Practice Free CISA Exam Online Questions
A computer forensic audit is MOST relevant in which of the following situations?
- A . Inadequate controls in the IT environment
- B . Mismatches in transaction data
- C . Missing server patches
- D . Data loss due to hacking of servers
D
Explanation:
A computer forensic audit is a process of collecting, preserving, analyzing, and presenting digital evidence from electronic devices in a legally admissible manner. It is most relevant in situations where data loss due to hacking of servers occurs, as it can help to identify the source, method, and extent of the attack, as well as recover the lost or damaged data. The other options are not as suitable for a computer forensic audit, as they relate to internal control issues, data quality issues, or system maintenance issues, which can be addressed by other types of audits or reviews.
Reference: CISA Review Manual (Digital Version), Domain 4: Information Systems Operations and Business Resilience, Section 4.5 Computer Forensics1
An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services.
Which of the following would BEST enable the organization to resolve this issue?
- A . Problem management
- B . Incident management
- C . Service level management
- D . Change management
A
Explanation:
Problem management is the best way to enable the organization to resolve the issue of repeated failures of critical data processing services, as it focuses on identifying and eliminating the root causes of incidents and preventing their recurrence. Problem management involves analyzing incidents, performing root cause analysis, finding solutions, implementing changes and documenting lessons learned. Incident management is not the best way to resolve the issue, as it focuses on restoring normal service operation as quickly as possible after an incident occurs, but does not address the underlying causes or prevent future incidents. Service level management is not the best way to resolve the issue, as it focuses on defining, monitoring and reporting on the service levels agreed upon between service providers and customers, but does not address the causes or solutions of incidents. Change management is not the best way to resolve the issue, as it focuses on ensuring that changes are implemented in a controlled and coordinated manner, but does not address the identification or elimination of incidents.
Reference: [Problem Management Definition]
[Incident Management Definition]
[Service Level Management Definition]
[Change Management Definition]
IT Service Management | ISACA
Which of the following should be of GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
- A . Backups of the old system and data are not available online
- B . The change management process was not formally documented
- C . Data conversion was performed using manual processes
- D . Unauthorized data modifications occurred during conversion
D
Explanation:
Unauthorized data modifications during conversion (D) are the most critical concern because they compromise data integrity, leading to inaccurate or corrupted information in the new system. Data migration should be performed with strict controls, including validation, reconciliation, and audit trails.
Other options:
Lack of online backups (A) is a risk but not as severe as compromised data integrity. Offline backups may still exist.
Undocumented change management (B) is a process deficiency but does not directly affect data accuracy.
Manual data conversion (C) increases risk but does not automatically indicate unauthorized changes.
Reference: ISACA CISA Review Manual, Information Systems Acquisition, Development, and Implementation
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions.
Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
- A . Computer-assisted audit technique (CAAT)
- B . Stratified sampling
- C . Statistical sampling
- D . Process walk-through
A
Explanation:
Comprehensive and Detailed Step-by-Step
To efficiently detectduplicate payments, data analyticsand automated checks are required due to thehigh volume of transactions.
Option A (Correct): Computer-Assisted Audit Techniques (CAATs)allow auditors toautomatically scan large datasetsfor duplicate payments based oninvoice numbers, vendor names, and payment amounts.
Option B (Incorrect): Stratified samplinggroups data into categories, which helps in analysis but doesnot directly detect duplicates.
Option C (Incorrect): Statistical samplingis useful forextrapolating results, but it doesnot systematically findduplicate transactions.
Option D (Incorrect): Process walk-throughsreview procedures but donot analyze transactions at scale.
Reference: ISACA CISA Review Manual CDomain 2: Governance and Management of ITC CoversCAATs, data analytics, and fraud detection techniques.
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
- A . architecture and cloud environment of the system.
- B . business process supported by the system.
- C . policies and procedures of the business area being audited.
- D . availability reports associated with the cloud-based system.
