

Determine the risk of not replacing the firewall.

Discussion 0
Get CISA dumps and pass your exam in 24 hours!

Free Exams Sample Questions