DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

ISACA CISA Exam Questions and Answers: Ace Your CISA Certification with Practice Tests

Real Exam Questions and Answers to Help You Prepare for the ISACA CISA Exam

Are you aiming to achieve the prestigious ISACA CISA certification? Look no further than our curated collection of real exam questions and answers. Designed to replicate the actual exam environment, these practice questions will help you assess your knowledge and identify areas where you need to improve. Our study materials are carefully crafted by industry experts to ensure that you receive the most accurate and up-to-date information. By practicing with these questions, you'll gain confidence in your ability to tackle challenging concepts and increase your chances of passing the ISACA CISA exam on your first attempt. Don't miss out on this invaluable resource that can help you achieve your career goals. Start studying today and become a Certified Information Systems Auditor!

Take other online exams

Question #1
During business process reengineering (BPR) of a bank's teller activities, an IS auditor should evaluate:
A. the cost of new controls
B. continuous improvement and monitoring plans
C. BPR project plans
D. the impact of changed business processes
View answer
Correct Answer: D
Question #2
Which of the following provides an IS auditor the MOST assurance that an organization is compliant with legal and regulatory requirements?
A. Controls associated with legal and regulatory requirements have been identified and tested
B. Senior management has provided attestation of legal and regulatory compliance
C. There is no history of complaints or fines from regulators regarding noncompliance
D. The IT manager is responsible for the organization's compliance with legal and regulatory requirements
View answer
Correct Answer: A
Question #3
In the risk assessment process, which of the following should be identified FIRST?
A. Assets
B. Vulnerabilities
C. Impact
D. Threats
View answer
Correct Answer: A
Question #4
An auditor is creating an audit program where the objective is to establish the adequacy of personal data privacy controls in a payroll process. Which of the following is MOST important to include?
A. User access provisioning
B. Segregation of duties controls
C. Approval of data changes
D. Audit logging of administrative user activity
View answer
Correct Answer: C
Question #5
Which of the following is the BEST compensating control for a lack of proper segregation of duties in an IT department?
A. Authorization forms
B. System activity logging
C. Audit trail reviews
D. Control self-assessment (CSA)
View answer
Correct Answer: B
Question #6
An IS auditor is reviewing an enterprise database platform. The review involves statistical methods, Benford analysis, and duplicate checks. Which of the following computer-assisted audit technique (CAAT) tools would be MOST useful for this review?
A. Audit hooks
B. Integrated test facility (ITF)
C. Generalized audit software (GAS)
D. Continuous and intermittent simulation (CIS)
View answer
Correct Answer: C
Question #7
When an IS auditor evaluates key performance indicators (KPIs) for IT initiatives, it is MOST important that the KPIs indicate:
A. IT resources are fully utilized
B. IT objectives are measured
C. IT solutions are within budget
D. IT deliverables are process driven
View answer
Correct Answer: B
Question #8
An IS audit reveals that many of an organization's Internet of Things (loT) devices have not been patched. Which of the following should the auditor do FIRST when determining why these devices have not received the required patches?
A. Ensure the devices are listed in the asset inventory database
C. Determine the physical location of the deployed devices
D. Review the organization's most recent risk assessment on loT devices
View answer
Correct Answer: B
Question #9
A financial institution has a system interface that is used by its branches to obtain applicable currency exchange rates when processing transactions. Which of the following should be the PRIMARY control objective for maintaining the security of the system interface?
A. Preventing unauthorized access to the data via malicious activity
B. Ensuring the integrity of the data being transferred
C. Preventing unauthorized access to the data via interception
D. Ensuring the availability of the data being transferred
View answer
Correct Answer: B
Question #10
An airline's online booking system uses an automated script that checks whether fares are within the defined threshold of what is reasonable before the fares are displayed on the website. Which type of control is in place?
A. Directive control
B. Compensating control
C. Corrective control
D. Preventive control
View answer
Correct Answer: A
Question #11
A recent audit identified duplicate software licenses and technologies. SSWhich of the following would be MOST helpful to prevent this type of duplication in the future?
A. Conducting periodic inventory reviews
B. Establishing a project management office
C. Centralizing IT procurement and approval practices
D. Updating IT procurement policies and procedures
View answer
Correct Answer: D
Question #12
Capacity management enables organizations to:
A. establish the capacity of network communication links
B. forecast technology trends
C. identify the extent to which components need to be upgraded
D. determine business transaction volumes
View answer
Correct Answer: C
Question #13
Due to a high volume of customer orders, an organization plans to implement a new application for customers to use for online ordering. Which type of testing is MOST important to ensure the security of the application prior to go-live?
A. User acceptance testing (UAT)
B. Regression testing
C. Vulnerability testing
D. Stress testing
View answer
Correct Answer: C
Question #14
Which of the following should be an IS auditor's GREATEST concern when reviewing an outsourcing arrangement with a third-partly cloud service provider to host personally identifiable data?
A. The outsourcing contract does not contain a right-to-audit clause
B. The organization's servers are not compatible with the third party's infrastructure
C. The data is not adequately segregated on the host platform
D. Fees are charged based on the volume of data stored by the host
View answer
Correct Answer: C
Question #15
An organization has agreed to perform remediation related to high-risk audit findings. The remediation process involves a complex reorganization of user roles as well as the implementation of several compensating controls that may not be completed within the next audit cycle. Which of the following is the BEST way for an IS auditor to follow up on the activities?
A. Provide management with a remediation timeline and verify adherence
B. Continue to audit the failed controls according to the audit schedule
C. Schedule a review of the controls after the projected remediation date
D. Review the progress of remediation on a regular basis
View answer
Correct Answer: A
Question #16
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
A. Developing and communicating test procedure best practices to audit teams
B. Decentralizing procedures and implementing periodic peer review
C. Developing and implementing an audit data repository
D. Centralizing procedures and implementing change control
View answer
Correct Answer: D
Question #17
During data migration, which of the following BEST prevents integrity issues when multiple processes within the migration program are attempting to write to the same table in the databases?
A. Authentication controls
B. Normalization controls
C. Concurrency controls
D. Database limit controls
View answer
Correct Answer: C
Question #18
Within the context of an IT-related governance framework, which type of organization would be considered MOST mature?
A. An organization in a state of dynamic growth with continuously updated policies and procedures
B. An organization with processes systematically managed by continuous improvement
C. An organization in which processes are repeatable and results periodically reviewed
D. An organization with established sets of documented standard processes
View answer
Correct Answer: B
Question #19
The objective of a vulnerability identification step in a risk assessment process is to:
A. identify the compensating controls
B. determine the impact of compromise
C. develop a list of weaknesses
D. determine the likelihood of a threat
View answer
Correct Answer: C
Question #20
Which of the following is the BEST way to minimize the impact of a ransomware attack?
A. Provide user awareness training on ransomware attacks
B. Perform more frequent system backups
C. Maintain a regular schedule for patch updates
D. Grant system access based on least privilege
View answer
Correct Answer: B
Question #21
When using a wireless device, which of the following BEST ensures confidential access to email via web mail?
A. Simple Object Access Protocol (SOAP)
B. Wired equivalent privacy (WEP)
C. Extensible markup language (XML)
D. Hypertext Transfer Protocol Secure (HTTPS)
View answer
Correct Answer: B
Question #22
Which of the following communication modes should be of GREATEST concern to an IS auditor evaluating end user networking?
A. Host-to-host
B. Peer-to-peer
C. System-to-system
D. Client-to-server
View answer
Correct Answer: B
Question #23
The PRIMARY reason to follow up on prior-year audit reports is to determine if:
A. prior-year recommendations have become irrelevant
B. identified control weaknesses have been addressed
C. significant changes to the control environment have occurred
D. inherent risks have changed
View answer
Correct Answer: B
Question #24
Which of the following is found in an audit charter?
A. The process of developing the annual audit plan
B. Required training for audit staff
C. The authority given to the audit function
D. Audit objectives and scope
View answer
Correct Answer: C
Question #25
An IS auditor is reviewing a network diagram. Which of the following would be the BEST location for placement of a firewall?
