ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 26.04.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 26.04.2025
A current project to develop IT-based solutions will need additional funding to meet changes in business requirements. Who is BEST suited to obtain this additional funding?
- A . Project sponsor
- B . Project manager
- C . IT strategy committee
- D . Board of directors
The following findings are the result of an IS auditor’s post-implementation review of a newly implemented system.
Which of the following findings is of GREATEST significance?
- A . A lessons-learned session was never conducted.
- B . The projects 10% budget overrun was not reported to senior management.
- C . Measurable benefits were not defined.
- D . Monthly dashboards did not always contain deliverables.
A business application’s database is copied to a replication server within minutes.
Which of the following processes taking place during business hours will MOST benefit from this architecture?
- A . Rolling forward of transactions when a production server fails
- B . Ad hoc batch reporting jobs from the replication server
- C . Analysis of application performance degradation
- D . Hardware replacement work involving databases
An organization has implemented a distributed security administration system to replace the previous centralized one.
Which of the following presents the GREATEST potential concern?
- A . Security procedures may be inadequate to support the change
- B . A distributed security system is inherently a weak security system
- C . End-user acceptance of the new system may be difficult to obtain
- D . The new system will require additional resources
Which of the following findings from an IT governance review should be of GREATEST concern?
- A . The IT budget is not monitored
- B . All IT services are provided by third parties.
- C . IT value analysis has not been completed.
- D . IT supports two different operating systems.
Which of the following is the MOST efficient way to identify fraudulent activity on a set of
transactions?
- A . Control self-assessments (CSAs)
- B . Interviews with control owners
- C . Regression analysis
- D . Benford’s law analysis
An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company.
Which of the following would be MOST helpful In determining the effectiveness of the framework?
- A . Sell-assessment reports of IT capability and maturity
- B . IT performance benchmarking reports with competitors
- C . Recent third-party IS audit reports
- D . Current and previous internal IS audit reports
Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?
- A . Implement data loss prevention (DLP) software
- B . Review perimeter firewall logs
- C . Provide ongoing information security awareness training
- D . Establish behavioral analytics monitoring
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
- A . integrated test facility (ITF).
- B . parallel simulation.
- C . transaction tagging.
- D . embedded audit modules.
The following findings are the result of an IS auditor’s post-implementation review of a newly implemented system.
Which of the following findings is of GREATEST significance?
- A . A lessons learned session was never conducted.
- B . Monthly dashboards did not always contain deliverables.
- C . The project’s 10% budget overrun was not reported to senior management.
- D . Measurable benefits were not defined.