ISACA CISA Certified Information Systems Auditor Online Training
ISACA CISA Online Training
The questions for CISA were last updated at Sep 06,2025.
- Exam Code: CISA
- Exam Name: Certified Information Systems Auditor
- Certification Provider: ISACA
- Latest update: Sep 06,2025
A proper audit trail of changes to server start-up procedures would include evidence of:
- A . subsystem structure.
- B . program execution.
- C . security control options.
- D . operator overrides.
Which of the following would be a result of utilizing a top-down maturity model process?
- A . A means of benchmarking the effectiveness of similar processes with peers
- B . A means of comparing the effectiveness of other processes within the enterprise
- C . Identification of older, more established processes to ensure timely review
- D . Identification of processes with the most improvement opportunities
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
- A . Agile auditing
- B . Continuous auditing
- C . Outsourced auditing
- D . Risk-based auditing
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
- A . Annual sign-off of acceptable use policy
- B . Regular monitoring of user access logs
- C . Security awareness training
- D . Formalized disciplinary action
Which of the following BEST guards against the risk of attack by hackers?
- A . Tunneling
- B . Encryption
- C . Message validation
- D . Firewalls
A system development project is experiencing delays due to ongoing staff shortages.
Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
- A . Implement overtime pay and bonuses for all development staff.
- B . Utilize new system development tools to improve productivity.
- C . Recruit IS staff to expedite system development.
- D . Deliver only the core functionality on the initial target date.
Which of the following should be done FIRST when planning a penetration test?
- A . Execute nondisclosure agreements (NDAs).
- B . Determine reporting requirements for vulnerabilities.
- C . Define the testing scope.
- D . Obtain management consent for the testing.
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions.
Which of the following is MOST important for the organization to ensure?
- A . The policy includes a strong risk-based approach.
- B . The retention period allows for review during the year-end audit.
- C . The total transaction amount has no impact on financial reporting.
- D . The retention period complies with data owner responsibilities.
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
- A . Rollback strategy
- B . Test cases
- C . Post-implementation review objectives
- D . Business case
Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization’s goals?
- A . Balanced scorecard
- B . Enterprise dashboard
- C . Enterprise architecture (EA)
- D . Key performance indicators (KPIs)