ISACA CISA Practice Exams
Last updated on Apr 01,2025- Exam Code: CISA
- Exam Name: Certified Information Systems Auditor
- Certification Provider: ISACA
- Latest update: Apr 01,2025
An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues.
What is the MOST likely cause?
- A . Database clustering
- B . Data caching
- C . Reindexing of the database table
- D . Load balancing
Which of the following is MOST useful for determining the strategy for IT portfolio management?
- A . IT metrics dashboards
- B . IT roadmap
- C . Capability maturity model
- D . Life cycle cost-benefit analysis
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
- A . Classifies documents to correctly reflect the level of sensitivity of information they contain
- B . Defines the conditions under which documents containing sensitive information may be transmitted
- C . Classifies documents in accordance with industry standards and best practices
- D . Ensures documents are handled in accordance With the sensitivity of information they contain
An IS auditor is evaluating the progress of a web-based customer service application development project.
Which of the following would be MOST helpful for this evaluation?
- A . Backlog consumption reports
- B . Critical path analysis reports
- C . Developer status reports
- D . Change management logs
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements.
Which of the following is the BEST way to obtain this assurance?
- A . Review sign-off documentation
- B . Review the source code related to the calculation
- C . Re-perform the calculation with audit software
- D . Inspect user acceptance lest (UAT) results
An IS auditor is reviewing a decision to consolidate processing for multiple applications onto a single large server.
Which of the following is the MOST significant impact from this decision?
- A . Higher operating system license fees
- B . More applications affected by a server outage
- C . Simplified asset management
- D . Fewer application servers requiring vulnerability scans
Which of the following data would be used when performing a business impact analysis (BIA)?
- A . Projected impact of current business on future business
- B . Cost-benefit analysis of running the current business
- C . Cost of regulatory compliance
- D . Expected costs for recovering the business
An IS auditor is providing input to an RFP to acquire a financial application system.
Which of the following is MOST important for the auditor to recommend?
- A . The application should meet the organization’s requirements.
- B . Audit trails should be included in the design.
- C . Potential suppliers should have experience in the relevant area.
- D . Vendor employee background checks should be conducted regularly.
Which of the following BEST enables an IS auditor to combine and compare access control lists from various applications and devices?
- A . Integrated test facility (ITF)
- B . Snapshots
- C . Data analytics
- D . Audit hooks
Which of the following should be the FIRST step in the incident response process for a suspected breach?
- A . Inform potentially affected customers of the security breach
- B . Notify business management of the security breach.
- C . Research the validity of the alerted breach
- D . Engage a third party to independently evaluate the alerted breach.