Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISA Exam Dumps - Isaca Certification Questions and Answers

Question # 354

When auditing the feasibility study of a system development project, the IS auditor should:

Options:

A.

review qualifications of key members of the project team.

B.

review the request for proposal (RFP) to ensure that it covers the scope of work.

C.

review cost-benefit documentation for reasonableness.

D.

ensure that vendor contracts are reviewed by legal counsel.

Buy Now
Question # 355

In an annual audit cycle, the audit of an organization ' s IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?

Options:

A.

Postponing the review until all of the findings have been rectified

B.

Limiting the review to the deficient areas

C.

Verifying that all recommendations have been implemented

D.

Following up on the status of all recommendations

Buy Now
Question # 356

An organization is establishing a steering committee for the implementation of a new enterprise resource planning (ERP) system that uses Agile project management methodology. What is the MOST important criterion for the makeup of this committee?

Options:

A.

Senior management representation

B.

Ability to meet the time commitment required

C.

Agile project management experience

D.

ERP implementation experience

Buy Now
Question # 357

The decision to accept an IT control risk related to data quality should be the responsibility of the:

Options:

A.

information security team.

B.

IS audit manager.

C.

chief information officer (CIO).

D.

business owner.

Buy Now
Question # 358

During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST

Options:

A.

perform a business impact analysis (BIA).

B.

issue an intermediate report to management.

C.

evaluate the impact on current disaster recovery capability.

D.

conduct additional compliance testing.

Buy Now
Question # 359

An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?

Options:

A.

The number of users deleting the email without reporting because it is a phishing email

B.

The number of users clicking on the link to learn more about the sender of the email

C.

The number of users forwarding the email to their business unit managers

D.

The number of users reporting receipt of the email to the information security team

Buy Now
Question # 360

Which of the following BEST enables an IS auditor to prioritize financial reporting spreadsheets for an end-user computing (EUC) audit?

Options:

A.

Understanding the purpose of each spreadsheet

B.

Identifying the spreadsheets with built-in macros

C.

Reviewing spreadsheets based on file size

D.

Ascertaining which spreadsheets are most frequently used

Buy Now
Question # 361

Which of the following should be the role of internal audit in an organization’s move to the cloud?

Options:

A.

Mitigating risk to an acceptable level.

B.

Assessing key controls that support the migration.

C.

Implementing security controls for data prior to migration.

D.

Identifying impacts to organizational budgets and resources.

Buy Now
Question # 362

The GREATEST concern for an IS auditor reviewing vulnerability assessments by the auditee would be if the assessments are:

Options:

A.

Conducted once per year just before system audits are scheduled.

B.

Conducted by the internal technical team instead of external experts.

C.

Performed for critical systems, not for the entire infrastructure.

D.

Performed using open-source testing tools.

Buy Now
Question # 363

An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?

Options:

A.

Intrusion detection system (IDS)

B.

Security information and event management (SIEM) system

C.

Stateful firewall

D.

Load balancer

Buy Now
Question # 364

Which of the following is the BEST method to prevent wire transfer fraud by bank employees?

Options:

A.

Independent reconciliation

B.

Re-keying of wire dollar amounts

C.

Two-factor authentication control

D.

System-enforced dual control

Buy Now
Question # 365

Upon completion of audit work, an IS auditor should:

Options:

A.

provide a report to senior management prior to discussion with the auditee.

B.

distribute a summary of general findings to the members of the auditing team.

C.

provide a report to the auditee stating the initial findings.

D.

review the working papers with the auditee.

Buy Now
Question # 366

An organization has decided to build a data warehouse using source data from several disparate systems to support strategic decision-making.

Which of the following is the BEST way to ensure the accuracy and completeness of the data used to support business decisions?

Options:

A.

The source data is pre-selected so that it already supports senior management ' s desired business decision outcome.

B.

The source data is from the current year of operations so that irrelevant data from prior years is not included.

C.

The source data is modified in the data warehouse to remove confidential or sensitive information.

D.

The source data is standardized and cleansed before loading into the data warehouse.

Buy Now
Question # 367

Which of the following is the BEST control to mitigate attacks that redirect internet traffic to an unauthorized website?

Options:

A.

Conduct regular user security awareness training.

B.

Enforce strong web browser security controls.

C.

Perform domain name system (DNS) server security hardening.

D.

Implement a web application firewall (WAF).

Buy Now
Question # 368

Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?

Options:

A.

Ensure the third party allocates adequate resources to meet requirements.

B.

Use analytics within the internal audit function

C.

Conduct a capacity planning exercise

D.

Utilize performance monitoring tools to verify service level agreements (SLAs)

Buy Now
Question # 369

Which of the following is the GREATEST benefit of adopting an Agile audit methodology?

Options:

A.

Better ability to address key risks

B.

Less frequent client interaction

C.

Annual cost savings

D.

Reduced documentation requirements

Buy Now
Question # 370

Which of the following would be an IS auditor ' s GREATEST concern when reviewing the organization ' s business continuity plan (BCP)?

Options:

A.

The recovery plan does not contain the process and application dependencies.

B.

The duration of tabletop exercises is longer than the recovery point objective (RPO).

C.

The duration of tabletop exercises is longer than the recovery time objective (RTO).

D.

The recovery point objective (RPO) and recovery time objective (R TO) are not the same.

Buy Now
Question # 371

A sample for testing must include the 80 largest client balances and a random sample of the rest. What should the IS auditor recommend?

Options:

A.

Query the database.

B.

Develop an integrated test facility (ITF).

C.

Use generalized audit software.

D.

Leverage a random number generator.

Buy Now
Question # 372

Which of the following controls is MOST crucial to ensure an organization will be able to recover its data from backup media in the event of a disaster?

Options:

A.

Storing backup media at an offsite facility

B.

Keeping a current inventory of backup media

C.

Periodically restoring backup media for key databases

D.

Encrypting data on backup media

Buy Now
Question # 373

An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?

Options:

A.

The standard is met as long as one member has a globally recognized audit certification.

B.

Technical co-sourcing must be used to help the new staff.

C.

Team member assignments must be based on individual competencies.

D.

The standard is met as long as a supervisor reviews the new auditors ' work.

Buy Now
Question # 374

Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?

Options:

A.

Requiring all users to encrypt documents before sending

B.

Installing firewalls on the corporate network

C.

Reporting all outgoing emails that are marked as confidential

D.

Monitoring all emails based on pre-defined criteria

Buy Now
Question # 375

An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor’s independence?

Options:

A.

The auditor implemented a specific control during the development of the system.

B.

The auditor participated as a member of the project team without operational responsibilities.

C.

The auditor provided advice concerning best practices.

D.

The auditor designed an embedded audit module exclusively for audit.

Buy Now
Question # 376

The PRIMARY purpose of a configuration management system is to:

Options:

A.

track software updates.

B.

define baselines for software.

C.

support the release procedure.

D.

standardize change approval.

Buy Now
Question # 377

Which of the following should an IS auditor be MOST concerned with when a system uses RFID?

Options:

A.

Scalability

B.

Maintainability

C.

Nonrepudiation

D.

Privacy

Buy Now
Question # 378

An IS auditor is reviewing an organization ' s information asset management process. Which of the following would be of GREATEST concern to the auditor?

Options:

A.

The process does not require specifying the physical locations of assets.

B.

Process ownership has not been established.

C.

The process does not include asset review.

D.

Identification of asset value is not included in the process.

Buy Now
Question # 379

Which of the following is the MOST important consideration of any disaster response plan?

Options:

A.

Lost revenue

B.

Personnel safety

C.

IT asset protection

D.

Adequate resource capacity

Buy Now
Question # 380

An IS auditor is evaluating the log management system for an organization with devices and systems in multiple geographic locations. Which of the following is MOST important for the auditor to verify?

Options:

A.

Log files are reviewed in multiple locations.

B.

Log files are concurrently updated.

C.

Log files are encrypted and digitally signed.

D.

Log files of the servers are synchronized.

Buy Now
Question # 381

Which of the following is the MOST important consideration when implementing a Zero Trust strategy for mobile, wireless, and Internet of Things (IoT) devices?

Options:

A.

Ensuring the latest firmware updates are applied regularly to all devices

B.

Validating the identity of all devices and users before granting access to resources

C.

Focusing on user training and awareness to prevent phishing attacks

D.

Implementing strong encryption protocols for data in transit and at rest

Buy Now
Question # 382

Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?

Options:

A.

Embed details within source code.

B.

Standardize file naming conventions.

C.

Utilize automated version control.

D.

Document details on a change register.

Buy Now
Question # 383

What is the MAIN reason to use incremental backups?

Options:

A.

To improve key availability metrics

B.

To reduce costs associates with backups

C.

To increase backup resiliency and redundancy

D.

To minimize the backup time and resources

Buy Now
Question # 384

What should be the PRIMARY focus during a review of a business process improvement project?

Options:

A.

Business project plan

B.

Continuous monitoring plans

C.

The cost of new controls

D.

Business impact

Buy Now
Question # 385

Which of the following should an IS auditor consider FIRST when evaluating firewall rules?

Options:

A.

The organization ' s security policy

B.

The number of remote nodes

C.

The firewalls ' default settings

D.

The physical location of the firewalls

Buy Now
Question # 386

Which of the following is the MOST important responsibility of user departments associated with program changes?

Options:

A.

Providing unit test data

B.

Analyzing change requests

C.

Updating documentation lo reflect latest changes

D.

Approving changes before implementation

Buy Now
Question # 387

An organization plans to centrally decommission end-of-life databases and migrate the data to the latest model of hardware. Which of the following BEST ensures data integrity is preserved during the migration?