B
Explanation:
The business process supported by the system is the most important factor for an IS auditor to understand when planning an audit to assess application controls of a cloud-based system. An IS auditor should have a clear understanding of the business objectives, requirements, and risks of the process, as well as the expected outputs and outcomes of the system. This will help the IS auditor to determine the scope, objectives, and criteria of the audit, as well as to identify and evaluate the key application controls that ensure the effectiveness, efficiency, and reliability of the process. The other options are less important factors that may provide additional information or context for the audit, but not its primary focus.
Reference: CISA Review Manual (Digital Version), Chapter 5, Section 5.31
CISA Review Questions, Answers & Explanations Database, Question ID 212
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room.
Which of the following would be the MOST effective compensating control to recommend?
- A . Installing security cameras at the doors
- B . Changing to a biometric access control system
- C . Implementing a monitored mantrap at entrance and exit points
- D . Requiring two-factor authentication at entrance and exit points
C
Explanation:
A monitored mantrap at entrance and exit points would be the most effective compensating control in this scenario. A mantrap is a physical security access control system comprising a small space having two sets of interlocking doors such that the first set of doors must close before the second set opens. By implementing a monitored mantrap, unauthorized access can be prevented and it can ensure that all individuals are logged when they enter and exit the server room12.
Reference: ISACA’s Information Systems Auditor Study Materials3
Which of the following is an IS auditor’s BEST recommendation to help an organization increase the efficiency of computing resources?
- A . Virtualization
- B . Hardware upgrades
- C . Overclocking the central processing unit (CPU)
- D . Real-time backups
An IS auditor reviewing a job scheduling tool notices performance and reliability problems.
Which of the following is MOST likely affecting the tool?
- A . Administrator passwords do not meet organizational security and complexity requirements.
- B . The number of support staff responsible for job scheduling has been reduced.
- C . The scheduling tool was not classified as business-critical by the IT department.
- D . Maintenance patches and the latest enhancement upgrades are missing.
D
Explanation:
The performance and reliability of a job scheduling tool can be significantly affected if maintenance patches and the latest enhancement upgrades are missing1. These patches and upgrades often contain fixes for known issues and improvements to the tool’s functionality. If they are not applied, the tool may continue to exhibit known problems or fail to benefit from enhancements that could improve its performance and reliability1. While factors like administrator password requirements23, number of support staff45, and tool classification64 can impact various aspects of a tool’s operation, they are less likely to be the direct cause of performance and reliability problems.
Reference: Patch Management Definition & Best Practices – Rapid7
Password must meet complexity requirements – Windows Security
NIST’s New Password Rule Book: Updated Guidelines Offer Benefits and Risk – ISACA
Workforce optimization: Staff scheduling with AI | McKinsey
Poor Employee Scheduling – Major Consequences And Solutions
A Critical Analysis of Job Shop Scheduling in Context of Industry 4.0
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT-related customer service project?
- A . The project risk exceeds the organization’s risk appetite.
- B . Executing the project will require additional investments.
- C . Expected business value is expressed in qualitative terms.
- D . The organization will be the first to offer the proposed services.
Which of the following provides the BEST assurance of data integrity after file transfers?
- A . Check digits
- B . Monetary unit sampling
- C . Hash values
- D . Reasonableness check
C
Explanation:
The best assurance of data integrity after file transfers is hash values. Hash values are unique strings that are generated by applying a mathematical function to the data. Hash values can be used to verify that the data has not been altered or corrupted during the transfer, as any change in the data would result in a different hash value. By comparing the hash values of the source and destination files, one can confirm that the data is identical and intact.
The other options are not as effective as hash values for ensuring data integrity after file transfers. Check digits are digits added to a number to detect errors in data entry or transmission, but they are not reliable for detecting intentional or complex modifications of the data. Monetary unit sampling is a statistical sampling technique used for auditing financial statements, but it is not applicable for verifying data integrity after file transfers. Reasonableness check is a validation method that checks whether the data falls within an expected range or format, but it does not guarantee that the data is accurate or consistent with the source.
Reference: 5: On Windows, how to check that data is unchanged after copying? – Super User
6: Data integrity | Cloud Storage Transfer Service Documentation | Google Cloud
7: Checking File Integrity – HECC Knowledge Base
8: How to setup File Transfer Integrity Checks – Progress.com
