Pre-Summer Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 10
Total 457 questions
Exam Code: CISA                Update: Apr 15, 2026
Exam Name: Certified Information Systems Auditor

Isaca Certified Information Systems Auditor CISA Exam Dumps: Updated Questions & Answers (April 2026)

Question # 1

Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?

A.

Establish the timing of testing.

B.

Identify milestones.

C.

Determine the test reporting

D.

Establish the rules of engagement.

Question # 2

Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?

A.

Perimeter firewall

B.

Data loss prevention (DLP) system

C.

Web application firewall

D.

Network segmentation

Question # 3

Before the release of a new application into an organization’s production environment, which of the following should be in place to ensure that proper testing has occurred and rollback plans are in place?

A.

Change approval board

B.

Standardized change requests

C.

Independent third-party approval

D.

Secure code review

Question # 4

A configuration management audit identified that predefined automated procedures are used when deploying and configuring application infrastructure in a cloud-based

environment. Which of the following is MOST important for the IS auditor to review?

A.

Storage location of configuration management documentation

B.

Processes for making changes to cloud environment specifications

C.

Contracts of vendors responsible for maintaining provisioning tools

D.

Number of administrators with access to cloud management consoles

Question # 5

Which of the following is the BEST compensating control against separation of duties conflicts in new code development?

A.

Post-implementation change review

B.

Adding the developers to the change approval board

C.

Creation of staging environments

D.

A small number of people have access to deploy code

Question # 6

An IS auditor is reviewing a data conversion project Which of the following is the auditor ' s BEST recommendation prior to go-live?

A.

Review test procedures and scenarios

B.

Conduct a mock conversion test

C.

Establish a configuration baseline

D.

Automate the test scripts

Question # 7

In a data center audit, an IS auditor finds that the humidity level is very low. The IS auditor would be MOST concerned because of an expected increase in:

A.

risk of fire.

B.

backup tape failures.

C.

static electricity problems.

D.

employee discomfort.

Question # 8

If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:

A.

filed in production for future reference in researching the problem.

B.

applied to the source code that reflects the version in production.

C.

eliminated from the source code that reflects the version in production.

D.

reinstalled when replacing the version back into production.

Question # 9

During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility Which of the following is the IS auditor ' s BEST course of action?

A.

Escalate to IT management for resolution.

B.

Issue the finding without identifying an owner

C.

Assign shared responsibility to all IT teams.

D.

Determine the most appropriate team and assign accordingly.

Question # 10

Which of the following is the MOST important regulatory consideration for an organization determining whether to use its customer data to train AI algorithms?

A.

Documentation of AI algorithm accuracy during the training process

B.

Ethical and optimal utilization of data computing resources

C.

Collection of data and obtaining data subject consent

D.

Continuous monitoring of AI algorithm performance

Question # 11

An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)

A.

Biometrics

B.

Procedures for escorting visitors

C.

Airlock entrance

D.

Intruder alarms

Question # 12

Which of the following would be the GREATEST concern for an IS auditor conducting a pre-implementation review of a data loss prevention (DLP > tool?

A.

The tool is implemented in monitor mode rather than block mode.

B.

Crawlers are used to discover sensitive data.

C.

Deep packet inspection opens data packets in transit.

D.

Encryption keys are not centrally managed.

Question # 13

With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?

A.

A business impact analysis (BIA) has not been performed

B.

Business data is not sanitized in the development environment

C.

There is no plan for monitoring system downtime

D.

The process owner has not signed off on user acceptance testing (UAT)

Question # 14

An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?

A.

Procedures may not align with best practices

B.

Human resources (HR) records may not match system access.

C.

Unauthorized access cannot he identified.

D.

Access rights may not be removed in a timely manner.

Question # 15

Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?

A.

System flowchart

B.

Data flow diagram

C.

Process flowchart

D.

Entity-relationship diagram

Question # 16

An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?

A.

Computer-assisted technique

B.

Stratified sampling

C.

Statistical sampling

D.

Process walk-through

Question # 17

Which of the following provides the MOST assurance of the integrity of a firewall log?

A.

The log is reviewed on a monthly basis.

B.

Authorized access is required to view the log.

C.

The log cannot be modified.

D.

The log is retained per policy.

Question # 18

To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?

A.

Recipient ' s public key

B.

Sender ' s private key

C.

Sender ' s public key

D.

Recipient ' s private key

Question # 19

An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:

A.

well understood by all employees.

B.

based on industry standards.

C.

developed by process owners.

D.

updated frequently.

Question # 20

Which of the following should be of MOST concern to an IS auditor reviewing an organization’s business impact analysis (BIA)?

A.

A risk assessment was not conducted prior to completing the BIA.

B.

System criticality information was only provided by the IT manager.

C.

A questionnaire was used to gather information as opposed to in-person interviews.

D.

The BIA was not signed off by executive management.

Question # 21

When an intrusion into an organization network is deleted, which of the following should be done FIRST?

A.

Block all compromised network nodes.

B.

Contact law enforcement.

C.

Notify senior management.

D.

Identity nodes that have been compromised.

Question # 22

Which of the following BEST indicates that the effectiveness of an organization ' s security awareness program has improved?

A.

A decrease in the number of information security audit findings

B.

An increase in the number of staff who complete awareness training

C.

An increase in the number of phishing emails reported by employees

D.

A decrease in the number of malware outbreaks

Question # 23

If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?

A.

Comparison of object and executable code

B.

Review of audit trail of compile dates

C.

Comparison of date stamping of source and object code

D.

Review of developer comments in executable code

Question # 24

Which of the following is an audit reviewer ' s PRIMARY role with regard to evidence?

A.

Ensuring unauthorized individuals do not tamper with evidence after it has been captured

B.

Ensuring evidence is sufficient to support audit conclusions

C.

Ensuring appropriate statistical sampling methods were used

D.

Ensuring evidence is labeled to show it was obtained from an approved source

Question # 25

An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor ' s FIRST action should be to:

A.

recommend that the option to directly modify the database be removed immediately.

B.

recommend that the system require two persons to be involved in modifying the database.

C.

determine whether the log of changes to the tables is backed up.

D.

determine whether the audit trail is secured and reviewed.

Question # 26

The FIRST step in an incident response plan is to:

A.

validate the incident.

B.

notify the head of the IT department.

C.

isolate systems impacted by the incident.

D.

initiate root cause analysis.

Question # 27

An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?

A.

Monitoring access rights on a regular basis

B.

Referencing a standard user-access matrix

C.

Granting user access using a role-based model

D.

Correcting the segregation of duties conflicts

Question # 28

Which of the following BEST describes the concept of fault tolerance in system resiliency?

A.

It enables switching to redundant systems in case of faults.

B.

It minimizes downtime and ensures continuous operations.

C.

It allows systems to continue operating in the presence of faults.

D.

It distributes workloads across multiple servers to prevent overload.

Question # 29

Which of the following provides the BEST providence that outsourced provider services are being properly managed?

A.

The service level agreement (SLA) includes penalties for non-performance.

B.

Adequate action is taken for noncompliance with the service level agreement (SLA).

C.

The vendor provides historical data to demonstrate its performance.

D.

Internal performance standards align with corporate strategy.

Question # 30

which of the following is a core functionality of a configuration and release management system?

A.

Managing privileged access to databases servers and infrastructure

B.

Identifying vulnerabilities in configuration settings

C.

Deploying a configuration change to the sandbox environment

D.

Identifying other configuration items that will be impacted by a given change

Question # 31

In order to be useful, a key performance indicator (KPI) MUST

A.

be approved by management.

B.

be measurable in percentages.

C.

be changed frequently to reflect organizational strategy.

D.

have a target value.

Question # 32

Which of the following BEST Indicates that an incident management process is effective?

A.

Decreased time for incident resolution

B.

Increased number of incidents reviewed by IT management

C.

Decreased number of calls lo the help desk

D.

Increased number of reported critical incidents

Question # 33

Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?

A.

User acceptance testing (UAT)

B.

Black-box testing

C.

Regression testing

D.

Stress testing

Question # 34

Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?

A.

Standard operating procedures

B.

Service level agreements (SLAs)

C.

Roles and responsibility matrix

D.

Business resiliency

Question # 35

The PRIMARY benefit of automating application testing is to:

A.

provide test consistency.

B.

provide more flexibility.

C.

replace all manual test processes.

D.

reduce the time to review code.

Question # 36

Which of the following is MOST useful for determining the strategy for IT portfolio management?

A.

IT metrics dashboards

B.

IT roadmap

C.

Capability maturity model

D.

Life cycle cost-benefit analysis

Question # 37

Which of the following is the BEST way to ensure email confidentiality in transit?

A.

Encryption of corporate network traffic

B.

Complex user passwords

C.

End-to-end encryption

D.

Digital signatures

Question # 38

During which process is regression testing MOST commonly used?

A.

System modification

B.

Unit testing

C.

Stress testing

D.

Program development

Question # 39

An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?

A.

Inspecting a sample of alerts generated from the central log repository

B.

Comparing a list of all servers from the directory server against a list of all servers present in the central log repository

C.

Inspecting a sample of alert settings configured in the central log repository

D.

Comparing all servers included in the current central log repository with the listing used for the prior-year audit

Question # 40

To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?

A.

Review IT staff job descriptions for alignment

B.

Develop quarterly training for each IT staff member.

C.

Identify required IT skill sets that support key business processes

D.

Include strategic objectives m IT staff performance objectives

Question # 41

In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?

A.

Planning phase

B.

Execution phase

C.

Follow-up phase

D.

Selection phase

Question # 42

Which of the following should be an IS auditor ' s GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?

A.

Business interruption due to remediation

B.

IT budgeting constraints

C.

Availability of responsible IT personnel

D.

Risk rating of original findings

Question # 43

An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?

A.

Detective

B.

Compensating

C.

Corrective

D.

Directive

Question # 44

To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?

A.

Data retention

B.

Data minimization

C.

Data quality

D.

Data integrity

Question # 45

Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?

A.

Program coding standards have been followed

B.

Acceptance test criteria have been developed

C.

Data conversion procedures have been established.

D.

The design has been approved by senior management.

Question # 46

Capacity management enables organizations to:

A.

forecast technology trends

B.

establish the capacity of network communication links

C.

identify the extent to which components need to be upgraded

D.

determine business transaction volumes.

Question # 47

Which of the following is MOST important for an IS auditor to confirm when reviewing an organization ' s plans to implement robotic process automation (RPA > to automate routine business tasks?

A.

The end-to-end process is understood and documented.

B.

Roles and responsibilities are defined for the business processes in scope.

C.

A benchmarking exercise of industry peers who use RPA has been completed.

D.

A request for proposal (RFP) has been issued to qualified vendors.

Question # 48

An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?

A.

Report the variance immediately to the audit committee

B.

Request an explanation of the variance from the auditee

C.

Increase the sample size to 100% of the population

D.

Exclude the transaction from the sample population

Question # 49

If concurrent update transactions to an account are not processed properly, which of the following will be affected?

A.

Confidentiality

B.

Integrity

C.

Accountability

D.

Availability

Question # 50

Capacity management tools are PRIMARILY used to ensure that:

A.

available resources are used efficiently and effectively

B.

computer systems are used to their maximum capacity most of the time

C.

concurrent use by a large number of users is enabled

D.

proposed hardware acquisitions meet capacity requirements

Page: 1 / 10
Total 457 questions

Most Popular Certification Exams

Payment

       

Contact us

Site Secure

mcafee secure

TESTED 15 Apr 2026