ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 25.04.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 25.04.2025
An IS auditor is reviewing a decision to consolidate processing for multiple applications onto a single large server.
Which of the following is the MOST significant impact from this decision?
- A . Higher operating system license fees
- B . More applications affected by a server outage
- C . Simplified asset management
- D . Fewer application servers requiring vulnerability scans
A bank performed minor changes to the interest calculation computer program.
Which of the following techniques would provide the STRONGEST evidence to determine whether the interest calculations are correct?
- A . Source code review
- B . Parallel simulation using audit software
- C . Manual verification of a sample of the results
- D . Review of the quality assurance (QA) test results
The PRIMARY benefit of automating application testing is to:
- A . provide test consistency.
- B . provide more flexibility.
- C . replace all manual test processes.
- D . reduce the time to review code.
Which of the following responses to risk associated with separation of duties would incur the LOWEST initial cost?
- A . Risk mitigation
- B . Risk acceptance
- C . Risk transference
- D . Risk reduction
Which of the following constitutes an effective detective control in a distributed processing environment?
- A . A log of privileged account use is reviewed.
- B . A disaster recovery plan (DRP)4% in place for the entire system.
- C . User IDs are suspended after three incorrect passwords have been entered.
- D . Users are required to request additional access via an electronic mail system.
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers.
How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
- A . Conduct a walk-through to view results of an employee plugging in a device to transfer confidential data.
- B . Review compliance with data loss and applicable mobile device user acceptance policies.
- C . Verify the data loss prevention (DLP) tool is properly configured by the organization.
- D . Verify employees have received appropriate mobile device security awareness training.
Which of the following is the BEST way for an IS auditor to assess the design of an automated application control?
- A . Interview the application developer.
- B . Obtain management attestation and sign-off.
- C . Review the application implementation documents.
- D . Review system configuration parameters and output.
An IS auditor is reviewing an artificial intelligence (Al) and expert system application. The system has produced several critical errors with severe impact.
Which of the following should the IS auditor do NEXT to understand the cause of the errors?
- A . Review the decision-making logic built into the system.
- B . Interview the system owner.
- C . Understand the purpose and functionality of the system.
- D . Verify system adherence to corporate policy.
Which of the following is the BEST way to ensure an organization’s data classification policies are preserved during the process of data transformation?
- A . Map data classification controls to data sets.
- B . Control access to extract, transform, and load (ETL) tools.
- C . Conduct a data discovery exercise across all business applications.
- D . Implement classification labels in metadata during data creation.
Which of the following should be used to evaluate an IT development project before an investment is committed?
- A . Earned value analysis (EVA)
- B . Rapid application development
- C . Function point analysis
- D . Feasibility study