DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

ISACA CISA Practice Questions and Answers

Real exam questions and answers are essential to help you prepare for the ISACA CISA exam. As an aspiring Certified Information Systems Auditor, you'll need to familiarize yourself with the format and content of the actual test. Our comprehensive collection of practice questions closely mirrors the ISACA CISA exam, covering all key domains and topics. These study materials are designed to challenge your knowledge and skills, ensuring you're well-prepared for the real thing. By working through our extensive database of exam questions and answers, you'll gain confidence in your ability to tackle the CISA Certification test. Our practice questions are regularly updated to reflect the latest changes in the ISACA CISA exam, keeping you ahead of the curve. Whether you're just starting your journey towards becoming a Certified Information Systems Auditor or looking to refine your skills before the big day, our ISACA CISA exam questions and answers provide invaluable preparation. With a mix of multiple-choice questions, scenario-based problems, and practical exercises, you'll develop a deep understanding of information systems auditing, control, and security. Don't leave your ISACA CISA Certification to chance – arm yourself with the best study materials available and maximize your chances of success on exam day.

Take other online exams

Question #1
Which of the following is the MOST effective way to reduce risk to an organization form widespread use of unauthorized web-based communication technologies?
A. Block access from user devices to unauthorized sites that allow web-based communication
B. Incorporate web-based communications into the enterprise security architecture
C. Publish an enterprise-wide policy outlining acceptable use of web-based communication technologies
D. Monitor unauthorized staff usage of web-based communication and notify the IT security department of violations
View answer
Correct Answer: B

View The Updated CISA Exam Questions

SPOTO Provides 100% Real CISA Exam Questions for You to Pass Your CISA Exam!

Question #2
A new application will require multiple interfaces ,Which of the following testing methods can be used to detect interface errors early in the development life cycle?
A. Sociability
B. Acceptance
C. Bottom up
D. Top down
View answer
Correct Answer: C
Question #3
An e-commerce enterprise's disaster recovery (DR) site has 30% less processing capability than the primary site. Based on this information, which of the following presents the GREATEST risk?
A. The DR site is in a shared location that hosts multiple other enterprises
B. Network firewalls and database firewalls at the DR site do not provide high availability
C. The DR site has not undergone testing to confirm its effectiveness
D. No disaster recovery plan (DRP) testing has been performed during the last six months
View answer
Correct Answer: C
Question #4
Which of the following should be of MOST concern to an IS auditor during the review of a quality management system (QMS)?
A. Important quality checklists are maintained outside the QMS
B. Indicators are not fully represented in the QMS
C. The QMS includes training records for IT personnel
D. There are no records to document actions for minor business processes
View answer
Correct Answer: B
Question #5
ln a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
A. parallel simulation
B. integrated test facility (ITF)
C. transaction tagging
D. embedded audit modules
View answer
Correct Answer: B
Question #6
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change management process?
A. The new functionality may not meet requirements
B. The project may go over budget
C. The added functionality has not been documented
D. The project may fail to meet the established deadline
View answer
Correct Answer: A
Question #7
The PRIMARY objective of IT service level management is to:
A. manage computer operations activities
B. improve IT cost control
C. increase awareness of IT services
D. satisfy customer requirements
View answer
Correct Answer: A
Question #8
An IS auditor reviewing a high risk business application has identified the need to strengthen controls for reporting malfunctions to management Which of the following would BEST facilitate timely reporting?
A. Incident management procedures
B. Security event logging
C. Change prioritization
D. Performance monitoring
View answer
Correct Answer: D
Question #9
A bank is relocating is servers to a vendor that provides data center hosting services to multiple clients. Which of the following controls would restrict other clients from physical access to the bank's servers?
A. Closed-circuit television cameras
B. Locking server cages
C. Biometric access at all data center entrances
D. 24-hour security guards
View answer
Correct Answer: B
Question #10
Which of the following is the BEST approach to identify whether a vulnerability is actively being exploited?
A. Conduct a penetration test
B. Review service desk reports
C. Perform log analysis
D. Implement key performance indicators (KPIs)
View answer
Correct Answer: C
Question #11
An organization transmits large amounts of data from one internal system to another. The IS auditor is reviewing the quality of the data at the originating point Which of the following should the auditor verify FIRST?
