ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 10.09.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 10.09.2025
Which of the following observations regarding change management should be considered the MOST serious risk by an IS auditor?
- A . There is no software used to track change management.
- B . The change is not approved by the business owners.
- C . The change is deployed two weeks after approval.
- D . The development of the change is not cost-effective.
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
- A . Analyze whether predetermined test objectives were met.
- B . Perform testing at the backup data center.
- C . Evaluate participation by key personnel.
- D . Test offsite backup files.
Email required for business purposes is being stored on employees‘ personal devices.
Which of the following is an IS auditor’s BEST recommendation?
- A . Require employees to utilize passwords on personal devices
- B . Prohibit employees from storing company email on personal devices
- C . Ensure antivirus protection is installed on personal devices
- D . Implement an email containerization solution on personal devices
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
- A . Information security policy
- B . Industry standards
- C . Incident response plan
- D . Industry regulations
An IS auditor wants to inspect recent events in a system to observe failed authentications and password changes.
Which of the following is the MOST appropriate method to use for this purpose?
- A . Penetration testing
- B . Authenticated scanning
- C . Change management records
- D . System log review
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management’s decision.
Which of the following should be the IS auditor’s NEXT course of action?
- A . Accept management’s decision and continue the follow-up.
- B . Report the issue to IS audit management.
- C . Report the disagreement to the board.
- D . Present the issue to executive management.
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization’s information security policy?
- A . IT steering committee minutes
- B . Business objectives
- C . Alignment with the IT tactical plan
- D . Compliance with industry best practice
Which of the following would present the GREATEST risk within a release management process for a new application?
- A . Procedures are not updated to coincide with the production release schedule.
- B . Code is deployed to production without authorization.
- C . A newly added program may overwrite existing production files.
- D . An identified bug was not resolved.
What should an IS auditor evaluate FIRST when reviewing an organization’s response to new privacy legislation?
- A . Implementation plan for restricting the collection of personal information
- B . Privacy legislation in other countries that may contain similar requirements
- C . Operational plan for achieving compliance with the legislation
- D . Analysis of systems that contain privacy components
Which of the following responsibilities of an organization’s quality assurance (QA) function should raise concern for an IS auditor?
- A . Ensuring standards are adhered to within the development process
- B . Ensuring the test work supports observations
- C . Updating development methodology
- D . Implementing solutions to correct defects