A. At borders of network segments with different security levels
B. Inside the demilitarized zone (DMZ)
C. Between each host and the local network switch/hub
D. Between virtual local area networks (VLANs)
View answer
Correct Answer: B
Question #26
Which of the following is a detective control that can be used to uncover unauthorized access to information systems?
A. Requiring long and complex passwords for system access
B. Protecting access to the data center with multifactor authentication
C. Implementing a security information and event management (SIEM) system
D. Requiring internal audit to perform periodic reviews of system access logs
View answer
Correct Answer: C
Question #27
Segregation of duties would be compromised if:
A. operations staff modified batch schedules
B. database administrators (DBAs) modified the structure of user tables
C. application programmers moved programs into production
D. application programmers accessed test data
View answer
Correct Answer: D
Question #28
Which of the following is the MOST likely cause of a successful firewall penetration?
A. Virus infection
B. Firewall misconfiguration by the administrator
C. Loophole in firewall vendor's code
D. Use of a Trojan to bypass the firewall
View answer
Correct Answer: B
Question #29
Which of the following is the MOST important step in the development of an effective IT governance action plan?
A. Conducting a business impact analysis (BIA)
B. Measuring IT governance key performance indicators (KPIs)
C. Preparing a statement of sensitivity
D. Setting up an IT governance framework for the process
View answer
Correct Answer: D
Question #30
What information within change records would provide an IS auditor with the MOST assurance that configuration management is operating effectively?
A. mplementation checklist for release management
B. onfiguration management plan and operating procedures
C. Post-implementation review documentation
D. Affected configuration items and associated impacts
View answer
Correct Answer: C
Question #31
Which of the following is a benefit of the DevOps development methodology?
A. It leads to a well-defined system development life cycle (SDLC)
B. It restricts software releases to a fixed release schedule
C. It enables increased frequency of software releases to production
D. It enforces segregation of duties between code developers and release migrators
View answer
Correct Answer: C
Question #32
Which of the following is MOST likely to result from compliance testing?
A. Comparison of data with physical counts
B. Discovery of controls that have not been applied
C. Confirmation of data with outside sources
D. Identification of errors due to processing mistakes
View answer
Correct Answer: B
Question #33
While conducting a system architecture review, an IS auditor learns of multiple complaints from field agents about the latency of a mobile thin client designed to provide information during site inspections. Which of the following is the BEST way to address this situation?
A. Upgrade the thin-client software to provide more informative error messages during application loading
B. Switch to a thick-client architecture that does not require a persistent network connection
C. Deploy a middleware application to improve messaging between application components
D. Upgrade the processors in the field agents' mobile devices
View answer
Correct Answer: C
Question #34
Which of the following BEST describes the relationship between vulnerability scanning and penetration testing?
A. Both are labor-intensive in preparation, planning, and execution
B. Both utilize a risk-based analysis that considers threat scenarios
C. For entities with regulatory drivers, the two tests must be the same
D. The scope of both is determined primarily by the likelihood of exploitation
View answer
Correct Answer: B
Question #35
An IS auditor is a member of an application development team that is selecting software. Which of the following would impair the auditor's independence?
A. Approving the vendor selection methodology
B. Reviewing the request for proposal (RFP)
C. Witnessing the vendor selection process
D. Verifying the weighting of each selection criteria
View answer
Correct Answer: A
Question #36
Which of the following is an IS auditor's GREATEST concern when an organization does not regularly update software on individual workstations in the internal environment?
A. The organization may not be in compliance with licensing agreements
B. The system may have version control issues
C. System functionality may not meet business requirements
D. The organization may be more susceptible to cyber attacks
View answer
Correct Answer: D
Question #37
An organization is deciding whether to outsource its customer relationship management (CRM) systems to a provider located in another country. Which of the following should be the PRIMARY influence in the outsourcing decision?
A. The service provider's disaster recovery plan (DRP)
B. Current geopolitical conditions
C. Time zone differences
D. Cross-border privacy laws
View answer
Correct Answer: D
Question #38
Which of the following should be of GREATEST concern to an IS auditor reviewing actions taken during a forensic investigation?
