How Many Questions Of CISA Free Exam Questions

Proper study guides for Up to the immediate present Isaca Isaca CISA certified begins with Isaca CISA preparation products which designed to deliver the Best Quality CISA questions by making you pass the CISA test at your first time. Try the free CISA demo right now.

Free demo questions for Isaca CISA Exam Dumps Below:

Page: 1 / 98
Total 1177 questions Full Exam Access
Question 1
- (Topic 3)
Which of the following would an IS auditor consider to be the MOST important when evaluating an organization's IS strategy? That it:
My answer: -
Reference answer: D
Reference analysis:


Strategic planning sets corporate or department objectives into motion. Both long-term and short-term strategic plans should be consistent with the organization's broader plans and business objectives for attaining these goals. Choice A is incorrectsince line management prepared the plans.

Question 2
- (Topic 2)
While reviewing sensitive electronic work papers, the IS auditor noticed that they were not encrypted. This could compromise the:
My answer: -
Reference answer: D
Reference analysis:


Encryption provides confidentiality for the electronic work papers. Audit trails, audit phase approvals and access to the work papers do not, of themselves, affect the confidentiality but are part of the reason for requiring encryption.

Question 3
- (Topic 1)
Any changes in systems assets, such as replacement of hardware, should be immediately recorded within the assets inventory of which of the following? Choose the BEST answer.
My answer: -
Reference answer: B
Reference analysis:

Any changes in systems assets, such as replacement of hardware, should be immediately recorded within the assets inventory of a business continuity plan.

Question 4
- (Topic 5)
An IS auditor analyzing the audit log of a database management system (DBMS) finds that some transactions were partially executed as a result of an error, and are not rolled back. Which of the following transaction processing features has been violated?
My answer: -
Reference answer: D
Reference analysis:


Atomicity guarantees that either the entire transaction is processed or none of it is. Consistency ensures that the database is in a legal state when the transaction begins and ends, isolation means that, while in an intermediate state, the transaction data is invisible to external operations. Durability guarantees that a successful transaction will persist, and cannot be undone.

Question 5
- (Topic 6)
In wireless communication, which of the following controls allows the device receiving
the communications to verify that the received communications have not been altered in transit?
My answer: -
Reference answer: C
Reference analysis:


Calculating cryptographic hashes for wireless communications allows the device receiving the communications to verify that the received communications have not been altered in transit. This prevents masquerading and message modification attacks. Device authentication and data origin authentication is not the correct answer since authenticating wireless endpoints to each other prevents man-in-the-middle attacks and masquerading. Wireless iDS/lPSs is not the correct answer since wireless IDS/lPSshave the ability to detect misconfigured devices and rogue devices, and detect and possibly stop certain types of attacks. Packet headers and trailers alone do not ensure that the content has not been altered.

Question 6
- (Topic 3)
To support an organization's goals, an IS department should have:
My answer: -
Reference answer: B
Reference analysis:


To ensure its contribution to the realization of an organization's overall goals, the IS department should have long- and short-range plans that are consistent with the organization's broader plans for attaining its goals. Choices A and C are objectives, and plans would be needed to delineate how each of the objectives would be achieved. Choice D could be a part of the overall plan but would be required only if hardware or software is needed to achieve the organizational goals.

Question 7
- (Topic 5)
For locations 3a, 1d and 3d, the diagram indicates hubs with lines that appear to be open and active. Assuming that is true, what control, if any, should be recommended to mitigate this weakness?
My answer: -
Reference answer: C
Reference analysis:


Open hubs represent a significant control weakness because of the potential to access a network connection easily. An intelligent hub would allow the deactivation of a single port while leaving the remaining ports active. Additionally, physical security would also provide
reasonable protection over hubs with active ports.

Question 8
- (Topic 1)
Which type of major BCP test only requires representatives from each operational area to meet to review the plan?
My answer: -
Reference answer: C
Reference analysis:

Of the three major types of BCP tests (paper, walk-through, and preparedness), a walk-through test requires only that representatives from each operational area meet to review the plan.

Question 9
- (Topic 8)
Within a virus, which component is responsible for what the virus does to the victim file?
My answer: -
Reference answer: A
Reference analysis:


"A virus typically consist of three parts, which are a mechanism that allows them to infect other files and reproduce a trigger that activates delivery of a ""payload"" and the payload from which the virus often gets its name. The payload is what the virus does to the victim file."

