ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 12.09.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 12.09.2025
When reviewing a business case for a proposed implementation of a third-party system, which of the following should be an IS auditor’s GREATEST concern?
- A . Lack of ongoing maintenance costs
- B . Lack of training materials
- C . Lack of plan for pilot implementation
- D . Lack of detailed work breakdown structure
Which of the following is the BEST way to detect unauthorized copies of licensed software on systems?
- A . Implement controls to prohibit downloads of unauthorized software.
- B . Conduct periodic software scanning.
- C . Perform periodic counting of licenses.
- D . Require senior management approval when installing licenses.
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
- A . Invoking the disaster recovery plan (DRP)
- B . Backing up data frequently
- C . Paying the ransom
- D . Requiring password changes for administrative accounts
Which of the following parameters reflects the risk threshold for an organization experiencing a service disruption?
- A . Maximum tolerable outage (MTO)
- B . Recovery point objective (RPO)
- C . Service delivery objective (SDO)
- D . Allowable interruption window (AIW)
Which of the following is MOST important for an IS auditor to assess during a post-implementation review of a newly modified IT application developed in-house?
- A . Sufficiency of implemented controls
- B . Resource management plan
- C . Updates required for end-user manuals
- D . Rollback plans for changes
Which of the following MOST effectively minimizes downtime during system conversions?
- A . Phased approach
- B . Direct cutover
- C . Pilot study
- D . Parallel run
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
- A . Walk-through reviews
- B . Substantive testing
- C . Compliance testing
- D . Design documentation reviews
Which of the following technologies is BEST suited to fulfill a business requirement for nonrepudiation of business-to-business transactions with external parties without the need for a mutually trusted entity?
- A . Public key infrastructure (PKI)
- B . Blockchain distributed ledger
- C . Artificial intelligence (Al)
- D . Centralized ledger technology
An organization plans to centrally decommission end-of-life databases and migrate the data to the latest model of hardware.
Which of the following BEST ensures data integrity is preserved during the migration?
- A . Reconciling sample data to most recent backups
- B . Obfuscating confidential data
- C . Encrypting the data
- D . Comparing checksums
The IS quality assurance (OA) group is responsible for:
- A . ensuring that program changes adhere to established standards.
- B . designing procedures to protect data against accidental disclosure.
- C . ensuring that the output received from system processing is complete.
- D . monitoring the execution of computer processing tasks.