Practice Free CISA Exam Online Questions
Which of the following findings would be of GREATEST concern when reviewing project risk management practices?
- A . There are no formal milestone sign-offs.
- B . Qualitative risk analyses have not been updated.
- C . Ongoing issues are not formally tracked.
- D . Project management software is not being used.
A project team has decided to switch to an agile approach to develop a replacement for an existing business application.
Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?
- A . Compare the agile process with previous methodology.
- B . Identify and assess existing agile process control
- C . Understand the specific agile methodology that will be followed.
- D . Interview business process owners to compile a list of business requirements
C
Explanation:
Understanding the specific agile methodology that will be followed is the first step that an IS auditor should do to ensure the effectiveness of the project audit. An IS auditor should familiarize themselves with the agile approach, principles, practices, and tools that will be used by the project team, as well as the roles and responsibilities of the project stakeholders. This will help the IS auditor to identify and assess the relevant risks and controls for the project audit. The other options are not the first steps that an IS auditor should do, but rather possible subsequent actions that may depend on the specific agile methodology.
Reference: CISA Review Manual (Digital Version), Chapter 4, Section 4.3.21
CISA Review Questions, Answers & Explanations Database, Question ID 211
Which of the following is the MAIN purpose of an information security management system?
- A . To identify and eliminate the root causes of information security incidents
- B . To enhance the impact of reports used to monitor information security incidents
- C . To keep information security policies and procedures up-to-date
- D . To reduce the frequency and impact of information security incidents
D
Explanation:
The main purpose of an information security management system (ISMS) is to reduce the frequency and impact of information security incidents. An ISMS is a systematic approach to managing information security risks, policies, procedures, and controls within an organization. An ISMS aims to ensure the confidentiality, integrity, and availability of information assets, as well as to comply with relevant laws and regulations. The other options are not the main purpose of an ISMS, but rather some of its possible benefits or components.
Reference: CISA Review Manual (Digital Version), Chapter 7, Section 7.11
CISA Review Questions, Answers & Explanations Database, Question ID 205
Which of the following is MOST important to include in security awareness training?
- A . How to respond to various types of suspicious activity
- B . The importance of complex passwords
- C . Descriptions of the organization’s security infrastructure
- D . Contact information for the organization’s security team
A
Explanation:
The most important thing to include in security awareness training is how to respond to various types of suspicious activity. Security awareness training is a program that educates employees about the importance of security and how to avoid common threats and risks. One of the main objectives of security awareness training is to enable employees to recognize and report any signs of malicious or unauthorized activity, such as phishing emails, malware infections, data breaches, or social engineering attempts. By teaching employees how to respond to various types of suspicious activity, security awareness training can help to prevent or mitigate the impact of security incidents, protect the organization’s assets and reputation, and comply with legal and regulatory requirements.
The other options are not as important as option A. The importance of complex passwords is a useful topic, but not the most important thing to include in security awareness training. Complex passwords are passwords that are hard to guess or crack by using a combination of letters, numbers, symbols, and cases. Complex passwords can help to protect user accounts and data from unauthorized access, but they are not sufficient to prevent all types of security incidents. Moreover, complex passwords may be difficult to remember or manage by users, and may require additional measures such as password managers or multi-factor authentication. Descriptions of the organization’s security infrastructure is a technical topic, but not the most important thing to include in security awareness training. Security infrastructure is the set of hardware, software, policies, and procedures that provide the foundation for the organization’s security posture and capabilities. Security infrastructure may include firewalls, antivirus software, encryption tools, access control systems, backup systems, etc. Descriptions of the organization’s security infrastructure may be relevant for some employees who are involved in security operations or administration, but they may not be necessary or understandable for all employees who need security awareness training. Contact information for the organization’s security team is a practical detail, but not the most important thing to include in security awareness training. Security team is the group of people who are responsible for planning, implementing, monitoring, and improving the organization’s security strategy and activities. Contact information for the organization’s security team may be useful for employees who need to report or escalate a security issue or request a security service or support. However, contact information for the organization’s security team is not enough to ensure that employees know how to respond to various types of suspicious activity.
Reference: Security Awareness Training | SANS Security Awareness, Security Awareness Training | KnowBe4, Security Awareness Training Course (ISC)² | Coursera
When designing metrics for information security, the MOST important consideration is that the metrics:
- A . conform to industry standards.
- B . apply to all business units.
- C . provide actionable data.
- D . are easy to understand.
