ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 11.09.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 11.09.2025
To help determine whether a controls-reliant approach to auditing financial systems in a company should be used, which sequence of IS audit work is MOST appropriate?
- A . Review of the general IS controls followed by a review of the application controls
- B . Detailed examination of financial transactions followed by review of the general ledger
- C . Review of major financial applications followed by a review of IT governance processes
- D . Review of application controls followed by a test of key business process controls
Which of the following is a detective control?
- A . Programmed edit checks for data entry
- B . Backup procedures
- C . Use of pass cards to gain access to physical facilities
- D . Verification of hash totals
An external attacker spoofing an internal Internet Protocol (IP) address can BEST be detected by which of the following?
- A . Comparing the source address to the domain name server (DNS) entry
- B . Using static IP addresses for identification
- C . Comparing the source address to the interface used as the entry point
- D . Using a state table to compare the message states of each packet as it enters the system
An IS auditor engaged in developing the annual internal audit plan learns that the chief information officer (CIO) has requested there be no IS audits in the upcoming year as more time is needed to address a large number of recommendations from the previous year.
Which of the following should the auditor do FIRST
- A . Escalate to audit management to discuss the audit plan
- B . Notify the chief operating officer (COO) and discuss the audit plan risks
- C . Exclude IS audits from the upcoming year’s plan
- D . Increase the number of IS audits in the clan
An organization wants to classify database tables according to its data classification scheme From an IS auditor’s perspective the tables should be classified based on the:
- A . specific functional contents of each single table.
- B . frequency of updates to the table.
- C . descriptions of column names in the table.
- D . number of end users with access to the table.
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting.
What would be MOST important to consider before including this audit in the program?
- A . Whether system delays result in more frequent use of manual processing
- B . Whether the system’s performance poses a significant risk to the organization
- C . Whether stakeholders are committed to assisting with the audit
- D . Whether internal auditors have the required skills to perform the audit
Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization’s disaster recovery plan (DRP)?
- A . Performing a cyber resilience test
- B . Performing a full interruption test
- C . Performing a tabletop test
- D . Performing a parallel test
Which of the following BEST enables an organization to determine the effectiveness of its information security awareness program?
- A . Measuring user satisfaction with the quality of the training
- B . Evaluating the results of a social engineering exercise
- C . Reviewing security staff performance evaluations
- D . Performing an analysis of the number of help desk calls
Which of the following documents should define roles and responsibilities within an IT audit organization?
- A . Audit charter
- B . Annual audit plan
- C . Engagement letter
- D . Audit scope letter
Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?
- A . Using passwords to allow authorized users to send documents to the printer
- B . Requiring a key code to be entered on the printer to produce hard copy
- C . Encrypting the data stream between the user’s computer and the printer
- D . Producing a header page with classification level for printed documents