31 January, 2024
The Updated Guide To CISA Free Practice Questions
Testking CISA Questions are updated and all CISA answers are verified by experts. Once you have completely prepared with our CISA exam prep kits you will be ready for the real CISA exam without a problem. We have Renovate Isaca CISA dumps study guide. PASSED CISA First attempt! Here What I Did.
Free demo questions for Isaca CISA Exam Dumps Below:
Question 1
- (Topic 2)
Which of the following is the PRIMARY advantage of using computer forensic software for investigations?
Which of the following is the PRIMARY advantage of using computer forensic software for investigations?
Question 2
- (Topic 6)
Disabling which of the following would make wireless local area networks more secure against unauthorized access?
Disabling which of the following would make wireless local area networks more secure against unauthorized access?
Question 3
- (Topic 1)
An IS auditor should carefully review the functional requirements in a systems-development project to ensure that the project is designed to:
An IS auditor should carefully review the functional requirements in a systems-development project to ensure that the project is designed to:
Question 4
- (Topic 7)
During a review of a business continuity plan, an IS auditor noticed that the point at which a situation is declared to be a crisis has not been defined. The MAJOR risk associated with this is that:
During a review of a business continuity plan, an IS auditor noticed that the point at which a situation is declared to be a crisis has not been defined. The MAJOR risk associated with this is that:
Question 5
- (Topic 8)
As part of the IEEE 802.11 standard ratified in September 1999, WEP uses the CRC- 32 checksum for:
As part of the IEEE 802.11 standard ratified in September 1999, WEP uses the CRC- 32 checksum for:
Question 6
- (Topic 6)
The PRIMARY objective of a logical access control review is to:
The PRIMARY objective of a logical access control review is to:
Question 7
- (Topic 7)
Which of the following is a continuity plan test that uses actual resources to simulate a system crash to cost-effectively obtain evidence about the plan's effectiveness?
Which of the following is a continuity plan test that uses actual resources to simulate a system crash to cost-effectively obtain evidence about the plan's effectiveness?
Question 8
- (Topic 6)
In auditing a web server, an IS auditor should be concerned about the risk of individuals gaining unauthorized access to confidential information through:
In auditing a web server, an IS auditor should be concerned about the risk of individuals gaining unauthorized access to confidential information through:
Question 9
- (Topic 4)
An organization is implementing an enterprise resource planning (ERP) application to meet its business objectives. Of the following, who is PRIMARILY responsible for overseeing the project in order to ensure that it is progressing in accordance with the project plan and that it will deliver the expected results?
An organization is implementing an enterprise resource planning (ERP) application to meet its business objectives. Of the following, who is PRIMARILY responsible for overseeing the project in order to ensure that it is progressing in accordance with the project plan and that it will deliver the expected results?
Question 10
- (Topic 3)
When performing a review of the structure of an electronic funds transfer (EFT) system, an IS auditor observes that the technological infrastructure is based on a centralized processing scheme that has been outsourced to a provider in another country. Based on this information, which of the following conclusions should be the main concern of the IS auditor?
When performing a review of the structure of an electronic funds transfer (EFT) system, an IS auditor observes that the technological infrastructure is based on a centralized processing scheme that has been outsourced to a provider in another country. Based on this information, which of the following conclusions should be the main concern of the IS auditor?
Question 11
CORRECT TEXT - (Topic 2)
The vice president of human resources has requested an audit to identify payroll overpayments for the previous year. Which would be the BEST audit technique to use in this situation?
The vice president of human resources has requested an audit to identify payroll overpayments for the previous year. Which would be the BEST audit technique to use in this situation?
Question 12
- (Topic 5)
An organization has recently installed a security patch, which crashed the production server. To minimize the probability of this occurring again, an IS auditor should:
An organization has recently installed a security patch, which crashed the production server. To minimize the probability of this occurring again, an IS auditor should:
Question 13
- (Topic 7)
A structured walk-through test of a disaster recovery plan involves:
A structured walk-through test of a disaster recovery plan involves:
Question 14
- (Topic 6)
An IS auditor reviewing digital rights management (DRM) applications should expect to find an extensive use for which of the following technologies?
An IS auditor reviewing digital rights management (DRM) applications should expect to find an extensive use for which of the following technologies?
Question 15
- (Topic 1)
What kind of testing should programmers perform following any changes to an application or system?
What kind of testing should programmers perform following any changes to an application or system?
Question 16
- (Topic 2)
An IS auditor issues an audit report pointing out the lack of firewall protection features at the perimeter network gateway and recommends a vendor product to address this vulnerability. The IS auditor has failed to exercise:
An IS auditor issues an audit report pointing out the lack of firewall protection features at the perimeter network gateway and recommends a vendor product to address this vulnerability. The IS auditor has failed to exercise:
Question 17
- (Topic 6)
An IS auditor examining a biometric user authentication system establishes the existence
of a control weakness that would allow an unauthorized individual to update the centralized database on the server that is used to store biometric templates. Ofthe following, which is the BEST control against this risk?
An IS auditor examining a biometric user authentication system establishes the existence
of a control weakness that would allow an unauthorized individual to update the centralized database on the server that is used to store biometric templates. Ofthe following, which is the BEST control against this risk?
Question 18
- (Topic 1)
What is the PRIMARY purpose of audit trails?
What is the PRIMARY purpose of audit trails?
Question 19
- (Topic 8)
The technique of rummaging through commercial trash to collect useful business information is known as:
The technique of rummaging through commercial trash to collect useful business information is known as:
Question 20
CORRECT TEXT - (Topic 7)
While observing a full simulation of the business continuity plan, an IS auditor notices that the notification systems within the organizational facilities could be severely impacted by infra structural damage. The BEST recommendation the IS auditor can provide to the organization is to ensure:
While observing a full simulation of the business continuity plan, an IS auditor notices that the notification systems within the organizational facilities could be severely impacted by infra structural damage. The BEST recommendation the IS auditor can provide to the organization is to ensure:
Question 21
- (Topic 6)
What is the BEST approach to mitigate the risk of a phishing attack?
What is the BEST approach to mitigate the risk of a phishing attack?