Practice Free CISA Exam Online Questions
Which of the following should be the FIRST step in a data migration project?
- A . Reviewing decisions on how business processes should be conducted in the new system
- B . Completing data cleanup in the current database to eliminate inconsistencies
- C . Understanding the new system’s data structure
- D . Creating data conversion scripts
C
Explanation:
Data migration is the process of moving data from one system to another, which may involve changes in storage, database, or application. To perform a successful data migration, it is essential to understand the data structure of the new system, which defines how the data is organized, stored, and accessed. Understanding the new system’s data structure will help determine the following aspects of the data migration project:
The scope and requirements of the data migration, such as what data needs to be migrated, how much data needs to be migrated, and what are the quality and performance expectations.
The data mapping and transformation rules, such as how the data elements from the source system correspond to the data elements in the target system, and what transformations or conversions are needed to ensure compatibility and consistency.
The data validation and testing methods, such as how to verify that the migrated data is accurate, complete, and functional in the new system, and how to identify and resolve any errors or issues.
Therefore, understanding the new system’s data structure is a crucial first step in a data migration project, as it lays the foundation for the subsequent steps of data extraction, transformation, loading, validation, and testing.
Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?
- A . Evaluating the likelihood of attack
- B . Estimating potential damage
- C . Identifying vulnerable assets
- D . Assessing the Impact of vulnerabilities
C
Explanation:
The first step in managing the impact of a recently discovered zero-day attack is to identify vulnerable assets. A zero-day attack is a cyberattack that exploits a previously unknown or unpatched vulnerability in a software or system, before the vendor or developer has had time to fix it. Identifying vulnerable assets is crucial for managing the impact of a zero-day attack, because it helps to determine the scope and severity of the attack, prioritize the protection and mitigation measures, and isolate or quarantine the affected assets from further damage or compromise. The other options are not the first steps in managing the impact of a zero-day attack, because they either require more informationabout the vulnerable assets, or they are part of the subsequentsteps of assessing, responding, or recovering from the attack.
Reference: CISA Review Manual (Digital Version)1, Chapter 5, Section 5.2.4
Attribute sampling is BEST suited to estimate:
- A . the true monetary value of a population.
- B . the total error amount in the population.
- C . the degree of compliance with approved procedures
- D . standard deviation from the mean.
During an information security review, an IS auditor learns an organizational policy requires all employ-ees to attend information security training during the first week of each new year.
What is the auditor’s BEST recommendation to ensure employees hired after January receive adequate guidance regarding security awareness?
- A . Ensure new employees read and sign acknowledgment of the acceptable use policy.
- B . Revise the policy to include security training during onboarding.
- C . Revise the policy to require security training every six months for all employees.
- D . Require management of new employees to provide an overview of security awareness.
B
Explanation:
This directly addresses the gap for new hires, creates a consistent expectation regardless of hiring date, and formalizes the process within organizational policy.
Reference
ISACA CISA Review Manual (Current Edition) – Chapters on Information Security Policies, Training and Awareness
Industry Best Practices for Security Awareness – Emphasize the importance of timely and comprehensive training for new employees.
Which of the following provides the BEST evidence that system requirements are met when evaluating a project before implementation?
- A . Integration testing results
- B . Sign-off from senior management
- C . User acceptance testing (UAT) results
- D . Regression testing results
Following a discussion on the results of a recent audit engagement, the process owner of the audited area has provided an action plan addressing the gaps and recommendations. The auditor disagrees with some of the responses where the process owner is accepting a level of residual risk that is not within the organization’s risk appetite.
What is the auditor’s BEST course of action?
- A . Include the issue in the next report to the audit committee.
- B . Inform executive management of the residual risk.
- C . Accept the action plan proposed by the process owner.
- D . Escalate the situation to audit management.
D
Explanation:
Comprehensive and Detailed
When an auditor finds that the process owner is accepting residual risk beyond the organization’s defined risk appetite, it is not appropriate to accept the action plan or wait until the next committee report.
Escalating to audit management (D) is the correct step. Audit management can then determine whether to escalate further to executive management or the audit committee.
Including in the next report (A) delays timely risk response.
Informing executive management directly (B) bypasses the audit reporting hierarchy.
Accepting the plan (C) would be inappropriate as it ignores risk governance.
