CISA Practice Questions
Certified Information Systems Auditor
Last Update 4 days ago
Total Questions : 1524
Dive into our fully updated and stable CISA practice test platform, featuring all the latest Isaca Certification exam questions added this week. Our preparation tool is more than just a Isaca study aid; it's a strategic advantage.
Our free Isaca Certification practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISA. Use this test to pinpoint which areas you need to focus your study on.
Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
A proper audit trail of changes to server start-up procedures would include evidence of:
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
Which of the following would provide management with the MOST reasonable assurance that a new data warehouse will meet the needs of the
organization?
During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)
agreement. What should the auditor do NEXT?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
Which of the following would be an IS auditor's GREATEST concern when reviewing the organization's business continuity plan (BCP)?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?
The BEST way to provide assurance that a project is adhering to the project plan is to:
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?
An IT strategic plan that BEST leverages IT in achieving organizational goals will include:
During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?
Which of the following is the BEST way to ensure an organization's data classification policies are preserved during the process of data transformation?
Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?
Which of the following BEST enables a benefits realization process for a system development project?
An IS auditor reviewing a job scheduling tool notices performance and reliability problems. Which of the following is MOST likely affecting the tool?
Which type of risk would MOST influence the selection of a sampling methodology?
Which of the following is the MOST important consideration when establishing vulnerability scanning on critical IT infrastructure?
Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:
