ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 09.09.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 09.09.2025
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
- A . Blocking attachments in IM
- B . Blocking external IM traffic
- C . Allowing only corporate IM solutions
- D . Encrypting IM traffic
Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?
- A . Creating test data to facilitate the user acceptance testing (IJAT) process
- B . Managing employee onboarding processes and background checks
- C . Advising the steering committee on quality management issues and remediation efforts
- D . Implementing procedures to facilitate adoption of quality management best practices
Which of the following should be of GREATEST concern to an IS auditor reviewing project documentation for a client relationship management (CRM) system migration project?
- A . The technical migration is planned for a holiday weekend and end users may not be available.
- B . Five weeks prior to the target date, there are still numerous defects in the printing functionality.
- C . A single implementation phase is planned and the legacy system will be immediately decommissioned.
- D . Employees are concerned that data representation in the new system is completely different from the old system.
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts.
Which of the following is the BEST
recommendation to address this situation?
- A . Suspend contracts with third-party providers that handle sensitive data.
- B . Prioritize contract amendments for third-party providers.
- C . Review privacy requirements when contracts come up for renewal.
- D . Require third-party providers to sign nondisclosure agreements (NDAs).
An organization is enhancing the security of a client-facing web application following a proposal to acquire personal information for a business purpose.
Which of the following is MOST important to review before implementing this initiative?
- A . Regulatory compliance requirements
- B . Data ownership assignments
- C . Encryption capabilities
- D . Customer notification procedures
Which of the following is the MOST important success factor for implementing a data loss prevention (DLP) tool?
- A . Implementing the tool in monitor mode to avoid unnecessary blocking of communication
- B . Defining and configuring policies and tool rule sets to monitor sensitive data movement
- C . Testing the tool in a test environment before moving to the production environment
- D . Assigning responsibilities for maintaining the tool to applicable data owners and stakeholders
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster“
- A . Use an electronic vault for incremental backups
- B . Deploy a fully automated backup maintenance system.
- C . Periodically test backups stored in a remote location
- D . Use both tape and disk backup systems
Which of the following is a threat to IS auditor independence?
- A . Internal auditors share the audit plan and control test plans with management prior to audit commencement.
- B . Internal auditors design remediation plans to address control gaps identified by internal audit.
- C . Internal auditors attend IT steering committee meetings.
- D . Internal auditors recommend appropriate controls for systems in development.
An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country.
What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted application?
- A . Financial regulations affecting the organization
- B . Data center physical access controls whore the application is hosted
- C . Privacy regulations affecting the organization
- D . Per-unit cost charged by the hosting services provider for storage
During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system.
Which of the following is the auditor’s BEST recommendation?
- A . System administrators should ensure consistency of assigned rights.
- B . IT security should regularly revoke excessive system rights.
- C . Human resources (HR) should delete access rights of terminated employees.
- D . Line management should regularly review and request modification of access rights