ISACA CISA Certified Information Systems Auditor Online Training
ISACA CISA Online Training
The questions for CISA were last updated at Jul 18,2025.
- Exam Code: CISA
- Exam Name: Certified Information Systems Auditor
- Certification Provider: ISACA
- Latest update: Jul 18,2025
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
- A . Configure a single server as a primary authentication server and a second server as a secondary authentication server.
- B . Configure each authentication server as belonging to a cluster of authentication servers.
- C . Configure each authentication server and ensure that each disk of its RAID is attached to the primary controller.
- D . Configure each authentication server and ensure that the disks of each server form part of a duplex.
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
- A . allocation of resources during an emergency.
- B . frequency of system testing.
- C . differences in IS policies and procedures.
- D . maintenance of hardware and software compatibility.
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
- A . Phishing
- B . Using a dictionary attack of encrypted passwords
- C . Intercepting packets and viewing passwords
- D . Flooding the site with an excessive number of packets
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
- A . Effectiveness of the security program
- B . Security incidents vs. industry benchmarks
- C . Total number of hours budgeted to security
- D . Total number of false positives
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
- A . basis for allocating indirect costs.
- B . cost of replacing equipment.
- C . estimated cost of ownership.
- D . basis for allocating financial resources.
Which of the following is an audit reviewer’s PRIMARY role with regard to evidence?
- A . Ensuring unauthorized individuals do not tamper with evidence after it has been captured
- B . Ensuring evidence is sufficient to support audit conclusions
- C . Ensuring appropriate statistical sampling methods were used
- D . Ensuring evidence is labeled to show it was obtained from an approved source
Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?
- A . Identifying relevant roles for an enterprise IT governance framework
- B . Making decisions regarding risk response and monitoring of residual risk
- C . Verifying that legal, regulatory, and contractual requirements are being met
- D . Providing independent and objective feedback to facilitate improvement of IT processes
Which of the following is MOST important for an effective control self-assessment (CSA) program?
- A . Determining the scope of the assessment
- B . Performing detailed test procedures
- C . Evaluating changes to the risk environment
- D . Understanding the business process
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
- A . Senior management’s request
- B . Prior year’s audit findings
- C . Organizational risk assessment
- D . Previous audit coverage and scope
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
- A . Segregation of duties between staff ordering and staff receiving information assets
- B . Complete and accurate list of information assets that have been deployed
- C . Availability and testing of onsite backup generators
- D . Knowledge of the IT staff regarding data protection requirements