Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Isaca CISA Practice Exam with Questions & Answers | Set: 3

Questions 101

Which of the following is the MOST appropriate control to ensure integrity of online orders?

Options:
A.

Data Encryption Standard (DES)

B.

Digital signature

C.

Public key encryption

D.

Multi-factor authentication

Isaca CISA Premium Access
Questions 102

Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?

Options:
A.

Degaussing

B.

Random character overwrite

C.

Physical destruction

D.

Low-level formatting

Questions 103

Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?

Options:
A.

Voice recovery

B.

Alternative routing

C.

Long-haul network diversity

D.

Last-mile circuit protection

Questions 104

Which of the following is the BEST indication of effective IT investment management?

Options:
A.

IT investments are implemented and monitored following a system development life cycle (SDLC)

B.

IT investments are mapped to specific business objectives

C.

Key performance indicators (KPIs) are defined for each business requiring IT Investment

D.

The IT Investment budget is significantly below industry benchmarks

Questions 105

Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?

Options:
A.

Using passwords to allow authorized users to send documents to the printer

B.

Requiring a key code to be entered on the printer to produce hard copy

C.

Encrypting the data stream between the user's computer and the printer

D.

Producing a header page with classification level for printed documents

Questions 106

An IS auditor learns that an in-house system development life cycle (SDLC) project has not met user specifications. The auditor should FIRST examine requirements from which of the following phases?

Options:
A.

Configuration phase

B.

User training phase

C.

Quality assurance (QA) phase

D.

Development phase

Questions 107

A checksum is classified as which type of control?

Options:
A.

Detective control

B.

Preventive control

C.

Corrective control

D.

Administrative control

Questions 108

Which of the following is the GREATEST risk associated with hypervisors in virtual environments?

Options:
A.

Availability issues

B.

Virtual sprawl

C.

Single point of failure

D.

Lack of patches

Questions 109

An IT balanced scorecard is PRIMARILY used for:

Options:
A.

evaluating the IT project portfolio

B.

measuring IT strategic performance

C.

allocating IT budget and resources

D.

monitoring risk in lT-related processes

Questions 110

Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?

Options:
A.

Evaluating the likelihood of attack

B.

Estimating potential damage

C.

Identifying vulnerable assets

D.

Assessing the Impact of vulnerabilities

Questions 111

Which of the following is the PRIMARY objective of a control self-assessment (CSA)?

Options:
A.

To shift some control monitoring responsibilities to functional areas

B.

To create cohesive teams through employee involvement

C.

To improve the audit rating process

D.

To reduce control costs associated with a specific function

Questions 112

Which of the following is the GREATEST risk associated with utilizing spreadsheets for financial reporting in end-user computing (EUC)?

Options:
A.

Lack of password protection

B.

Lack of processing integrity

C.

Increase in regulatory violations

D.

Increase in operational incidents

Questions 113

An IS auditor is reviewing desktop software profiles and notes that a user has downloaded and installed several games that are not approved by the company. Which of the following is the MOST significant risk that could result from this situation?

Options:
A.

Violation of user's privacy

B.

Potential for malware

C.

Noncompliance with the acceptable use policy

D.

Interoperability issues with company software

Questions 114

Which of the following technologies is BEST suited to fulfill a business requirement for nonrepudiation of business-to-business transactions with external parties without the need for a mutually trusted entity?

Options:
A.

Public key infrastructure (PKI)

B.

Blockchain distributed ledger

C.

Artificial intelligence (Al)

D.

Centralized ledger technology

Questions 115

Which of the following is MOST useful for determining the strategy for IT portfolio management?

Options:
A.

IT metrics dashboards

B.

IT roadmap

C.

Capability maturity model

D.

Life cycle cost-benefit analysis

Questions 116

A mission-critical application utilizes a one-node database server. On multiple occasions, the database service has been stopped to perform routine patching, causing application outages. Which of the following should be the IS auditor’s GREATEST concern?

Options:
A.

Revenue lost due to application outages

B.

Patching performed by the vendor

C.

A large number of scheduled database changes

D.

The presence of a single point of failure

Questions 117

Control self-assessments (CSAs) can be used to:

Options:
A.

Determine the value of assets.

B.

Establish baselines.

C.

Evaluate strategic business goals.

D.

Replace audits.

Questions 118

Which of the following is the MOST important regulatory consideration for an organization determining whether to use its customer data to train AI algorithms?

Options:
A.

Documentation of AI algorithm accuracy during the training process

B.

Ethical and optimal utilization of data computing resources

C.

Collection of data and obtaining data subject consent

D.

Continuous monitoring of AI algorithm performance

Questions 119

Which of the following is the PRIMARY objective of cyber resiliency?

Options:
A.

To resume normal operations after service disruptions

B.

To prevent potential attacks or disruptions in operations

C.

To efficiently and effectively recover from an incident with limited operational impact

D.

To limit the severity of security breaches and maintain continuous operations

Questions 120

Which of the following controls is MOST effective at preventing system failures when implementing a new web application?

Options:
A.

System recovery plan

B.

System testing

C.

Business continuity plan (BCP)

D.

Transaction monitoring

Questions 121

Which of the following should be of MOST concern to an IS auditor reviewing an organization's operational log management?

Options:
A.

Log file size has grown year over year.

B.

Critical events are being logged to immutable log files.

C.

Applications are logging events into multiple log files.

D.

Data formats have not been standardized across all logs.

Questions 122

Which of the following would BEST protect the confidentiality of sensitive data in transit between multiple offices?

Options:
A.

Hash algorithms

B.

Digital signatures

C.

Public key infrastructure (PKI)

D.

Kerberos

Questions 123

Which of the following is the GREATEST risk related to the use of virtualized environments?

Options:
A.

The host may be a potential single point of failure within the system.

B.

There may be insufficient processing capacity to assign to guests.

C.

There may be increased potential for session hijacking.

D.

Ability to change operating systems may be limited.

Questions 124

An IS auditor is reviewing an organization's cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?

Options:
A.

Cloud services are classified.

B.

Users are centrally managed.

C.

Cloud processes are resilient.

D.

Users are periodically recertified.

Questions 125

Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?

Options:
A.

Timely audit execution

B.

Effective allocation of audit resources

C.

Reduced travel and expense costs

D.

Effective risk mitigation

Questions 126

Which of the following poses the GREATEST risk to the use of active RFID tags?

Options:
A.

Session hijacking

B.

Eavesdropping

C.

Piggybacking

D.

Phishing attacks

Questions 127

Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?

Options:
A.

Biometric authentication for the device

B.

Remote data wipe program

C.

Encryption of the data stored on the device

D.

Password for device authentication

Questions 128

A contract for outsourcing IS functions should always include:

Options:
A.

Full details of security procedures to be observed by the contractor.

B.

A provision for an independent audit of the contractor’s operations.

C.

The names and roles of staff to be employed in the operation.

D.

Data transfer protocols.

Questions 129

The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:

Options:
A.

audit resources are used most effectively.

B.

internal audit activity conforms with audit standards and methodology.

C.

the audit function is adequately governed and meets performance metrics.

D.

inherent risk in audits is minimized.

Questions 130

An organization's information security policies should be developed PRIMARILY on the basis of:

Options:
A.

enterprise architecture (EA).

B.

industry best practices.

C.

a risk management process.

D.

past information security incidents.

Questions 131

Which of the following should be the GREATEST concern for an IS auditor reviewing recent disaster recovery operations?

Options:
A.

The recovery point objective (RPO) was not defined.

B.

Test data was lost during a recovery operation.

C.

A warm site was used as a recovery strategy.

D.

A full backup was only performed once a week.

Questions 132

which of the following is a core functionality of a configuration and release management system?

Options:
A.

Managing privileged access to databases servers and infrastructure

B.

Identifying vulnerabilities in configuration settings

C.

Deploying a configuration change to the sandbox environment

D.

Identifying other configuration items that will be impacted by a given change

Questions 133

Which of the following would be MOST important to include in an IS audit report?

Options:
A.

Observations not reported as findings due to inadequate evidence

B.

The roadmap for addressing the various risk areas

C.

The level of unmitigated risk along with business impact

D.

Specific technology solutions for each audit observation

Questions 134

Which of the following is the GREATEST benefit of adopting an Agile audit methodology?

Options:
A.

Better ability to address key risks

B.

Less frequent client interaction

C.

Annual cost savings

D.

Reduced documentation requirements

Questions 135

Which of the following key performance indicators (KPIs) provides stakeholders with the MOST useful information about whether information security risk is being managed?

Options:
A.

Time from identifying security threats to implementing solutions

B.

The number of security controls audited

C.

Time from security log capture to log analysis

D.

The number of entries in the security risk register

Questions 136

Having knowledge in which of the following areas is MOST relevant for an IS auditor reviewing public key infrastructure (PKI)?

Options:
A.

Design and application of key controls in public audit

B.

Security strategy in public cloud Infrastructure as a Service (IaaS)

C.