Which of the following system redundancy configurations BEST improves system resiliency and reduces the possibility of a single cause of failure impacting system dependability?
- A . Active redundancy
- B . Homogeneous redundancy
- C . Diverse redundancy
- D . Passive redundancy
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
- A . Embed details within source code.
- B . Standardize file naming conventions.
- C . Utilize automated version control.
- D . Document details on a change register.
C
Explanation:
Automated version control systems are the best method to maintain an audit trail of changes made to the source code of a program. They automatically track and manage changes to the source code over time, allowing you to see what changes were made, when they were made, and who made them1. This provides a clear and detailed audit trail that can be invaluable for debugging, understanding the evolution of the code, and ensuring accountability23.
The BEST way to provide assurance that a project is adhering to the project plan is to:
- A . require design reviews at appropriate points in the life cycle.
- B . have an IS auditor participate on the steering committee.
- C . have an IS auditor participate on the quality assurance (QA) team.
- D . conduct compliance audits at major system milestones.
D
Explanation:
The best way to provide assurance that a project is adhering to the project plan is to conduct compliance audits at major system milestones. A compliance audit is a systematic and independent examination of the project’s activities, documents, and deliverables to determine whether they conform to the project plan and its specifications, standards, and requirements1. A major system milestone is a significant point or event in the project’s life cycle that marks the completion of a phase, stage, or deliverable2.
By conducting compliance audits at major system milestones, the auditor can provide assurance that the project is adhering to the project plan by:
Verifying that the project’s scope, schedule, budget, quality, and risks are aligned with the project plan and its objectives1
Identifying any deviations, discrepancies, or non-compliances that may affect the project’s performance or outcome1
Recommending and monitoring corrective and preventive actions to address the identified issues and improve the project’s compliance1
Reporting and communicating the audit findings, conclusions, and recommendations to the relevant stakeholders1
The other options are not as effective as conducting compliance audits at major system milestones for providing assurance that the project is adhering to the project plan. Requiring design reviews at appropriate points in the life cycle is a useful technique for ensuring that the project’s design meets the user and business requirements and follows the design standards and best practices3. However, design reviews are not sufficient for providing assurance that the project is adhering to the project plan, as they do not cover other aspects of the project such as schedule, budget, quality, or risks. Having an IS auditor participate on the steering committee is a possible way for providing assurance that the project is adhering to the project plan, as the auditor can provide independent advice and oversight to the steering committee on quality management issues and remediation efforts4. However, this may not be feasible or appropriate for every project, as it may create a conflict of interest or compromise the auditor’s objectivity and independence. Having an IS auditor participate on the quality assurance (QA) team is another possible way for providing assurance that the project is adhering to the project plan, as the auditor can assist the QA team in implementing procedures to facilitate adoption of quality management best practices5. However, this may also not be feasible or appropriate for every project, as it may create a conflict of interest or compromise the auditor’s objectivity and independence. Therefore, option D is the correct answer.
Reference: What Is Compliance Audit? Definition & Process | ASQ
What Is A Project Milestone? – The Basics
Design Review – an overview | ScienceDirect Topics
Project success through project assurance – Project Management Institute
Quality Assurance Team: Roles & Responsibilities
An IS auditor has been asked to provide support to the control self-assessment (CSA) program.
Which of the following BEST represents the scope of the auditor’s role in the program?
- A . The auditor should act as a program facilitator.
- B . The auditor should focus on improving process productivity
- C . The auditor should perform detailed audit procedures
- D . The auditor’s presence replaces the audit responsibilities of other team members.
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
- A . Review a report of security rights in the system.
- B . Observe the performance of business processes.
- C . Develop a process to identify authorization conflicts.
- D . Examine recent system access rights violations.
A
Explanation:
The most efficient way to identify segregation of duties violations in a new system is to review a report of security rights in the system. Segregation of duties is a control principle that aims to prevent or detect errors, fraud, or abuse by ensuring that no single individual has the ability to perform incompatible or conflicting functions or activities within a system or process. A report of security rights in the system can provide a comprehensive and accurate overview of the roles, responsibilities, and access levels assigned to different users or groups in the system, and can help to identify any potential segregation of duties violations or risks. The other options are not as efficient as reviewing a report of security rights in the system, because they either rely on observation or testing rather than analysis, or they focus on existing rather than potential violations.
Reference: CISA Review Manual (Digital Version)1, Chapter 5, Section 5.2.2
