Isaca CISA Practice Test - Questions Answers
List of questions
Related questions
Question 1
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Explanation:
The best recommendation for an IS auditor when finding that a third-party IT service provider hosts the organization's HR system in a foreign country is to conduct a privacy impact analysis. A privacy impact analysis is a systematic process that identifies and evaluates the potential risks and impacts of collecting, using, disclosing, and storing personal information. A privacy impact analysis will help the IS auditor to assess the legal, regulatory, contractual, and ethical obligations of the organization and the service provider regarding the protection of personal information. A privacy impact analysis will also help to identify and mitigate any privacy risks and gaps in the service level agreement.Reference:
CISA Certification | Certified Information Systems Auditor | ISACA
CISA Questions, Answers & Explanations Database
Question 2
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
Explanation:
The best way to enforce the principle of least privilege on a server containing data with different security classifications is to apply access controls determined by the data owner. The principle of least privilege states that users should only have the minimum level of access required to perform their tasks. The data owner is the person who has the authority and responsibility to classify, label, and protect the data according to its sensitivity and value. The data owner can define the access rights and permissions for each user or role based on the data classification policy and the business needs. This will ensure that only authorized and appropriate users can access the data and prevent unauthorized or excessive access that could compromise the confidentiality, integrity, or availability of the data.Reference:
CISA Review Manual (Digital Version)
CISA Questions, Answers & Explanations Database
Question 3
The PRIMARY benefit of automating application testing is to:
Explanation:
The primary benefit of automating application testing is to provide test consistency. Automated testing can ensure that the same test cases are executed in the same manner and order every time, which can improve the reliability and accuracy of the test results. Providing more flexibility, replacing all manual test processes, and reducing the time to review code are possible benefits of automating application testing, but they are not the primary benefit.Reference:
ISACA, CISA Review Manual, 27th Edition, 2020, p.3091
ISACA, CISA Review Questions, Answers & Explanations Database - 12 Month Subscription
Question 4
Which of the following BEST addresses the availability of an online store?
Explanation:
The primary benefit of automating application testing is to provide test consistency. Automated testing can ensure that the same test cases are executed in the same manner and order every time, which can improve the reliability and accuracy of the test results. Providing more flexibility, replacing all manual test processes, and reducing the time to review code are possible benefits of automating application testing, but they are not the primary benefit.Reference:
ISACA, CISA Review Manual, 27th Edition, 2020, p.3091
ISACA, CISA Review Questions, Answers & Explanations Database - 12 Month Subscription
Question 5
Which of the following is the BEST way to prevent social engineering incidents?
Explanation:
Maintaining an onboarding and annual security awareness program is the best way to prevent social engineering incidents because it can educate the users about the common techniques and tactics used by social engineers and how to avoid falling victim to them. Ensuring user workstations are running the most recent version of antivirus software, including security responsibilities in job descriptions and requiring signed acknowledgment, and enforcing strict email security gateway controls are all good security practices, but they do not directly address the human factor that is exploited by social engineering.Reference:
ISACA, CISA Review Manual, 27th Edition, 2020, p.3671
ISACA, CISA Review Questions, Answers & Explanations Database - 12 Month Subscription2
Question 6
The PRIMARY purpose of a configuration management system is to:
Explanation:
A configuration management system is a process that establishes and maintains the consistency of a product's attributes throughout its life cycle. It helps to identify and control the functional and physical characteristics of a product, and to record and report any changes to those characteristics. A configuration management system also supports the audit of the product to verify its conformance to requirements.
One of the key activities of a configuration management system is to define baselines for software. A baseline is a fixed reference point that serves as a basis for comparison and measurement. A baseline can be established for any configuration item, such as a requirement, a design document, a test plan, or a software component. A baseline helps to ensure that the software product meets its intended purpose and quality standards, and that any changes to the software are controlled and documented.
A configuration management system also supports other activities, such as tracking software updates, supporting the release procedure, and standardizing change approval, but these are not its primary purpose. Therefore, the other options are incorrect.
Question 7
Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?
Explanation:
The data retention policy for a global organization with regional offices in multiple countries should align with local laws and regulations, as they may vary significantly from one country to another and may impose different requirements and penalties for non-compliance.The policy should also consider the corporate policies and practices, the global best practices, and the business goals and objectives, but these are secondary to the legal compliance.Reference:CISA Review Manual (Digital Version), Chapter 5: Protection of Information Assets, Section 5.3: Data Classification and Protection
Question 8
Which of the following BEST enables alignment of IT with business objectives?
Explanation:
Leveraging an IT governance framework is the best way to enable alignment of IT with business objectives, as it provides a set of principles, standards, processes, and practices that guide the effective delivery of IT services that support the organization's strategy and goals.Benchmarking against peer organizations, developing key performance indicators (KPIs), and completing an IT risk assessment are useful activities that can help measure and improve the performance and value of IT, but they are not sufficient to ensure alignment without a governance framework.Reference:CISA Review Manual (Digital Version), Chapter 1: Information Systems Auditing Process, Section 1.2: IT Governance
Question 9
Which of the following are used in a firewall to protect the entity's internal resources?
Explanation:
Internet Protocol (IP) address restrictions are used in a firewall to protect the entity's internal resources by allowing or denying access to specific IP addresses or ranges of IP addresses based on predefined rules. Remote access servers, Secure Sockets Layers (SSLs), and failover services are not directly related to firewall protection, but rather to other aspects of network security, such as authentication, encryption, and availability.Reference:CISA Review Manual (Digital Version), Chapter 5: Protection of Information Assets, Section 5.2: Network Security Devices and Technologies
Question 10
Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?
Explanation:
Independence would be most impacted if an IS auditor were to assist with the implementation of recommended control enhancements, as this would create a conflict of interest and impair the objectivity and credibility of the IS auditor. Integrity, materiality, and accountability are important attributes of an IS auditor, but they are not directly affected by the involvement in the implementation of control enhancements.Reference:CISA Review Manual (Digital Version), Chapter 1: Information Systems Auditing Process, Section 1.1: IS Audit Standards, Guidelines and Codes of Ethics
Question