ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 08.09.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 08.09.2025
During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon.
Which of the following is the auditor’s BEST course of action?
- A . Report the deviation by the control owner in the audit report.
- B . Evaluate the implemented control to ensure it mitigates the risk to an acceptable level.
- C . Cancel the follow-up audit and reschedule for the next audit period.
- D . Request justification from management for not implementing the recommended control.
Which of the following should an IS auditor do FIRST when auditing a robotics process automation (RPA) implementation?
- A . Evaluate the overall solution architecture.
- B . Analyze the sequence of activities performed by the robot.
- C . Understand the business processes automated by the robot.
- D . Identity the credentials used by the robot and where they are stored.
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
- A . Conduct periodic onsite assessments using agreed-upon criteria.
- B . Conduct an unannounced vulnerability assessment of the vendor’s IT systems.
- C . Periodically review the service level agreement (SLA) with the vendor.
- D . Obtain evidence of the vendor’s control self-assessment (CSA).
As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:
- A . a host operating system.
- B . a guest operating system.
- C . any applications on the guest operating system.
- D . any applications on the host operating system.
Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?
- A . Conduct a data inventory and classification exercise.
- B . Identify approved data workflows across the enterprise_
- C . Conduct a threat analysis against sensitive data usage.
- D . Create the DLP policies and templates
During an organization’s implementation of a data loss prevention (DLP) solution, which of the following activities should be completed FIRST?
- A . Configuring reports
- B . Configuring rule sets
- C . Enabling detection points
- D . Establishing exceptions workflow
When conducting an audit of an organization’s use of AI in its customer service chatbots, an IS auditor should PRIMARILY focus on the:
- A . Safeguarding of personal data processing by the AI system.
- B . AI system’s compliance with industry security standards.
- C . Speed and accuracy of chatbot responses to customer queries.
- D . AI system’s ability to handle multiple customer queries at once.
How would an IS auditor BEST determine the effectiveness of a security awareness program?
- A . Review the results of social engineering tests.
- B . Evaluate management survey results.
- C . Interview employees to assess their security awareness.
- D . Review security awareness training quiz results.
Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?
- A . End-user computing (EUC) systems
- B . Email attachments
- C . Data sent to vendors
- D . New system applications
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months.
Which of the following is the BEST course of action?
- A . Require documentation that the finding will be addressed within the new system
- B . Schedule a meeting to discuss the issue with senior management
- C . Perform an ad hoc audit to determine if the vulnerability has been exploited
- D . Recommend the finding be resolved prior to implementing the new system