Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISA Exam Dumps - Isaca Certification Questions and Answers

Question # 404

Which of the following is the BEST approach to help organizations address risks associated with shadow IT?

Options:

A.

Implementing policies that prohibit the use of unauthorized systems and solutions

B.

Training employees on information security and conducting routine follow-ups

C.

Providing employees with access to necessary systems and unlimited software licenses

D.

Conducting regular security assessments to identify unauthorized systems and solutions

Buy Now
Question # 405

An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor’s test data set to include?

Options:

A.

Applicants of all ages

B.

Applicants from a range of geographic areas and income levels

C.

Incomplete records and incorrectly formatted data

D.

Duplicate records

Buy Now
Question # 406

When an organization conducts business process improvements, the IS auditor should be MOST concerned with the:

Options:

A.

metrics used to evaluate key operating segments.

B.

adequacy of the controls in the redesigned process.

C.

adequacy of reporting to senior management.

D.

lack of version control over process documentation.

Buy Now
Question # 407

IT disaster recovery time objectives (RTOs) should be based on the:

Options:

A.

maximum tolerable loss of data.

B.

nature of the outage

C.

maximum tolerable downtime (MTD).

D.

business-defined criticality of the systems.

Buy Now
Question # 408

A PRIMARY objective of risk management is to keep the total cost of risks below the:

Options:

A.

amount of losses that would materially damage the firm.

B.

average cost of physical security measures.

C.

administrative cost of risk management.

D.

estimated amount of losses included in the firm ' s budget

Buy Now
Question # 409

A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:

Options:

A.

evaluate replacement systems and performance monitoring software.

B.

restrict functionality of system monitoring software to security-related events.

C.

re-install the system and performance monitoring software.

D.

use analytical tools to produce exception reports from the system and performance monitoring software

Buy Now
Question # 410

Which of the following poses the GREATEST risk to an organization related to system interfaces?

Options:

A.

There is no process documentation for some system interfaces.

B.

Notifications of data transfers through the interfaces are not retained.

C.

Parts of the data transfer process are performed manually.

D.

There is no reliable inventory of system interfaces.

Buy Now
Question # 411

Which of the following should be the PRIMARY purpose of conducting tabletop exercises when re-viewing a security incident response plan?

Options:

A.

To provide efficiencies for alignment with incident response test scenarios

B.

To determine process improvement options for the incident response plan

C.

To gather documentation for responding to security audit inquiries

D.

To confirm that technology is in place to support the incident response plan

Buy Now
Question # 412

Which of the following should an IS auditor expect to see in a network vulnerability assessment?

Options:

A.

Misconfiguration and missing updates

B.

Malicious software and spyware

C.

Zero-day vulnerabilities

D.

Security design flaws

Buy Now
Question # 413

Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?

Options:

A.

Real-time audit software

B.

Performance data

C.

Quality assurance (QA) reviews

D.

Participative management techniques

Buy Now
Question # 414

Which of the following demonstrates the use of data analytics for a loan origination process?

Options:

A.

Evaluating whether loan records are included in the batch file and are validated by the servicing system

B.

Comparing a population of loans input in the origination system to loans booked on the servicing system

C.

Validating whether reconciliations between the two systems are performed and discrepancies are investigated

D.

Reviewing error handling controls to notify appropriate personnel in the event of a transmission failure

Buy Now
Question # 415

Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?

Options:

A.

Adding the developers to the change approval board

B.

A small number of people have access to deploy code

C.

Post-implementation change review

D.

Creation of staging environments

Buy Now
Question # 416

Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?

Options:

A.

Stress

B.

Parallel

C.

Regression

D.

Interface

Buy Now
Question # 417

Which of the following can only be provided by asymmetric encryption?

Options:

A.

Information privacy

B.

256-brt key length

C.

Data availability

D.

Nonrepudiation

Buy Now
Question # 418

Which of the following occurs during the issues management process for a system development project?

Options:

A.

Contingency planning

B.

Configuration management

C.

Help desk management

D.

Impact assessment

Buy Now
Question # 419

Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?

Options:

A.

To prevent confidential data loss

B.

To comply with legal and regulatory requirements

C.

To identify data at rest and data in transit for encryption

D.

To provide options to individuals regarding use of their data

Buy Now
Question # 420

Which of the following is MOST important for an IS auditor to assess during a post-implementation review of a newly modified IT application developed in-house?

Options:

A.

Sufficiency of implemented controls

B.

Resource management plan

C.

Updates required for end-user manuals

D.

Rollback plans for changes

Buy Now
Question # 421

When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:

Options:

A.

communicate via Transport Layer Security (TLS),

B.

block authorized users from unauthorized activities.

C.

channel access only through the public-facing firewall.

D.

channel access through authentication.

Buy Now
Question # 422

An organization ' s IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?

Options:

A.

Potential for inaccurate audit findings

B.

Compromise of IS audit independence

C.

IS audit resources being shared with other IT functions

D.

IS audit being isolated from other audit functions

Buy Now
Question # 423

Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?

Options:

A.

Customer service complaints

B.

Automated monitoring of logs

C.

Server crashes

D.

Penetration testing

Buy Now
Question # 424

A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor ' s BEST recommendation to facilitate compliance with the regulation?

Options:

A.

Include the requirement in the incident management response plan.

B.

Establish key performance indicators (KPIs) for timely identification of security incidents.

C.

Enhance the alert functionality of the intrusion detection system (IDS).

D.

Engage an external security incident response expert for incident handling.

Buy Now
Question # 425

Which of the following is MOST important to consider when defining disaster recovery strategies?

Options:

A.

Maximum tolerable downtime (MTD)

B.

Mean time to restore (MTTR)

C.

Mean time to acknowledge

D.

Maximum time between failures (MTBF)

Buy Now
Question # 426

Which of the following is MOST important to define within a disaster recovery plan (DRP)?

Options:

A.

Business continuity plan (BCP)

B.

Test results for backup data restoration

C.

A comprehensive list of disaster recovery scenarios and priorities

D.

Roles and responsibilities for recovery team members

Buy Now
Question # 427

Which of the following is MOST important for an IS auditor to confirm when reviewing an organization ' s incident response management program?

Options:

A.

All incidents have a severity level assigned.

B.

All identified incidents are escalated to the CEO and the CISO.

C.

Incident response is within defined service level agreements (SLAs).

D.

The alerting tools and incident response team can detect incidents.

Buy Now
Question # 428

An information systems security officer ' s PRIMARY responsibility for business process applications is to:

Options:

A.

authorize secured emergency access

B.

approve the organization ' s security policy

C.

ensure access rules agree with policies

D.

create role-based rules for each business process

Buy Now
Question # 429

A job is scheduled to transfer data from a transactional system database to a data lake for reporting purposes. Which of the following would be of GREATEST concern to an IS auditor?

Options:

A.

The inventory of scheduled jobs is not periodically reviewed

B.

Automated support ticket creation has not been implemented for job failures and errors

C.

Access to scheduling changes is restricted to job operators

D.

Notification alerts are configured to be sent to a support distribution group

Buy Now
Question # 430

An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?

Options:

A.

Additional firewall rules

B.

Multi-factor authentication

C.

Virtual private network (VPN)

D.

Virtual desktop

Buy Now
Question # 431

During a follow-up audit, an IS auditor finds that some critical recommendations have not been addressed, as management has decided to accept the risk. Which of the following is the IS auditors BEST course of action?

Options:

A.

Require the auditee to address the recommendations in full.

B.

Update the audit program based on management ' s acceptance of risk.

C.

Evaluate senior management ' s acceptance of the risk.

D.

Adjust the annual risk assessment accordingly.

Buy Now
Question # 432

What is MOST important to verify during an external assessment of network vulnerability?

Options:

A.

Update of security information event management (SIEM) rules

B.

Regular review of the network security policy

C.

Completeness of network asset inventory

D.

Location of intrusion detection systems (IDS)

Buy Now
Question # 433

The PRIMARY objective of a follow-up audit is to:

Options:

A.

assess the appropriateness of recommendations.

B.

verify compliance with policies.

C.

evaluate whether the risk profile has changed.

D.

determine adequacy of actions taken on recommendations.

Buy Now
Question # 434

An organization wants to use virtual desktops to deliver corporate applications to its end users. Which of the following should an IS auditor recommend to prevent domain name system (DNS) poisoning in their cloud environment?

Options:

A.

Enable verification of administrators to protect against impersonators modifying DNS tables.

B.

Configure ONS servers to create appropriately sized responses to domain resolution requests.

C.

Ensure DNS changes are propagated across all servers in the organization ' s cloud account.

D.

Provide corporate laptops to end users with built-in antivirus tools that scan for DNS vulnerabilities.

Buy Now
Question # 435

An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor ' s NEXT course of action?

Options:

A.

Note the exception in a new report as the item was not addressed by management.

B.

Recommend alternative solutions to address the repeat finding.

C.

Conduct a risk assessment of the repeat finding.

D.

Interview management to determine why the finding was not addressed.

Buy Now
Question # 436

A national tax administration agency with a distributed network experiences service disruptions due to a large influx of traffic to a regional office near the end of each year. Which of the following would BEST enable the agency to improve the performance of its servers during the busy period?

Options:

A.

Virtual firewall

B.

Proxy server

C.

Load balancer

D.

Virtual private network (VPN)

Buy Now
Question # 437

Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?

Options:

A.

The policy includes a strong risk-based approach.

B.

The retention period allows for review during the year-end audit.

C.

The retention period complies with data owner responsibilities.

D.

The total transaction amount has no impact on financial reporting

Buy Now
Question # 438

A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?

Options:

A.

Perform periodic reconciliations.

B.

Ensure system owner sign-off for the system fix.

C.

Conduct functional testing.

D.

Improve user acceptance testing (UAT).

Buy Now
Question # 439

An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?

Options:

A.

Attack vectors are evolving for industrial control systems.

B.

There is a greater risk of system exploitation.

C.

Disaster recovery plans (DRPs) are not in place.

D.

Technical specifications are not documented.

Buy Now
Question # 440

Which of the following backup methods is MOST appropriate when storage space is limited?

Options:

A.

Incremental backups

B.

Mirror backups

C.

Full backups

D.

Annual backups

Buy Now
Question # 441

Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?

Options:

A.

The testing produces a lower number of false positive results

B.

Network bandwidth is utilized more efficiently

C.

Custom-developed applications can be tested more accurately

D.

The testing process can be automated to cover large groups of assets

Buy Now
Question # 442

Which of the following roles is PRIMARILY responsible for mitigating the risk of benefits not being realized in an IT project?

Options:

A.

Project sponsor

B.

Project manager

C.

Quality assurance (QA) manager

D.

Chief risk officer (CRO)

Buy Now
Question # 443

Which of the following should be the PRIMARY basis for prioritizing follow-up audits?

Options:

A.

Audit cycle defined in the audit plan

B.

Complexity of management ' s action plans

C.

Recommendation from executive management

D.

Residual risk from the findings of previous audits

Buy Now
Question # 444

During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor ' s BEST action?

Options:

A.

Explain to IT management that the new control will be evaluated during follow-up

B.

Re-perform the audit before changing the conclusion.

C.

Change the conclusion based on evidence provided by IT management.

D.

Add comments about the action taken by IT management in the report.

Buy Now
Question # 445

Which of the following is MOST important to consider when reviewing an organization ' s defined data backup and restoration procedures?

Options:

A.

Business continuity plan (BCP)

B.

Recovery point objective (RPO)

C.

Mean time to restore (MTTR)

D.

Mean time between failures (MTBF)

Buy Now
Question # 446

The MOST effective way to reduce sampling risk is to increase:

Options:

A.

confidence interval.

B.

population.

C.

audit sampling training.

D.

sample size.

Buy Now
Question # 447

Which of the following is MOST important for an IS auditor to verify when evaluating tne upgrade of an organization ' s enterprise resource planning (ERP) application?

Options:

A.

Application related documentation was updated to reflect the changes in the new version

B.

Security configurations were appropriately applied to the new version

C.

Users were provided security training on the new version

D.

Lessons teamed analysis was documented after the upgrade

Buy Now
Question # 448

Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?

Options:

A.

Reconciliation of total amounts by project

B.

Validity checks, preventing entry of character data

C.

Reasonableness checks for each cost type

D.

Display the back of the project detail after the entry

Buy Now
Question # 449

Which of the following is the PRIMARY benefit of a tabletop exercise for an incident response plan?

Options:

A.

It demonstrates the maturity of the incident response program.

B.

It reduces the likelihood of an incident occurring.

C.

It identifies deficiencies in the operating environment.

D.

It increases confidence in the team ' s response readiness.

Buy Now
Question # 450

A post-implementation audit has been completed for the deployment of a sophisticated job scheduling tool Which of the following observations would be of GREATEST concern?

Options:

A.

The IT learn customized tool settings without seeking approval from the provider.

B.

The overall project took longer to complete than planned.

C.

The data encryption setting is not enabled in the scheduling tool.

D.

The IT team accesses the scheduler admin panel via a generic account.

Buy Now
Question # 451

An IS auditor finds that a number of key patches have not been applied in a timely manner due to re-source constraints. Which of the following is the GREATEST risk to the organization in this

situation?

Options:

A.

Systems may not be supported by the vendor.

B.

Known security vulnerabilities may not be mitigated.

C.

Different systems may not be compatible.

D.

The systems may not meet user requirements.

Buy Now
Question # 452

Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?

Options:

A.

inventory of relevant business processes

B.

Policies for business procurement

C.

Documentation of application configurations

D.

Results of business resumption planning efforts

Buy Now
Question # 453

An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.

Which of the following is the BEST course of action to address this issue?

Options:

A.

Examine the workflow to identify gaps in asset-handling responsibilities.

B.

Escalate the finding to the asset owner for remediation.

C.

Recommend the drives be sent to the vendor for destruction.

D.

Evaluate the corporate asset-handling policy for potential gaps.

Buy Now
Exam Code: CISA
Exam Name: Certified Information Systems Auditor
Last Update: Mar 29, 2026
Questions: 1524
CISA pdf

CISA PDF

$59.7  $199
CISA Engine

CISA Testing Engine

$67.5  $225
CISA PDF + Engine

CISA PDF + Testing Engine

$74.7  $249