100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CISA (CERTIFIED INFORMATION SYSTEMS AUDITOR) QUESTIONS WITH DETAILED VERIFIED ANSWERS

Rating
-
Sold
-
Pages
51
Grade
A+
Uploaded on
03-12-2025
Written in
2025/2026

CISA (CERTIFIED INFORMATION SYSTEMS AUDITOR) QUESTIONS WITH DETAILED VERIFIED ANSWERSCISA (CERTIFIED INFORMATION SYSTEMS AUDITOR) QUESTIONS WITH DETAILED VERIFIED ANSWERSCISA (CERTIFIED INFORMATION SYSTEMS AUDITOR) QUESTIONS WITH DETAILED VERIFIED ANSWERSCISA (CERTIFIED INFORMATION SYSTEMS AUDITOR) QUESTIONS WITH DETAILED VERIFIED ANSWERSCISA (CERTIFIED INFORMATION SYSTEMS AUDITOR) QUESTIONS WITH DETAILED VERIFIED ANSWERSCISA (CERTIFIED INFORMATION SYSTEMS AUDITOR) QUESTIONS WITH DETAILED VERIFIED ANSWERSCISA (CERTIFIED INFORMATION SYSTEMS AUDITOR) QUESTIONS WITH DETAILED VERIFIED ANSWERSCISA (CERTIFIED INFORMATION SYSTEMS AUDITOR) QUESTIONS WITH DETAILED VERIFIED ANSWERS

Show more Read less
Institution
CISA
Module
CISA











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISA
Module
CISA

Document information

Uploaded on
December 3, 2025
Number of pages
51
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Page | 1



CISA (CERTIFIED INFORMATION SYSTEMS
AUDITOR) QUESTIONS WITH DETAILED
VERIFIED ANSWERS
Indemnity Clause Ans: a contractual transfer of risk between two
contractual parties generally to prevent loss or compensate for a loss
which may occur as a result of a specified event

Portfolio Management Ans: Assist in the definition, prioritization,
approval and running of a set of projects within a given organization.
These tools offer data capture, workflow and scenario planning
functionality, which can help identify the optimum set of projects (from
the full set of ideas) to take forward within a given budget.

Helps to gain an understanding of the effectiveness of controls over the
management of multiple projects

Top-Down Approach (Meaning-Based) Ans: Deriving lower-level policies
from corporate policies which aids in ensuring consistency across the
organization and consistency with other policies.

What is the BEST way to ensure that the tested code that is moved into
production is the same? Ans: Release management software

The project steering committee is ultimately responsible for: Ans:
project deliverables, costs and timetables

Load testing Ans: Evaluates the performance of the software under
normal and peak conditions.

Recovery testing Ans: evaluates the ability of a system to recover after
a failure.

Volume testing Ans: evaluates the impact of incremental volume of
records (not users) on a system.

, Page | 2

Stress testing Ans: determines the capacity of the software to cope with
an abnormal number of users or simultaneous operations.

Spooling Ans: sends documents to be printed to a buffer instead of
sending them immediately to the printer

Professional standards Ans: Professional standards from ISACA, The
Institute of Internal Auditors and the International Federation of
Accountants require supervision of audit staff to accomplish audit
objectives and comply with competence, professional proficiency and
documentation requirements, and more.

Honeypot Ans: Vulnerable computer that is set up to entice an intruder
to break into it and provides clues as to the hacker's methods and
strategies

Program coding standards Ans: These are required for efficient program
maintenance and modifications.

Denormalization vs Normalization Ans: Normalization is used to remove
redundant data from the database and to store non-redundant and
consistent data into it. Reduces data redundancy and inconsistency.
Maintains data integrity

Denormalization is used to combine multiple table data into one so that it
can be queried quickly. Introduces redundancy. Does not maintain any
data integrity

Escrow Agreement Ans: A source code escrow agreement is primarily
recommended to help protect the enterprise's investment in software,
because the source code will be available through a trusted third party
and can be retrieved if the start-up vendor goes out of business.

Which of the following is the initial step in creating a firewall policy?
Ans: Identification of network applications to be externally accessed

What BEST helps prioritize the recovery of IT assets when planning for a
disaster? Ans: Business impact analysis

, Page | 3

Incorporating the business impact analysis (BIA) into the IT disaster
recovery planning process is critical to ensure that IT assets are
prioritized to align with the business.

An advantage in using a bottom-up vs. a top-down approach to software
testing is that: Ans: errors in critical modules are detected earlier.

Spoofing Attack Ans: Attacker pretends to be another user or machine
to gain access

denial of service attack Ans: a cyber attack in which an attacker sends a
flood of data packets to the target computer, with the aim of overloading
its resources

Example: Ping of death

port scanning attack Ans: An attack where an attacker scans your
systems to see which ports are listening in an attempt to find a way to
gain unauthorized access.

man-in-the-middle attack Ans: A form of eavesdropping where the
attacker intercepts a computerized conversation between two parties and
then allows the conversation to continue by relaying the appropriate data
to both parties, while simultaneously monitoring the same data passing
through the attacker's conduit.

Which of the following is the MOST important consideration for database
hardening? Ans: Default database configurations are changed.

Default database configurations, such as default passwords and services,
need to be changed; otherwise, the database could be easily
compromised by malicious code and by intruders.

Which of the following has the MOST significant impact on the success of
an application systems implementation? Ans: The overall organizational
environment

An IS auditor discovers that developers have operator access to the
command line of a production environment operating system. Which of
the following controls would BEST mitigate the risk of undetected and

, Page | 4

unauthorized program changes to the production environment? Ans: The
matching of hash keys over time would allow detection of changes to
files.

pharming attack Ans: The pharming attack redirects the traffic to an
unauthorized web site by exploiting vulnerabilities of the DNS server.

Mitigation: Domain name system server security hardening

stress test Ans: a form of deliberately intense or thorough testing used
to determine the stability and performance of a given system, critical
infrastructure or entity. It involves testing beyond normal operational
capacity, often to a breaking point, in order to observe the results.

Ideally, stress testing should be carried out in a: Ans: test environment
using live workloads.

Which of the following is the BEST method for testing program changes?
Ans: Trace a sample of modified programs to supporting change tickets.

Function Point Analysis Ans: This is a technique used to determine the
size of a development task based on the number of function points.
Function points are factors such as inputs, outputs, inquiries and logical
internal sites.

White Box Testing Ans: This involves a detailed review of the behavior
of program code. It is a quality assurance technique suited to simpler
applications during the design and building stage of development.

Black Box Testing Ans: Testing, either functional or non-functional,
without reference to the internal structure of the component or system.

As part of the business continuity planning process, which of the following
should be identified FIRST in the business impact analysis? Ans: Critical
business processes for ascertaining the priority for recovery

In determining the acceptable time period for the resumption of critical
business processes: Ans: both downtime costs and recovery costs need
to be evaluated.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ivie Southern New Hampshire University
View profile
Follow You need to be logged in order to follow users or courses
Sold
19
Member since
9 months
Number of followers
1
Documents
8296
Last sold
1 month ago

3.3

6 reviews

5
2
4
1
3
1
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions