DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

CISA Dumps & Exam Questions 2024, Certified Information Systems Auditor | SPOTO

Welcome to SPOTO's CISA Dumps & Exam Questions for 2024! As the gold standard in auditing and IT systems assessment, the Certified Information Systems Auditor® (CISA®) certification signifies mastery in risk-based audit methodologies. Our practice tests are meticulously crafted to mirror real exam scenarios, equipping you with the skills to tackle exam questions confidently. With SPOTO, access a wealth of exam materials, including sample questions, mock exams, and online exam questions, all verified for accuracy. Prepare effectively with our exam dumps and comprehensive exam answers, paving the way for exam success. Take advantage of our exam simulator for a realistic exam experience and boost your exam practice and preparation. Join SPOTO for a seamless journey towards your CISA certification!

Take other online exams

Question #1
Which of the following procedures would MOST effectively detect the loading of illegal software packages onto a network?
A. The use of diskless workstations
B. Periodic checking of hard drives
C. The use of current antivirus software
D. Policies that result in instant dismissal if violated
View answer
Correct Answer: A
Question #2
During a human resources (HR) audit, an IS auditor is informed that there is a verbal agreement between the IT and HR departments as to the level of IT services expected. In this situation, what should the IS auditor do FIRST?
A. Postpone the audit until the agreement is documented
B. Report the existence of the undocumented agreement to senior management
C. Confirm the content of the agreement with both departments
D. Draft a service level agreement (SLA) for the two departments
View answer
Correct Answer: A
Question #3
Which of the following types of data validation editing checks is used to determine if a field contains data, and not zeros or blanks?
A. Check digit
B. Existence check
C. Completeness check
D. Reasonableness check
View answer
Correct Answer: C
Question #4
An existing system is being extensively enhanced by extracting and reusing design and program components. This is an example of:
A. reverse engineerin
B. prototypin
C. software reus
D. reengineerin
View answer
Correct Answer: B
Question #5
An IS auditor invited to a development project meeting notes that no project risks have been documented. When the IS auditor raises this issue, the project manager responds that it is too early to identify risks and that, if risks do start impactingthe project, a risk manager will be hired. The appropriate response of the IS auditor would be to:
A. stress the importance of spending time at this point in the project to consider and document risks, and to develop contingency plan
B. accept the project manager's position as the project manager is accountable for the outcome of the projec
C. offer to work with the risk manager when one is appointe
D. inform the project manager that the IS auditor will conduct a review of the risks at the completion of the requirements definition phase of the projec
View answer
Correct Answer: C
Question #6
In an organization, the responsibilities for IT security are clearly assigned and enforced and an IT security risk and impact analysis is consistently performed. This represents which level of ranking in the information security governance maturity model?
A. Optimized
B. Managed
C. Defined
D. Repeatable
View answer
Correct Answer: B
Question #7
An IS auditor is reviewing an IT security risk management program. Measures of security risk should:
A. address all of the network risk
B. be tracked over time against the IT strategic pla
C. take into account the entire IT environmen
D. result in the identification of vulnerability tolerance
View answer
Correct Answer: B
Question #8
Responsibility and reporting lines cannot always be established when auditing automated systems since:
A. diversified control makes ownership irrelevan
B. staff traditionally changes jobs with greater frequenc
C. ownership is difficult to establish where resources are share
D. duties change frequently in the rapid development of technolog
View answer
Correct Answer: C
Question #9
An IS auditor finds out-of-range data in some tables of a database. Which of the following controls should the IS auditor recommend to avoid this situation?
A. Log all table update transaction
B. implement before-and-after image reportin
C. Use tracing and taggin
D. implement integrity constraints in the databas
View answer
Correct Answer: B
Question #10
Topic 5If a database is restored using before-image dumps, where should the process begin following an interruption?
A. Before the last transaction
B. After the last transaction
C. As the first transaction after the latest checkpoint
D. At the last transaction before the latest checkpoint
View answer
Correct Answer: A
Question #11
