Isaca CISA - Certified Information Systems Auditor
An organization outsourced its IS functions to meet its responsibility for disaster recovery, the organization should:
An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?
Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?
Capacity management tools are PRIMARILY used to ensure that:
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:
Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?
Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?
Management has learned the implementation of a new IT system will not be completed on time and has requested an audit. Which of the following audit findings should be of GREATEST concern?
During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor's GREATEST concern with this situation?
Which of the following is MOST helpful to an IS auditor when assessing the effectiveness of controls?
The PRIMARY purpose of a configuration management system is to:
An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether
When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor's NEXT action1?
In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?
An IS auditor is reviewing an organization's business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor's GREATEST concern?
During an audit which of the following would be MOST helpful in establishing a baseline for measuring data quality?
Which of the following is the BEST source of information to determine the required level of data protection on a file server?
Which of the following is the BEST indication to an IS auditor that management's post-implementation review was effective?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?
An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?
Which of the following would be the BEST process for continuous auditing to a large financial Institution?
Which of the following provides the BEST assurance of data integrity after file transfers?
Which of the following is the MOST appropriate control to ensure integrity of online orders?
In the development of a new financial application, the IS auditor's FIRST involvement should be in the:
When assessing the overall effectiveness of an organization's disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?
An IS auditor is asked to review an organization's technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
A disaster recovery plan (DRP) should include steps for:
When is it MOST important for an IS auditor to apply the concept of materiality in an audit?
The FIRST step in auditing a data communication system is to determine:
When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on
Which of the following is MOST important during software license audits?
Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?
Which of the following is the BEST testing approach to facilitate rapid identification of application interface errors?
After delivering an audit report, the audit manager discovers that evidence was overlooked during the audit This evidence indicates that a procedural control may have failed and could contradict a conclusion of the audit Which of the following risks is MOST affected by this oversight?
Which of the following is the PRIMARY role of key performance indicators (KPIs) in supporting business process effectiveness?
During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor's BEST course of action?
The use of access control lists (ACLs) is the MOST effective method to mitigate security risk for routers because they: (Identify Correct answer and related explanation/references from CISA Certification - Information Systems Auditor official Manual or book)
An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?
A firewall between internal network segments improves security and reduces risk by:
Which of the following is the MOST important responsibility of user departments associated with program changes?
An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?
Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan?
To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?
Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?