ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 09.05.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 09.05.2025
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
- A . Phishing
- B . Using a dictionary attack of encrypted passwords
- C . Intercepting packets and viewing passwords
- D . Flooding the site with an excessive number of packets
When assessing the overall effectiveness of an organization’s disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?
- A . Management contracts with a third party for warm site services.
- B . Management schedules an annual tabletop exercise.
- C . Management documents and distributes a copy of the plan to all personnel.
- D . Management reviews and updates the plan annually or as changes occur.
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
- A . Implementation plan
- B . Project budget provisions
- C . Requirements analysis
- D . Project plan
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system.
Which of the following is the IS auditors BEST recommendation?
- A . Enable automatic encryption decryption and electronic signing of data files
- B . implement software to perform automatic reconciliations of data between systems
- C . Have coders perform manual reconciliation of data between systems
- D . Automate the transfer of data between systems as much as feasible
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system.
Which of the following is the IS auditors BEST recommendation?
- A . Enable automatic encryption decryption and electronic signing of data files
- B . implement software to perform automatic reconciliations of data between systems
- C . Have coders perform manual reconciliation of data between systems
- D . Automate the transfer of data between systems as much as feasible
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
- A . Scalability
- B . Maintainability
- C . Nonrepudiation
- D . Privacy
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
- A . Documentation of exit routines
- B . System initialization logs
- C . Change control log
- D . Security system parameters
Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?
- A . Regression testing
- B . Unit testing
- C . Integration testing
- D . Acceptance testing
Which of the following would BEST guide an IS auditor when determining an appropriate time to schedule the follow-up of agreed corrective actions for reported audit issues?
- A . Progress updates indicate that the implementation of agreed actions is on track.
- B . Sufficient time has elapsed since implementation to provide evidence of control operation.
- C . Business management has completed the implementation of agreed actions on schedule.
- D . Regulators have announced a timeline for an inspection visit.
Which of the following should be the IS auditor’s PRIMARY focus, when evaluating an organization’s offsite storage facility?
- A . Shared facilities
- B . Adequacy of physical and environmental controls
- C . Results of business continuity plan (BCP) test
- D . Retention policy and period