ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 26.04.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 26.04.2025
Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?
- A . Degaussing
- B . Random character overwrite
- C . Physical destruction
- D . Low-level formatting
The use of which of the following would BEST enhance a process improvement program?
- A . Model-based design notations
- B . Balanced scorecard
- C . Capability maturity models
- D . Project management methodologies
An organization has recently implemented a Voice-over IP (VoIP) communication system.
Which of the following should be the IS auditor’s PRIMARY concern?
- A . A single point of failure for both voice and data communications
- B . Inability to use virtual private networks (VPNs) for internal traffic
- C . Lack of integration of voice and data communications
- D . Voice quality degradation due to packet toss
When auditing an organization’s software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
- A . feasibility study
- B . business case
- C . request for proposal (RFP)
- D . alignment with IT strategy
An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.
Which of the following is the BEST course of action to address this issue?
- A . Examine the workflow to identify gaps in asset-handling responsibilities.
- B . Escalate the finding to the asset owner for remediation.
- C . Recommend the drives be sent to the vendor for destruction.
- D . Evaluate the corporate asset-handling policy for potential gaps.
When reviewing whether IT investments are meeting business objectives, which of the following evaluations would be MOST useful?
- A . A break-even analysis
- B . Realized return on investment (ROI) versus projected ROI
- C . Budgeted spend versus actual spend
- D . Actual return on investment (ROI) versus industry average ROI
To develop meaningful recommendations ‚or findings, which of the following is MOST important ‚or an IS auditor to determine and understand?
- A . Root cause
- B . Responsible party
- C . impact
- D . Criteria
Which of the following would be of GREATEST concern to an IS auditor reviewing the feasibility study for a new application system?
- A . Security requirements have not been defined.
- B . Conditions under which the system will operate are unclear.
- C . The business case does not include well-defined strategic benefits.
- D . System requirements and expectations have not been clarified.
Which of the following should be used as the PRIMARY basis for prioritizing IT projects and initiatives?
- A . Estimated cost and time
- B . Level of risk reduction
- C . Expected business value
- D . Available resources
Which of the following BEST indicates to an IS auditor that an organization handles emergency changes appropriately and transparently?
- A . The application operations manual contains procedures to ensure emergency fixes do not compromise system integrity.
- B . Special logon IDs are used to grant programmers permanent access to the production environment.
- C . Change management controls are retroactively applied.
- D . Emergency changes are applied to production libraries immediately.