ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 24.04.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 24.04.2025
The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
- A . Internal audit activity conforms with audit standards and methodology.
- B . The audit function is adequately governed and meets performance metrics.
- C . Inherent risk in audits is minimized.
- D . Audit resources are used most effectively.
Which of the following would BEST protect the confidentiality of sensitive data in transit between multiple offices?
- A . Hash algorithms
- B . Digital signatures
- C . Public key infrastructure (PKI)
- D . Kerberos
An IS auditor is reviewing a medical device that is attached to a patient’s body, which automatically takes and uploads measurements to a cloud server. Treatment may be updated based on the measurements.
Which of the following should be the auditor’s PRIMARY focus?
- A . Physical access controls on the device
- B . Security and quality certification of the device
- C . Device identification and authentication
- D . Confirmation that the device is regularly updated
Which of the following is the MOST important outcome of an information security program?
- A . Operating system weaknesses are more easily identified.
- B . Emerging security technologies are better understood and accepted.
- C . The cost to mitigate information security risk is reduced.
- D . Organizational awareness of security responsibilities is improved.
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
- A . Industry regulations
- B . Industry standards
- C . Incident response plan
- D . Information security policy
Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?
- A . Reviewing results from simulated high-demand stress test scenarios
- B . Performing a root cause analysis for past performance incidents
- C . Anticipating current service level agreements (SLAs) will remain unchanged
- D . Duplicating existing disk drive systems to improve redundancy and data storage
Which of the following would protect the confidentiality of information sent in email messages?
- A . Secure Hash Algorithm 1(SHA-1)
- B . Digital signatures
- C . Encryption
- D . Digital certificates
Which of the following is the MOST important task of an IS auditor during an application post-implementation review?
- A . Conduct a business impact analysis (BIA)
- B . Perform penetration testing
- C . identify project delays
- D . Verify user access controls
An IS auditor reviewing an organization’s IT systems finds that the organization frequently purchases systems that are incompatible with the technologies already in the organization.
Which of the following is the MOST likely reason?
- A . Ineffective risk management policy
- B . Lack of enterprise architecture (EA)
- C . Lack of a maturity model
- D . Outdated enterprise resource planning (ERP) system
An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system’s security settings Where would the auditor MOST likely find this information?
- A . System event correlation report
- B . Database log
- C . Change log
- D . Security incident and event management (SIEM) report