ISACA
Reference: CISA Review Manual 27th Edition, Domain 1 (Governance and Risk Management), section on Risk appetite, residual risk, and auditor’s role in escalation.
A KEY benefit of integrated auditing is that it:
- A . Facilitates the business in reviewing its control environment.
- B . Enables continuous auditing and monitoring.
- C . Improves the review of audit work by team leaders.
- D . Combines skill sets from operational, functional, and IS auditors.
D
Explanation:
Comprehensive and Detailed
An integrated audit merges financial, operational, compliance, and IT audits into a single coordinated review. The key benefit is leveraging a multidisciplinary team with combined skill sets, resulting in a more holistic evaluation of risks and controls.
Option A: Business reviews are important but not the primary benefit.
Option B: Continuous auditing is a separate methodology.
Option C: Better review by team leaders may occur, but that’s not unique to integrated audits.
Option D: Correct ― the main advantage is combining diverse audit expertise.
ISACA
Reference: CISA Review Manual 27th Edition, Domain 1, section on integrated audits and multidisciplinary audit approaches.
When reviewing an organization’s finalized risk assessment process, what would be the MAIN reason for an IS auditor to compare acceptable risk level with residual risk?
- A . To identify omissions made in the completed risk assessment
- B . To identify new risks the organization may have to address
- C . To recommend control enhancements for further risk reduction
- D . To advise management on risk appetite levels
Which of the following metrics would BEST measure the agility of an organization’s IT function?
- A . Average number of learning and training hours per IT staff member
- B . Frequency of security assessments against the most recent standards and guidelines
- C . Average time to turn strategic IT objectives into an agreed upon and approved initiative
- D . Percentage of staff with sufficient IT-related skills for the competency required of their roles
C
Explanation:
The metric that would best measure the agility of an organization’s IT function is average time to turn strategic IT objectives into an agreed upon and approved initiative. IT agility is the ability of an IT function to respond quickly and effectively to changing business needs and opportunities. By measuring how fast an IT function can translate strategic IT objectives into actionable initiatives, such as projects or programs, an organization can assess how well its IT function can align with and support its business strategy. Average number of learning and training hours per IT staff member, frequency of security assessments against the most recent standards and guidelines, and percentage of staff with sufficient IT-related skills for the competency required of their roles are metrics that may indicate other aspects of IT performance, such as capability development, security maturity, and skills gap analysis, but they do not directly measure IT agility.
Reference: ISACA Journal Article: Measuring IT Agility
The use of control totals reduces the risk of:
- A . posting to the wrong record.
- B . incomplete processing.
- C . improper backup.
- D . improper authorization.
B
Explanation:
Control totals are a method of verifying the accuracy and completeness of data processing by comparing the totals of key fields in input and output records1. Control totals can be used to reduce the risk of incomplete processing, which is the failure to process all the data or transactions that are expected or required2.
Incomplete processing can result in data loss, inconsistency, or incompleteness, which can affect the quality and reliability of the information system and its outputs.
Incomplete processing can be caused by various factors, such as:
Hardware or software failures that interrupt the processing or transmission of data2
Human errors or omissions that skip or miss some data or transactions2
Malicious attacks or unauthorized access that delete or modify some data or transactions2
Environmental hazards or disasters that damage or destroy some data or transactions2
Control totals can help detect and prevent incomplete processing by:
Providing a benchmark or reference point to compare the input and output data or transactions1
Identifying any discrepancies or deviations from the expected or required totals1
Alerting the users or operators to investigate and resolve the causes of incomplete processing1
Ensuring that all the data or transactions are properly transmitted, converted, and processed1
The other options are not as relevant as control totals for reducing the risk of incomplete processing. Posting to the wrong record is the error of assigning or transferring data or transactions to an incorrect account, file, or record3. Improper backup is the failure to create, store, or restore copies of data or transactions in case of loss, corruption, or damage4. Improper authorization is the lack of proper permission or approval to access, modify, or process data or transactions. Control totals may not be able to prevent or detect these errors or failures, as they are not related to the completeness of data processing. Therefore, option B is the correct answer.
Reference: control totals – Barrons Dictionary – AllBusiness.com
What is control total amount? – Sage Advice US
Posting Error Definition
Backup Definition
[Authorization Definition]