Question 10
- (Topic 7)
During an audit, an IS auditor notes that an organization's business continuity plan (BCP) does not adequately address information confidentiality during a recovery process. The IS auditor should recommend that the plan be modified to include:
My answer: -
Reference answer: A
Reference analysis:


Business should consider whether information security levels required during recovery should be the same, lower or higher than when business is operating normally. In particular, any special rules for access to confidential data during a crisis needto be identified. The other choices do not directly address the information confidentiality issue.

Question 11
- (Topic 3)
When reviewing the IT strategic planning process, an IS auditor should ensure that the plan:
My answer: -
Reference answer: C
Reference analysis:


The IT strategic plan must include a clear articulation of the IT mission and vision. The plan need not address the technology, operational controls or project management practices.

Question 12
- (Topic 3)
Is it appropriate for an IS auditor from a company that is considering outsourcing its IS processing to request and review a copy of each vendor's business continuity plan?
My answer: -
Reference answer: A
Reference analysis:


The primary responsibility of an IS auditor is to assure that the company assets are being safeguarded. This is true even if the assets do not reside on the immediate premises. Reputable service bureaus will have a well-designed and tested business continuity plan.

Question 13
- (Topic 1)
Who should be responsible for network security operations?
My answer: -
Reference answer: B
Reference analysis:

Security administrators are usually responsible for network security operations.

Question 14
- (Topic 7)
The PRIMARY purpose of implementing Redundant Array of Inexpensive Disks (RAID) level 1 in a file server is to:
My answer: -
Reference answer: C
Reference analysis:


RAID level 1 provides disk mirroring. Data written to one disk are also written to another disk. Users in the network access data in the first disk; if disk one fails, the second disk takes over. This redundancy ensures the availability of datA. RAID level 1 does not improve performance, has no relevance to authentication and does nothing to provide for data confidentiality.

Question 15
- (Topic 6)
The human resources (HR) department has developed a system to allow employees to enroll in benefits via a web site on the corporate Intranet. Which of the following would protect the confidentiality of the data?
My answer: -
Reference answer: A
Reference analysis:


The main risk in this scenario is confidentiality, therefore the only option which would provide confidentiality is Secure Socket Layer (SSL) encryption. The remaining options deal with authentication issues.

Question 16
- (Topic 5)
The purpose of code signing is to provide assurance that:
My answer: -
Reference answer: A
Reference analysis:


Code signing can only ensure that the executable code has not been modified after being signed. The other choices are incorrect and actually represent potential and exploitable weaknesses of code signing.

Question 17
- (Topic 6)
Which of the following is the BEST way to satisfy a two-factor user authentication?
My answer: -
Reference answer: A
Reference analysis:


A smart card addresses what the user has. This is generally used in conjunction with testing what the user knows, e.g., a keyboard password or personal identification number (PIN). An ID and password, what the user knows, is a single-factor user authentication. Choice C is not a two-factor user authentication because it is only biometric. Choice D is similar to choice A, but the magnetic card may be copied; therefore, choice A is the best way to satisfy a two-factor user authentication.

Question 18
- (Topic 5)
The FIRST step in managing the risk of a cyber attack is to:
My answer: -
Reference answer: C
Reference analysis:


The first step in managing risk is the identification and classification of critical information resources (assets). Once the assets have been identified, the process moves onto the identification of threats, vulnerabilities and calculation of potential damages.

Question 19
- (Topic 1)
What can be very helpful to an IS auditor when determining the efficacy of a systems maintenance program? Choose the BEST answer.
My answer: -
Reference answer: B
Reference analysis:

A system downtime log can be very helpful to an IS auditor when determining the efficacy of a systems maintenance program.

Question 20
- (Topic 6)
The feature of a digital signature that ensures the sender cannot later deny generating and sending the message is called:
My answer: -
Reference answer: C
Reference analysis:


All of the above are features of a digital signature. Non repudiation ensures that the claimed sender cannot later deny generating and sending the message. Data integrity refers to changes in the plaintext message that would result in the recipient failing to compute the same message hash. Since only the claimed sender has the key, authentication ensures that the message has been sent by the claimed sender. Replay protection is a method that a recipient can use to check that the message was not intercepted and replayed.

Question 21
- (Topic 2)
A substantive test to verify that tape library inventory records are accurate is:
My answer: -
Reference answer: C
Reference analysis:


A substantive test includes gathering evidence to evaluate the integrity of individual transactions, data or other information. Conducting a physical count of the tape inventory is a substantive test. Choices A, B and D are compliance tests.

Page: 1 / 98
Total 1177 questions Full Exam Access