ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 09.09.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 09.09.2025
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance.
Which of the following is the GREATEST concern with this situation?
- A . Degradation of services
- B . Limited tolerance for damage
- C . Decreased mean time between failures (MTBF)
- D . Single point of failure
What is the MOST effective way to manage contractors‘ access to a data center?
- A . Badge identification worn by visitors
- B . Escort requirement for visitor access
- C . Management approval of visitor access
- D . Verification of visitor identification
Which of the following is the MOST effective way to detect as many abnormalities as possible during an IS audit?
- A . Conduct a walk-through of the process.
- B . Perform substantive testing on sampled records.
- C . Perform judgmental sampling of key processes.
- D . Use a data analytics tool to identify trends.
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
- A . Rotate job duties periodically.
- B . Perform an independent audit.
- C . Hire temporary staff.
- D . Implement compensating controls.
During an IS audit of a data center, it was found that programmers are allowed to make emergency fixes to operational programs.
Which of the following should be the IS auditor’s PRIMARY recommendation?
- A . Programmers should be allowed to implement emergency fixes only after obtaining verbal agreement from the application owner.
- B . Emergency program changes should be subject to program migration and testing procedures before they are applied to operational systems.
- C . Bypass user ID procedures should be put in place to ensure that the changes are subject to after-the-event approval and testing.
Which of the following system redundancy configurations BEST improves system resiliency and reduces the possibility of a single cause of failure impacting system dependability?
- A . Active redundancy
- B . Homogeneous redundancy
- C . Diverse redundancy
- D . Passive redundancy
Which of the following provides the BEST evidence of the validity and integrity of logs in an organization’s security information and event management (SIEM) system?
- A . Compliance testing
- B . Stop-or-go sampling
- C . Substantive testing
- D . Variable sampling
Which of the following is the MOST important responsibility of user departments associated with program changes?
- A . Providing unit test data
- B . Analyzing change requests
- C . Updating documentation lo reflect latest changes
- D . Approving changes before implementation
Which of the following is the MOST important responsibility of user departments associated with program changes?
- A . Providing unit test data
- B . Analyzing change requests
- C . Updating documentation lo reflect latest changes
- D . Approving changes before implementation
Which of the following BEST addresses the availability of an online store?
- A . RAID level 5 storage devices
- B . A mirrored site at another location
- C . Online backups
- D . Clustered architecture