ISACA CISA Practice Exams
Last updated on Apr 07,2025- Exam Code: CISA
- Exam Name: Certified Information Systems Auditor
- Certification Provider: ISACA
- Latest update: Apr 07,2025
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
- A . The system does not have a maintenance plan.
- B . The system contains several minor defects.
- C . The system deployment was delayed by three weeks.
- D . The system was over budget by 15%.
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
- A . Monitoring
- B . Deterrent
- C . Detective
- D . Corrective
Which of the following would BEST prevent an arbitrary application of a patch?
- A . Database access control
- B . Established maintenance windows
- C . Network based access controls
- D . Change management
The PRIMARY role of an IS auditor in the remediation of problems found during an audit engagement is to:
- A . help auditee management by providing the solution.
- B . explain the findings and provide general advice.
- C . present updated policies to management for approval.
- D . take ownership of the problems and oversee remediation efforts.
Which of the following is an IS auditor’s BEST recommendation to mitigate the risk of eavesdropping associated with an application programming interface (API) integration implementation?
- A . Encrypt the extensible markup language (XML) file.
- B . Implement Transport Layer Security (TLS).
- C . Mask the API endpoints.
- D . Implement Simple Object Access Protocol (SOAP).
Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?
- A . Data storage costs
- B . Data classification
- C . Vendor cloud certification
- D . Service level agreements (SLAs)
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email.
Which of the following metrics BEST indicates the effectiveness of awareness training?
- A . The number of users deleting the email without reporting because it is a phishing email
- B . The number of users clicking on the link to learn more about the sender of the email
- C . The number of users forwarding the email to their business unit managers
- D . The number of users reporting receipt of the email to the information security team
An IS auditor is reviewing the installation of a new server. The IS auditor’s PRIMARY objective is to ensure that
- A . security parameters are set in accordance with the manufacturer s standards.
- B . a detailed business case was formally approved prior to the purchase.
- C . security parameters are set in accordance with the organization’s policies.
- D . the procurement project invited lenders from at least three different suppliers.
An IS auditor is planning an audit of an organization’s risk management practices.
Which of the following would provide the MOST useful information about
risk appetite?
- A . Risk policies
- B . Risk assessments
- C . Prior audit reports
- D . Management assertion
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
- A . Carbon dioxide
- B . FM-200
- C . Dry pipe
- D . Halon