When participating in a systems-development project, an IS auditor should focus on system controls rather than ensuring that adequate and complete documentation exists for all projects. True or false?
A. True
B. False
View answer
Correct Answer: A
Question #12
Which of the following is the BEST type of program for an organization to implement to aggregate, correlate and store different log and event files, and then produce weekly and monthly reports for IS auditors?
A. A security information event management (SIEM) product
B. An open-source correlation engine
C. A log management tool
D. An extract, transform, load (ETL) system
View answer
Correct Answer: A
Question #13
In a client-server system, which of the following control techniques is used to inspect activity from known or unknown users?
A. Diskless workstations
B. Data encryption techniques
C. Network monitoring devices
D. Authentication systems
View answer
Correct Answer: C
Question #14
An installed Ethernet cable run in an unshielded twisted pair (UTP) network is more than 100 meters long. Which of the following could be caused by the length of the cable?
A. Electromagnetic interference (EMI)
B. Cross-talk
C. Dispersion
D. Attenuation
View answer
Correct Answer: C
Question #15
An IS auditor reviews an organizational chart PRIMARILY for:
A. an understanding of workflow
B. investigating various communication channel
C. understanding the responsibilities and authority of individual
D. investigating the network connected to different employee
View answer
Correct Answer: B
Question #16
Which of the following network configuration options contains a direct link between any two host machines?
A. Bus
B. Ring
C. Star
D. Completely connected (mesh)
View answer
Correct Answer: D
Question #17
An IS auditor reviewing an accounts payable system discovers that audit logs are not being reviewed. When this issue is raised with management the response is that additional controls are not necessary because effective system access controls are inplace. The BEST response the auditor can make is to:
A. review the integrity of system access control
B. accept management's statement that effective access controls are in plac
C. stress the importance of having a system control framework in plac
D. review the background checks of the accounts payable staf
View answer
Correct Answer: D
Question #18
An IS auditor evaluating logical access controls should FIRST:
A. document the controls applied to the potential access paths to the syste
B. test controls over the access paths to determine if they are functiona
C. evaluate the security environment in relation to written policies and practices
D. obtain an understanding of the security risks to information processin
View answer
Correct Answer: D
Question #19
Topic 5In addition to the backup considerations for all systems, which of the following is an important consideration in providingbackup for online systems?
A. Maintaining system software parameters
B. Ensuring periodic dumps of transaction logs
C. Ensuring grandfather-father-son file backups
D. Maintaining important data at an offsite location
View answer
Correct Answer: B
Question #20
What protects an application purchaser's ability to fix or change an application in case the application vendor goes out of business?
A. Assigning copyright to the organization
B. Program back doors
C. Source code escrow
D. Internal programming expertise
View answer
Correct Answer: A
Question #21
A company uses a bank to process its weekly payroll. Time sheets and payroll adjustment forms (e.g., hourly rate changes, terminations) are completed and delivered to the bank, which prepares checks (cheques) and reports for distribution. To BEST ensure payroll data accuracy:
A. payroll reports should be compared to input form
B. gross payroll should be recalculated manuall
C. checks (cheques) should be compared to input form
D. checks (cheques) should be reconciled with output report
View answer
Correct Answer: D
Question #22
Which testing approach is MOST appropriate to ensure that internal application interface errors are identified as soon as possible?
A. Bottom up
B. Sociability testing
C. Top-down
D. System test
View answer
Correct Answer: A
Question #23
An organization has outsourced its help desk. Which of the following indicators would be the best to include in the SLA?
A. Overall number of users supported
B. Percentage of incidents solved in the first call
C. Number of incidents reported to the help desk
D. Number of agents answering the phones
View answer
Correct Answer: C
Question #24
To determine which users can gain access to the privileged supervisory state, which of the following should an IS auditor review?
A. System access log files
B. Enabled access control software parameters
C. Logs of access control violations
D. System configuration files for control options used
View answer
Correct Answer: C
Question #25
During the collection of forensic evidence, which of the following actions would MOST likely result in the destruction or corruption of evidence on a compromised system?
