ISACA CISA Certified Information Systems Auditor Online Training
ISACA CISA Online Training
The questions for CISA were last updated at Sep 07,2025.
- Exam Code: CISA
- Exam Name: Certified Information Systems Auditor
- Certification Provider: ISACA
- Latest update: Sep 07,2025
Cross-site scripting (XSS) attacks are BEST prevented through:
- A . application firewall policy settings.
- B . a three-tier web architecture.
- C . secure coding practices.
- D . use of common industry frameworks.
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
- A . Implementation plan
- B . Project budget provisions
- C . Requirements analysis
- D . Project plan
An organization has outsourced its data processing function to a service provider.
Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
- A . Assessment of the personnel training processes of the provider
- B . Adequacy of the service provider’s insurance
- C . Review of performance against service level agreements (SLAs)
- D . Periodic audits of controls by an independent auditor
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
- A . communicate via Transport Layer Security (TLS),
- B . block authorized users from unauthorized activities.
- C . channel access only through the public-facing firewall.
- D . channel access through authentication.
Coding standards provide which of the following?
- A . Program documentation
- B . Access control tables
- C . Data flow diagrams
- D . Field naming conventions
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management’s decision.
Which of the following should be the IS auditor’s NEXT course of action?
- A . Accept management’s decision and continue the follow-up.
- B . Report the issue to IS audit management.
- C . Report the disagreement to the board.
- D . Present the issue to executive management.
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
- A . is more effective at suppressing flames.
- B . allows more time to abort release of the suppressant.
- C . has a decreased risk of leakage.
- D . disperses dry chemical suppressants exclusively.
Which of the following is MOST important with regard to an application development acceptance test?
- A . The programming team is involved in the testing process.
- B . All data files are tested for valid information before conversion.
- C . User management approves the test design before the test is started.
- D . The quality assurance (QA) team is in charge of the testing process.
An organization’s enterprise architecture (EA) department decides to change a legacy system’s components while maintaining its original functionality.
Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
- A . The current business capabilities delivered by the legacy system
- B . The proposed network topology to be used by the redesigned system
- C . The data flows between the components to be used by the redesigned system
- D . The database entity relationships within the legacy system
An IS auditor is evaluating an organization’s IT strategy and plans.
Which of the following would be of GREATEST concern?
- A . There is not a defined IT security policy.
- B . The business strategy meeting minutes are not distributed.
- C . IT is not engaged in business strategic planning.
- D . There is inadequate documentation of IT strategic planning.