ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 09.05.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 09.05.2025
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?
- A . An increase in the number of identified false positives
- B . An increase in the number of detected Incidents not previously identified
- C . An increase in the number of unfamiliar sources of intruders
- D . An increase in the number of internally reported critical incidents
During an audit which of the following would be MOST helpful in establishing a baseline for measuring data quality?
- A . Input from customers
- B . Industry standard business definitions
- C . Validation of rules by the business
- D . Built-in data error prevention application controls
During the forensic investigation of a cyberattack involving credit card data, which of the following is MOST important to ensure?
- A . Adequate card security features are activated.
- B . The company’s payment platforms are blocked.
- C . Proper chain of custody is maintained.
- D . All staff in the payment card unit are interviewed.
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
- A . Media recycling policy
- B . Media sanitization policy
- C . Media labeling policy
- D . Media shredding policy
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
- A . Independent reconciliation
- B . Re-keying of wire dollar amounts
- C . Two-factor authentication control
- D . System-enforced dual control
Which of the following will BEST ensure that archived electronic information of permanent importance remains accessible over time?
- A . Performing preventive maintenance on old hardware
- B . Acquiring applications that emulate old software
- C . Regularly migrating data to current technology
- D . Periodically backing up archived data
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
- A . Aligning the framework to industry best practices
- B . Establishing committees to support and oversee framework activities
- C . Involving appropriate business representation within the framework
- D . Documenting IT-related policies and procedures
Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?
- A . IT strategies are communicated to all Business stakeholders
- B . Organizational strategies are communicated to the chief information officer (CIO).
- C . Business stakeholders are Involved In approving the IT strategy.
- D . The chief information officer (CIO) is involved In approving the organizational strategies
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function.
In order to resolve the situation, the IS auditor’s BEST course of action would be to:
- A . re-prioritize the original issue as high risk and escalate to senior management.
- B . schedule a follow-up audit in the next audit cycle.
- C . postpone follow-up activities and escalate the alternative controls to senior audit management.
- D . determine whether the alternative controls sufficiently mitigate the risk.
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
- A . To optimize system resources
- B . To follow system hardening standards
- C . To optimize asset management workflows
- D . To ensure proper change control