03 February, 2024
How Many Questions Of CISA Free Exam Questions
Proper study guides for Up to the immediate present Isaca Isaca CISA certified begins with Isaca CISA preparation products which designed to deliver the Best Quality CISA questions by making you pass the CISA test at your first time. Try the free CISA demo right now.
Free demo questions for Isaca CISA Exam Dumps Below:
Question 1
- (Topic 3)
Which of the following would an IS auditor consider to be the MOST important when evaluating an organization's IS strategy? That it:
Which of the following would an IS auditor consider to be the MOST important when evaluating an organization's IS strategy? That it:
Question 2
- (Topic 2)
While reviewing sensitive electronic work papers, the IS auditor noticed that they were not encrypted. This could compromise the:
While reviewing sensitive electronic work papers, the IS auditor noticed that they were not encrypted. This could compromise the:
Question 3
- (Topic 1)
Any changes in systems assets, such as replacement of hardware, should be immediately recorded within the assets inventory of which of the following? Choose the BEST answer.
Any changes in systems assets, such as replacement of hardware, should be immediately recorded within the assets inventory of which of the following? Choose the BEST answer.
Question 4
- (Topic 5)
An IS auditor analyzing the audit log of a database management system (DBMS) finds that some transactions were partially executed as a result of an error, and are not rolled back. Which of the following transaction processing features has been violated?
An IS auditor analyzing the audit log of a database management system (DBMS) finds that some transactions were partially executed as a result of an error, and are not rolled back. Which of the following transaction processing features has been violated?
Question 5
- (Topic 6)
In wireless communication, which of the following controls allows the device receiving
the communications to verify that the received communications have not been altered in transit?
In wireless communication, which of the following controls allows the device receiving
the communications to verify that the received communications have not been altered in transit?
Question 6
- (Topic 3)
To support an organization's goals, an IS department should have:
To support an organization's goals, an IS department should have:
Question 7
- (Topic 5)
For locations 3a, 1d and 3d, the diagram indicates hubs with lines that appear to be open and active. Assuming that is true, what control, if any, should be recommended to mitigate this weakness?
For locations 3a, 1d and 3d, the diagram indicates hubs with lines that appear to be open and active. Assuming that is true, what control, if any, should be recommended to mitigate this weakness?
Question 8
- (Topic 1)
Which type of major BCP test only requires representatives from each operational area to meet to review the plan?
Which type of major BCP test only requires representatives from each operational area to meet to review the plan?
Question 9
- (Topic 8)
Within a virus, which component is responsible for what the virus does to the victim file?
Within a virus, which component is responsible for what the virus does to the victim file?
Question 10
- (Topic 7)
During an audit, an IS auditor notes that an organization's business continuity plan (BCP) does not adequately address information confidentiality during a recovery process. The IS auditor should recommend that the plan be modified to include:
During an audit, an IS auditor notes that an organization's business continuity plan (BCP) does not adequately address information confidentiality during a recovery process. The IS auditor should recommend that the plan be modified to include:
Question 11
- (Topic 3)
When reviewing the IT strategic planning process, an IS auditor should ensure that the plan:
When reviewing the IT strategic planning process, an IS auditor should ensure that the plan:
Question 12
- (Topic 3)
Is it appropriate for an IS auditor from a company that is considering outsourcing its IS processing to request and review a copy of each vendor's business continuity plan?
Is it appropriate for an IS auditor from a company that is considering outsourcing its IS processing to request and review a copy of each vendor's business continuity plan?
Question 13
- (Topic 1)
Who should be responsible for network security operations?
Who should be responsible for network security operations?
Question 14
- (Topic 7)
The PRIMARY purpose of implementing Redundant Array of Inexpensive Disks (RAID) level 1 in a file server is to:
The PRIMARY purpose of implementing Redundant Array of Inexpensive Disks (RAID) level 1 in a file server is to:
Question 15
- (Topic 6)
The human resources (HR) department has developed a system to allow employees to enroll in benefits via a web site on the corporate Intranet. Which of the following would protect the confidentiality of the data?
The human resources (HR) department has developed a system to allow employees to enroll in benefits via a web site on the corporate Intranet. Which of the following would protect the confidentiality of the data?
Question 16
- (Topic 5)
The purpose of code signing is to provide assurance that:
The purpose of code signing is to provide assurance that:
Question 17
- (Topic 6)
Which of the following is the BEST way to satisfy a two-factor user authentication?
Which of the following is the BEST way to satisfy a two-factor user authentication?
Question 18
- (Topic 5)
The FIRST step in managing the risk of a cyber attack is to:
The FIRST step in managing the risk of a cyber attack is to:
Question 19
- (Topic 1)
What can be very helpful to an IS auditor when determining the efficacy of a systems maintenance program? Choose the BEST answer.
What can be very helpful to an IS auditor when determining the efficacy of a systems maintenance program? Choose the BEST answer.
Question 20
- (Topic 6)
The feature of a digital signature that ensures the sender cannot later deny generating and sending the message is called:
The feature of a digital signature that ensures the sender cannot later deny generating and sending the message is called:
Question 21
- (Topic 2)
A substantive test to verify that tape library inventory records are accurate is:
A substantive test to verify that tape library inventory records are accurate is: