A Review Of Validated CISA Testing Engine

Proper study guides for Leading Isaca Isaca CISA certified begins with Isaca CISA preparation products which designed to deliver the High quality CISA questions by making you pass the CISA test at your first time. Try the free CISA demo right now.

Check CISA free dumps before getting the full version:

Page: 1 / 98
Total 1177 questions Full Exam Access
Question 1
- (Topic 4)
The GREATEST advantage of rapid application development (RAD) over the traditional system development life cycle (SDLC) is that it:
My answer: -
Reference answer: D
Reference analysis:


The greatest advantage of RAD is the shorter time frame for the development of a system. Choices A and B are true, but they are also true for the traditional systems development life cycle. Choice C is not necessarily always true.

Question 2
- (Topic 6)
The PRIMARY objective of Secure Sockets Layer (SSL) is to ensure:
My answer: -
Reference answer: A
Reference analysis:


SSL generates a session key used to encrypt/decrypt the transmitted data, thus ensuring its confidentiality. Although SSL allows the exchange of X509 certificates to provide for identification and authentication, this feature along with choices C and D are not the primary objectives.

Question 3
- (Topic 1)
What is essential for the IS auditor to obtain a clear understanding of network management?
My answer: -
Reference answer: C
Reference analysis:

A graphical interface to the map of the network topology is essential for the IS auditor to obtain a clear understanding of network management.

Question 4
- (Topic 2)
During the collection of forensic evidence, which of the following actions would MOST likely result in the destruction or corruption of evidence on a compromised system?
My answer: -
Reference answer: C
Reference analysis:


Rebooting the system may result in a change in the system state and the loss of files and important evidence stored in memory. The other choices are appropriate actions for preserving evidence.

Question 5
- (Topic 6)
The difference between a vulnerability assessment and a penetration test is that a vulnerability assessment:
My answer: -
Reference answer: A
Reference analysis:


The objective of a vulnerability assessment is to find the security holds in the computers and elements analyzed; its intent is not to damage the infrastructure. The intent of penetration testing is to imitate a hacker's activities and determine how far they could go into the network. They are not the same; they have different approaches. Vulnerability assessments and penetration testing can be executed by automated or manual tools or processes and can be executed by commercial or free tools.

Question 6
- (Topic 8)
In the context of physical access control, what is known as the process of verifying user identities?
My answer: -
Reference answer: A
Reference analysis:


Authentication is the process of verifying a user's claimed identity. It is based on at least one of these three factors: Something you know, Something you have, or Something you are.

Question 7
- (Topic 1)
After an IS auditor has identified threats and potential impacts, the auditor should:
My answer: -
Reference answer: A
Reference analysis:

After an IS auditor has identified threats and potential impacts, the auditor should then identify and evaluate the existing controls.

Question 8
- (Topic 8)
"Which of the following BEST describes the concept of ""defense in depth""?"
My answer: -
Reference answer: A
Reference analysis:


"With 0""defense in depth"", more than one subsystem needs to be compromised to compromise the security of the system and the information it holds. Subsystems should default to secure settings, and wherever possible should be designed to ""fail secure"" rather than ""fail insecure""."

Question 9
- (Topic 6)
When using a digital signature, the message digest is computed:
My answer: -
Reference answer: C
Reference analysis:


A digital signature is an electronic identification of a person or entity. It is created by using asymmetric encryption. To verify integrity of data, the sender uses a cryptographic hashing algorithm against the entire message to create a message digest to be sent along with the message. Upon receipt of the message, the receiver will recompute the hash using the same algorithm and compare results with what was sent to ensure the integrity of the message.

Question 10
- (Topic 6)
The BEST filter rule for protecting a network from being used as an amplifier in a denial of service (DoS) attack is to deny all:
My answer: -
Reference answer: A
Reference analysis:


Outgoing traffic with an IP source address different than the IP range in the network is invalid, in most of the cases, it signals a DoS attack originated by an internal user or by a previously compromised internal machine; in both cases, applying this filter will stop the attack.

Question 11
- (Topic 1)
If senior management is not committed to strategic planning, how likely is it that a company's implementation of IT will be successful?
My answer: -
Reference answer: C
Reference analysis:

A company's implementation of IT will be less likely to succeed if senior management is not committed to strategic planning.

Question 12
- (Topic 6)
An investment advisor e-mails periodic newsletters to clients and wants reasonable assurance that no one has modified the newsletter. This objective can be achieved by:
My answer: -
Reference answer: A
Reference analysis:


There is no attempt on the part of the investment advisor to prove their identity or to keep the newsletter confidential. The objective is to assure the receivers that it came to them without any modification, i.e., it has message integrity. Choice Ais correct because the hash is encrypted using the advisor's private key. The recipients can open the newsletter, recompute the hash and decrypt the received hash using the advisor's public key. If the two hashes are equal, the newsletter was not modified in transit. Choice B is not feasible, for no one other than the investment advisor can open it. Choice C addresses sender authentication but not message integrity. Choice D addresses confidentiality, but not message integrity, because anyone can obtain the investment advisor's public key, decrypt the newsletter, modify it and send it to others. The interceptor will not be able to use the advisor's private key, because they do not have it. Anything encrypted using the interceptor's privatekey can be decrypted by the receiver only by using their public key.

Question 13
- (Topic 6)
During an audit of a telecommunications system, an IS auditor finds that the risk of intercepting data transmitted to and from remote sites is very high. The MOST effective control for reducing this exposure is:
My answer: -
Reference answer: A
Reference analysis:


Encryption of data is the most secure method. The other methods are less secure, with leased lines being possibly the least secure method.

Question 14
- (Topic 6)
Digital signatures require the:
My answer: -
Reference answer: B
Reference analysis:


Digital signatures are intended to verify to a recipient the integrity of the data and the identity of the sender. The digital signature standard is a public key algorithm. This requires the signer to have a private key and the receiver to have a public key.

Question 15
- (Topic 5)
Which of the following controls would provide the GREATEST assurance of database integrity?
My answer: -
Reference answer: B
Reference analysis:


Performing table link/reference checks serves to detect table linking errors (such as completeness and accuracy of the contents of the database), and thus provides the greatest assurance of database integrity. Audit log procedures enable recording ofall events that have been identified and help in tracing the events. However, they only point to the event and do not ensure completeness or accuracy of the database's contents. Querying/monitoring table access time checks helps designers improve database performance, but not integrity. Rollback and rollforward database features ensure recovery from an abnormal disruption. They assure the integrity of the transaction that was being processed at the time of disruption, but do not provide assurance on the integrity of the contents of the database.

Question 16
- (Topic 1)
What often results in project scope creep when functional requirements are not defined as well as they could be?
My answer: -
Reference answer: A
Reference analysis:

Inadequate software baselining often results in project scope creep because functional requirements are not defined as well as they could be.

Question 17
- (Topic 2)
The decisions and actions of an IS auditor are MOST likely to affect which of the following risks?
My answer: -
Reference answer: B
Reference analysis:


Detection risks are directly affected by the auditor's selection of audit procedures and techniques. Inherent risks are not usually affected by an IS auditor. Control risks are controlled by the actions of the company's management. Business risks are not affected by an IS auditor.

Question 18
- (Topic 1)
Why is a clause for requiring source code escrow in an application vendor agreement important?
My answer: -
Reference answer: D
Reference analysis:

A clause for requiring source code escrow in an application vendor agreement is important to ensure that the source code remains available even if the application vendor goes out of business.

Question 19
- (Topic 1)
Authentication techniques for sending and receiving data between EDI systems is crucial to prevent which of the following? Choose the BEST answer.
My answer: -
Reference answer: B
Reference analysis:

Authentication techniques for sending and receiving data between EDI systems are crucial to prevent unauthorized transactions.

Question 20
- (Topic 8)
Which of the following types of attack works by taking advantage of the unenforced and unchecked assumptions the system makes about its inputs?
My answer: -
Reference answer: C
Reference analysis:


Code injection is a technique to introduce code into a computer program or system by taking advantage of the unenforced and unchecked assumptions the system makes about its inputs.

Question 21
- (Topic 3)
The ultimate purpose of IT governance is to:
My answer: -
Reference answer: A
Reference analysis:


IT governance is intended to specify the combination of decision rights and accountability that is best for the enterprise. It is different for every enterprise. Reducing IT costs may not be the best IT governance outcome for an enterprise. Decentralizing IT resources across the organization is not always desired, although it may be desired in a decentralized environment. Centralizing control of IT is not always desired. An example of where it might be desired is an enterprise desiring a single point of customer contact.

Page: 1 / 98
Total 1177 questions Full Exam Access