ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 11.09.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 11.09.2025
In the development of a new financial application, the IS auditor’s FIRST involvement should be in the:
- A . control design.
- B . feasibility study.
- C . application design.
- D . system test.
Which of the following analytical methods would be MOST useful when trying to identify groups with similar behavior or characteristics in a large population?
- A . Deviation detection
- B . Cluster sampling
- C . Random sampling
- D . Classification
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
- A . Temperature sensors
- B . Humidity sensors
- C . Water sensors
- D . Air pressure sensors
A startup organization wants to develop a data loss prevention (DLP) program. The FIRST step should be to implement:
- A . Security awareness training
- B . Data encryption
- C . Data classification
- D . Access controls
One advantage of monetary unit sampling is the fact that
- A . results are stated m terms of the frequency of items in error
- B . it can easily be applied manually when computer resources are not available
- C . large-value population items are segregated and audited separately
- D . it increases the likelihood of selecting material items from the population
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
- A . Use of stateful firewalls with default configuration
- B . Ad hoc monitoring of firewall activity
- C . Misconfiguration of the firewall rules
- D . Potential back doors to the firewall software
Which type of risk would MOST influence the selection of a sampling methodology?
- A . Inherent
- B . Residual
- C . Control
- D . Detection
Who is PRIMARILY responsible for the design of IT controls to meet control objectives?
- A . Risk management
- B . Business management
- C . IT manager
- D . Internal auditor
Which of the following would be the GREATEST concern to an IS auditor when reviewing the outsourcing contract for an organization’s cloud service provider?
- A . There is no change management process defined in the contract.
- B . There are no procedures for incident escalation.
- C . There is no dispute resolution process defined in the contract.
- D . There is no right-to-audit clause defined in the contract.
Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls?
- A . The information security policy has not been approved by the chief audit executive (CAE).
- B . The information security policy does not include mobile device provisions
- C . The information security policy is not frequently reviewed
- D . The information security policy has not been approved by the policy owner