A. Dumping the memory content to a file
B. Generating disk images of the compromised system
C. Rebooting the system
D. Removing the system from the network
View answer
Correct Answer: C
Question #26
Topic 5Which of the following is the MOST important criterion when selecting a location for an offsite storage facility for IS backupfiles? The offsite facility must be:
A. physically separated from the data center and not subject to the same risks
B. given the same level of protection as that of the computer data center
C. outsourced to a reliable third party
D. equipped with surveillance capabilities
View answer
Correct Answer: A
Question #27
An integrated test facility is considered a useful audit tool because it:
A. is a cost-efficient approach to auditing application control
B. enables the financial and IS auditors to integrate their audit test
C. compares processing output with independently calculated dat
D. provides the IS auditor with a tool to analyze a large range of information
View answer
Correct Answer: C
Question #28
When reviewing procedures for emergency changes to programs, the IS auditor should verify that the procedures:
A. allow changes, which will be completed using after-the-fact follow-u
B. allow undocumented changes directly to the production librar
C. do not allow any emergency change
D. allow programmers permanent access to production program
View answer
Correct Answer: C
Question #29
Topic 5Which of the following procedures would BEST determine whether adequate recovery/restart procedures exist?
A. Reviewing program code
B. Reviewing operations documentation
C. Turning off the UPS, then the power
D. Reviewing program documentation
View answer
Correct Answer: B
Question #30
The MOST significant security concern when using flash memory (e.g., USB removable disk) is that the:
A. contents are highly volatil
B. data cannot be backed u
C. data can be copie
D. device may not be compatible with other peripheral
View answer
Correct Answer: B
Question #31
What are used as the framework for developing logical access controls?
A. Information systems security policies
B. Organizational security policies
C. Access Control Lists (ACL)
D. Organizational charts for identifying roles and responsibilities
View answer
Correct Answer: A
Question #32
During the audit of an acquired software package, an IS auditor learned that the software purchase was based on information obtained through the Internet, rather than from responses to a request for proposal (RFP). The IS auditor should FIRST:
A. test the software for compatibility with existing hardwar
B. perform a gap analysi
C. review the licensing polic
D. ensure that the procedure had been approve
View answer
Correct Answer: C
Question #33
Topic 5An IS auditor performing a review of the backup processing facilities should be MOST concerned that:
A. adequate fire insurance exists
B. regular hardware maintenance is performed
C. offsite storage of transaction and master files exists
D. backup processing facilities are fully tested
View answer
Correct Answer: C
Question #34
When using an integrated test facility (ITF), an IS auditor should ensure that:
A. production data are used for testin
B. test data are isolated from production dat
C. a test data generator is use
D. master files are updated with the test dat
View answer
Correct Answer: D
Question #35
Topic 5Which of the following would BEST support 24/7 availability?
A. Daily backup
B. offsite storage
C. Mirroring
D. Periodic testing
View answer
Correct Answer: C
Question #36
Topic 5When reviewing the procedures for the disposal of computers, which of the following should be the GREATEST concern forthe IS auditor?
A. Hard disks are overwritten several times at the sector level, but are not reformatted before leaving the organization
B. All files and folders on hard disks are separately deleted, and the hard disks are formatted before leaving the organization
C. Hard disks are rendered unreadable by hole-punching through the platters at specific positions before leaving the organization
D. The transport of hard disks is escorted by internal security staff to a nearby metal recycling company, where the hard disks are registered and then shredded
View answer
Correct Answer: B
Question #37
The BEST way to minimize the risk of communication failures in an e-commerce environment would be to use:
A. compression software to minimize transmission duratio
B. functional or message acknowledgment
C. a packet-filtering firewall to reroute message
D. leased asynchronous transfer mode line
View answer
Correct Answer: D
Question #38
Which of the following is widely accepted as one of the critical components in networking management?
A. Configuration management
B. Topological mappings
C. Application of monitoring tools
D. Proxy server troubleshooting
View answer
Correct Answer: C

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: