ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 10.09.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 10.09.2025
What is the Most critical finding when reviewing an organization’s information security management?
- A . No dedicated security officer
- B . No official charier for the information security management system
- C . No periodic assessments to identify threats and vulnerabilities
- D . No employee awareness training and education program
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
- A . Voice recovery
- B . Alternative routing
- C . Long-haul network diversity
- D . Last-mile circuit protection
During which process is regression testing MOST commonly used?
- A . System modification
- B . Unit testing
- C . Stress testing
- D . Program development
Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?
- A . The policy aligns with corporate policies and practices.
- B . The policy aligns with global best practices.
- C . The policy aligns with business goals and objectives.
- D . The policy aligns with local laws and regulations.
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
- A . Classifies documents to correctly reflect the level of sensitivity of information they contain
- B . Defines the conditions under which documents containing sensitive information may be transmitted
- C . Classifies documents in accordance with industry standards and best practices
- D . Ensures documents are handled in accordance With the sensitivity of information they contain
A disaster recovery plan (DRP) should include steps for:
- A . assessing and quantifying risk.
- B . negotiating contracts with disaster planning consultants.
- C . identifying application control requirements.
- D . obtaining replacement supplies.
Management receives information indicating a high level of risk associated with potential flooding near the organization’s data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground.
Which approach has been adopted?
- A . Risk avoidance
- B . Risk transfer
- C . Risk acceptance
- D . Risk reduction
Which of the following is MOST helpful for evaluating benefits realized by IT projects?
- A . Benchmarking IT project management practices with industry peers
- B . Evaluating compliance with key security controls
- C . Comparing planned versus actual return on investment (ROI)
- D . Reviewing system development life cycle (SDLC) processes
When developing customer-facing IT applications, in which stage of the system development life cycle (SDLC) is it MOST beneficial to consider data privacy principles?
- A . Systems design and architecture
- B . Software selection and acquisition
- C . User acceptance testing (UAT)
- D . Requirements definition
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system.
Which of the following is the IS auditor’s BEST recommendation for a compensating control?
- A . Require written authorization for all payment transactions
- B . Restrict payment authorization to senior staff members.
- C . Reconcile payment transactions with invoices.
- D . Review payment transaction history