Practice Free CISA Exam Online Questions
Which of the following is an IS auditor’s MOST important step in a privacy audit?
- A . Assess the controls in place for data management.
- B . Determine whether privacy training is being conducted for employees.
- C . Review third-party agreements for adequate personally identifiable information (PII) protection measures.
- D . Analyze all stages of the personally identifiable information (PII) data life cycle to identify potential risks.
D
Explanation:
Comprehensive and Detailed
The most important step in a privacy audit is to ensure that all risks associated with PII handling are identified. This requires analyzing the entire PII data life cycle―from collection, processing, storage, and transfer to retention and destruction.
Option A: Reviewing data management controls is part of the audit but is narrower than life cycle coverage.
Option B: Privacy training is necessary, but training alone doesn’t ensure compliance.
Option C: Reviewing third-party agreements is important but only covers outsourced risks.
Option D: Provides comprehensive coverage of privacy risks across all stages.
ISACA
Reference: CISA Review Manual 27th Edition, Domain 5, section on data privacy, data life cycle, and PII risks.
Which of the following is an IS auditor’s MOST important step in a privacy audit?
- A . Assess the controls in place for data management.
- B . Determine whether privacy training is being conducted for employees.
- C . Review third-party agreements for adequate personally identifiable information (PII) protection measures.
- D . Analyze all stages of the personally identifiable information (PII) data life cycle to identify potential risks.
D
Explanation:
Comprehensive and Detailed
The most important step in a privacy audit is to ensure that all risks associated with PII handling are identified. This requires analyzing the entire PII data life cycle―from collection, processing, storage, and transfer to retention and destruction.
Option A: Reviewing data management controls is part of the audit but is narrower than life cycle coverage.
Option B: Privacy training is necessary, but training alone doesn’t ensure compliance.
Option C: Reviewing third-party agreements is important but only covers outsourced risks.
Option D: Provides comprehensive coverage of privacy risks across all stages.
ISACA
Reference: CISA Review Manual 27th Edition, Domain 5, section on data privacy, data life cycle, and PII risks.
Which of the following statements appearing in an organization’s acceptable use policy BEST demonstrates alignment with data classification standards related to the protection of information assets?
- A . Any information assets transmitted over a public network must be approved by executive management.
- B . All information assets must be encrypted when stored on the organization’s systems.
- C . Information assets should only be accessed by persons with a justified need.
- D . All information assets will be assigned a clearly defined level to facilitate proper employee handling.
B
Explanation:
The statement that BEST demonstrates alignment with data classification standards related to the protection of information assets is
D. All information assets will be assigned a clearly defined level to facilitate proper employee handling. Data classification involves categorizing information assets based on their sensitivity, importance, and usage. Assigning clearly defined levels (such as public, internal, confidential, etc.) to information assets ensures that appropriate security controls are applied based on their classification. By doing so, organizations can manage access, encryption, and other protective measures effectively12.
Reference: 1. IFRC. “Information Security: Acceptable Use
Policy.” 1(https://www.ifrc.org/sites/default/files/2021-11/IFRC-Information-Security-Acceptable-Use-Policy.pdf)
Which of the following security risks can be reduced by a property configured network firewall?
- A . SQL injection attacks
- B . Denial of service (DoS) attacks
- C . Phishing attacks
- D . Insider attacks
B
Explanation:
A network firewall is a device or software that monitors and controls the incoming and outgoing network traffic based on predefined rules. A network firewall can help reduce the risk of denial of service (DoS) attacks, which are attempts to overwhelm a system or network with excessive requests or traffic, by filtering or blocking unwanted or malicious packets. A SQL injection attack is a type of code injection attack that exploits a vulnerability in a web application’s database query, by inserting malicious SQL statements into the input fields. A phishing attack is a type of social engineering attack that attempts to trick users into revealing sensitive information or installing malware, by sending fraudulent emails or messages that impersonate legitimate entities. An insider attack is a type of malicious activity that originates from within an organization, such as employees, contractors, or partners, who abuse their access privileges or credentials to compromise the confidentiality, integrity, or availability of information systems or data. A network firewall cannot prevent these types of attacks, as they rely on exploiting human or application weaknesses rather than network vulnerabilities.
In an online application, which of the following would provide the MOST information about the transaction audit trail?
- A . System/process flowchart
- B . File layouts
- C . Data architecture
- D . Source code documentation
C
Explanation:
In an online application, data architecture provides the most information about the transaction audit trail, as it describes how data are created, stored, processed, accessed and exchanged among different components of the application. Data architecture includes data models, schemas, dictionaries, metadata, standards and policies that define the structure, quality, integrity, security and governance of data. Data architecture can help the IS auditor to trace the origin, flow, transformation and destination of data in an online transaction, and to identify the key data elements, attributes and relationships that are relevant for audit purposes. A system/process flowchart is a graphical representation of the sequence of steps or activities that are performed by a system or process. A system/process flowchart can provide some information about the transaction audit trail, but it is not as detailed or comprehensive as data architecture. A system/process flowchart shows the inputs, outputs, decisions and actions of a system or process, but it does not show the data elements, attributes and relationships that are involved in each step or activity. A file layout is a specification of the format and structure of a data file. A file layout can provide some information about the transaction audit trail, but it is not as detailed or comprehensive as data architecture. A file layout shows the fields, types, lengths and positions of data in a file, but it does not show the origin, flow, transformation and destination of data in an online transaction. Source code documentation is a description of the logic, functionality and purpose of a program or module written in a programming language. Source code documentation can provide some information about the transaction audit trail, but it is not as detailed or comprehensive as data architecture. Source code documentation shows the instructions, variables and parameters that are used to perform calculations and operations on data, but it does not show the data elements, attributes and relationships that are involved in each instruction or operation.
Reference: CISA Review Manual (Digital Version) 1, Chapter 4: Information Systems Operations and Business Resilience, Section 4.2: Data Administration Practices.
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
- A . Server room access history
- B . Emergency change records
- C . IT security incidents
- D . Penetration test results
D
Explanation:
The IS auditor should ensure that penetration test results are classified at the highest level of sensitivity, because they contain detailed information about the vulnerabilities and weaknesses of the IT systems and networks, as well as the methods and tools used by the testers to exploit them. Penetration test results can be used by malicious actors to launch cyberattacks or cause damage to the organization if they are disclosed or accessed without authorization. Therefore, they should be protected with the highest level of confidentiality, integrity and availability. The other options are not as sensitive as penetration test results, because they either do not reveal as muchinformation aboutthe IT security posture, or they are already known or reported by the organization.
Reference: CISA Review Manual (Digital Version)1, Chapter 5, Section 5.2.4
An organization is ready to implement a new IT solution consisting of multiple modules. The last module updates the processed data into the database.
Which of the following findings should be of MOST concern to the IS auditor?
- A . Absence of a formal change approval process
- B . Lack of input validation
- C . Use of weak encryption
- D . Lack of a data dictionary
Which of the following provides the GREATEST assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively?
- A . Continuous auditing
- B . Manual checks
- C . Exception reporting
- D . Automated reconciliations
A
Explanation:
Continuous auditing provides the greatest assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively12. Continuous auditing involves the use of automated tools to continuously monitor and audit a system’s operations12. This allows for real-time identification and resolution of issues, ensuring that the system is always functioning as expected12. It also provides ongoing assurance about the integrity and reliability of the data being compiled by the middleware application12.
Reference: 5 Data Integration Methods and Strategies | Talend
What Is Middleware? Definition, Architecture, and Best Practices
An IS auditor finds that while an organization’s IT strategy is heavily focused on research and development, the majority of protects n the IT portfolio focus on operations and maintenance.
Which of the Mowing is the BEST recommendation?
- A . Align the IT strategy will business objectives
- B . Review priorities in the IT portfolio
- C . Change the IT strategy to focus on operational excellence.
- D . Align the IT portfolio with the IT strategy.
A
Explanation:
The best recommendation is to align the IT strategy with the business objectives. This will ensure that the IT projects and initiatives are consistent with the organization’s vision, mission, and goals. IT strategy should be derived from and support the business strategy, not the other way around. By aligning the IT strategy with the business objectives, the organization can achieve better value, performance, and alignment from its IT investments.
Reviewing priorities in the IT portfolio (option B) is not the best recommendation, as it does not address the root cause of the misalignment between the IT strategy and the IT portfolio. The IT portfolio should reflect the IT strategy, which in turn should reflect the business objectives. Simply changing the priorities in the IT portfolio without aligning the IT strategy with the business objectives may result in suboptimal or conflicting outcomes.
Changing the IT strategy to focus on operational excellence (option C) is also not the best recommendation, as it may not be aligned with the business objectives. The organization’s IT strategy should be based on its competitive advantage, market position, customer needs, and industry trends. If the organization’s business strategy is heavily focused on research and development, then changing the IT strategy to focus on operational excellence may not be appropriate or beneficial.
Aligning the IT portfolio with the IT strategy (option D) is also not the best recommendation, as it does not address the misalignment between the IT strategy and the business objectives. Aligning the IT portfolio with the IT strategy may improve the coherence and consistency of the IT projects, but it may not ensure that they are aligned with the organization’s vision, mission, and goals.
Therefore, option A is the correct answer.
Reference: The Challenges of Aligning IT and the Business | CIO Insight Strategic alignment and value maximization for IT project portfolios … A Guide to IT Portfolio Management | AdobeWorkfront
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization’s website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur.
Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
- A . Assign responsibility for improving data quality.
- B . Invest in additional employee training for data entry.
- C . Outsource data cleansing activities to reliable third parties.
- D . Implement business rules to validate employee data entry.
D
Explanation:
Implementing business rules to validate employee data entry is the best way to reduce the likelihood of future occurrences of poor data quality that cause customer complaints about receiving different items from what they ordered on the organization’s website. Business rules are logical statements that define the conditions and actions for data validation, such as checking for data completeness, accuracy, consistency, and integrity. Assigning responsibility for improving data quality, investing in additional employee training for data entry, and outsourcing data cleansing activities to reliable third parties are also possible ways to improve data quality, but they are not as effective as implementing business rules to validate employee data entry.
Reference: CISA Review Manual (Digital Version), Chapter 4, Section 4.3.1