A. An image copy of the attacked system was not taken
B. The proper authorities were not notified
C. The handling procedures of the attacked system are not documented
D. The investigation report does not indicate a conclusion
View answer
Correct Answer: B
Question #39
When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (AI) system, the IS auditor should be MOST concerned with the impact Al will have on:
A. enterprise architecture (EA)
B. task capacity output
C. employee retention
D. future task updates
View answer
Correct Answer: C
Question #40
When evaluating the recent implementation of an intrusion detection system (IDS), an IS auditor should be MOST concerned with inappropriate:
A. patching
B. training
C. encryption
D. tuning
View answer
Correct Answer: D
Question #41
Which of the following is MOST important for an IS auditor to consider during a review of the IT governance of an organization?
A. Defined service levels
B. Funding allocations
C. Risk management methodology
D. Decision making responsibilities
View answer
Correct Answer: A
Question #42
An internal IS auditor recommends that incoming accounts payable payment files be encrypted. Which type of control is the auditor recommending?
A. Preventive
B. Detective
C. Corrective
D. Directive
View answer
Correct Answer: D
Question #43
The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:
A. payment processing
B. payroll processing
C. product registration
D. procurement
View answer
Correct Answer: A
Question #44
An IS auditor is reviewing the change management process in a large IT service organization. Which of the following observations would be the GREATEST concern?
A. User acceptance testing (UAT) can be waived in case of emergency software releases
B. Code is migrated manually into production during emergency software releases
C. A senior developer has permanent access to promote code for emergency software releases
D. Emergency software releases are not fully documented after implementation
View answer
Correct Answer: C
Question #45
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
A. Risk-based auditing
B. Agile auditing
C. Outsourced auditing
D. Continuous auditing
View answer
Correct Answer: A
Question #46
Which of the following is the BEST way to mitigate the risk associated with technology obsolescence?
A. Create a technology watch team that evaluates emerging trends
B. Make provisions in the budgets for potential upgrades
C. Invest in current technology
D. Create tactical and strategic IS plans
View answer
Correct Answer: D
Question #47
An IS auditor reviewing the system development life cycle (SDLC) finds there is no requirement for business cases. Which of the following should be of GREATEST concern to the organization?
A. Business impacts of projects are not adequately analyzed
B. Business resources have not been optimally assigned
C. Vendor selection criteria are not sufficiently evaluated
D. Project costs exceed established budgets
View answer
Correct Answer: A
Question #48
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
A. Consultation with security staff
B. Alignment with an information security framework
C. Inclusion of mission and objectives
D. Compliance with relevant regulations
View answer
Correct Answer: D
Question #49
View answer
Correct Answer:
Question #50
View answer
Correct Answer:
Question #51
View answer
Correct Answer:
Question #52
View answer
Correct Answer:
Question #53
View answer
Correct Answer:
Question #54
View answer
Correct Answer:
Question #55
View answer
Correct Answer:
Question #56
View answer
Correct Answer:
Question #57
View answer
Correct Answer:
Question #58
View answer
Correct Answer:
Question #59
View answer
Correct Answer:
Question #60
View answer
Correct Answer:
Question #61
View answer
Correct Answer:
Question #62
View answer
Correct Answer:
Question #63
View answer
Correct Answer:
Question #64
View answer
Correct Answer:
Question #65
View answer
Correct Answer:
Question #66
View answer
Correct Answer:
Question #67
View answer
Correct Answer:
Question #68
View answer
Correct Answer:
Question #69
View answer
Correct Answer:
Question #70
View answer
Correct Answer:
Question #71
View answer
Correct Answer:
Question #72
View answer
Correct Answer:
Question #73
View answer
Correct Answer:
Question #74
View answer
Correct Answer:
Question #75
View answer
Correct Answer:
Question #76
