Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CISA Exam Dumps - Isaca Certification Questions and Answers

Question # 54

Which of the following metrics would BEST measure the agility of an organization's IT function?

Options:

A.

Average number of learning and training hours per IT staff member

B.

Frequency of security assessments against the most recent standards and guidelines

C.

Average time to turn strategic IT objectives into an agreed upon and approved initiative

D.

Percentage of staff with sufficient IT-related skills for the competency required of their roles

Buy Now
Question # 55

Which of the following BEST mitigates the risk of SQL injection attacks against applications exposed to the internet?

Options:

A.

Web application firewall (WAF)

B.

SQL server hardening

C.

Patch management program

D.

SQL server physical controls

Buy Now
Question # 56

The GREATEST benefit of using a polo typing approach in software development is that it helps to:

Options:

A.

minimize scope changes to the system.

B.

decrease the time allocated for user testing and review.

C.

conceptualize and clarify requirements.

D.

Improve efficiency of quality assurance (QA) testing

Buy Now
Question # 57

Which of the following BEST enables an organization to determine the effectiveness of its information security awareness program?

Options:

A.

Measuring user satisfaction with the quality of the training

B.

Evaluating the results of a social engineering exercise

C.

Reviewing security staff performance evaluations

D.

Performing an analysis of the number of help desk calls

Buy Now
Question # 58

Which of the following provides the BEST providence that outsourced provider services are being properly managed?

Options:

A.

The service level agreement (SLA) includes penalties for non-performance.

B.

Adequate action is taken for noncompliance with the service level agreement (SLA).

C.

The vendor provides historical data to demonstrate its performance.

D.

Internal performance standards align with corporate strategy.

Buy Now
Question # 59

Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization's security policy?

Options:

A.

Reviewing the parameter settings

B.

Reviewing the system log

C.

Interviewing the firewall administrator

D.

Reviewing the actual procedures

Buy Now
Question # 60

Which of the following is the PRIMARY purpose of conducting a control self-assessment (CSA)?

Options:

A.

To replace audit responsibilities

B.

To reduce control costs

C.

To promote control ownership

D.

To enable early detection of risks

Buy Now
Question # 61

At the end of each business day, a business-critical application generates a report of financial transac-tions greater than a certain value, and an employee

then checks these transactions for errors. What type of control is in place?

Options:

A.

Detective

B.

Preventive

C.

Corrective

D.

Deterrent

Buy Now
Question # 62

An organization has alternative links in its wide area network (WAN) to provide redundancy. However, each time there is a problem with a link, network administrators have to update the configuration to divert traffic to the other link. Which of the following would be an IS auditor's BEST recommendation?

Options:

A.

Reduce the number of alternative links.

B.

Implement a load-balancing mechanism.

C.

Configure a non-proprietary routing protocol.

D.

Implement an exterior routing protocol.

Buy Now
Question # 63

Which of the following is an analytical review procedure for a payroll system?

Options:

A.

Performing reasonableness tests by multiplying the number of employees by the average wage rate

B.

Evaluating the performance of the payroll system using benchmarking software

C.

Performing penetration attempts on the payroll system

D.

Testing hours reported on time sheets

Buy Now
Question # 64

The GREATEST concern for an IS auditor reviewing vulnerability assessments by the auditee would be if the assessments are:

Options:

A.

Conducted once per year just before system audits are scheduled.

B.

Conducted by the internal technical team instead of external experts.

C.

Performed for critical systems, not for the entire infrastructure.

D.

Performed using open-source testing tools.

Buy Now
Question # 65

Which of the following is the MOST important consideration when relying on the work of the prior auditor?

Options:

A.

Qualifications of the prior auditor

B.

Management agreement with recommendations

C.

Duration of the prior audit

D.

Number of findings identified by the prior auditor

Buy Now
Question # 66

An IS auditor is conducting an IT governance audit and notices many initiatives are managed informally by isolated project managers. Which of the following recommendations would have the GREATEST impact on improving the maturity of the IT team?

