ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 10.09.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 10.09.2025
Which of the following is the GREATEST impact as a result of the ongoing deterioration of a detective control?
- A . Decreased effectiveness of root cause analysis
- B . Decreased overall recovery time
- C . Increased number of false negatives in security logs
- D . Increased demand for storage space for logs
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
- A . To improve traceability
- B . To prevent piggybacking
- C . To implement multi-factor authentication
- D . To reduce maintenance costs
Which of the following should be an IS auditor’s GREATEST concern when reviewing an organization’s security controls for policy compliance?
- A . The security policy has not been reviewed within the past year.
- B . Security policy documents are available on a public domain website.
- C . Security policies are not applicable across all business units.
- D . End users are not required to acknowledge security policy training.
Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?
- A . Timely audit execution
- B . Effective allocation of audit resources
- C . Reduced travel and expense costs
- D . Effective risk mitigation
An IS auditor finds that a recently deployed application has a number of developers with inappropriate update access left over from the testing environment.
Which of the following would have BEST prevented the update access from being migrated?
- A . Establishing a role-based matrix for provisioning users
- B . Re-assigning user access rights in the quality assurance (QA) environment
- C . Holding the application owner accountable for application security
- D . Including a step within the system development life cycle (SDLC) to clean up access prior to go-live
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
- A . Have an independent party review the source calculations
- B . Execute copies of EUC programs out of a secure library
- C . implement complex password controls
- D . Verify EUC results through manual calculations
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release.
Which of the following should the IS auditor review FIRST?
- A . Capacity management plan
- B . Training plans
- C . Database conversion results
- D . Stress testing results
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
- A . Insufficient processes to track ownership of each EUC application?
- B . Insufficient processes to lest for version control
- C . Lack of awareness training for EUC users
- D . Lack of defined criteria for EUC applications
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
- A . each information asset is to a assigned to a different classification.
- B . the security criteria are clearly documented for each classification
- C . Senior IT managers are identified as information owner.
- D . the information owner is required to approve access to the asset
Which of the following is the MOST important consideration when establishing operational log management?
- A . Types of data
- B . Log processing efficiency
- C . IT organizational structure
- D . Log retention period