A. The data transformation is accurate
B. The data has been encrypted
D. The source data is accurate
View answer
Correct Answer: D
Question #12
A 5-yoar audit plan provides for general audits every year and application audits on alternating years. To achieve higher efficiency; the IS audit manager would MOST likely:
A. alternate between control self-assessment (CSA) and general audits every year
B. implement risk assessment criteria to determine audit priorities
C. have control self-assessments (CSAs) and formal audits of applications on alternating years
D. proceed with the plan and integrate all new applications
View answer
Correct Answer: B
Question #13
Which of the following attacks would MOST likely result in the interception and modification of traffic for mobile phones connecting to potentially insecure public WiFi networks?
A. Man-in-the-middle
B. Brute force
C. Phishing
D. Vishing
View answer
Correct Answer: A
Question #14
A company is using a software developer for a project. At which of the following points should the software quality assurance(QA) plan be developed?
A. Prior to acceptance testing
B. As part of the design phase
C. During the feasibility phase
D. As part of software definition
View answer
Correct Answer: B
Question #15
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that:
A. a detailed business case was formally approved prior to the purchase
B. security parameters are set in accordance with the manufacturer's standards
C. the procurement project invited tenders from at least three different suppliers
D. security parameters are set in accordance with the organization's policies
View answer
Correct Answer: D
Question #16
The BEST way to validate whether a malicious act has actually occurred in an application is to review:
A. segregation of duties
B. access controls
C. activity logs
D. change management logs
View answer
Correct Answer: C
Question #17
Which of the following is a corrective control that reduces the impact of a threat event?
A. Security policy
B. Business continuity plan (BCP)
C. Segregation of duties(SoD)
D. Business process analysis
View answer
Correct Answer: B
Question #18
Which of the following control testing approaches is BEST used to evaluate a control’s ongoing effectiveness by comparing processing results to independently calculated data?
A. Statistical sampling
B. Embedded audit modules
C. Sample-based re-performance
D. Integrated test facility (ITF)
View answer
Correct Answer: D
Question #19
An organization is running servers with critical business applications that are in an area subject to frequent but brief power outages. Knowledge of which of the following would allow the organization's management to monitor the ongoing adequacy of the uninterruptible power supply (UPS)?
A. Business impact of server downtime
B. Mean time to recover servers after failure
C. Duration and interval of the power outages
D. Number of servers supported by the UPS
View answer
Correct Answer: C
Question #20
Which of the following is the PRIMARY purpose of quality assurance (QA) within an IS audit department?
A. To confirm audit practice is aligned with industry standards and benchmarks
B. To regularly assess and improve audit methodology
C. To enforce audit policies and identify any deviations
D. To ensure conclusions are reliable and no false assurance is given
View answer
Correct Answer: A
Question #21
The information security function in a large organization is MOST effective when:
A. established at a corporate-wide level
B. the function reports directly to the IS operations manager
C. decentralized as close to the user as possible
D. partnered with the 1S development team to determine access rights
View answer
Correct Answer: A
Question #22
An existing system is being replaced with a new application package. User acceptance testing (UAT) should ensure that:
A. the new system is better than the old system
B. the new system functions as expected
C. data from the old system has been converted correctly
D. there is a business need for the new system
View answer
Correct Answer: B
Question #23
An IS auditor is testing employee access to a large financial system and must select a sample from the current employee lit provided by the auditor Which of the following is the MOST reliable sample source to support this testing?
A. Previous audit reports generated by a third party
B. Human resources (HR) documents signed by employees' managers
C. A system-generated list of accounts with access levels
D. A system access spreadsheet provided by the system administrator
View answer
Correct Answer: B
Question #24
Which of the following should be the FIRST step in an organization's forensics process to preserve evidence?
A. Perform analytics on digital evidence obtained using forensic methods
B. Create the forensics analysis reporting template
C. Duplicate digital evidence and validate it using a hash function
D. Determine which forensic tools to use
View answer
Correct Answer: C
Question #25
Which of the following is MOST important for an IS auditor to review when evaluating the effectiveness of an organization's incident response process?
A. Incident response staff experience and qualifications
B. Incident response roles and responsibilities
C. Past incident response actions
D. Results from management testing of incident response procedures
View answer
Correct Answer: D
Question #26
An IS auditor previously worked in an organizations T department and was involved with the design of the business continuity plan (BCP). The IS auditor has nowbeen asked to review this same BCP. The auditor should FIRST:
A. communicate the conflict of interest to the audit committee prior to starting the assignment
B. communicate the conflict of interest to the audit manager prior to starting the assignment
C. document the conflict in the audit report
D. decline the audit assignment
View answer
Correct Answer: A
Question #27
ln a situation where the recovery paint objective(RPO) is 0 for an online transaction processing system, which of the following is MOST important for an IS auditor To verify?
A. The application has a clustered architecture to ensure high availability
B. Daily backups are created and backup media are verified
C. IT is able to recover system functionality in the shortest possible time frame
D. Synchronous data mirroring is implemented between the data centers
View answer
Correct Answer: D
Question #28
Which of the following is the PRIMARY reason for an IS auditor to use computer-assisted audit techniques (CAATs)?
A. To perform direct testing of production data
B. To enable quicker access to information
C. To conduct automated sampling for testing
D. To efficiently test an entire population
View answer
Correct Answer: D
Question #29
Which of the following would BEST facilitate the detection of internal fraud perpetrated by an individual?
A. Flexible time
B. Segregation of duties
C. Mandatory leave
D. Corporate fraud hotline
View answer
Correct Answer: C
Question #30
Which of the following is the BEST way for an IS auditor to ensure the completeness of data collected for advanced analytics during an audit?
A. Perform additional quality control steps after selecting the samples
B. Review the query or parameters used to download the data before selecting samples
C. Request the data owner to verify and approve the information
D. Obtain access to the quality assurance (QA) system to independently download the information
View answer
Correct Answer: B
Question #31
An IS auditor has assessed a payroll service provider's security policy and fids significant topics are missing . which of the following is the auditor's BEST course of Saction?
A. Report the risk to internal management
B. Recommend the service provider update their policy
C. Recommend replacement of the service provider
D. Notify the service provider of the discrepancies
View answer
Correct Answer: A
Question #32
Which of the following should occur EARLIEST in a business continuity management lifecycle?
A. Carrying out a threat and risk assessment
B. Defining business continuity procedures
C. Identifying critical business processes
D. Developing a training and awareness program
View answer
Correct Answer: C
Question #33
An organization is in the process of deciding whether t low a bring your own device (BYOD)program. f approved, which of the following should be the FIRST control required before implementation?
A. An acceptable use policyB
C. Device registration
D. Device baseline configurations
View answer
Correct Answer: A
Question #34
When evaluating an IT organizational structure, which of the following is MOST important to ensure has been documented?
A. Human resources (HR) policy on organizational changes
B. Provisions for cross-training
C. Succession and promotion plans
D. Job functions and duties
View answer
Correct Answer: C
Question #35
To ensure the integrity of a recovered database, which of the following would be MOST useful?
A. Application transaction logs
B. A copy of the data dictionary
C. Before-and-after transaction images
D. Database defragmentation tools
View answer
Correct Answer: C
Question #36
Which of the following is the PRIMARY reason for an organization's procurement processes to include an independent party who is not directly involved with business operations and related decision-making?
A. To ensure favorable price negotiations
B. To avoid conflicts of interest
C. To ensure continuity of processes and procedures
D. To optimize use of business team resources
View answer
Correct Answer: B
Question #37
Both statistical and nonstatistical sampling techniques:
A. permit the auditor to quantify and fix the level of risk
B. permit the auditor to quantify the probability of error
C. require judgment when defining population characteristics
D. provide each item an equal opportunity of being selected
View answer
Correct Answer: C
Question #38
During a review of an application system, an IS auditor identifies automated controls designed to prevent the entry of duplicate transactions. What is the BEST way to verify that the controls work as designed?
A. Review quality assurance (QA) test results
B. lmplement periodic reconciliations
C. Use generalized audit software for seeking data corresponding to duplicate transactions
D. Enter duplicate transactions in a copy of the live system
View answer
Correct Answer: D
Question #39
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
A. The business continuity plan (BCP) was not updated
B. Users are not required to sign updated acceptable use agreements
C. Users have not been trained on the new system
D. Mobile devices are not encrypted
View answer
Correct Answer: A
Question #40
When reviewing backup policies, an IS auditor MUST verify that backup intervals of critical systems do not exceed which of the following?
A. Recovery point objective (RPO)
B. Maximum acceptable outage (MAO)
C. Recovery time objective (RTO)
D. Service level objective (SLO)
View answer
Correct Answer: A
Question #41
Which of the following would BEST provide executive management with current information on lT-related costs and IT performance indicators?
A. Risk register
B. Continuous audit reports
C. IT service-management plan
D. IT dashboard
View answer
Correct Answer: D
Question #42
Which of the following should be included in a business impact analysis (BIA)?
A. Support documentation for the recovery alternative
B. Recovery strategy for significant business interruptions
C. Identification of IT resources that support key business processes
D. Roles and responsibilities for the business continuity process
View answer
Correct Answer: C
Question #43
After an employee termination, a network account was removed, but the application account remained active. To keep this issue from recuring, which of the following is the BEST recommendation?
A. Perform periodic access reviews
B. Integrate application accounts with network single sign-on
C. Leverage shared accounts for the application
D. Retrain system administration staff
View answer
Correct Answer: B
Question #44
An IS auditor is assessing the results of an organization's post-implementation review of a newly developed information system. Which of the following should be the auditor's MAIN focus
A. The disaster recovery plan (DRP) has been updated
B. Lessons learned have been identified
C. Benefits realization analysis has been completed
D. The procurement contract has been closed
View answer
Correct Answer: C
Question #45
An IS auditor finds the timeliness and depth of information regarding the organization's IT projects varies based on which project manager is assigned Which of the following recommendations would be MOST helpful in achieving predictable and repeatable project management processes?
A. Adoption of business case and earned value templates
B. Measurement against defined and documented procedures
C. Alignment of project performance to pay incentives
D. Use of Gantt charts and work breakdown structures
View answer
Correct Answer: A
Question #46
To protect information assets, which of the following should be done FIRST?
A. Restrict access to data
B. Back up data
C. Encrypt data
D. Classify data
View answer
Correct Answer: D
Question #47
When reviewing an organization's data protection practices, an IS auditor should be MOST concerned with a lack of:
A. data classification
B. a security team
C. training manuals
D. data encryption
View answer
Correct Answer: A
Question #48
View answer
Correct Answer:
Question #49
View answer
Correct Answer:
Question #50
View answer
Correct Answer:
Question #51
View answer
Correct Answer:
Question #52
View answer
Correct Answer:
Question #53
View answer
Correct Answer:
Question #54
View answer
Correct Answer:
Question #55
View answer
Correct Answer:
Question #56
View answer
Correct Answer:
Question #57
View answer
Correct Answer:
Question #58
View answer
Correct Answer:
Question #59
View answer
Correct Answer:
Question #60
View answer
Correct Answer:
Question #61
View answer
Correct Answer:
Question #62
View answer
Correct Answer:
Question #63
View answer
Correct Answer:
Question #64
View answer
Correct Answer:
Question #65
View answer
Correct Answer:
Question #66
View answer
Correct Answer:
Question #67
View answer
Correct Answer:
Question #68
View answer
Correct Answer:
Question #69
View answer
Correct Answer:
Question #70
View answer
Correct Answer:
Question #71
View answer
Correct Answer:
Question #72
View answer
Correct Answer:
Question #73
View answer
Correct Answer:
Question #74
View answer
Correct Answer:
Question #75
View answer
Correct Answer:
Question #76
View answer
Correct Answer:
Question #77
View answer
Correct Answer:
Question #78
View answer
Correct Answer:
Question #79
View answer
Correct Answer:
Question #80
View answer
Correct Answer:
Question #81
View answer
Correct Answer:
Question #82
View answer
Correct Answer:
Question #83
View answer
Correct Answer:
Question #84
View answer
Correct Answer:
Question #85
View answer
Correct Answer:
Question #86
View answer
Correct Answer:
Question #87
View answer
Correct Answer:
Question #88
View answer
Correct Answer:
Question #89
View answer
Correct Answer:
Question #90
View answer
Correct Answer:
Question #91
View answer
Correct Answer:
Question #92
View answer
Correct Answer:
Question #93
View answer
Correct Answer:
Question #94
View answer
Correct Answer:
Question #95
View answer
Correct Answer:
Question #96
View answer
Correct Answer:
Question #97
View answer
Correct Answer:
Question #98
View answer
Correct Answer:
Question #99
View answer
Correct Answer:
Question #100
View answer
Correct Answer:
Question #101
View answer
Correct Answer:
Question #102
View answer
Correct Answer:
Question #103
View answer
Correct Answer:
Question #104
View answer
Correct Answer:
Question #105
View answer
Correct Answer:
Question #106
View answer
Correct Answer:
Question #107
View answer
Correct Answer:
Question #108
View answer
Correct Answer:
Question #109
View answer
Correct Answer:
Question #110
View answer
Correct Answer:
Question #111
View answer
Correct Answer:
Question #112
View answer
Correct Answer:
Question #113
View answer
Correct Answer:
Question #114
View answer
Correct Answer:
Question #115
View answer
Correct Answer:
Question #116
View answer
Correct Answer:
Question #117
View answer
Correct Answer:
Question #118
View answer
Correct Answer:
Question #119
View answer
Correct Answer:
Question #120
View answer
Correct Answer:
Question #121
View answer
Correct Answer:
Question #122
View answer
Correct Answer:
Question #123
View answer
Correct Answer:
Question #124
View answer
Correct Answer:
Question #125
View answer
Correct Answer:
Question #126
View answer
Correct Answer:
Question #127
View answer
Correct Answer:
Question #128
View answer
Correct Answer:
Question #129
View answer
Correct Answer:
Question #130
View answer
Correct Answer:
Question #131
View answer
Correct Answer:
Question #132
View answer
Correct Answer:
Question #133
View answer
Correct Answer:
Question #134
View answer
Correct Answer:
Question #135
View answer
Correct Answer:
Question #136
View answer
Correct Answer:
Question #137
View answer
Correct Answer:
Question #138
View answer
Correct Answer:
Question #139
View answer
Correct Answer:
Question #140
View answer
Correct Answer:
Question #141
View answer
Correct Answer:
Question #142
View answer
Correct Answer:
Question #143
View answer
Correct Answer:
Question #144
View answer
Correct Answer:
Question #145
View answer
Correct Answer:
Question #146
View answer
Correct Answer:
Question #147
View answer
Correct Answer:
Question #148
View answer
Correct Answer:
Question #149
View answer
Correct Answer:
Question #150
View answer
Correct Answer:
Question #151
View answer
Correct Answer:
Question #152
View answer
Correct Answer:
Question #153
View answer
Correct Answer:
Question #154
View answer
Correct Answer:
Question #155
View answer
Correct Answer:
Question #156
View answer
Correct Answer:
Question #157
View answer
Correct Answer:
Question #158
View answer
Correct Answer:
Question #159
View answer
Correct Answer:
Question #160
View answer
Correct Answer:
Question #161
View answer
Correct Answer:
Question #162
View answer
Correct Answer:
Question #163
View answer
Correct Answer:
Question #164
View answer
Correct Answer:
Question #165
View answer
Correct Answer:
Question #166
View answer
Correct Answer:
Question #167
View answer
Correct Answer:
Question #168
View answer
Correct Answer:
Question #169
View answer
Correct Answer:
Question #170
View answer
Correct Answer:
Question #171
View answer
Correct Answer:
Question #172
View answer
Correct Answer:
Question #173
View answer
Correct Answer:
Question #174
View answer
Correct Answer:
Question #175
View answer
Correct Answer:
Question #176
View answer
Correct Answer:
Question #177
View answer
Correct Answer:
Question #178
View answer
Correct Answer:
Question #179
View answer
Correct Answer:
Question #180
View answer
Correct Answer:
Question #181
View answer
Correct Answer:
Question #182
View answer
Correct Answer:
Question #183
View answer
Correct Answer:
Question #184
View answer
Correct Answer:
Question #185
View answer
Correct Answer:
Question #186
View answer
Correct Answer:
Question #187
View answer
Correct Answer:
Question #188
View answer
Correct Answer:
Question #189
View answer
Correct Answer:
Question #190
View answer
Correct Answer:
Question #191
View answer
Correct Answer:
Question #192
View answer
Correct Answer:
Question #193
View answer
Correct Answer:
Question #194
View answer
Correct Answer:
Question #195
View answer
Correct Answer:
Question #196
View answer
Correct Answer:
Question #197
View answer
Correct Answer:
Question #198
View answer
Correct Answer:
Question #199
View answer
Correct Answer:
Question #200
View answer
Correct Answer:
Question #201
View answer
Correct Answer:
Question #202
View answer
Correct Answer:
Question #203
View answer
Correct Answer:
Question #204
View answer
Correct Answer:
Question #205
View answer
Correct Answer:
Question #206
View answer
Correct Answer:
Question #207
View answer
Correct Answer:
Question #208
View answer
Correct Answer:
Question #209
View answer
Correct Answer:
Question #210
View answer
Correct Answer:
Question #211
View answer
Correct Answer:
Question #212
View answer
Correct Answer:
Question #213
View answer
Correct Answer:
Question #214
View answer
Correct Answer:
Question #215
View answer
Correct Answer:
Question #216
View answer
Correct Answer:
Question #217
View answer
Correct Answer:
Question #218
View answer
Correct Answer:
Question #219
View answer
Correct Answer:
Question #220
View answer
Correct Answer:
Question #221
View answer
Correct Answer:
Question #222
View answer
Correct Answer:
Question #223
View answer
Correct Answer:
Question #224
View answer
Correct Answer:
Question #225
View answer
Correct Answer:
Question #226
View answer
Correct Answer:
Question #227
View answer
Correct Answer:
Question #228
View answer
Correct Answer:
Question #229
View answer
Correct Answer:
Question #230
View answer
Correct Answer:
Question #231
View answer
Correct Answer:
Question #232
View answer
Correct Answer:
Question #233
View answer
Correct Answer:
Question #234
View answer
Correct Answer:
Question #235
View answer
Correct Answer:
Question #236
View answer
Correct Answer:
Question #237
View answer
Correct Answer:
Question #238
View answer
Correct Answer:
Question #239
View answer
Correct Answer:
Question #240
View answer
Correct Answer:
Question #241
View answer
Correct Answer:
Question #242
View answer
Correct Answer:
Question #243
View answer
Correct Answer:
Question #244
View answer
Correct Answer:
Question #245
View answer
Correct Answer:
Question #246
View answer
Correct Answer:
Question #247
View answer
Correct Answer:
Question #248
View answer
Correct Answer:
Question #249
View answer
Correct Answer:
Question #250
View answer
Correct Answer:
Question #251
View answer
Correct Answer:
Question #252
View answer
Correct Answer:
Question #253
View answer
Correct Answer:
Question #254
View answer
Correct Answer:
Question #255
View answer
Correct Answer:
Question #256
View answer
Correct Answer:
Question #257
View answer
Correct Answer:
Question #258
View answer
Correct Answer:
Question #259
View answer
Correct Answer:
Question #260
View answer
Correct Answer:
Question #261
View answer
Correct Answer:
Question #262
View answer
Correct Answer:
Question #263
View answer
Correct Answer:
Question #264
View answer
Correct Answer:
Question #265
View answer
Correct Answer:
Question #266
View answer
Correct Answer:
Question #267
View answer
Correct Answer:
Question #268
View answer
Correct Answer:
Question #269
View answer
Correct Answer:
Question #270
View answer
Correct Answer:
Question #271
View answer
Correct Answer:
Question #272
View answer
Correct Answer:
Question #273
View answer
Correct Answer:
Question #274
View answer
Correct Answer:
Question #275
View answer
Correct Answer:
Question #276
View answer
Correct Answer:
Question #277
View answer
Correct Answer:
Question #278
View answer
Correct Answer:
Question #279
View answer
Correct Answer:
Question #280
View answer
Correct Answer:
Question #281
View answer
Correct Answer:
Question #282
View answer
Correct Answer:

View The Updated ISACA Exam Questions

SPOTO Provides 100% Real ISACA Exam Questions for You to Pass Your ISACA Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: