Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISA Certified Information Systems Auditor is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISA Practice Questions

Certified Information Systems Auditor

Last Update 4 days ago
Total Questions : 1524

Dive into our fully updated and stable CISA practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.

Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISA. Use this test to pinpoint which areas you need to focus your study on.

CISA PDF

CISA PDF (Printable)
$69.65
$199

CISA Testing Engine

CISA PDF (Printable)
$78.75
$225

CISA PDF + Testing Engine

CISA PDF (Printable)
$87.15
$249
Question # 351

Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?

Options:

A.  

Data conversion was performed using manual processes.

B.  

Backups of the old system and data are not available online.

C.  

Unauthorized data modifications occurred during conversion.

D.  

The change management process was not formally documented

Discussion 0
Question # 352

Which of the following is a social engineering attack method?

Options:

A.  

An unauthorized person attempts to gam access to secure premises by following an authonzed person through a secure door.

B.  

An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.

C.  

A hacker walks around an office building using scanning tools to search for a wireless network to gain access.

D.  

An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.

Discussion 0
Question # 353

A proper audit trail of changes to server start-up procedures would include evidence of:

Options:

A.  

subsystem structure.

B.  

program execution.

C.  

security control options.

D.  

operator overrides.

Discussion 0
Question # 354

An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?

Options:

A.  

Segregation of duties between issuing purchase orders and making payments.

B.  

Segregation of duties between receiving invoices and setting authorization limits

C.  

Management review and approval of authorization tiers

D.  

Management review and approval of purchase orders

Discussion 0
Question # 355

Which of the following is the PRIMARY concern when negotiating a contract for a hot site?

Options:

A.  

Availability of the site in the event of multiple disaster declarations

B.  

Coordination with the site staff in the event of multiple disaster declarations

C.  

Reciprocal agreements with other organizations

D.  

Complete testing of the recovery plan

Discussion 0
Question # 356

Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?

Options:

A.  

To determine whether project objectives in the business case have been achieved

B.  

To ensure key stakeholder sign-off has been obtained

C.  

To align project objectives with business needs

D.  

To document lessons learned to improve future project delivery

Discussion 0
Question # 357

An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?

Options:

A.  

Verify the disaster recovery plan (DRP) has been tested.

B.  

Ensure the intrusion prevention system (IPS) is effective.

C.  

Assess the security risks to the business.

D.  

Confirm the incident response team understands the issue.

Discussion 0
Question # 358

A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?

Options:

A.  

Periodically reviewing log files

B.  

Configuring the router as a firewall

C.  

Using smart cards with one-time passwords

D.  

Installing biometrics-based authentication

Discussion 0
Question # 359

During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:

Options:

A.  

note the noncompliance in the audit working papers.

B.  

issue an audit memorandum identifying the noncompliance.

C.  

include the noncompliance in the audit report.

D.  

determine why the procedures were not followed.

Discussion 0
Question # 360

A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?

Options:

A.  

Notify the cyber insurance company.

B.  

Shut down the affected systems.

C.  

Quarantine the impacted systems.

D.  

Notify customers of the breach.

Discussion 0
Question # 361

Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?

Options:

A.  

Purchasing guidelines and policies

B.  

Implementation methodology

C.  

Results of line processing

D.  

Test results

Discussion 0
Question # 362

Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?

Options:

A.  

Lessons learned were implemented.

B.  

Management approved the PIR report.

C.  

The review was performed by an external provider.

D.  

Project outcomes have been realized.

Discussion 0
Question # 363

Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?

Options:

A.  

The policy includes a strong risk-based approach.

B.  

The retention period allows for review during the year-end audit.

C.  

The total transaction amount has no impact on financial reporting.

D.  

The retention period complies with data owner responsibilities.

Discussion 0
Question # 364

Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?

Options:

A.  

Whether there is explicit permission from regulators to collect personal data

B.  

The organization's legitimate purpose for collecting personal data

C.  

Whether sharing of personal information with third-party service providers is prohibited

D.  

The encryption mechanism selected by the organization for protecting personal data

Discussion 0
Question # 365

While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:

Options:

A.  

re-prioritize the original issue as high risk and escalate to senior management.

B.  

schedule a follow-up audit in the next audit cycle.

C.  

postpone follow-up activities and escalate the alternative controls to senior audit management.

D.  

determine whether the alternative controls sufficiently mitigate the risk.

Discussion 0
Question # 366

An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?

Options:

A.  

Require employees to attend security awareness training.

B.  

Password protect critical data files.

C.  

Configure to auto-wipe after multiple failed access attempts.

D.  

Enable device auto-lock function.

Discussion 0
Question # 367

Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?

Options:

A.  

Assignment of responsibility for each project to an IT team member

B.  

Adherence to best practice and industry approved methodologies

C.  

Controls to minimize risk and maximize value for the IT portfolio

D.  

Frequency of meetings where the business discusses the IT portfolio

Discussion 0
Question # 368

Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?

Options:

A.  

Walk-through reviews

B.  

Substantive testing

C.  

Compliance testing

D.  

Design documentation reviews

Discussion 0
Question # 369

Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?

Options:

A.  

Frequent testing of backups

B.  

Annual walk-through testing

C.  

Periodic risk assessment

D.  

Full operational test

Discussion 0
Question # 370

An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?

Options:

A.  

Examine the computer to search for evidence supporting the suspicions.

B.  

Advise management of the crime after the investigation.

C.  

Contact the incident response team to conduct an investigation.

D.  

Notify local law enforcement of the potential crime before further investigation.

Discussion 0
Question # 371

Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?

Options:

A.  

Encryption of the spreadsheet

B.  

Version history

C.  

Formulas within macros

D.  

Reconciliation of key calculations

Discussion 0
Question # 372

To confirm integrity for a hashed message, the receiver should use:

Options:

A.  

the same hashing algorithm as the sender's to create a binary image of the file.

B.  

a different hashing algorithm from the sender's to create a binary image of the file.

C.  

the same hashing algorithm as the sender's to create a numerical representation of the file.

D.  

a different hashing algorithm from the sender's to create a numerical representation of the file.

Discussion 0
Question # 373

When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:

Options:

A.  

communicate via Transport Layer Security (TLS),

B.  

block authorized users from unauthorized activities.

C.  

channel access only through the public-facing firewall.

D.  

channel access through authentication.

Discussion 0
Question # 374

Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?

Options:

A.  

Compliance with action plans resulting from recent audits

B.  

Compliance with local laws and regulations

C.  

Compliance with industry standards and best practice

D.  

Compliance with the organization's policies and procedures

Discussion 0
Question # 375

During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?

Options:

A.  

Rollback strategy

B.  

Test cases

C.  

Post-implementation review objectives

D.  

Business case

Discussion 0
Question # 376

Which of the following would provide management with the MOST reasonable assurance that a new data warehouse will meet the needs of the

organization?

Options:

A.  

Integrating data requirements into the system development life cycle (SDLC)

B.  

Appointing data stewards to provide effective data governance

C.  

Classifying data quality issues by the severity of their impact to the organization

D.  

Facilitating effective communication between management and developers

Discussion 0
Question # 377

During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)

agreement. What should the auditor do NEXT?

Options:

A.  

Verify whether IT management monitors the effectiveness of the environment.

B.  

Verify whether a right-to-audit clause exists.

C.  

Verify whether a third-party security attestation exists.

D.  

Verify whether service level agreements (SLAs) are defined and monitored.

Discussion 0
Question # 378

To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?

Options:

A.  

Recipient's public key

B.  

Sender's private key

C.  

Sender's public key

D.  

Recipient's private key

Discussion 0
Question # 379

Which of the following would be an IS auditor's GREATEST concern when reviewing the organization's business continuity plan (BCP)?

Options:

A.  

The recovery plan does not contain the process and application dependencies.

B.  

The duration of tabletop exercises is longer than the recovery point objective (RPO).

C.  

The duration of tabletop exercises is longer than the recovery time objective (RTO).

D.  

The recovery point objective (RPO) and recovery time objective (R TO) are not the same.

Discussion 0
Question # 380

Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?

Options:

A.  

Embed details within source code.

B.  

Standardize file naming conventions.

C.  

Utilize automated version control.

D.  

Document details on a change register.

Discussion 0
Question # 381

Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?

Options:

A.  

Documentation of exit routines

B.  

System initialization logs

C.  

Change control log

D.  

Security system parameters

Discussion 0
Question # 382

During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?

Options:

A.  

Outsource low-risk audits to external audit service providers.

B.  

Conduct limited-scope audits of low-risk business entities.

C.  

Validate the low-risk entity ratings and apply professional judgment.

D.  

Challenge the risk rating and include the low-risk entities in the plan.

Discussion 0
Question # 383

The BEST way to provide assurance that a project is adhering to the project plan is to:

Options:

A.  

require design reviews at appropriate points in the life cycle.

B.  

have an IS auditor participate on the steering committee.

C.  

have an IS auditor participate on the quality assurance (QA) team.

D.  

conduct compliance audits at major system milestones.

Discussion 0
Question # 384

Stress testing should ideally be carried out under a:

Options:

A.  

test environment with production workloads.

B.  

test environment with test data.

C.  

production environment with production workloads.

D.  

production environment with test data.

Discussion 0
Question # 385

An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?

Options:

A.  

Computer-assisted technique

B.  

Stratified sampling

C.  

Statistical sampling

D.  

Process walk-through

Discussion 0
Question # 386

Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?

Options:

A.  

Preventive

B.  

Deterrent

C.  

Corrective

D.  

Detective

Discussion 0
Question # 387

In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:

Options:

A.  

integrated test facility (ITF).

B.  

parallel simulation.

C.  

transaction tagging.

D.  

embedded audit modules.

Discussion 0
Question # 388

Which of the following is BEST used for detailed testing of a business application's data and configuration files?

Options:

A.  

Version control software

B.  

Audit hooks

C.  

Utility software

D.  

Audit analytics tool

Discussion 0
Question # 389

An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?

Options:

A.  

Source code version control

B.  

Project change management controls

C.  

Existence of an architecture review board

D.  

Configuration management

Discussion 0
Question # 390

An IT strategic plan that BEST leverages IT in achieving organizational goals will include:

Options:

A.  

a comparison of future needs against current capabilities.

B.  

a risk-based ranking of projects.

C.  

enterprise architecture (EA) impacts.

D.  

IT budgets linked to the organization's budget.

Discussion 0
Question # 391

During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?

Options:

A.  

System administrators should ensure consistency of assigned rights.

B.  

IT security should regularly revoke excessive system rights.

C.  

Human resources (HR) should delete access rights of terminated employees.

D.  

Line management should regularly review and request modification of access rights

Discussion 0
Question # 392

Which of the following is the BEST way to ensure an organization's data classification policies are preserved during the process of data transformation?

Options:

A.  

Map data classification controls to data sets.

B.  

Control access to extract, transform, and load (ETL) tools.

C.  

Conduct a data discovery exercise across all business applications.

D.  

Implement classification labels in metadata during data creation.

Discussion 0
Question # 393

Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?

Options:

A.  

Legacy data has not been purged.

B.  

Admin account passwords are not set to expire.

C.  

Default settings have not been changed.

D.  

Database activity logging is not complete.

Discussion 0
Question # 394

Which of the following BEST enables a benefits realization process for a system development project?

Options:

A.  

Metrics for the project have been selected before the project begins.

B.  

Project budget includes costs to execute the project and costs associated with the solution.

C.  

Estimates of business benefits are backed by similar previously completed projects.

D.  

Metrics are evaluated immediately after the project has been implemented.

Discussion 0
Question # 395

An IS auditor reviewing a job scheduling tool notices performance and reliability problems. Which of the following is MOST likely affecting the tool?

Options:

A.  

Administrator passwords do not meet organizational security and complexity requirements.

B.  

The number of support staff responsible for job scheduling has been reduced.

C.  

The scheduling tool was not classified as business-critical by the IT department.

D.  

Maintenance patches and the latest enhancement upgrades are missing.

Discussion 0
Question # 396

The PRIMARY responsibility of a project steering committee is to:

Options:

A.  

sign off on the final build document.

B.  

ensure that each project deadline is met.

C.  

ensure that developed systems meet business needs.

D.  

provide regular project updates and oversight.

Discussion 0
Question # 397

Which type of risk would MOST influence the selection of a sampling methodology?

Options:

A.  

Inherent

B.  

Residual

C.  

Control

D.  

Detection

Discussion 0
Question # 398

When reviewing an IT strategic plan, the GREATEST concern would be that

Options:

A.  

an IT strategy committee has not been created

B.  

the plan does not support relevant organizational goals.

C.  

there are no key performance indicators (KPls).

D.  

the plan was not formally approved by the board of directors

Discussion 0
Question # 399

Which of the following is the MOST important consideration when establishing vulnerability scanning on critical IT infrastructure?

Options:

A.  

The scanning will be performed during non-peak hours.

B.  

The scanning will be followed by penetration testing.

C.  

The scanning will be cost-effective.

D.  

The scanning will not degrade system performance.

Discussion 0
Question # 400

Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:

Options:

A.  

eliminated

B.  

unchanged

C.  

increased

D.  

reduced

Discussion 0
Get CISA dumps and pass your exam in 24 hours!

Free Exams Sample Questions