Practice Free CISA Exam Online Questions
An organization is disposing of removable onsite media which contains sensitive information.
Which of the following is the MOST effective method to prevent disclosure of sensitive data?
- A . Encrypting and destroying keys
- B . Machine shredding
- C . Software formatting
- D . Wiping and rewriting three times
B
Explanation:
Machine shredding is the process of using a shredding machine to physically destroy the media and make the data unrecoverable. This is more effective than software formatting, which only erases the data logically and may leave traces that can be recovered by special tools1. Encrypting and destroying keys may prevent unauthorized access to the data, but it does not erase the data from the media. Wiping and rewriting three times is unnecessary and may reduce the lifespan of the media, especially for solid state drives2. Machine shredding is also recommended by various security standards and guidelines for media disposal345.
Which of the following concerns is MOST effectively addressed by implementing an IT framework for alignment between IT and business objectives?
- A . Inaccurate business impact analysis (BIA)
- B . Inadequate IT change management practices
- C . Lack of a benchmark analysis
- D . Inadequate IT portfolio management
D
Explanation:
An IT framework for alignment between IT and business objectives is a set of principles, guidelines, and practices that help an organization to ensure that its IT investments support its strategic goals, deliver value, manage risks, and optimize resources. One of the benefits of implementing such a framework is that it enables an effective IT portfolio management, which is the process of selecting, prioritizing, monitoring, and evaluating the IT projects and services that comprise the IT portfolio. An IT portfolio is a collection of IT assets, such as applications, infrastructure, data, and capabilities, that are aligned with the business needs and objectives.
An IT portfolio management helps an organization to achieve the following outcomes:
Align the IT portfolio with the business strategy and vision
Balance the IT portfolio among different types of investments, such as innovation, growth, maintenance, and compliance
Optimize the IT portfolio performance, value, and risk
Enhance the IT portfolio decision-making and governance
Improve the IT portfolio communication and transparency
Therefore, an inadequate IT portfolio management is a major concern that can be addressed by implementing an IT framework for alignment between IT and business objectives. An inadequate IT portfolio management can result in the following issues:
Misalignment of the IT portfolio with the business needs and expectations
Imbalance of the IT portfolio among competing demands and priorities
Suboptimal use of the IT resources and capabilities
Lack of visibility and accountability of the IT portfolio outcomes and impacts
Poor communication and collaboration among the IT portfolio stakeholders
The other possible options are:
Inaccurate business impact analysis (BIA): A BIA is a process of identifying and assessing the potential effects of a disruption or disaster on the critical business functions and processes. A BIA helps an organization to determine the recovery priorities, objectives, and strategies for its business continuity plan. A BIA is not directly related to an IT framework for alignment between IT and business objectives, although it may use some inputs from the IT portfolio management. Therefore, an inaccurate BIA is not a concern that can be effectively addressed by implementing an IT framework for alignment between IT and business objectives.
Inadequate IT change management practices: IT change management is a process of controlling and managing the changes to the IT environment, such as hardware, software, configuration, or documentation. IT change management helps an organization to minimize the risks and disruptions caused by the changes, ensure the quality and consistency of the changes, and align the changes with the business requirements. IT change management is not directly related to an IT framework for alignment between IT and business objectives, although it may support some aspects of the IT portfolio management. Therefore, inadequate IT change management practices are not a concern that can be effectively addressed by implementing an IT framework for alignment between IT and business objectives.
Lack of a benchmark analysis: A benchmark analysis is a process of comparing an organization’s performance, processes, or practices with those of other organizations or industry standards. A benchmark analysis helps an organization to identify its strengths and weaknesses, set realistic goals and targets, and implement best practices for improvement. A benchmark analysis is not directly related to an IT framework for alignment between IT and business objectives, although it may provide some insights for the IT portfolio management. Therefore, lack of a benchmark analysis is not a concern that can be effectively addressed by implementing an IT framework for alignment between IT and business objectives.
Reference: 1: What is Portfolio Management? | Smartsheet 2: What Is Portfolio Management? – Definition from Techopedia 3: What Is Project Portfolio Management (PPM)? |ProjectManager.com 4: What Is Business Impact Analysis? | Smartsheet 5: What Is Change Management? – Definition from Techopedia 6: Benchmarking – Wikipedia
Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program’?
- A . Only new employees are required to attend the program
- B . Metrics have not been established to assess training results
- C . Employees do not receive immediate notification of results
- D . The timing for program updates has not been determined
B
Explanation:
The greatest concern for an IS auditor reviewing an online security awareness program is that metrics have not been established to assess training results. Without metrics, it is difficult to measure the effectiveness of the program and identify areas for improvement. The other findings are also issues that need to be addressed, but they are not as significant as the lack of metrics.
Reference: CISA Review Manual (Digital Version), Chapter 5, Section 5.3.11
When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?
- A . The IS audit staff has a high level of experience.
- B . It is expected that the population is error-free.
- C . Proper segregation of duties is in place.
- D . The data can be directly changed by users.
B
Explanation:
The best situation that justifies the use of a smaller sample size when testing the accuracy of transaction data is B. It is expected that the population is error-free. The sample size is the number of items selected from the population for testing. The sample size depends on various factors, such as the level of confidence, the tolerable error rate, the expected error rate, and the variability of the population. A smaller sample size means that fewer items are tested, which reduces the cost and time of testing, but also increases the sampling risk (the risk that the sample is not representative of the population).
One of the factors that affects the sample size is the expected error rate, which is the auditor’s best estimate of the proportion of errors in the population before testing. A higher expected error rate means that more errors are likely to be found in the population, which requires a larger sample size to provide sufficient evidence for the auditor’s conclusion. A lower expected error rate means that fewer errors are likely to be found in the population, which allows a smaller sample size to provide sufficient evidence for the auditor’s conclusion. Therefore, if it is expected that the population is error-free (i.e., the expected error rate is zero or very low), a smaller sample size can be justified.
The other situations do not justify the use of a smaller sample size when testing the accuracy of transaction data.
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor’s BEST course of action?
- A . Require the auditee to address the recommendations in full.
- B . Adjust the annual risk assessment accordingly.
- C . Evaluate senior management’s acceptance of the risk.
- D . Update the audit program based on management’s acceptance of risk.
C
Explanation:
The best course of action for an IS auditor who finds that some critical recommendations have not been implemented is to evaluate senior management’s acceptance of the risk. The IS auditor should understand the reasons why the recommendations have not been implemented and the implications for the organization’s risk exposure. The IS auditor should also verify that senior management has formally acknowledged and accepted the residual risk and has documented the rationale and justification for their decision. The IS auditor should communicate the findings and the risk acceptance to the audit committee and other relevant stakeholders.
Reference: CISA Review Manual (Digital Version)
CISA Questions, Answers & Explanations Database
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
- A . Network penetration tests are not performed
- B . The network firewall policy has not been approved by the information security officer.
- C . Network firewall rules have not been documented.
- D . The network device inventory is incomplete.
A
Explanation:
The finding that should be ranked as the highest risk is that network penetration tests are not performed. Network penetration tests are simulated cyberattacks that aim to identify and exploit the vulnerabilities and weaknesses of the network security controls, such as firewalls, routers, switches, servers, and devices. Network penetration tests are essential for assessing the effectiveness and resilience of the network security posture, and for providing recommendations for improvement and remediation. If network penetration tests are not performed, the organization may not be aware of the existing or potential threats and risks to its network, and may not be able to prevent or respond to real cyberattacks, which can result in data breaches, service disruptions, financial losses, reputational damage, and legal or regulatory penalties. The other findings are also important, butnot as risky as the lack of network penetration tests, because they either do not directly affect the networksecurity controls, or they can be addressed by documentation or approval processes.
Reference: CISA Review Manual (Digital Version)1, Chapter 5, Section 5.2.4
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization’s enterprise architecture (EA) program?
- A . IT application owners have sole responsibility for architecture approval.
- B . The architecture review board is chaired by the CIO.
- C . Information security requirements are reviewed by the EA program.
- D . The EA program governs projects that are not IT-related.
A
Explanation:
Comprehensive and Detailed Step-by-Step
Enterprise Architecture (EA) governance requires proper oversight and separation of duties to ensure strategic alignment and risk management.
Option A (Correct): If IT application owners have sole authority over architecture approval, there is a high risk of inadequate governance, lack of strategic alignment, and potential conflicts of interest. Architecture decisions should involve multiple stakeholders, including business and security teams, to ensure compliance, security, and business alignment.
Option B (Incorrect): While having the CIO chair the architecture review board might not be ideal, it is not the greatest concern. The CIO is a senior leader who can provide oversight and direction, even if additional governance mechanisms should be in place.
Option C (Incorrect): Reviewing security requirements within the EA program is a best practice, as it ensures that security is embedded into enterprise architecture rather than treated as an afterthought.
Option D (Incorrect): Enterprise architecture should ideally encompass both IT and business processes. Governing non-IT-related projects is not inherently problematic, as EA is designed to align business strategy with IT infrastructure.
Reference: ISACA CISA Review Manual CDomain 1: Information Systems Auditing ProcessC Covers IT governance and EA program structure.
During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?
- A . The business case reflects stakeholder requirements.
- B . The business case is based on a proven methodology.
- C . The business case passed a quality review by an independent party.
- D . The business case identifies specific plans for cost allocation.
A
Explanation:
During a pre-deployment assessment, the best indication that a business case will lead to the achievement of business objectives is that the business case reflects stakeholder requirements. A business case is a document that explains the rationale, benefits, costs, and risks of a proposed project or initiative. A business case should align with the strategic goals and vision of the organization and address the needs and expectations of the stakeholders who are involved in or affected by the project12.
Stakeholder requirements are the conditions or capabilities that stakeholders expect from a project or its outcomes. Stakeholders can include customers, users, employees, managers, suppliers, regulators, and others who have an interest or stake in the project. Stakeholder requirements should be identified, analyzed, prioritized, validated, and documented throughout the project lifecycle34.
The business case should reflect stakeholder requirements because they provide the basis for defining the project scope, objectives, deliverables, quality standards, success criteria, and benefits realization. By reflecting stakeholder requirements, the business case can demonstrate how the project will add value to the organization and its stakeholders, justify the investment and resources required for the project, and facilitate the decision-making and approval process for the project5.
Therefore, during a pre-deployment assessment, an IS auditor should look for evidence that the business case reflects stakeholder requirements as the best indication that the business case will lead to the achievement of business objectives.
Reference: How to Write a Business Case (Template Included) – ProjectManager
How to Write a Business Case | Smartsheet
What are Stakeholder Requirements? | PM Study Circle
Stakeholder Requirements – Project Management Knowledge
Business Case vs Business Requirements – Difference Between
[Business Case Development – Project Management Docs]
The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:
- A . nonrepudiation.
- B . authorization.
- C . integrity.
- D . authenticity.
When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?
- A . The information security department has difficulty filling vacancies
- B . An information security governance audit was not conducted within the past year
- C . The data center manager has final sign-off on security projects
- D . Information security policies are updated annually
C
Explanation:
The finding that should be of most concern to an IS auditor when evaluating information security governance within an organization is that the data center manager has final sign-off on security projects. This indicates a lack of segregation of duties and a potential conflict of interest between the operational and security roles. The data center manager may have access to sensitive information or systems that should be protected by security controls, or may influence or override security decisions that are not in the best interest of the organization. This finding also suggests that there is no clear accountability or authority for information security governance at a higher level, such as senior management or board of directors. The other findings are not as concerning as this one, although they may indicate some areas for improvement or monitoring.
Reference: ISACA, CISA Review Manual, 27th Edition, chapter 5, section 5.11
ISACA, IT Governance Using COBIT and Val IT: Student Booklet – 2nd Edition4