View answer
Correct Answer:
Question #77
View answer
Correct Answer:
Question #78
View answer
Correct Answer:
Question #79
View answer
Correct Answer:
Question #80
View answer
Correct Answer:
Question #81
View answer
Correct Answer:
Question #82
View answer
Correct Answer:
Question #83
View answer
Correct Answer:
Question #84
View answer
Correct Answer:
Question #85
View answer
Correct Answer:
Question #86
View answer
Correct Answer:
Question #87
View answer
Correct Answer:
Question #88
View answer
Correct Answer:
Question #89
View answer
Correct Answer:
Question #90
View answer
Correct Answer:
Question #91
View answer
Correct Answer:
Question #92
View answer
Correct Answer:
Question #93
View answer
Correct Answer:
Question #94
View answer
Correct Answer:
Question #95
View answer
Correct Answer:
Question #96
View answer
Correct Answer:
Question #97
View answer
Correct Answer:
Question #98
View answer
Correct Answer:
Question #99
View answer
Correct Answer:
Question #100
View answer
Correct Answer:
Question #101
View answer
Correct Answer:
Question #102
View answer
Correct Answer:
Question #103
View answer
Correct Answer:
Question #104
View answer
Correct Answer:
Question #105
View answer
Correct Answer:
Question #106
View answer
Correct Answer:
Question #107
View answer
Correct Answer:
Question #108
View answer
Correct Answer:
Question #109
View answer
Correct Answer:
Question #110
View answer
Correct Answer:
Question #111
View answer
Correct Answer:
Question #112
View answer
Correct Answer:
Question #113
View answer
Correct Answer:
Question #114
View answer
Correct Answer:
Question #115
View answer
Correct Answer:
Question #116
View answer
Correct Answer:
Question #117
View answer
Correct Answer:
Question #118
View answer
Correct Answer:
Question #119
View answer
Correct Answer:
Question #120
View answer
Correct Answer:
Question #121
View answer
Correct Answer:
Question #122
View answer
Correct Answer:
Question #123
View answer
Correct Answer:
Question #124
View answer
Correct Answer:
Question #125
View answer
Correct Answer:
Question #126
View answer
Correct Answer:
Question #127
View answer
Correct Answer:
Question #128
View answer
Correct Answer:
Question #129
View answer
Correct Answer:
Question #130
View answer
Correct Answer:
Question #131
View answer
Correct Answer:
Question #132
View answer
Correct Answer:
Question #133
View answer
Correct Answer:
Question #134
View answer
Correct Answer:
Question #135
View answer
Correct Answer:
Question #136
View answer
Correct Answer:
Question #137
View answer
Correct Answer:
Question #138
View answer
Correct Answer:
Question #139
View answer
Correct Answer:
Question #140
View answer
Correct Answer:
Question #141
View answer
Correct Answer:
Question #142
View answer
Correct Answer:
Question #143
View answer
Correct Answer:
Question #144
View answer
Correct Answer:
Question #145
View answer
Correct Answer:
Question #146
View answer
Correct Answer:
Question #147
View answer
Correct Answer:
Question #148
View answer
Correct Answer:
Question #149
View answer
Correct Answer:
Question #150
View answer
Correct Answer:
Question #151
View answer
Correct Answer:
Question #152
View answer
Correct Answer:
Question #153
View answer
Correct Answer:
Question #154
View answer
Correct Answer:
Question #155
View answer
Correct Answer:
Question #156
View answer
Correct Answer:
Question #157
View answer
Correct Answer:
Question #158
View answer
Correct Answer:
Question #159
View answer
Correct Answer:
Question #160
View answer
Correct Answer:
Question #161
View answer
Correct Answer:
Question #162
View answer
Correct Answer:
Question #163
View answer
Correct Answer:
Question #164
View answer
Correct Answer:
Question #165
View answer
Correct Answer:
Question #166
View answer
Correct Answer:
Question #167
View answer
Correct Answer:
Question #168
View answer
Correct Answer:
Question #169
View answer
Correct Answer:
Question #170
View answer
Correct Answer:
Question #171
View answer
Correct Answer:
Question #172
View answer
Correct Answer:
Question #173
View answer
Correct Answer:
Question #174
View answer
Correct Answer:
Question #175
View answer
Correct Answer:
Question #176
View answer
Correct Answer:
Question #177
View answer
Correct Answer:
Question #178
View answer
Correct Answer:
Question #179
View answer
Correct Answer:
Question #180
View answer
Correct Answer:
Question #181
View answer
Correct Answer:
Question #182
View answer
Correct Answer:
Question #183
View answer
Correct Answer:
Question #184
View answer
Correct Answer:
Question #185
View answer
Correct Answer:
Question #186
View answer
Correct Answer:
Question #187
View answer
Correct Answer:
Question #188
View answer
Correct Answer:
Question #189
View answer
Correct Answer:
Question #190
View answer
Correct Answer:
Question #191
View answer
Correct Answer:
Question #192
View answer
Correct Answer:
Question #193
View answer
Correct Answer:
Question #194
View answer
Correct Answer:
Question #195
View answer
Correct Answer:
Question #196
View answer
Correct Answer:
Question #197
View answer
Correct Answer:
Question #198
View answer
Correct Answer:
Question #199
View answer
Correct Answer:
Question #200
View answer
Correct Answer:
Question #201
View answer
Correct Answer:
Question #202
View answer
Correct Answer:
Question #203
View answer
Correct Answer:
Question #204
View answer
Correct Answer:
Question #205
View answer
Correct Answer:
Question #206
View answer
Correct Answer:
Question #207
View answer
Correct Answer:
Question #208
View answer
Correct Answer:
Question #209
View answer
Correct Answer:
Question #210
View answer
Correct Answer:
Question #211
View answer
Correct Answer:
Question #212
View answer
Correct Answer:
Question #213
View answer
Correct Answer:
Question #214
View answer
Correct Answer:
Question #215
View answer
Correct Answer:
Question #216
View answer
Correct Answer:
Question #217
View answer
Correct Answer:
Question #218
View answer
Correct Answer:
Question #219
View answer
Correct Answer:
Question #220
View answer
Correct Answer:
Question #221
View answer
Correct Answer:
Question #222
View answer
Correct Answer:
Question #223
View answer
Correct Answer:
Question #224
View answer
Correct Answer:
Question #225
View answer
Correct Answer:
Question #226
View answer
Correct Answer:
Question #227
View answer
Correct Answer:
Question #228
View answer
Correct Answer:
Question #229
View answer
Correct Answer:
Question #230
View answer
Correct Answer:
Question #231
View answer
Correct Answer:
Question #232
View answer
Correct Answer:
Question #233
View answer
Correct Answer:
Question #234
View answer
Correct Answer:
Question #235
View answer
Correct Answer:
Question #236
View answer
Correct Answer:
Question #237
View answer
Correct Answer:
Question #238
View answer
Correct Answer:
Question #239
View answer
Correct Answer:
Question #240
View answer
Correct Answer:
Question #241
View answer
Correct Answer:
Question #242
View answer
Correct Answer:
Question #243
View answer
Correct Answer:
Question #244
View answer
Correct Answer:
Question #245
View answer
Correct Answer:
Question #246
View answer
Correct Answer:
Question #247
View answer
Correct Answer:
Question #248
View answer
Correct Answer:
Question #249
View answer
Correct Answer:
Question #250
View answer
Correct Answer:
Question #251
View answer
Correct Answer:
Question #252
View answer
Correct Answer:
Question #253
View answer
Correct Answer:
Question #254
View answer
Correct Answer:
Question #255
View answer
Correct Answer:
Question #256
View answer
Correct Answer:
Question #257
View answer
Correct Answer:
Question #258
View answer
Correct Answer:
Question #259
View answer
Correct Answer:
Question #260
View answer
Correct Answer:
Question #261
View answer
Correct Answer:
Question #262
View answer
Correct Answer:
Question #263
View answer
Correct Answer:
Question #264
View answer
Correct Answer:
Question #265
View answer
Correct Answer:
Question #266
View answer
Correct Answer:
Question #267
View answer
Correct Answer:
Question #268
View answer
Correct Answer:
Question #269
View answer
Correct Answer:
Question #270
View answer
Correct Answer:
Question #271
View answer
Correct Answer:
Question #272
View answer
Correct Answer:
Question #273
View answer
Correct Answer:
Question #274
View answer
Correct Answer:
Question #275
View answer
Correct Answer:
Question #276
View answer
Correct Answer:
Question #277
View answer
Correct Answer:
Question #278
View answer
Correct Answer:
Question #279
View answer
Correct Answer:
Question #280
View answer
Correct Answer:
Question #281
View answer
Correct Answer:
Question #282
View answer
Correct Answer:
Question #283
View answer
Correct Answer:

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: