Update Isaca CISA CISA Free Exam Questions

It is more faster and easier to pass the Isaca CISA exam by using 100% Guarantee Isaca Isaca CISA questuins and answers. Immediate access to the Up to the minute CISA Exam and find the same core area CISA questions with professionally verified answers, then PASS your exam with a high score now.

Free demo questions for Isaca CISA Exam Dumps Below:

Page: 1 / 98
Total 1177 questions Full Exam Access
Question 1
- (Topic 1)
An IS auditor reviewing the key roles and responsibilities of the database administrator (DBA) is LEAST likely to expect the job description of the DBA to include:
My answer: -
Reference answer: D
Reference analysis:


A DBA only in rare instances should be mapping data elements from the data model to the internal schema (physical data storage definitions). To do so would eliminate data independence for application systems. Mapping of the data model occurs with the conceptual schema since the conceptual schema represents the enterprisewide view of data within an organization and is the basis for deriving an end-user department data model.

Question 2
- (Topic 7)
The MAIN purpose for periodically testing offsite facilities is to:
My answer: -
Reference answer: C
Reference analysis:


The main purpose of offsite hardware testing is to ensure the continued compatibility of the contingency facilities. Specific software tools are available to protect the ongoing integrity of the database. Contingency plans should not be eliminated and program and system documentation should be reviewed continuously for currency.

Question 3
- (Topic 1)
Which of the following provides the BEST single-factor authentication?
My answer: -
Reference answer: A
Reference analysis:

Although biometrics provides only single-factor authentication, many consider it to be an excellent method for user authentication.

Question 4
- (Topic 4)
Which of the following types of data validation editing checks is used to determine if a field contains data, and not zeros or blanks?
My answer: -
Reference answer: C
Reference analysis:


A completeness check is used to determine if a field contains data and not zeros or blanks. A check digit is a digit calculated mathematically to ensure original data were not altered. An existence check also checks entered data for agreement to predetermined criteriA. A reasonableness check matches input to predetermined reasonable limits or occurrence rates.

Question 5
- (Topic 4)
Which of the following is the GREATEST risk when implementing a data warehouse?
My answer: -
Reference answer: B
Reference analysis:


Once the data is in a warehouse, no modifications should be made to it and access controls should be in place to prevent data modification. Increased response time on the production systems is not a risk, because a data warehouse does not impact production datA. Based on data replication, data duplication is inherent in a data warehouse. Transformation of data from operational systems to a data warehouse is done at predefined intervals, and as such, data may not be current.

Question 6
- (Topic 1)
What determines the strength of a secret key within a symmetric key cryptosystem?
My answer: -
Reference answer: B
Reference analysis:

The strength of a secret key within a symmetric key cryptosystem is determined by a combination of key length, initial input vectors, and the complexity of the data-encryption algorithm that uses the key.

Question 7
- (Topic 6)
Which of the following penetration tests would MOST effectively evaluate incident
handling and response capabilities of an organization?
My answer: -
Reference answer: D
Reference analysis:


In a double-blind test, the administrator and security staff are not aware of the test, which will result in an assessment of the incident handling and response capability in an organization. In targeted, external, and internal testing, the system administrator and security staff are aware of the tests since they are informed before the start of the tests.

Question 8
- (Topic 4)
Functionality is a characteristic associated with evaluating the quality of software products throughout their life cycle, and is BEST described as the set of attributes that bear on the:
My answer: -
Reference answer: A
Reference analysis:


Functionality is the set of attributes that bears on the existence of a set of functions and their specified properties. The functions are those that satisfy stated or implied needs. Choice B refers to portability, choice C refers to reliability andchoice D refers to efficiency.

Question 9
- (Topic 1)
Which of the following is a data validation edit and control?
My answer: -
Reference answer: B
Reference analysis:


A reasonableness check is a data validation edit and control, used to ensure that data conforms to predetermined criteriA.

Question 10
- (Topic 6)
An IS auditor has completed a network audit. Which of the following is the MOST significant logical security finding?
My answer: -
Reference answer: A
Reference analysis:


Choice A is the only logical security finding. Network logical security controls should be in place to restrict, identify, and report authorized and unauthorized users of the network. Disabling inactive workstations restricts users of the network. Choice D is an environmental issue and choices B and C are physical security issues. Choices B, C and D should be reported to the appropriate entity.

Question 11
- (Topic 5)
Which of the following would BEST maintain the integrity of a firewall log?
My answer: -
Reference answer: D
Reference analysis:


Establishing a dedicated third-party log server and logging events in it is the best procedure for maintaining the integrity of a firewall log. When access control to the log server is adequately maintained, the risk of unauthorized log modification will be mitigated, therefore improving the integrity of log information. To enforce segregation of duties, administrators should not have access to log files. This primarily contributes to the assurance of confidentiality rather than integrity. Thereare many ways to capture log information: through the application layer, network layer, operating systems layer, etc.; however, there is no log integrity advantage in capturing events in the operating systems layer. If it is a highly mission-critical information system, it may be nice to run the system with a dual log mode. Having logs in two different storage devices will primarily contribute to the assurance of the availability of log information, rather than to maintaining its integrity.

Question 12
- (Topic 4)
From a risk management point of view, the BEST approach when implementing a large and complex IT infrastructure is:
My answer: -
Reference answer: C
Reference analysis:


When developing a large and complex IT infrastructure, the best practice is to use a phased approach to fitting the entire system together. This will provide greater assurance of quality results. The other choices are riskier approaches.

Question 13
- (Topic 1)
An off-site processing facility should be easily identifiable externally because easy identification helps ensure smoother recovery. True or false?
My answer: -
Reference answer: B
Reference analysis:

An off-site processing facility should not be easily identifiable externally because easy identification would create an additional vulnerability for sabotage.

Question 14
- (Topic 5)
An IS auditor observes a weakness in the tape management system at a data center in that some parameters are set to bypass or ignore tape header records. Which of the following is the MOST effective compensating control for this weakness?
My answer: -
Reference answer: A
Reference analysis:


If the IS auditor finds that there are effective staging and job set up processes, this can be accepted as a compensating control. Choice B is a detective control while choices C and D are corrective controls, none of which would serve as good compensating controls.

Question 15
- (Topic 6)
A virtual private network (VPN) provides data confidentiality by using:
My answer: -
Reference answer: B
Reference analysis:


VPNs secure data in transit by encapsulating traffic, a process known as tunnelling. SSL is a symmetric method of encryption between a server and a browser. Digital signatures are not used in the VPN process, while phishing is a form of a social engineering attack.

Question 16
- (Topic 6)
Which of the following would effectively verify the originator of a transaction?
My answer: -
Reference answer: D
Reference analysis:


A digital signature is an electronic identification of a person, created by using a public key algorithm, to verify to a recipient the identity of the source of a transaction and the integrity of its content. Since they are a 'shared secret' between the user and the system itself, passwords are considered a weaker means of authentication. Encrypting the transaction with the recipient's public key will provide confidentiality for the information, while using a portable document format(PDF) will probe the integrity of the content but not necessarily authorship.

Question 17
- (Topic 2)
During the planning stage of an IS audit, the PRIMARY goal of an IS auditor is to:
My answer: -
Reference answer: A
Reference analysis:


ISACA auditing standards require that an IS auditor plan the audit work to address the audit objectives. Choice B is incorrect because the auditor does not collect evidence in the planning stage of an audit. Choices C and D are incorrect because theyare not the primary goals of audit planning. The activities described in choices B, C and D are all undertaken to address audit objectives and are thus secondary to choice A.

Question 18
- (Topic 8)
Which of the following types of spyware was originally designed for determining the sources of error or for measuring staff productivity?
My answer: -
Reference answer: B
Reference analysis:


Keystroke logging (in the form of spyware) was originally a function of diagnostic tool deployed by software developers for capturing user's keystrokes.
This is done for determining the sources of error or for measuring staff productivity.

Question 19
- (Topic 7)
Which of the following would contribute MOST to an effective business continuity plan (BCP)?
My answer: -
Reference answer: B
Reference analysis:


The involvement of user departments in the BCP is crucial for the identification of the business processing priorities. The BCP circulation will ensure that the BCP document is received by all users. Though essential, this does not contribute significantly to the success of the BCP. A BCP approved by senior management would not ensure the quality of the BCP, nor would an audit necessarily improve the quality of the BCP.

Question 20
- (Topic 4)
The MAJOR advantage of a component-based development approach is the:
My answer: -
Reference answer: D
Reference analysis:


Components written in one language can interact with components written in other languages or running on other machines, which can increase the speed of development. Software developers can then focus on business logic. The other choices are not themost significant advantages of a component-based development approach.

Question 21
- (Topic 5)
During the audit of a database server, which of the following would be considered the GREATEST exposure?
My answer: -
Reference answer: B
Reference analysis:


Default security settings for the database could allow issues like blank user passwords or passwords that were the same as the username. Logging all database activity is not practical. Failure to purge old data may present a performance issue but isnot an
immediate security concern. Choice A is an exposure but not as serious as B.

Page: 1 / 98
Total 1177 questions Full Exam Access