ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 02.11.2025- Prüfungscode: CISA
 - Prüfungsname: Certified Information Systems Auditor
 - Zertifizierungsanbieter: ISACA
 - Zuletzt aktualisiert am: 02.11.2025
 
Which of the following is the GREATEST impact as a result of the ongoing deterioration of a detective control?
- A . Decreased effectiveness of root cause analysis
 - B . Decreased overall recovery time
 - C . Increased number of false negatives in security logs
 - D . Increased demand for storage space for logs
 
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
- A . To improve traceability
 - B . To prevent piggybacking
 - C . To implement multi-factor authentication
 - D . To reduce maintenance costs
 
Which of the following should be an IS auditor’s GREATEST concern when reviewing an organization’s security controls for policy compliance?
- A . The security policy has not been reviewed within the past year.
 - B . Security policy documents are available on a public domain website.
 - C . Security policies are not applicable across all business units.
 - D . End users are not required to acknowledge security policy training.
 
Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?
- A . Timely audit execution
 - B . Effective allocation of audit resources
 - C . Reduced travel and expense costs
 - D . Effective risk mitigation
 
An IS auditor finds that a recently deployed application has a number of developers with inappropriate update access left over from the testing environment.
Which of the following would have BEST prevented the update access from being migrated?
- A . Establishing a role-based matrix for provisioning users
 - B . Re-assigning user access rights in the quality assurance (QA) environment
 - C . Holding the application owner accountable for application security
 - D . Including a step within the system development life cycle (SDLC) to clean up access prior to go-live
 
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
- A . Have an independent party review the source calculations
 - B . Execute copies of EUC programs out of a secure library
 - C . implement complex password controls
 - D . Verify EUC results through manual calculations
 
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release.
Which of the following should the IS auditor review FIRST?
- A . Capacity management plan
 - B . Training plans
 - C . Database conversion results
 - D . Stress testing results
 
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
- A . Insufficient processes to track ownership of each EUC application?
 - B . Insufficient processes to lest for version control
 - C . Lack of awareness training for EUC users
 - D . Lack of defined criteria for EUC applications
 
When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.
- A . each information asset is to a assigned to a different classification.
 - B . the security criteria are clearly documented for each classification
 - C . Senior IT managers are identified as information owner.
 - D . the information owner is required to approve access to the asset
 
Which of the following is the MOST important consideration when establishing operational log management?
- A . Types of data
 - B . Log processing efficiency
 - C . IT organizational structure
 - D . Log retention period