Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Isaca CISA Practice Exam with Questions & Answers | Set: 2

Questions 51

When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;

Options:
A.

data analytics findings.

B.

audit trails

C.

acceptance lasting results

D.

rollback plans

Isaca CISA Premium Access
Questions 52

Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?

Options:
A.

Server room access history

B.

Emergency change records

C.

IT security incidents

D.

Penetration test results

Questions 53

An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?

Options:
A.

Alarm system with CCTV

B.

Access control log

C.

Security incident log

D.

Access card allocation records

Questions 54

Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?

Options:
A.

Cost of projects divided by total IT cost

B.

Expected return divided by total project cost

C.

Net present value (NPV) of the portfolio

D.

Total cost of each project

Questions 55

Which of the following presents the GREATEST challenge to the alignment of business and IT?

Options:
A.

Lack of chief information officer (CIO) involvement in board meetings

B.

Insufficient IT budget to execute new business projects

C.

Lack of information security involvement in business strategy development

D.

An IT steering committee chaired by the chief information officer (CIO)

Questions 56

What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?

Options:
A.

it facilitates easier audit follow-up

B.

it enforces action plan consensus between auditors and auditees

C.

it establishes accountability for the action plans

D.

it helps to ensure factual accuracy of findings

Questions 57

Which of the following should be restricted from a network administrator's privileges in an adequately segregated IT environment?

Options:
A.

Monitoring network traffic

B.

Changing existing configurations for applications

C.

Hardening network ports

D.

Ensuring transmission protocols are functioning correctly

Questions 58

An organization's IT risk assessment should include the identification of:

Options:
A.

vulnerabilities

B.

compensating controls

C.

business needs

D.

business process owners

Questions 59

Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?

Options:
A.

Data storage costs

B.

Data classification

C.

Vendor cloud certification

D.

Service level agreements (SLAs)

Questions 60

Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?

Options:
A.

Data owners are not trained on the use of data conversion tools.

B.

A post-implementation lessons-learned exercise was not conducted.

C.

There is no system documentation available for review.

D.

System deployment is routinely performed by contractors.

Questions 61

Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?

Options:
A.

Data leakage as a result of employees leaving to work for competitors

B.

Noncompliance fines related to storage of regulated information

C.

Unauthorized logical access to information through an application interface

D.

Physical theft of media on which information is stored

Questions 62

One advantage of monetary unit sampling is the fact that

Options:
A.

results are stated m terms of the frequency of items in error

B.

it can easily be applied manually when computer resources are not available

C.

large-value population items are segregated and audited separately

D.

it increases the likelihood of selecting material items from the population

Questions 63

Which of the following provides the MOST reliable method of preventing unauthonzed logon?

Options:
A.

issuing authentication tokens

B.

Reinforcing current security policies

C.

Limiting after-hours usage

D.

Installing an automatic password generator

Questions 64

A computer forensic audit is MOST relevant in which of the following situations?

Options:
A.

Inadequate controls in the IT environment

B.

Mismatches in transaction data

C.

Missing server patches

D.

Data loss due to hacking of servers

Questions 65

An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:

Options:
A.

some of the identified threats are unlikely to occur.

B.

all identified threats relate to external entities.

C.

the exercise was completed by local management.

D.

neighboring organizations' operations have been included.

Questions 66

An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?

Options:
A.

Detective

B.

Compensating

C.

Corrective

D.

Directive

Questions 67

Which of the following is an IS auditor's BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?

Options:
A.

Enforce a secure tunnel connection.

B.

Enhance internal firewalls.

C.

Set up a demilitarized zone (DMZ).

D.

Implement a secure protocol.

Questions 68

An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?

Options:
A.

Monitoring access rights on a regular basis

B.

Referencing a standard user-access matrix

C.

Granting user access using a role-based model

D.

Correcting the segregation of duties conflicts

Questions 69

Which of the following should an organization do to anticipate the effects of a disaster?

Options:
A.

Define recovery point objectives (RPO)

B.

Simulate a disaster recovery

C.

Develop a business impact analysis (BIA)

D.

Analyze capability maturity model gaps

Questions 70

The charging method that effectively encourages the MOST efficient use of IS resources is:

Options:
A.

specific charges that can be tied back to specific usage.

B.

total utilization to achieve full operating capacity.

C.

residual income in excess of actual incurred costs.

D.

allocations based on the ability to absorb charges.

Questions 71

An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?

Options:
A.

Inspecting a sample of alerts generated from the central log repository

B.

Comparing a list of all servers from the directory server against a list of all servers present in the central log repository

C.

Inspecting a sample of alert settings configured in the central log repository

D.

Comparing all servers included in the current central log repository with the listing used for the prior-year audit

Questions 72

Which of the following is the MOST important factor when an organization is developing information security policies and procedures?

Options:
A.

Consultation with security staff

B.

Inclusion of mission and objectives

C.

Compliance with relevant regulations

D.

Alignment with an information security framework

Questions 73

Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?

Options:
A.

Establishing a risk appetite

B.

Establishing a risk management framework

C.

Validating enterprise risk management (ERM)

D.

Operating the risk management framework

Questions 74

With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?

Options:
A.

A business impact analysis (BIA) has not been performed

B.

Business data is not sanitized in the development environment

C.

There is no plan for monitoring system downtime

D.

The process owner has not signed off on user acceptance testing (UAT)

Questions 75

Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?

Options:
A.

Policies and procedures for managing documents provided by department heads

B.

A system-generated list of staff and their project assignments. roles, and responsibilities

C.

Previous audit reports related to other departments' use of the same system

D.

