Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISA Exam Dumps - Isaca Certification Questions and Answers

Question # 154

Which of the following is the MOST appropriate responsibility of an IS auditor involved in a data center renovation project?

Options:

A.

Performing independent reviews of responsible parties engaged in the project

B.

Shortlisting vendors to perform renovations

C.

Ensuring the project progresses as scheduled and milestones are achieved

D.

Implementing data center operational controls

Buy Now
Question # 155

Which of the following key performance indicators (KPIs) provides stakeholders with the MOST useful information about whether information security risk is being managed?

Options:

A.

Time from identifying security threats to implementing solutions

B.

The number of security controls audited

C.

Time from security log capture to log analysis

D.

The number of entries in the security risk register

Buy Now
Question # 156

The management of a small e-commerce firm is concerned about the impact of AI adoption on its intellectual property. Which of the following BEST addresses this concern?

Options:

A.

Developing an AI acceptable use policy

B.

Sanctioning employees for using generative AI

C.

Performing manual reviews of AI web traffic logs

D.

Deny-listing chat-based AI websites and plugins

Buy Now
Question # 157

Which of the following is the BEST way to mitigate the impact of ransomware attacks?

Options:

A.

Invoking the disaster recovery plan (DRP)

B.

Backing up data frequently

C.

Paying the ransom

D.

Requiring password changes for administrative accounts

Buy Now
Question # 158

Which of the following is the BEST way to verify the effectiveness of a data restoration process?

Options:

A.

Performing periodic reviews of physical access to backup media

B.

Performing periodic complete data restorations

C.

Validating off ne backups using software utilities

D.

Reviewing and updating data restoration policies annually

Buy Now
Question # 159

Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?

Options:

A.

Implementing the remediation plan

B.

Partially completing the CSA

C.

Developing the remediation plan

D.

Developing the CSA questionnaire

Buy Now
Question # 160

Which of the following would a digital signature MOST likely prevent?

Options:

A.

Repudiation

B.

Unauthorized change

C.

Corruption

D.

Disclosure

Buy Now
Question # 161

Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?

Options:

A.

Perimeter firewall

B.

Data loss prevention (DLP) system

C.

Network segmentation

D.

Web application firewall (WAF)

Buy Now
Question # 162

Which of the following documents should define roles and responsibilities within an IT audit organization?

Options:

A.

Audit charter

B.

Annual audit plan

C.

Engagement letter

D.

Audit scope letter

Buy Now
Question # 163

Which of the following is the MAIN objective of enterprise architecture (EA) governance?

Options:

A.

To ensure new processes and technologies harmonize with existing processes

B.

To ensure the EA can adapt to emerging technology trends

C.

To ensure the EA is compliant with local laws and regulations

D.

To ensure new initiatives produce an acceptable return on investment (ROI)

Buy Now
Question # 164

Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?

Options:

A.

Antivirus software was unable to prevent the attack even though it was properly updated

B.

The most recent security patches were not tested prior to implementation

C.

Backups were only performed within the local network

D.

Employees were not trained on cybersecurity policies and procedures

Buy Now
Question # 165

An organization ' s information security policies should be developed PRIMARILY on the basis of:

Options:

A.

enterprise architecture (EA).

B.

industry best practices.

C.

a risk management process.

D.

past information security incidents.

Buy Now
Question # 166

Which of the following is BEST supported by enforcing data definition standards within a database?

Options:

A.

Data disposal

B.

Data retention

C.

Data formatting

D.

Data confidentiality

Buy Now
Question # 167

Which of the following is a PRIMARY purpose of a privacy notice?

Options:

A.

To indemnify the organization against litigation by users for the appropriation of personal information

B.

To establish the organization’s accountability for the use and protection of personal information

C.

To obtain approval for the sale of personal information to third-party organizations

D.

To ensure that the organization’s privacy controls comply with the privacy laws of the user’s region

Buy Now
Question # 168

An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?

Options:

A.

A significant increase in authorized connections to third parties

B.

A significant increase in cybersecurity audit findings

C.

A significant increase in approved exceptions

D.

A significant increase in external attack attempts

Buy Now
Question # 169

A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?

Options:

A.

The programmer did not involve the user in testing

B.

The user requirements were not documented

C.

The programmer has access to the production programs

D.

Payroll files were not under the control of a librarian

Buy Now
Question # 170

In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?

Options:

A.

Modify applications to no longer require direct access to the database.

B.

Introduce database access monitoring into the environment

C.

Modify the access management policy to make allowances for application accounts.

D.

Schedule downtime to implement password changes.

Buy Now
Question # 171

Which of the following is the BEST indication of effective IT investment management?

Options:

A.

IT investments are implemented and monitored following a system development life cycle (SDLC)

B.

IT investments are mapped to specific business objectives

C.

Key performance indicators (KPIs) are defined for each business requiring IT Investment

D.

The IT Investment budget is significantly below industry benchmarks

Buy Now
Question # 172

An outsourced recruitment vendor processes personally identifiable information (PII) related to an organization’s new hires. Which of the following would be the GREATEST concern to an IS auditor reviewing the third-party risk management process?

Options:

A.

The vendor collects data using an external-facing web service.

B.

The vendor lacks a team of dedicated privacy professionals.

C.

The vendor uses a fourth party to host client data.

D.

The vendor is excluded from the third-party due diligence process.

Buy Now
Question # 173

An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?

Options:

A.

Software developers may adopt inappropriate technology.

B.

Project managers may accept technology risks exceeding the organization ' s risk appetite.

C.

Key decision-making entities for technology risk have not been identified

D.

There is no clear approval entity for organizational security standards.

Buy Now
Question # 174

An external IS auditor is reviewing the continuous monitoring system for a large bank and notes several potential issues. Which of the following would present the GREATEST concern regarding the reliability of the monitoring system?

Options:

A.

The system results are not reviewed by senior management.

B.

The alert threshold is updated periodically.

C.

The monitoring thresholds are not subject to change management.

D.

The monitoring system was configured by a third party.

Buy Now
Question # 175

Which of the following MOST effectively detects transposition and transcription errors?

Options:

A.

Duplicate check

B.

Completeness check

C.

Sequence check

D.

Check digit

Buy Now
Question # 176

Which of the following BEST indicates that the effectiveness of an organization ' s security awareness program has improved?

Options:

A.

A decrease in the number of information security audit findings

B.

An increase in the number of staff who complete awareness training

C.

An increase in the number of phishing emails reported by employees

D.

A decrease in the number of malware outbreaks

Buy Now
Question # 177

An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?

Options:

A.

Source code version control

B.

Project change management controls

C.

Existence of an architecture review board

D.

Configuration management

Buy Now
Question # 178

An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:

Options:

A.

structured query language (SQL) injection

B.

buffer overflow.

C.

denial of service (DoS).

D.

phishing.

Buy Now
Question # 179

An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor ' s PRIMARY concern?

Options:

A.

A single point of failure for both voice and data communications

B.

Inability to use virtual private networks (VPNs) for internal traffic

C.

Lack of integration of voice and data communications

D.

Voice quality degradation due to packet toss

Buy Now
Question # 180

Which of the following BEST enables a governing body to monitor IT performance based on metrics?

Options:

A.

Metrics defined at the operational level are aligned with service delivery objectives (SDOs).

B.

IT asset metrics are defined based on manufacturers’ recommendations.

C.

Metrics are derived from quantitatively measurable data generated automatically by systems.

D.

Business goals have been properly aligned with IT performance metrics.

Buy Now
Question # 181

Which of the following BEST facilitates the legal process in the event of an incident?

Options:

A.

Right to perform e-discovery

B.

Advice from legal counsel

C.

Preserving the chain of custody

D.

Results of a root cause analysis

Buy Now
Question # 182

Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?

Options:

A.

IT strategies are communicated to all Business stakeholders

B.

Organizational strategies are communicated to the chief information officer (CIO).

C.

Business stakeholders are Involved In approving the IT strategy.

D.

The chief information officer (CIO) is involved In approving the organizational strategies

Buy Now
Question # 183

Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?

Options:

A.

Evaluating the likelihood of attack

B.

Estimating potential damage

C.

Identifying vulnerable assets

D.

Assessing the Impact of vulnerabilities

Buy Now
Question # 184

An IS auditor is reviewing an organization ' s system development life cycle (SDLC) Which of the following MUST be included in the review?

Options:

A.

Ownership of the system quality management plan

B.

Utilization of standards in the system development processes and procedures

C.

Validation that system development processes adhere to quality standards

D.

Definition of quality attributes to be associated with the system

Buy Now
Question # 185

Which of the following should be the FIRST step in managing the impact of recently discovered zero-day vulnerabilities?

Options:

A.

Identifying at-risk assets

B.

Assessing the impact of vulnerabilities

C.

Evaluating the likelihood of attack

D.

Estimating potential damage

Buy Now
Question # 186

Which of the following BEST supports an organization ' s objective of restricting the use of removable storage devices by users?

Options:

A.

Data management policy

B.

Updated anti-malware solutions

C.

Data loss prevention (DLP)

D.

