ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 25.04.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 25.04.2025
Which of the following is the BEST recommendation to drive accountability for achieving the desired outcomes specified in a benefits realization plan for an IT project?
- A . Document the dependencies between the project and other projects within the same program.
- B . Ensure that IT takes ownership for the delivery and tracking of all aspects of the benefits realization plan.
- C . Ensure that the project manager has formal authority for managing the benefits realization plan.
- D . Assign responsibilities, measures, and timelines for each identified benefit within the plan.
An IS auditor is reviewing a client’s outsourced payroll system to assess whether the financial audit team can rely on the application.
Which of the following findings would be the auditor’s GREATEST concern?
- A . User access rights have not been periodically reviewed by the client.
- B . Payroll processing costs have not been included in the IT budget.
- C . The third-party contract has not been reviewed by the legal department.
- D . The third-party contract does not comply with the vendor management policy.
When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on
- A . employee retention
- B . enterprise architecture (EA)
- C . future task updates
- D . task capacity output
Which of the following should an IS auditor consider FIRST when evaluating firewall rules?
- A . The organization’s security policy
- B . The number of remote nodes
- C . The firewalls‘ default settings
- D . The physical location of the firewalls
To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications.
Which of the following is MOST helpful to review when identifying which servers are no longer required?
- A . Performance feedback from the user community
- B . Contract with the server vendor
- C . Server CPU usage trends
- D . Mean time between failure (MTBF) of each server
In response to an audit finding regarding a payroll application, management implemented a new automated control.
Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?
- A . Approved test scripts and results prior to implementation
- B . Written procedures defining processes and controls
- C . Approved project scope document
- D . A review of tabletop exercise results
Which of the following control measures is the MOST effective against unauthorized access of confidential information on stolen or lost laptops?
- A . Remote wipe capabilities
- B . Disk encryption
- C . User awareness
- D . Password-protected files
An organization has partnered with a third party to transport backup drives to an offsite storage facility.
Which of the following is MOST important before sending the drives?
- A . Creating a chain of custody to accompany the drive in transit
- B . Ensuring data protection is aligned with the data classification policy
- C . Encrypting the drive with strong protection standards
- D . Ensuring the drive is placed in a tamper-evident mechanism
An organization’s security policy mandates that all new employees must receive appropriate security awareness training.
Which of the following metrics would BEST assure compliance with this policy?
- A . Percentage of new hires that have completed the training.
- B . Number of new hires who have violated enterprise security policies.
- C . Number of reported incidents by new hires.
- D . Percentage of new hires who report incidents
An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated.
Which of the following should be of MOST concern?
- A . Confidentiality of the user list
- B . Timeliness of the user list review
- C . Completeness of the user list
- D . Availability of the user list