Options:

A.

Schedule a follow-up audit in the next year to confirm whether IT processes have matured.

B.

Create an interdisciplinary IT steering committee to oversee IT prioritization and spending.

C.

Document and track all IT decisions in a project management tool.

D.

Discontinue all current IT projects until formal approval is obtained and documented.

Buy Now
Question # 67

An IS auditor reviewing an organization’s IT systems finds that the organization frequently purchases systems that are incompatible with the technologies already in the organization. Which of the following is the MOST likely reason?

Options:

A.

Ineffective risk management policy

B.

Lack of enterprise architecture (EA)

C.

Lack of a maturity model

D.

Outdated enterprise resource planning (ERP) system

Buy Now
Question # 68

Which of the following encryption methods offers the BEST wireless security?

Options:

A.

Wi-Fi Protected Access 3 (WPA3)

B.

Data Encryption Standard (DES)

C.

Wired Equivalent Privacy (WEP)

D.

Secure Sockets Layer (SSL)

Buy Now
Question # 69

A telecommunications company has recently created a new fraud department with three employees and acquired a fraud detection system that uses artificial intelligence (AI) modules. Which of the following would be of GREATEST concern to an IS auditor reviewing the system?

Options:

A.

A very large number of true negatives

B.

A small number of false negatives

C.

A small number of true positives

D.

A large number of false positives

Buy Now
Question # 70

An organization's information security policies should be developed PRIMARILY on the basis of:

Options:

A.

enterprise architecture (EA).

B.

industry best practices.

C.

a risk management process.

D.

past information security incidents.

Buy Now
Question # 71

During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?

Options:

A.

Post-implementation review phase

B.

Final implementation phase

C.

User acceptance testing (UAT) phase

D.

Design review phase

Buy Now
Question # 72

An IS auditor is reviewing a network diagram. Which of the following would be the BEST location for placement of a firewall?

Options:

A.

Between each host and the local network switch/hub

B.

Between virtual local area networks (VLANs)

C.

Inside the demilitarized zone (DMZ)

D.

At borders of network segments with different security levels

Buy Now
Question # 73

Which of the following roles is PRIMARILY responsible for mitigating the risk of benefits not being realized in an IT project?

Options:

A.

Project sponsor

B.

Project manager

C.

Quality assurance (QA) manager

D.

Chief risk officer (CRO)

Buy Now
Question # 74

An IS auditor finds ad hoc vulnerability scanning is in place with no clear alignment to the organization's wider security threat and vulnerability management program.

Which of the following would BEST enable the organization to work toward improvement in this area?

Options:

A.

Implementing security logging to enhance threat and vulnerability management

B.

Maintaining a catalog of vulnerabilities that may impact mission-critical systems

C.

Using a capability maturity model to identify a path to an optimized program

D.

Outsourcing the threat and vulnerability management function to a third party

Buy Now
Question # 75

Which of the following is MOST important for an IS auditor to verify when reviewing the planned use of Benford's law as a data analytics technique to detect fraud in a set of credit card transactions?

Options:

A.

The transactions are in double integer format.

B.

The transaction amounts are selected randomly without restriction.

C.

The transaction analysis is limited to transactions within standard deviation.

D.

The transactions are all in the same currency.

Buy Now
Question # 76

An IS auditor is preparing for a review of controls associated with a manufacturing plant's implementation of industrial Internet of Things (loT) infrastructure Which of the following vulnerabilities would present the GREATEST security risk to the organization?

Options:

A.

Insufficient physical security around the lo I devices for theft prevention

B.

Use of open-source software components within the loT devices

C.

Constraints in loT device firmware storage space for code upgrades

D.

loT devices that are not using wireless network connectivity

Buy Now
Question # 77

Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?

Options:

A.

Enforce strong security settings on smart devices.

B.

Require employees to formally acknowledge security procedures.

C.

Review access logs to the organization's sensitive data in a timely manner.

D.

Include usage restrictions in bring your own device (BYOD) security procedures.

Buy Now
Question # 78

The waterfall life cycle model of software development is BEST suited for which of the following situations?

Options:

A.

The project will involve the use of new technology.

B.

The project intends to apply an object-oriented design approach.

C.

The project requirements are well understood.

D.

The project is subject to time pressures.

Buy Now
Question # 79

Which of the following is the BEST indication that an information security awareness program is effective?

Options:

A.

A reduction in the number of reported information security incidents

B.

A reduction in the success rate of social engineering attacks

C.

A reduction in the cost of maintaining the information security program

D.

A reduction in the number of information security attacks

Buy Now
Question # 80

An organization saves confidential information in a file with password protection and the file is placed in a shared folder. An attacker has stolen this information by obtaining the password through social engineering. Implementing which of the following would BEST enable the organization to prevent this type of incident in the future?

Options:

A.

Multi-factor authentication (MFA)

B.

Security awareness programs for employees

C.

Access history log review by the business manager

D.

File encryption along with password protection

Buy Now
Question # 81

After areas have been appropriately scoped, what is the IS auditor's NEXT step in the selection for sampling?

Options:

A.

Define the population for sampling.

B.

Determine the sampling method.

C.

Calculate the sample size.

D.

Pull the sample.

Buy Now
Question # 82

Which of the following is the PRIMARY benefit of effective implementation of appropriate data classification?

Options:

A.

Ability to meet business requirements

B.

Assurance that sensitive data is encrypted

C.

Increased accuracy of sensitive data

D.

Management of business risk to sensitive data

Buy Now
Question # 83

Which of the following should be of MOST concern to an IS auditor when reviewing an intrusion detection system (IDS)?

Options:

A.

High false-positive rate

B.

Delay in signature updates

C.

High false-negative rate

D.

Decrease in processing speed

Buy Now
Question # 84

Which of the following would be the GREATEST concern during a financial statement audit?

Options:

A.

A backup has not been identified for key approvers.

B.

System capacity has not been tested.

C.

The procedures for generating key reports have not been approved.

D.

The financial management system is cloud based.

Buy Now
Question # 85

Control self-assessments (CSAs) can be used to:

Options:

A.

Determine the value of assets.

B.

Establish baselines.

C.

Evaluate strategic business goals.

D.

Replace audits.

Buy Now
Question # 86

An IS auditor can BEST evaluate the business impact of system failures by:

Options:

A.

assessing user satisfaction levels.

B.

interviewing the security administrator.

C.

analyzing equipment maintenance logs.

D.

reviewing system-generated logs.

Buy Now
Question # 87

An IS auditor is reviewing a data conversion project. Which of the following is the auditor's BEST recommendation prior to go-live?

Options:

A.

Conduct a mock conversion test.

B.

Review test procedures and scenarios.

C.

Automate the test scripts.

D.

Establish a configuration baseline.

Buy Now
Question # 88

Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?

Options:

A.

Legal and compliance requirements

B.

Customer agreements

C.

Data classification

D.

Organizational policies and procedures

Buy Now
Question # 89

Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?

Options:

A.

Staff members who failed the test did not receive follow-up education

B.

Test results were not communicated to staff members.

C.

Staff members were not notified about the test beforehand.

D.

Security awareness training was not provided prior to the test.

Buy Now
Question # 90

Which of the following would MOST effectively ensure the integrity of data transmitted over a network?

Options:

A.

Message encryption

B.

Certificate authority (CA)

C.

Steganography

D.

Message digest

Buy Now
Question # 91

Which of the following is a social engineering attack method?

Options:

A.

An unauthorized person attempts to gam access to secure premises by following an authonzed person through a secure door.

B.

An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.

C.

A hacker walks around an office building using scanning tools to search for a wireless network to gain access.

D.

An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.

Buy Now
Question # 92

Which of the following is the BEST recommendation by an IS auditor to prevent unauthorized access to Internet of Things (loT) devices'?

