ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 07.05.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 07.05.2025
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner.
Which of the following is the auditor’s BEST recommendation?
- A . Increase the capacity of existing systems.
- B . Upgrade hardware to newer technology.
- C . Hire temporary contract workers for the IT function.
- D . Build a virtual environment.
Which of the following criteria is MOST important for the successful delivery of benefits from an IT project?
- A . Assessing the impact of changes to individuals and business units within the organization
- B . Involving key stakeholders during the development and execution phases of the project
- C . Ensuring that IT project managers have sign-off authority on the business case
- D . Quantifying the size of the software development effort required by the project
An organization is establishing a steering committee for the implementation of a new enterprise resource planning (ERP) system that uses Agile project management methodology.
What is the MOST important criterion for the makeup of this committee?
- A . Senior management representation
- B . Ability to meet the time commitment required
- C . Agile project management experience
- D . ERP implementation experience
Which of the following encryption methods offers the BEST wireless security?
- A . Wi-Fi Protected Access 3 (WPA3)
- B . Data Encryption Standard (DES)
- C . Wired Equivalent Privacy (WEP)
- D . Secure Sockets Layer (SSL)
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
- A . Restricting program functionality according to user security profiles
- B . Restricting access to update programs to accounts payable staff only
- C . Including the creator’s user ID as a field in every transaction record created
- D . Ensuring that audit trails exist for transactions
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users‘ computers.
Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
- A . An imaging process was used to obtain a copy of the data from each computer.
- B . The legal department has not been engaged.
- C . The chain of custody has not been documented.
- D . Audit was only involved during extraction of the Information
Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?
- A . Data storage costs
- B . Data classification
- C . Vendor cloud certification
- D . Service level agreements (SLAs)
Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?
- A . Preventive
- B . Deterrent
- C . Corrective
- D . Detective
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
- A . Utilize a network-based firewall.
- B . Conduct regular user security awareness training.
- C . Perform domain name system (DNS) server security hardening.
- D . Enforce a strong password policy meeting complexity requirement.
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
- A . Project segments are established.
- B . The work is separated into phases.
- C . The work is separated into sprints.
- D . Project milestones are created.