Information provided by the audit team lead an the authentication systems used by the department

Questions 76

When assessing whether an organization's IT performance measures are comparable to other organizations in the same industry, which of the following would be MOST helpful to review?

Options:
A.

IT governance frameworks

B.

Benchmarking surveys

C.

Utilization reports

D.

Balanced scorecard

Questions 77

An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?

Options:
A.

All users provisioned after the finding was originally identified

B.

All users provisioned after management resolved the audit issue

C.

All users provisioned after the final audit report was issued

D.

All users who have followed user provisioning processes provided by management

Questions 78

What is the MOST effective way to detect installation of unauthorized software packages by employees?

Options:
A.

Regular scanning of hard drives

B.

Communicating the policy to employees

C.

Logging of activity on the network

D.

Maintaining current antivirus software

Questions 79

An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?

Options:
A.

Additional firewall rules

B.

Multi-factor authentication

C.

Virtual private network (VPN)

D.

Virtual desktop

Questions 80

Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?

Options:
A.

Readily available resources such as domains and risk and control methodologies

B.

Comprehensive coverage of fundamental and critical risk and control areas for IT governance

C.

Fewer resources expended on trial-and-error attempts to fine-tune implementation methodologies

D.

Wide acceptance by different business and support units with IT governance objectives

Questions 81

Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?

Options:
A.

Auditors are responsible for performing operational duties or activities.

B.

The internal audit manager reports functionally to a senior management official.

C.

The internal audit manager has a reporting line to the audit committee.

D.

Auditors are responsible for assessing and operating a system of internal controls.

Questions 82

Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?

Options:
A.

EUC inventory

B.

EUC availability controls

C.

EUC access control matrix

D.

EUC tests of operational effectiveness

Questions 83

A characteristic of a digital signature is that it

Options:
A.

is under control of the receiver

B.

is unique to the message

C.

is validated when data are changed

D.

has a reproducible hashing algorithm

Questions 84

An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application's operating system?

Options:
A.

The cloud provider's external auditor

B.

The cloud provider

C.

The operating system vendor

D.

The organization

Questions 85

A database administrator (DBA) should be prevented from having end user responsibilities:

Options:
A.

having end user responsibilities

B.

accessing sensitive information

C.

having access to production files

D.

using an emergency user ID

Questions 86

When is it MOST important for an IS auditor to apply the concept of materiality in an audit?

Options:
A.

When planning an audit engagement

B.

When gathering information for the fieldwork

C.

When a violation of a regulatory requirement has been identified

D.

When evaluating representations from the auditee

Questions 87

What is the BEST way to reduce the risk of inaccurate or misleading data proliferating through business intelligence systems?

Options:
A.

Establish rules for converting data from one format to another

B.

Implement data entry controls for new and existing applications

C.

Implement a consistent database indexing strategy

D.

Develop a metadata repository to store and access metadata

Questions 88

Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?

Options:
A.

Monitoring tools are configured to alert in case of downtime

B.

A comprehensive security review is performed every quarter.

C.

Data for different tenants is segregated by database schema

D.

Tenants are required to implement data classification polices

Questions 89

Which of the following is the MAJOR advantage of automating internal controls?

Options:
A.

To enable the review of large value transactions

B.

To efficiently test large volumes of data

C.

To help identity transactions with no segregation of duties

D.

To assist in performing analytical reviews

Questions 90

During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?

Options:
A.

Business case development phase when stakeholders are identified

B.

Application design phase process functionalities are finalized

C.

User acceptance testing (UAT) phase when test scenarios are designed

D.

Application coding phase when algorithms are developed to solve business problems

Questions 91

An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?

Options:
A.

Come to an agreement prior to issuing the final report.

B.

Include the position supported by senior management in the final engagement report

C.

Ensure the auditee's comments are included in the working papers

D.

Exclude the disputed recommendation from the final engagement report

Questions 92

Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''

Options:
A.

Steps taken to address identified vulnerabilities are not formally documented

B.

Results are not reported to individuals with authority to ensure resolution

C.

Scans are performed less frequently than required by the organization's vulnerability scanning schedule

D.

Results are not approved by senior management

Questions 93

Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?

Options:
A.

Cross-site scripting (XSS)

B.

Copyright violations

C.

Social engineering

D.

Adverse posts about the organization

Questions 94

Which of the following is the PRIMARY reason to perform a risk assessment?

Options:
A.

To determine the current risk profile

B.

To ensure alignment with the business impact analysis (BIA)

C.

To achieve compliance with regulatory requirements

D.

To help allocate budget for risk mitigation controls

Questions 95

Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?

Options:
A.

End-user computing (EUC) systems

B.

Email attachments

C.

Data sent to vendors

D.

New system applications

Questions 96

Which of the following provides the BEST assurance of data integrity after file transfers?

Options:
A.

Check digits

B.

Monetary unit sampling

C.

Hash values

D.

Reasonableness check

Questions 97

Backup procedures for an organization's critical data are considered to be which type of control?

Options:
A.

Directive

B.

Corrective

C.

Detective

D.

Compensating

Questions 98

Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?

Options:
A.

Industry regulations

B.

Industry standards

C.

Incident response plan

D.

Information security policy

Questions 99

What is the PRIMARY purpose of performing a parallel run of a now system?

Options:
A.

To train the end users and supporting staff on the new system

B.

To verify the new system provides required business functionality

C.

To reduce the need for additional testing

D.

To validate the new system against its predecessor

Questions 100

Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan?

Options:
A.

Project charter

B.

Project plan

C.

Project issue log

D.

Project business case

Exam Code: CISA
Certification Provider: Isaca
Exam Name: Certified Information Systems Auditor
Last Update: Jul 13, 2025
Questions: 1407

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.