ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 26.04.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 26.04.2025
An IS auditor is assigned to perform a post-implementation review of an application system.
Which of the following would impair the auditor’s independence?
- A . The auditor implemented a specific control during the development of the system.
- B . The auditor provided advice concerning best practices.
- C . The auditor participated as a member of the project team without operational responsibilities
- D . The auditor designed an embedded audit module exclusively for audit
An IS auditor discovers from patch logs that some in-scope systems are not compliant with the regular patching schedule.
What should the auditor do NEXT?
- A . Interview IT management to clarify the current procedure.
- B . Report this finding to senior management.
- C . Review the organization’s patch management policy.
- D . Request a plan of action to be established as a follow-up item.
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization’s goals and strategic objectives?
- A . Enterprise architecture (EA)
- B . Business impact analysis (BIA)
- C . Risk assessment report
- D . Audit recommendations
Capacity management enables organizations to:
- A . forecast technology trends
- B . establish the capacity of network communication links
- C . identify the extent to which components need to be upgraded
- D . determine business transaction volumes.
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
- A . Unit testing
- B . Pilot testing
- C . System testing
- D . Integration testing
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available.
What should the auditor recommend be done FIRST?
- A . Implement a new system that can be patched.
- B . Implement additional firewalls to protect the system.
- C . Decommission the server.
- D . Evaluate the associated risk.
Which of the following is MOST important when creating a forensic image of a hard drive?
- A . Requiring an independent third party be present while imaging
- B . Securing a backup copy of the hard drive
- C . Generating a content hash of the hard drive
- D . Choosing an industry-leading forensics software tool
Which of the following presents the GREATEST risk of data leakage in the cloud environment?
- A . Lack of data retention policy
- B . Multi-tenancy within the same database
- C . Lack of role-based access
- D . Expiration of security certificate
Which of the following should be an IS auditor’s PRIMARY consideration when determining which issues to include in an audit report?
- A . Professional skepticism
- B . Management’s agreement
- C . Materiality
- D . Inherent risk
Which of the following is the MOST effective accuracy control for entry of a valid numeric part number?
- A . Hash totals
- B . Online review of description
- C . Comparison to historical order pattern
- D . Self-checking digit