ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 11.09.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 11.09.2025
Which of the following should be an IS auditor’s GREATEST concern when reviewing an organization’s security controls for policy compliance?
- A . Security policies are not applicable across all business units
- B . End users are not required to acknowledge security policy training
- C . The security policy has not been reviewed within the past year
- D . Security policy documents are available on a public domain website
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
- A . Recipient’s public key
- B . Sender’s private key
- C . Sender’s public key
- D . Recipient’s private key
Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?
- A . Review of monthly performance reports submitted by the vendor
- B . Certifications maintained by the vendor
- C . Regular independent assessment of the vendor
- D . Substantive log file review of the vendor’s system
Which of the following is MOST helpful for understanding an organization’s key driver to modernize application platforms?
- A . Vendor software inventories
- B . Network architecture diagrams
- C . System-wide incident reports
- D . Inventory of end-of-life software
An organization has developed mature risk management practices that are followed across all departments.
What is the MOST effective way for the audit team to leverage this risk management maturity?
- A . Implementing risk responses on management’s behalf
- B . Integrating the risk register for audit planning purposes
- C . Providing assurances to management regarding risk
- D . Facilitating audit risk identification and evaluation workshops
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
- A . Staff were not involved in the procurement process, creating user resistance to the new system.
- B . Data is not converted correctly, resulting in inaccurate patient records.
- C . The deployment project experienced significant overruns, exceeding budget projections.
- D . The new system has capacity issues, leading to slow response times for users.
Which of the following poses the GREATEST risk to the use of active RFID tags?
- A . Session hijacking
- B . Eavesdropping
- C . Piggybacking
- D . Phishing attacks
Which of the following is MOST important for an IS auditor to review when determining whether IT investments are providing value to tie business?
- A . Return on investment (ROI)
- B . Business strategy
- C . Business cases
- D . Total cost of ownership (TCO)
Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?
- A . Write access to production program libraries
- B . Write access to development data libraries
- C . Execute access to production program libraries
- D . Execute access to development program libraries
Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?
- A . Establishing a risk appetite
- B . Establishing a risk management framework
- C . Validating enterprise risk management (ERM)
- D . Operating the risk management framework