Options:

A.

Reconciling sample data to most recent backups

B.

Obfuscating confidential data

C.

Encrypting the data

D.

Comparing checksums

Buy Now
Question # 388

Which of the following activities should be separated in an organization’s incident management processes?

Options:

A.

Initiating and closing error logs

B.

Collecting and analyzing logs from devices

C.

Identifying root causes and recommending workarounds

D.

Recording and classifying incidents

Buy Now
Question # 389

Which of the following should be the FIRST step to successfully implement a corporate data classification program?

Options:

A.

Approve a data classification policy.

B.

Select a data loss prevention (DLP) product.

C.

Confirm that adequate resources are available for the project.

D.

Check for the required regulatory requirements.

Buy Now
Question # 390

Which of the following provides the GREATEST assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively?

Options:

A.

Continuous auditing

B.

Manual checks

C.

Exception reporting

D.

Automated reconciliations

Buy Now
Question # 391

Which of the following is the MOST important consideration to facilitate prosecution of a perpetrator after a cybercrime?

Options:

A.

An active intrusion detection system (IDS)

B.

Professional collection of unaltered evidence

C.

Reporting to the internal legal department

D.

Immediate law enforcement involvement

Buy Now
Question # 392

Which of the following BEST facilitates strategic program management?

Options:

A.

Implementing stage gates

B.

Establishing a quality assurance (QA) process

C.

Aligning projects with business portfolios

D.

Tracking key project milestones

Buy Now
Question # 393

When evaluating whether the expected benefits of a project have been achieved, it is MOST important for an IS auditor to review:

Options:

A.

The business case.

B.

The project schedule.

C.

Proposed enhancements.

D.

Quality assurance (QA) results.

Buy Now
Question # 394

Which of the following BEST demonstrates alignment of the IT department with the corporate mission?

Options:

A.

Analysis of IT department functionality

B.

Biweekly reporting to senior management

C.

Annual board meetings

D.

Quarterly steering committee meetings

Buy Now
Question # 395

When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?

Options:

A.

Observing the execution of a daily backup run

B.

Evaluating the backup policies and procedures

C.

Interviewing key personnel evolved In the backup process

D.

Reviewing a sample of system-generated backup logs

Buy Now
Question # 396

A telecommunications company has recently created a new fraud department with three employees and acquired a fraud detection system that uses artificial intelligence (AI) modules. Which of the following would be of GREATEST concern to an IS auditor reviewing the system?

Options:

A.

A very large number of true negatives

B.

A small number of false negatives

C.

A small number of true positives

D.

A large number of false positives

Buy Now
Question # 397

Which of the following would minimize the risk of losing transactions as a result of a disaster?

Options:

A.

Sending a copy of the transaction logs to offsite storage on a daily basis

B.

Storing a copy of the transaction logs onsite in a fireproof vault

C.

Encrypting a copy of the transaction logs and store on a local server

D.

Signing a copy of the transaction logs and store on a local server

Buy Now
Question # 398

An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?

Options:

A.

Requiring policy acknowledgment and nondisclosure agreements (NDAs) signed by employees

B.

Establishing strong access controls on confidential data

C.

Providing education and guidelines to employees on use of social networking sites

D.

Monitoring employees ' social networking usage

Buy Now
Question # 399

During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the

associated risk?

Options:

A.

Increased vulnerability due to anytime, anywhere accessibility

B.

Increased need for user awareness training

C.

The use of the cloud negatively impacting IT availability

D.

Lack of governance and oversight for IT infrastructure and applications

Buy Now
Question # 400

Which of the following would be an appropriate rote of internal audit in helping to establish an organization ' s privacy program?

Options:

A.

Analyzing risks posed by new regulations

B.

Designing controls to protect personal data

C.

Defining roles within the organization related to privacy

D.

Developing procedures to monitor the use of personal data

Buy Now
Question # 401

An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?

Options:

A.

Redundant pathways

B.

Clustering

C.

Failover power

D.

Parallel testing

Buy Now
Question # 402

Which of the following BEST helps to ensure data integrity across system interfaces?

Options:

A.

Environment segregation

B.

Reconciliation

C.

System backups

D.

Access controls

Buy Now
Question # 403

Which of the following should be the PRIMARY focus for any network design that deploys a Zero Trust architecture?

Options:

A.

Protecting network segments

B.

Protecting technology resources

C.

Maintaining network router operating system versions

D.

Ensuring a vendor-agnostic environment

Buy Now
Exam Code: CISA
Exam Name: Certified Information Systems Auditor
Last Update: Mar 29, 2026
Questions: 1524
CISA pdf

CISA PDF

$59.7  $199
CISA Engine

CISA Testing Engine

$67.5  $225
CISA PDF + Engine

CISA PDF + Testing Engine

$74.7  $249