Modern encoding methods for digital communications

D.

Technology and process life cycle for digital certificates and key pairs

Questions 137

Which of the following recommendations would BEST prevent the implementation of IT projects without collaborating with the business?

Options:
A.

Partner with the business units to evaluate IT projects.

B.

Review the projects to identify similarities and eliminate duplication.

C.

Periodically review the projects' return on investment (ROI).

D.

Prioritize protects based on business and IT resource availability.

Questions 138

An organization plans to centrally decommission end-of-life databases and migrate the data to the latest model of hardware. Which of the following BEST ensures data integrity is preserved during the migration?

Options:
A.

Reconciling sample data to most recent backups

B.

Obfuscating confidential data

C.

Encrypting the data

D.

Comparing checksums

Questions 139

An IS auditor is reviewing an organizations release management practices and observes inconsistent and inaccurate estimation of the size and complexity of business application development projects. Which of the following should the auditor recommend to address this issue?

Options:
A.

Critical path methodology

B.

Agile development approach

C.

Function point analysis

D.

Rapid application development

Questions 140

Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's mobile device policies and controls in its corporate environment?

Options:
A.

The mobile authentication policy requires biometrics.

B.

The virtual private network (VPN) policy is not enabled for the internal corporate network.

C.

Not all active devices are enrolled in mobile device management (MDM).

D.

Remote wipe and lock features are only available with access to the internet.

Questions 141

An IS auditor has been asked to provide support to the control self-assessment (CSA) program. Which of the following BEST represents the scope of the auditor’s role in the program?

Options:
A.

The auditor should act as a program facilitator.

B.

The auditor should focus on improving process productivity

C.

The auditor should perform detailed audit procedures

D.

The auditor's presence replaces the audit responsibilities of other team members.

Questions 142

During a pre-implementation review, an IS auditor notes that some scenarios have not been tested. Management has indicated that the project is critical and cannot be postponed. Which of the following is the auditor's BEST course of action?

Options:
A.

Determine whether the tested scenarios covered the most significant project risks.

B.

Help management complete remaining scenario testing before implementation.

C.

Recommend project implementation be postponed until all scenarios have been tested.

D.

Perform remaining scenario testing in the production environment post implementation.

Questions 143

The PRIMARY objective of a follow-up audit is to:

Options:
A.

assess the appropriateness of recommendations.

B.

verify compliance with policies.

C.

evaluate whether the risk profile has changed.

D.

determine adequacy of actions taken on recommendations.

Questions 144

Which of the following types of firewalls provides the GREATEST degree of control against hacker intrusion?

Options:
A.

Packet filtering router

B.

Circuit gateway

C.

Application-level gateway

D.

Screening router.

Questions 145

During the forensic investigation of a cyberattack involving credit card data, which of the following is MOST important to ensure?

Options:
A.

Adequate card security features are activated.

B.

The company’s payment platforms are blocked.

C.

Proper chain of custody is maintained.

D.

All staff in the payment card unit are interviewed.

Questions 146

An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?

Options:
A.

Review system and error logs to verify transaction accuracy.

B.

Review input and output control reports to verify the accuracy of the system decisions.

C.

Review signed approvals to ensure responsibilities for decisions of the system are well defined.

D.

Review system documentation to ensure completeness.

Questions 147

An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:

Options:
A.

refuse the assignment to avoid conflict of interest.

B.

use the knowledge of the application to carry out the audit.

C.

inform audit management of the earlier involvement.

D.

modify the scope of the audit.

Questions 148

To confirm integrity for a hashed message, the receiver should use:

Options:
A.

the same hashing algorithm as the sender's to create a binary image of the file.

B.

a different hashing algorithm from the sender's to create a binary image of the file.

C.

the same hashing algorithm as the sender's to create a numerical representation of the file.

D.

a different hashing algorithm from the sender's to create a numerical representation of the file.

Questions 149

Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?

Options:
A.

The lack of technical documentation to support the program code

B.

The lack of completion of all requirements at the end of each sprint

C.

The lack of acceptance criteria behind user requirements.

D.

The lack of a detailed unit and system test plan

Questions 150

Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?

Options:
A.

Ensure corrected program code is compiled in a dedicated server.

B.

Ensure change management reports are independently reviewed.

C.

Ensure programmers cannot access code after the completion of program edits.

D.

Ensure the business signs off on end-to-end user acceptance test (UAT) results.

Exam Code: CISA
Certification Provider: Isaca
Exam Name: Certified Information Systems Auditor
Last Update: Jul 13, 2025
Questions: 1407

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.