ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 08.09.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 08.09.2025
Which of the following BEST describes a digital signature?
- A . It is under control of the receiver.
- B . It is capable of authorization.
- C . It dynamically validates modifications of data.
- D . It is unique to the sender using it.
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization.
Which of the following should be recommended as the PRIMARY factor to determine system criticality?
- A . Key performance indicators (KPIs)
- B . Maximum allowable downtime (MAD)
- C . Recovery point objective (RPO)
- D . Mean time to restore (MTTR)
An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction.
Which of the following should the auditor do NEXT?
- A . Report the variance immediately to the audit committee
- B . Request an explanation of the variance from the auditee
- C . Increase the sample size to 100% of the population
- D . Exclude the transaction from the sample population
Which of the following is the BEST indicator for measuring performance of IT help desk function?
- A . Percentage of problems raised from incidents
- B . Mean time to categorize tickets
- C . Number 0t incidents reported
- D . Number of reopened tickets
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
- A . Requiring all users to encrypt documents before sending
- B . Installing firewalls on the corporate network
- C . Reporting all outgoing emails that are marked as confidential
- D . Monitoring all emails based on pre-defined criteria
Which of the following would be an auditor’s GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?
- A . Undocumented code formats data and transmits directly to the database.
- B . There is not a complete inventory of spreadsheets, and file naming is inconsistent.
- C . The department data protection policy has not been reviewed or updated for two years.
- D . Spreadsheets are accessible by all members of the finance department.
Which of the following is an example of shadow IT?
- A . An employee using a cloud based order management tool without approval from IT
- B . An employee using a company provided laptop to access personal banking information
- C . An employee using personal email to communicate with clients without approval from IT
- D . An employee using a company-provided tablet to access social media during work hours
Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?
- A . Ensure compliance with the data classification policy.
- B . Protect the plan from unauthorized alteration.
- C . Comply with business continuity best practice.
- D . Reduce the risk of data leakage that could lead to an attack.
Based on best practices, which types of accounts should be disabled for interactive login?
- A . Local accounts
- B . Administrator accounts
- C . Console accounts
- D . Service accounts
If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:
- A . filed in production for future reference in researching the problem.
- B . applied to the source code that reflects the version in production.
- C . eliminated from the source code that reflects the version in production.
- D . reinstalled when replacing the version back into production.