Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca CISA Practice Exam with Questions & Answers | Set: 4

Questions 151

During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST

Options:
A.

perform a business impact analysis (BIA).

B.

issue an intermediate report to management.

C.

evaluate the impact on current disaster recovery capability.

D.

conduct additional compliance testing.

Isaca CISA Premium Access
Questions 152

An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:

Options:
A.

establish criteria for reviewing alerts.

B.

recruit more monitoring personnel.

C.

reduce the firewall rules.

D.

fine tune the intrusion detection system (IDS).

Questions 153

Which of the following is the BEST data integrity check?

Options:
A.

Counting the transactions processed per day

B.

Performing a sequence check

C.

Tracing data back to the point of origin

D.

Preparing and running test data

Questions 154

In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?

Options:
A.

Modify applications to no longer require direct access to the database.

B.

Introduce database access monitoring into the environment

C.

Modify the access management policy to make allowances for application accounts.

D.

Schedule downtime to implement password changes.

Questions 155

Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?

Options:
A.

Segregation of duties between staff ordering and staff receiving information assets

B.

Complete and accurate list of information assets that have been deployed

C.

Availability and testing of onsite backup generators

D.

Knowledge of the IT staff regarding data protection requirements

Questions 156

An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?

Options:
A.

The process does not require specifying the physical locations of assets.

B.

Process ownership has not been established.

C.

The process does not include asset review.

D.

Identification of asset value is not included in the process.

Questions 157

Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?

Options:
A.

Change management

B.

Problem management

C.

incident management

D.

Configuration management

Questions 158

An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?

Options:
A.

Users can export application logs.

B.

Users can view sensitive data.

C.

Users can make unauthorized changes.

D.

Users can install open-licensed software.

Questions 159

An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?

Options:
A.

The cost of outsourcing is lower than in-house development.

B.

The vendor development team is located overseas.

C.

A training plan for business users has not been developed.

D.

The data model is not clearly documented.

Questions 160

Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?

Options:
A.

Have an independent party review the source calculations

B.

Execute copies of EUC programs out of a secure library

C.

implement complex password controls

D.

Verify EUC results through manual calculations

Questions 161

Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?

Options:
A.

Shared facilities

B.

Adequacy of physical and environmental controls

C.

Results of business continuity plan (BCP) test

D.

Retention policy and period

Questions 162

What is the PRIMARY benefit of using one-time passwords?

Options:
A.

An intercepted password cannot be reused

B.

Security for applications can be automated

C.

Users do not have to memorize complex passwords

D.

Users cannot be locked out of an account

Questions 163

Which of the following provides the MOST useful information regarding an organization's risk appetite and tolerance?

Options:
A.

Gap analysis

B.

Audit reports

C.

Risk profile

D.

Risk register

Questions 164

Which of the following is an IS auditor's BEST approach when prepanng to evaluate whether the IT strategy supports the organization's vision and mission?

Options:
A.

Review strategic projects tor return on investments (ROls)

B.

Solicit feedback from other departments to gauge the organization's maturity

C.

Meet with senior management to understand business goals

D.

Review the organization's key performance indicators (KPls)

Questions 165

Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?

Options:
A.

Stress

B.

Regression

C.

Interface

D.

Integration

Questions 166

Which of the following would an IS auditor find to be the GREATEST risk associated with the server room in a remote office location?

Options:
A.

The server room is secured by a key lock instead of an electronic lock.

B.

The server room's location is known by people who work in the area.

C.

The server room does not have temperature controls.

D.

The server room does not have biometric controls.

Questions 167

Which of the following controls helps to reduce fraud risk associated with robotic process automation (RPA)?

Options:
A.

Inclusion of robots in business impact assessments (BIAs)

B.

Password rotation

C.

Recertification process for robots

D.

Common RPA testing framework

Questions 168

An organization requires the use of a key card to enter its data center. Recently, a control was implemented that requires biometric authentication for each employee.

Which type of control has been added?

Options:
A.

Corrective

B.

Compensating

C.

Preventive

D.

Detective

Questions 169

Which of the following observations regarding change management should be considered the MOST serious risk by an IS auditor?

Options:
A.

There is no software used to track change management.

B.

The change is not approved by the business owners.

C.

The change is deployed two weeks after approval.

D.

The development of the change is not cost-effective.

Questions 170

Which of the following is the GREATEST risk of project dashboards being set without sufficiently defined criteria?

Options:
A.

Adverse findings from internal and external auditors

B.

Lack of project portfolio status oversight

C.

Lack of alignment of project status reports

D.

Inadequate decision-making and prioritization

Questions 171

Who is PRIMARILY responsible for the design of IT controls to meet control objectives?

Options:
A.

Business management

B.

Internal auditor

C.

Risk management

D.

ITC manager

Questions 172

Before the release of a new application into an organization’s production environment, which of the following should be in place to ensure that proper testing has occurred and rollback plans are in place?

Options:
A.

Change approval board

B.

Standardized change requests

C.

Independent third-party approval

D.

Secure code review

Questions 173

Which of the following metrics is the BEST indicator of the performance of a web application?

Options:
A.

Server thread count

B.

Server uptime

C.

Average response time

D.

HTTP server error rate

Questions 174

Which of the following findings would be of GREATEST concern to an IS auditor reviewing the security architecture of an organization that has just implemented a Zero Trust solution?

Options:
A.

An increase in security-related costs

B.

User complaints about the new mode of working

C.

An increase in user identification errors

D.

A noticeable drop in the performance of IT systems

Questions 175

An IS auditor is tasked to review an organization's plan-do-check-act (PDCA) method for improving IT-related processes and wants to determine the accuracy of defined targets to be achieved. Which of the following steps in the PDCA process should the auditor PRIMARILY focus on in this situation?

Options:
A.

Check

B.

Plan

C.

Do

D.

Act

Questions 176

A business application's database is copied to a replication server within minutes. Which of the following processes taking place during business hours will MOST benefit from this architecture?

Options:
A.

Rolling forward of transactions when a production server fails

B.

Ad hoc batch reporting jobs from the replication server

C.

Analysis of application performance degradation

D.

Hardware replacement work involving databases

Questions 177

Which of the following BEST Indicates that an incident management process is effective?

Options:
A.

Decreased time for incident resolution

B.

Increased number of incidents reviewed by IT management

C.

Decreased number of calls lo the help desk

D.

Increased number of reported critical incidents

Questions 178

Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?

Options:
A.

The person who collected the evidence is not qualified to represent the case.

B.

The logs failed to identify the person handling the evidence.

C.

The evidence was collected by the internal forensics team.

D.

The evidence was not fully backed up using a cloud-based solution prior to the trial.

Questions 179

During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?

Options:
A.

Revise the assessment based on senior management's objections.

B.

Escalate the issue to audit management.

C.

Finalize the draft audit report without changes.

D.

Gather evidence to analyze senior management's objections

Questions 180

During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?

Options:
A.

The business case reflects stakeholder requirements.

B.

The business case is based on a proven methodology.

C.

The business case passed a quality review by an independent party.

D.

The business case identifies specific plans for cost allocation.

Questions 181

Which of the following presents the GREATEST risk of data leakage in the cloud environment?

Options:
A.

Lack of data retention policy

B.

Multi-tenancy within the same database

C.

Lack of role-based access

D.

Expiration of security certificate

Questions 182

Which of the following is the MOST effective accuracy control for entry of a valid numeric part number?

Options:
A.

Hash totals

B.

Online review of description

C.

Comparison to historical order pattern

D.

Self-checking digit

Questions 183

In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?

Options:
A.

Perform data recovery.

B.

Arrange for a secondary site.

C.

Analyze risk.

D.

Activate the call tree.

Questions 184

When reviewing an IT strategic plan, the GREATEST concern would be that

Options:
A.

an IT strategy committee has not been created

B.

the plan does not support relevant organizational goals.

C.

there are no key performance indicators (KPls).

D.

the plan was not formally approved by the board of directors

Questions 185

If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?

Options:
A.

Comparison of object and executable code

B.

Review of audit trail of compile dates

C.

Comparison of date stamping of source and object code

D.

Review of developer comments in executable code

Questions 186

During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?

Options:
A.

The project manager will have to be replaced.

B.

The project reporting to the board of directors will be incomplete.

C.

The project steering committee cannot provide effective governance.

D.

The project will not withstand a quality assurance (QA) review.

Questions 187

Retention periods and conditions for the destruction of personal data should be determined by the.

Options:
A.

risk manager.

B.

database administrator (DBA).

C.

privacy manager.

D.

business owner.

Questions 188

An IS auditor reviewing incident response management processes notices that resolution times for reoccurring incidents have not shown improvement. Which of the following is the auditor's BEST recommendation?

Options:
A.

Harden IT system and application components based on best practices.

B.

Incorporate a security information and event management (SIEM) system into incident response

C.

Implement a survey to determine future incident response training needs.

D.

Introduce problem management into incident response.

Questions 189

Which of the following should an IS auditor be MOST concerned with when a system uses RFID?

Options:
A.

privacy

B.

Maintainability

C.

Scalability

D.

Nonrepudiation

Questions 190

Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?

Options:
A.

adequate measurement of key risk indicators (KRIS)

B.

Inadequate alignment of IT plans and business objectives

C.

Inadequate business impact analysis (BIA) results and predictions

D.

Inadequate measurement of key performance indicators (KPls)

Questions 191

An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the

business continuity plan (BCP). Which of the following is the auditor's BEST course of action?

Options:
A.

Confirm the BCP has been recently updated.

B.

Review the effectiveness of the business response.

C.

Raise an audit issue for the lack of simulated testing.

D.

Interview staff members to obtain commentary on the BCP's effectiveness.

Questions 192

An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?

Options:
A.

Perform correlation analysis between incidents and investments.

B.

Downgrade security controls on low-risk systems.

C.

Introduce automated security monitoring tools.

D.

Re-evaluate the organization's risk and control framework.

Questions 193

Which of the following should be identified FIRST during the risk assessment process?

Options:
A.

Vulnerability to threats

B.

Existing controls

C.

Information assets

D.

Legal requirements

Questions 194

Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?

Options:
A.

Embed details within source code.

B.

Standardize file naming conventions.

C.

Utilize automated version control.

D.

Document details on a change register.

Questions 195

Which of the following is the MOST important control for virtualized environments?

Options:
A.

Regular updates of policies for the operation of the virtualized environment

B.

Hardening for the hypervisor and guest machines

C.

Redundancy of hardware resources and network components

D.

Monitoring utilization of resources at the guest operating system level

Questions 196

An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?

Options:
A.

Benchmark organizational performance against industry peers

B.

Implement key performance indicators (KPIs).

C.

Require executive management to draft IT strategy

D.

Implement annual third-party audits.

Questions 197

Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?

Options:
A.

Findings from prior audits

B.

Results of a risk assessment

C.

An inventory of personal devices to be connected to the corporate network

D.

Policies including BYOD acceptable user statements

Questions 198

What is the Most critical finding when reviewing an organization’s information security management?

Options:
A.

No dedicated security officer

B.

No official charier for the information security management system

C.

No periodic assessments to identify threats and vulnerabilities

D.

No employee awareness training and education program

Questions 199

Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?

Options:
A.

Reviewing vacation patterns

B.

Reviewing user activity logs

C.

Interviewing senior IT management

D.

Mapping IT processes to roles

Questions 200

IT disaster recovery time objectives (RTOs) should be based on the:

Options:
A.

maximum tolerable loss of data.

B.

nature of the outage

C.

maximum tolerable downtime (MTD).

D.

business-defined criticality of the systems.

Exam Code: CISA
Certification Provider: Isaca
Exam Name: Certified Information Systems Auditor
Last Update: May 13, 2025
Questions: 1404

Isaca Related Exams

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.