How Many Questions Of CISA Free Samples

we provide Highest Quality Isaca CISA test question which are the best for clearing CISA test, and to get certified by Isaca Isaca CISA. The CISA Questions & Answers covers all the knowledge points of the real CISA exam. Crack your Isaca CISA Exam with latest dumps, guaranteed!

Check CISA free dumps before getting the full version:

Page: 1 / 98
Total 1177 questions Full Exam Access
Question 1
- (Topic 6)
Which of the following biometrics has the highest reliability and lowest false-acceptance rate (FAR)?
My answer: -
Reference answer: C
Reference analysis:


Retina scan uses optical technology to map the capillary pattern of an eye's retinA. This is highly reliable and has the lowest false-acceptance rate (FAR) among the current biometric methods. Use of palm scanning entails placing a hand on a scannerwhere a palm's physical characteristics are captured. Hand geometry, one of the oldest techniques, measures the physical characteristics of the user's hands and fingers from a three dimensional perspective. The palm and hand biometric techniques lackuniqueness in the geometry datA. In face biometrics, a reader analyzes the images captured for general facial characteristics. Though considered a natural and friendly biometric, the main disadvantage of face recognition is the lack of uniqueness, which means that people looking alike can fool the device.

Question 2
- (Topic 1)
The quality of the metadata produced from a data warehouse is _______________ in the warehouse's design. Choose the BEST answer.
My answer: -
Reference answer: B
Reference analysis:

The quality of the metadata produced from a data warehouse is the most important consideration in the warehouse's design.

Question 3
- (Topic 8)
Why is it not preferable for a firewall to treat each network frame or packet in isolation?
My answer: -
Reference answer: A
Reference analysis:


A stateless firewall treats each network frame or packet in isolation.
Such a firewall has no way of knowing if any given packet is part of an existing connection,
is trying to establish a new connection, or is just a rogue packet.

Question 4
- (Topic 6)
Validated digital signatures in an e-mail software application will:
My answer: -
Reference answer: A
Reference analysis:


Validated electronic signatures are based on qualified certificates that are created by a certification authority (CA), with the technical standards required to ensure the key can neither be forced nor reproduced in a reasonable time. Such certificates are only delivered through a registration authority (RA) after a proof of identity has been passed. Using strong signatures in e-mail traffic, nonrepudiation can be assured and a sender can be tracked. The recipient can configure their e-mail server or client to automatically delete e-mails from specific senders. For confidentiality issues, one must use encryption, not a signature, although both methods can be based on qualified certificates. Without any filters directly applied on mail gateway servers to block traffic without strong signatures, the workload will not increase. Using filters directly on a gateway server will result in an overhead less than antivirus software imposes. Digital signatures are only a few bytes in size and will not slash bandwidth. Even if gateway servers were to check CRLs, there is little overhead.

Question 5
- (Topic 6)
The logical exposure associated with the use of a checkpoint restart procedure is:
My answer: -
Reference answer: B
Reference analysis:


Asynchronous attacks are operating system-based attacks. A checkpoint restart is a feature that stops a program at specified intermediate points for later restart in an orderly manner without losing data at the checkpoint. The operating system savesa copy of the computer programs and data in their current state as well as several system parameters describing the mode and security level of the program at the time of stoppage. An asynchronous attack occurs when an individual with access to this information is able to gain access to the checkpoint restart copy of the system parameters and change those parameters such that upon restart the program would function at a higher-priority security level.

Question 6
- (Topic 8)
Which of the following correctly describes the purpose of an Electronic data processing audit?
My answer: -
Reference answer: A
Reference analysis:


An Electronic data processing (EDP) audit is an IT audit. It is the process of collecting and evaluating evidence of an organization's information systems, practices, and operations.

Question 7
- (Topic 4)
What control detects transmission errors by appending calculated bits onto the end of each segment of data?
My answer: -
Reference answer: C
Reference analysis:


A redundancy check detects transmission errors by appending calculated bits onto the end of each segment of datA. A reasonableness check compares data to predefined reasonability limits or occurrence rates established for the datA. A parity check isa hardware control that detects data errors when data are read from one computer to another, from memory or during transmission. Check digits detect transposition and transcription errors.

Question 8
- (Topic 7)
If a database is restored using before-image dumps, where should the process begin following an interruption?
My answer: -
Reference answer: A
Reference analysis:


If before images are used, the last transaction in the dump will not have updated the database prior to the dump being taken. The last transaction will not have updated the database and must be reprocessed. Program checkpoints are irrelevant in this situation.

