ISACA CISA Certified Information Systems Auditor Online Training
ISACA CISA Online Training
The questions for CISA were last updated at Sep 07,2025.
- Exam Code: CISA
- Exam Name: Certified Information Systems Auditor
- Certification Provider: ISACA
- Latest update: Sep 07,2025
Which of the following strategies BEST optimizes data storage without compromising data retention practices?
- A . Limiting the size of file attachments being sent via email
- B . Automatically deleting emails older than one year
- C . Moving emails to a virtual email vault after 30 days
- D . Allowing employees to store large emails on flash drives
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
- A . Align service level agreements (SLAs) with current needs.
- B . Monitor customer satisfaction with the change.
- C . Minimize costs related to the third-party agreement.
- D . Ensure right to audit is included within the contract.
To confirm integrity for a hashed message, the receiver should use:
- A . the same hashing algorithm as the sender’s to create a binary image of the file.
- B . a different hashing algorithm from the sender’s to create a binary image of the file.
- C . the same hashing algorithm as the sender’s to create a numerical representation of the file.
- D . a different hashing algorithm from the sender’s to create a numerical representation of the file.
Which of the following is MOST important to ensure when planning a black box penetration test?
- A . The management of the client organization is aware of the testing.
- B . The test results will be documented and communicated to management.
- C . The environment and penetration test scope have been determined.
- D . Diagrams of the organization’s network architecture are available.
Which of the following is the BEST method to safeguard data on an organization’s laptop computers?
- A . Disabled USB ports
- B . Full disk encryption
- C . Biometric access control
- D . Two-factor authentication
An IS auditor is planning an audit of an organization’s accounts payable processes.
Which of the following controls is MOST important to assess in the audit?
- A . Segregation of duties between issuing purchase orders and making payments.
- B . Segregation of duties between receiving invoices and setting authorization limits
- C . Management review and approval of authorization tiers
- D . Management review and approval of purchase orders
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
- A . Incident monitoring togs
- B . The ISP service level agreement
- C . Reports of network traffic analysis
- D . Network topology diagrams
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers.
During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
- A . Review system and error logs to verify transaction accuracy.
- B . Review input and output control reports to verify the accuracy of the system decisions.
- C . Review signed approvals to ensure responsibilities for decisions of the system are well defined.
- D . Review system documentation to ensure completeness.
What is the BEST control to address SQL injection vulnerabilities?
- A . Unicode translation
- B . Secure Sockets Layer (SSL) encryption
- C . Input validation
- D . Digital signatures
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization’s website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur.
Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
- A . Assign responsibility for improving data quality.
- B . Invest in additional employee training for data entry.
- C . Outsource data cleansing activities to reliable third parties.
- D . Implement business rules to validate employee data entry.