ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 07.09.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 07.09.2025
How does a continuous integration/continuous development (CI/CD) process help to reduce software failure risk?
- A . Easy software version rollback
- B . Smaller incremental changes
- C . Fewer manual milestones
- D . Automated software testing
Which of the following is the BEST reason to implement a data retention policy?
- A . To limit the liability associated with storing and protecting information
- B . To document business objectives for processing data within the organization
- C . To assign responsibility and ownership for data protection outside IT
- D . To establish a recovery point detective (RPO) for (toaster recovery procedures
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged.
Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
- A . Trace a sample of complete PCR forms to the log of all program changes
- B . Use source code comparison software to determine whether any changes have been made to a sample of programs since the last audit date
- C . Review a sample of PCRs for proper approval throughout the program change process
- D . Trace a sample of program change from the log to completed PCR forms
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
- A . hire another person to perform migration to production.
- B . implement continuous monitoring controls.
- C . remove production access from the developers.
- D . perform a user access review for the development team
Effective separation of duties in an online environment can BEST be achieved by utilizing:
- A . appropriate supervision.
- B . transaction logging.
- C . written procedure manuals.
- D . access authorization tables.
Which of the following is an IS auditor’s BEST recommendation to help an organization increase the efficiency of computing resources?
- A . Virtualization
- B . Hardware upgrades
- C . Overclocking the central processing unit (CPU)
- D . Real-time backups
The operations team of an organization has reported an IS security attack.
Which of the following should be the FIRST step for the security incident response team?
- A . Report results to management
- B . Document lessons learned
- C . Perform a damage assessment
- D . Prioritize resources for corrective action
In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?
- A . Users are required to periodically rotate responsibilities
- B . Segregation of duties conflicts are periodically reviewed
- C . Data changes are independently reviewed by another group
- D . Data changes are logged in an outside application
Which of the following occurs during the issues management process for a system development project?
- A . Contingency planning
- B . Configuration management
- C . Help desk management
- D . Impact assessment
The FIRST step in an incident response plan is to:
- A . validate the incident.
- B . notify the head of the IT department.
- C . isolate systems impacted by the incident.
- D . initiate root cause analysis.