ISACA CISA Certified Information Systems Auditor Online Training
ISACA CISA Online Training
The questions for CISA were last updated at Sep 06,2025.
- Exam Code: CISA
- Exam Name: Certified Information Systems Auditor
- Certification Provider: ISACA
- Latest update: Sep 06,2025
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
- A . perform a business impact analysis (BIA).
- B . issue an intermediate report to management.
- C . evaluate the impact on current disaster recovery capability.
- D . conduct additional compliance testing.
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
- A . Monitor access to stored images and snapshots of virtual machines.
- B . Restrict access to images and snapshots of virtual machines.
- C . Limit creation of virtual machine images and snapshots.
- D . Review logical access controls on virtual machines regularly.
An IS auditor is examining a front-end subledger and a main ledger.
Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
- A . Double-posting of a single journal entry
- B . Inability to support new business transactions
- C . Unauthorized alteration of account attributes
- D . Inaccuracy of financial reporting
What is MOST important to verify during an external assessment of network vulnerability?
- A . Update of security information event management (SIEM) rules
- B . Regular review of the network security policy
- C . Completeness of network asset inventory
- D . Location of intrusion detection systems (IDS)
A data breach has occurred due lo malware.
Which of the following should be the FIRST course of action?
- A . Notify the cyber insurance company.
- B . Shut down the affected systems.
- C . Quarantine the impacted systems.
- D . Notify customers of the breach.
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
- A . The system does not have a maintenance plan.
- B . The system contains several minor defects.
- C . The system deployment was delayed by three weeks.
- D . The system was over budget by 15%.
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
- A . Frequent testing of backups
- B . Annual walk-through testing
- C . Periodic risk assessment
- D . Full operational test
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
- A . Invoking the disaster recovery plan (DRP)
- B . Backing up data frequently
- C . Paying the ransom
- D . Requiring password changes for administrative accounts
Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported.
Which of the following is the IS auditor’s BEST recommendation?
- A . Ensure corrected program code is compiled in a dedicated server.
- B . Ensure change management reports are independently reviewed.
- C . Ensure programmers cannot access code after the completion of program edits.
- D . Ensure the business signs off on end-to-end user acceptance test (UAT) results.
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
- A . business impact analysis (BIA).
- B . threat and risk assessment.
- C . business continuity plan (BCP).
- D . disaster recovery plan (DRP).