ISACA CISA Übungsprüfungen
Zuletzt aktualisiert am 12.09.2025- Prüfungscode: CISA
- Prüfungsname: Certified Information Systems Auditor
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 12.09.2025
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
- A . Block all compromised network nodes.
- B . Contact law enforcement.
- C . Notify senior management.
- D . Identity nodes that have been compromised.
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
- A . Limit check
- B . Parity check
- C . Reasonableness check
- D . Validity check
Which of the following technologies BEST assists in protection of digital evidence as part of forensic investigation acquisition?
- A . Hardware-based media write blocker
- B . Data encryption
- C . Differential backups
- D . Source media sanitization
An organization has virtualized its server environment without making any other changes to the network or security infrastructure.
Which of the following is the MOST significant risk?
- A . Inability of the network intrusion detection system (IDS) to monitor virtual server-lo-server communications
- B . Vulnerability in the virtualization platform affecting multiple hosts
- C . Data center environmental controls not aligning with new configuration
- D . System documentation not being updated to reflect changes in the environment
A project team has decided to switch to an agile approach to develop a replacement for an existing business application.
Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?
- A . Compare the agile process with previous methodology.
- B . Identify and assess existing agile process control
- C . Understand the specific agile methodology that will be followed.
- D . Interview business process owners to compile a list of business requirements
Which of the following is MOST important when planning a network audit?
- A . Determination of IP range in use
- B . Analysis of traffic content
- C . Isolation of rogue access points
- D . Identification of existing nodes
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
- A . Comparing code between old and new systems
- B . Running historical transactions through the new system
- C . Reviewing quality assurance (QA) procedures
- D . Loading balance and transaction data to the new system
A small IT department has embraced DevOps, which allows members of this group to deploy code to production and maintain some development access to automate releases.
Which of the following is the MOST effective control?
- A . Enforce approval prior to deployment by a member of the team who has not taken part in the development.
- B . The DevOps team provides an annual policy acknowledgment that they did not develop and deploy the same code.
- C . Annual training reinforces the need to maintain segregation between developers and deployers of code
- D . The IT compliance manager performs weekly reviews to ensure the same person did not develop and deploy code.