Online monitoring

Buy Now
Question # 187

Which of the following is the BEST way to ensure a vendor complies with system security requirements?

Options:

A.

Require security training for vendor staff.

B.

Review past incidents reported by the vendor.

C.

Review past audits on the vendor ' s security compliance.

D.

Require a compliance clause in the vendor contract.

Buy Now
Question # 188

Which of the following is me GREATE ST impact as a result of the ongoing deterioration of a detective control?

Options:

A.

Increased number of false negatives in security logs

B.

Decreased effectiveness of roof cause analysis

C.

Decreased overall recovery time

D.

Increased demand for storage space for logs

Buy Now
Question # 189

An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?

Options:

A.

Information security manager

B.

Quality assurance (QA) manager

C.

Business department executive

D.

Business process owner

Buy Now
Question # 190

An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?

Options:

A.

Installing security software on the devices

B.

Partitioning the work environment from personal space on devices

C.

Preventing users from adding applications

D.

Restricting the use of devices for personal purposes during working hours

Buy Now
Question # 191

Which of the following is MOST important to review during the project initiation phase of developing and deploying a new application?

Options:

A.

User requirements

B.

User acceptance testing (UAT) plans

C.

Deployment plans

D.

Architectural design

Buy Now
Question # 192

Which of the following would BEST prevent an arbitrary application of a patch?

Options:

A.

Database access control

B.

Established maintenance windows

C.

Network based access controls

D.

Change management

Buy Now
Question # 193

Which of the following MUST be completed as part of the annual audit planning process?

Options:

A.

Business continuity analysis

B.

Industry benchmarking

C.

Risk assessment

D.

Risk control matrix

Buy Now
Question # 194

Which of the following is the BEST recommendation to include in an organization ' s bring your own device (BYOD)

policy to help prevent data leakage?

Options:

A.

Require employees to waive privacy rights related to data on BYOD devices.

B.

Require multi-factor authentication on BYOD devices,

C.

Specify employee responsibilities for reporting lost or stolen BYOD devices.

D.

Allow only registered BYOD devices to access the network.

Buy Now
Question # 195

Which of the following is the PRIMARY basis on which audit objectives are established?

Options:

A.

Audit risk

B.

Consideration of risks

C.

Assessment of prior audits

D.

Business strategy

Buy Now
Question # 196

Which of the following is found in an audit charter?

Options:

A.

The process of developing the annual audit plan

B.

The authority given to the audit function

C.

Required training for audit staff

D.

Audit objectives and scope

Buy Now
Question # 197

In order for a firewall to effectively protect a network against external attacks, what fundamental practice must be followed?

Options:

A.

The firewall must be placed in the demilitarized zone (DMZ).

B.

Only essential external services should be permitted.

C.

Filters for external information must be defined.

D.

All external communication must be via the firewall.

Buy Now
Question # 198

Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?

Options:

A.

Risk acceptance

B.

Risk mitigation

C.

Risk transference

D.

Risk reduction

Buy Now
Question # 199

An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?

Options:

A.

Database clustering

B.

Data caching

C.

Reindexing of the database table

D.

Load balancing

Buy Now
Question # 200

An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank ' s customers. Which of the following controls is MOST important for the auditor to confirm is in place?

Options:

A.

The default configurations have been changed.

B.

All tables in the database are normalized.

C.

The service port used by the database server has been changed.

D.

The default administration account is used after changing the account password.

Buy Now
Question # 201

Which of the following presents the GREATEST risk associated with end-user computing (EUC) applica-tions over financial reporting?

Options:

A.

Inability to quickly modify and deploy a solution

B.

Lack of portability for users

C.

Loss of time due to manual processes

D.

Calculation errors in spreadsheets

Buy Now
Question # 202

Which of the following should be of MOST concern to an IS auditor when reviewing an intrusion detection system (IDS)?

Options:

A.

High false-positive rate

B.

Delay in signature updates

C.

High false-negative rate

D.

Decrease in processing speed

Buy Now
Question # 203

Which of the following is a concern associated with virtualization?

Options:

A.

The physical footprint of servers could decrease within the data center.

B.

Performance issues with the host could impact the guest operating systems.

C.

Processing capacity may be shared across multiple operating systems.

D.

One host may have multiple versions of the same operating system.

Buy Now
Exam Code: CISA
Exam Name: Certified Information Systems Auditor
Last Update: Mar 29, 2026
Questions: 1524
CISA pdf

CISA PDF

$59.7  $199
CISA Engine

CISA Testing Engine

$67.5  $225
CISA PDF + Engine

CISA PDF + Testing Engine

$74.7  $249