ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 09.09.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 09.09.2025
Which of the following would be an IS auditor’s GREATEST concern when reviewing the organization’s business continuity plan (BCP)?
- A . The recovery plan does not contain the process and application dependencies.
- B . The duration of tabletop exercises is longer than the recovery point objective (RPO).
- C . The duration of tabletop exercises is longer than the recovery time objective (RTO).
- D . The recovery point objective (RPO) and recovery time objective (R TO) are not the same.
Which of the following is the BEST way to ensure a vendor complies with system security requirements?
- A . Require security training for vendor staff.
- B . Review past incidents reported by the vendor.
- C . Review past audits on the vendor’s security compliance.
- D . Require a compliance clause in the vendor contract.
An IS auditor is reviewing processes for importing market price data from external data providers.
Which of the following findings should the auditor consider MOST critical?
- A . The quality of the data is not monitored.
- B . Imported data is not disposed frequently.
- C . The transfer protocol is not encrypted.
- D . The transfer protocol does not require authentication.
Which of the following should be the PRIMARY concern for the it department head when implementing operational log management?
- A . Diversity of log formats generated by different IT resources
- B . Retention and storage issues due to log volume
- C . Resistance by operational users
- D . Impact on performance of IT resources
Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time?
- A . IT incident log
- B . Benchmarking studies
- C . Maturity model
- D . IT risk register
During an ongoing audit, management requests a briefing on the findings to date.
Which of the following is the IS auditor’s BEST course of action?
- A . Review working papers with the auditee.
- B . Request the auditee provide management responses.
- C . Request management wait until a final report is ready for discussion.
- D . Present observations for discussion only.
An IS auditor discovers that backups of critical systems are not being performed in accordance with the recovery point objective (RPO) established in the business continuity plan (BCP).
What should the auditor do NEXT?
- A . Request an immediate backup be performed.
- B . Expand the audit scope.
- C . Identify the root cause.
- D . Include the observation in the report.
From a risk management perspective, which of the following is the BEST approach when implementing a large and complex data center IT infrastructure?
- A . Simulating the new infrastructure before deployment
- B . Prototyping and a one-phase deployment
- C . A deployment plan based on sequenced phases
- D . A big bang deployment with a successful proof of concept
A proper audit trail of changes to server start-up procedures would include evidence of:
- A . subsystem structure.
- B . program execution.
- C . security control options.
- D . operator overrides.
Which of the following technologies has the SMALLEST maximum range for data transmission between devices?
- A . Wi-Fi
- B . Bluetooth
- C . Long-term evolution (LTE)
- D . Near-field communication (NFC)