Question 9
- (Topic 2)
When assessing the design of network monitoring controls, an IS auditor should FIRST review network:
My answer: -
Reference answer: A
Reference analysis:


The first step in assessing network monitoring controls should be the review of the adequacy of network documentation, specifically topology diagrams. If this information is not up to date, then monitoring processes and the ability to diagnose problems will not be effective.

Question 10
- (Topic 1)
What is an acceptable recovery mechanism for extremely time-sensitive transaction processing?
My answer: -
Reference answer: C
Reference analysis:

Shadow file processing can be implemented as a recovery mechanism for extremely time-sensitive transaction processing.

Question 11
- (Topic 6)
Which of the following is the MOST effective control over visitor access to a data center?
My answer: -
Reference answer: A
Reference analysis:


Escorting visitors will provide the best assurance that visitors have permission to access the data processing facility. Choices B and C are not reliable controls. Choice D is incorrect because visitors should be accompanied at all times while they are on the premises, not only when they are in the data processing facility.

Question 12
- (Topic 1)
When should plans for testing for user acceptance be prepared? Choose the BEST answer.
My answer: -
Reference answer: A
Reference analysis:

Plans for testing for user acceptance are usually prepared in the requirements definition phase of the systems-development project.

Question 13
- (Topic 1)
What can be used to gather evidence of network attacks?
My answer: -
Reference answer: B
Reference analysis:

Intrusion-detection systems (IDS) are used to gather evidence of network attacks.

Question 14
- (Topic 3)
When implementing an IT governance framework in an organization the MOST important objective is:
My answer: -
Reference answer: A
Reference analysis:


The goals of IT governance are to improve IT performance, to deliver optimum business value and to ensure regulatory compliance. The key practice in support of these goals is the strategic alignment of IT with the business {choice A). To achieve alignment, all other choices need to be tied to business practices and strategies.

Question 15
- (Topic 8)
What is wrong with a Black Box type of intrusion detection system?
My answer: -
Reference answer: C
Reference analysis:


"An intrusion detection system should to able to run continually without human supervision.
The system must be reliable enough to allow it to run in the background of the system being observed. However, it should not be a ""black box"", coz you want to ensure its internal workings are examinable from outside."

Question 16
- (Topic 3)
Which of the following IT governance best practices improves strategic alignment?
My answer: -
Reference answer: D
Reference analysis:


Top management mediating between the imperatives of business and technology is an IT strategic alignment best practice. Supplier and partner risks being managed is a risk management best practice. A knowledge base on customers, products, markets andprocesses being in place is an IT value delivery best practice. An infrastructure being provided to facilitate the creation and sharing of business information is an IT value delivery and risk management best practice.

Question 17
- (Topic 1)
Which of the following could lead to an unintentional loss of confidentiality? Choose the BEST answer.
My answer: -
Reference answer: A
Reference analysis:

Lack of employee awareness of a company's information security policy could lead to an unintentional loss of confidentiality.

Question 18
- (Topic 3)
Which of the following provides the best evidence of the adequacy of a security awareness program?
My answer: -
Reference answer: D
Reference analysis:


The adequacy of security awareness content can best be assessed by determining whether it is periodically reviewed and compared to industry best practices. Choices A, B and C provide metrics for measuring various aspects of a security awareness program, but do not help assess the content.

Question 19
- (Topic 1)
IS management has decided to rewrite a legacycustomer relations system using fourth generation languages (4GLs). Which of the following risks is MOST often associated with system development using 4GLs?
My answer: -
Reference answer: D
Reference analysis:


4GLs are usually not suitable for data intensive operations. Instead, they are used mainly for graphic user interface (GUI) design or as simple query/report generators.

Question 20
- (Topic 4)
During the requirements definition phase of a software development project, the aspects of software testing that should be addressed are developing:
My answer: -
Reference answer: D
Reference analysis:


A key objective in any software development project is to ensure that the developed software will meet the business objectives and the requirements of the user. The users should be involved in the requirements definition phase of a development project and user acceptance test specification should be developed during this phase. The other choices are generally performed during the system testing phase.

Question 21
- (Topic 1)
Above almost all other concerns, what often results in the greatest negative impact on the implementation of new application software?
My answer: -
Reference answer: A
Reference analysis:

Above almost all other concerns, failing to perform user acceptance testing often results in the greatest negative impact on the implementation of new application software.

Page: 1 / 98
Total 1177 questions Full Exam Access