Options:

A.

loT devices should only be accessible from the host network.

B.

loT devices should log and alert on access attempts.

C.

IoT devices should require identification and authentication.

D.

loT devices should monitor the use of device system accounts.

Buy Now
Question # 93

An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that

Options:

A.

security parameters are set in accordance with the manufacturer s standards.

B.

a detailed business case was formally approved prior to the purchase.

C.

security parameters are set in accordance with the organization's policies.

D.

the procurement project invited lenders from at least three different suppliers.

Buy Now
Question # 94

The PRIMARY role of an IS auditor in the remediation of problems found during an audit engagement is to:

Options:

A.

help auditee management by providing the solution.

B.

explain the findings and provide general advice.

C.

present updated policies to management for approval.

D.

take ownership of the problems and oversee remediation efforts.

Buy Now
Question # 95

An IS auditor has validated that an organization's IT department runs several low-priority automated tasks Which of the following is the BEST recommendation for an automated job schedule?

Options:

A.

Low-priority jobs should be avoided.

B.

Low-priority jobs should include the major functions.

C.

Low-priority jobs should be provided with optimal resources.

D.

Low-priority jobs should be scheduled subject to resource availability.

Buy Now
Question # 96

Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?

Options:

A.

System flowchart

B.

Data flow diagram

C.

Process flowchart

D.

Entity-relationship diagram

Buy Now
Question # 97

A mission-critical application utilizes a one-node database server. On multiple occasions, the database service has been stopped to perform routine patching, causing application outages. Which of the following should be the IS auditor’s GREATEST concern?

Options:

A.

Revenue lost due to application outages

B.

Patching performed by the vendor

C.

A large number of scheduled database changes

D.

The presence of a single point of failure

Buy Now
Question # 98

Which of the following parameters reflects the risk threshold for an organization experiencing a service disruption?

Options:

A.

Maximum tolerable outage (MTO)

B.

Recovery point objective (RPO)

C.

Service delivery objective (SDO)

D.

Allowable interruption window (AIW)

Buy Now
Question # 99

During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the

associated risk?

Options:

A.

Increased vulnerability due to anytime, anywhere accessibility

B.

Increased need for user awareness training

C.

The use of the cloud negatively impacting IT availability

D.

Lack of governance and oversight for IT infrastructure and applications

Buy Now
Question # 100

Which of the following audit procedures would provide the BEST assurance that an application program is functioning as designed?

Options:

A.

Using a continuous auditing module

B.

Interviewing business management

C.

Confirming accounts

D.

Reviewing program documentation

Buy Now
Question # 101

Which of the following is the MOST appropriate testing approach when auditing a daily data flow between two systems via an automated interface to confirm that it is complete and accurate?

Options:

A.

Confirm that the encryption standard applied to the interface is in line with best practice.

B.

Inspect interface configurations and an example output of the systems.

C.

Perform data reconciliation between the two systems for a sample of 25 days.

D.

Conduct code review for both systems and inspect design documentation.

Buy Now
Question # 102

Which of the following should be an IS auditor's GREATEST concern when assessing an IT service configuration database?

Options:

A.

The database is read-accessible for all users.

B.

The database is write-accessible for all users.

C.

The database is not encrypted at rest.

D.

The database is executable for all users.

Buy Now
Question # 103

Which of the following should be the GREATEST concern to an IS auditor reviewing the information security framework of an organization?

Options:

A.

The information security policy has not been updated in the last two years.

B.

Senior management was not involved in the development of the information security policy.

C.

A list of critical information assets was not included in the information security policy.

D.

The information security policy is not aligned with regulatory requirements.

Buy Now
Exam Code: CISA
Exam Name: Certified Information Systems Auditor
Last Update: Aug 1, 2025
Questions: 1407
CISA pdf

CISA PDF

$69.65  $199
CISA Engine

CISA Testing Engine

$78.75  $225
CISA PDF + Engine

CISA PDF + Testing Engine

$87.15  $249