ISACA CISA Certified Information Systems Auditor Online Training
ISACA CISA Online Training
The questions for CISA were last updated at Apr 07,2025.
- Exam Code: CISA
- Exam Name: Certified Information Systems Auditor
- Certification Provider: ISACA
- Latest update: Apr 07,2025
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor’s time would be to review and evaluate:
- A . application test cases.
- B . acceptance testing.
- C . cost-benefit analysis.
- D . project plans.
An IS auditor finds that firewalls are outdated and not supported by vendors.
Which of the following should be the auditor’s NEXT course of action?
- A . Report the mitigating controls.
- B . Report the security posture of the organization.
- C . Determine the value of the firewall.
- D . Determine the risk of not replacing the firewall.
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
- A . Analyze whether predetermined test objectives were met.
- B . Perform testing at the backup data center.
- C . Evaluate participation by key personnel.
- D . Test offsite backup files.
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes.
Which of the following recommendations would BEST help to reduce the risk of data leakage?
- A . Requiring policy acknowledgment and nondisclosure agreements (NDAs) signed by employees
- B . Establishing strong access controls on confidential data
- C . Providing education and guidelines to employees on use of social networking sites
- D . Monitoring employees’ social networking usage
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons.
Which of the following should the auditor recommend be performed FIRST?
- A . Implement a process to actively monitor postings on social networking sites.
- B . Adjust budget for network usage to include social media usage.
- C . Use data loss prevention (DLP) tools on endpoints.
- D . implement policies addressing acceptable usage of social media during working hours.
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
- A . Carbon dioxide
- B . FM-200
- C . Dry pipe
- D . Halon
Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
- A . The IS auditor provided consulting advice concerning application system best practices.
- B . The IS auditor participated as a member of the application system project team, but did not have operational responsibilities.
- C . The IS auditor designed an embedded audit module exclusively for auditing the application system.
- D . The IS auditor implemented a specific control during the development of the application system.
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider.
Which of the following would be the BEST way to prevent accepting bad data?
- A . Obtain error codes indicating failed data feeds.
- B . Appoint data quality champions across the organization.
- C . Purchase data cleansing tools from a reputable vendor.
- D . Implement business rules to reject invalid data.
An IS auditor suspects an organization’s computer may have been used to commit a crime.
Which of the following is the auditor’s BEST course of action?
- A . Examine the computer to search for evidence supporting the suspicions.
- B . Advise management of the crime after the investigation.
- C . Contact the incident response team to conduct an investigation.
- D . Notify local law enforcement of the potential crime before further investigation.
Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?
- A . Write access to production program libraries
- B . Write access to development data libraries
- C . Execute access to production program libraries
- D . Execute access to development program libraries