100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISA Exam Comprehensive Practice Questions and Correct Answers with Detailed Rationales

Rating
-
Sold
-
Pages
45
Grade
A+
Uploaded on
10-12-2025
Written in
2025/2026

CISA Exam Comprehensive Practice Questions and Correct Answers with Detailed Rationales In a public key infrastructure (PKI), which of the following may be relied upon to prove that an online transaction was authorized by a specific customer? A. Nonrepudiation B. Encryption C. Authentication D. Integrity correct answer is A. Which of the following BEST ensures the integrity of a server's operating system (OS)? A. Protecting the server in a secure location B. Setting a boot password C. Hardening the server configuration D. Implementing activity logging correct answer is C. The PRIMARY purpose of an IT forensic audit is: A. to participate in investigations related to corporate fraud. B. the systematic collection and analysis of evidence after a system irregularity. C. to assess the correctness of an organization's financial statements. D. to preserve evidence of criminal activity. The correct answer is B. The IS auditor is reviewing an organization's human resources (HR) database implementation. The IS auditor discovers that the database servers are clustered for high availability, all default database accounts have been removed and database audit logs are kept and reviewed on a weekly basis. What other area should the IS auditor check to ensure that the databases are appropriately secured? A. Database digital signatures B. Database encryption nonces and other variables C. Database media access control (MAC) address authentication D. Database initialization parameters The correct answer is D. Which of the following processes will be MOST effective in reducing the risk that unauthorized software on a backup server is distributed to the production server? A. Manually copy files to accomplish replication. B. Review changes in the software version control system. C. Ensure that developers do not have access to the backup server. D. Review the access control log of the backup server. The correct answer is B. A consulting firm has created a File Transfer Protocol (FTP) site for the purpose of receiving financial data and has communicated the site's address, user ID and password to the financial services company in separate email messages. The company is to transmit its data to the FTP site after manually encrypting the data. The IS auditor's GREATEST concern with this process is that: A. the users may not remember to manually encrypt the data before transmission. B. the site credentials were sent to the financial services company via email. C. personnel at the consulting firm may obtain access to sensitive data. D. the use of a shared user ID to the FTP site does not allow for user accountability. correct answer is A. In the course of performing a risk analysis, an IS auditor has identified threats and potential impacts. Next, the IS auditor should: A. identify and assess the risk assessment process used by management. B. identify information assets and the underlying systems. C. disclose the threats and impacts to management. D. identify and evaluate the existing controls. correct answer is D. A. certificate revocation list (CRL). B. digital signature. C. digital certificate. D. receiver's private key. Correct answer is C. When performing a review of a business process reengineering (BPR) effort, which of the following choices would be the PRIMARY concern? A. Controls are eliminated as part of the BPR effort. B. Resources are not adequate to support the BPR process. C. The audit department is not involved in the BPR effort. D. The BPR effort includes employees with limited knowledge of the process area. The correct answer is A. An IS auditor suspects an incident (attack) is occurring while an audit is being performed on a financial system. What should the IS auditor do FIRST? A. Request that the system be shut down to preserve evidence. B. Report the incident to management. C. Ask for immediate suspension of the suspect accounts. D. Immediately investigate the source and nature of the incident. The correct answer is B. Online banking transactions are being posted to the database when processing suddenly comes to a halt. The integrity of the transaction processing is BEST ensured by: A. database integrity checks. B. validation checks. C. input controls. D. database commits and rollbacks. Correct answer is D. Which of the following would be evaluated as a preventive control by an IS auditor performing an audit? A. Transaction logs B. Before and after image reporting C. Table lookups D. Tracing and tagging the answer is C.

Show more Read less
Institution
CISA - Certified Information Systems Auditor
Course
CISA - Certified Information Systems Auditor











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISA - Certified Information Systems Auditor
Course
CISA - Certified Information Systems Auditor

Document information

Uploaded on
December 10, 2025
Number of pages
45
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • cisa exam

Content preview

CISA Exam Comprehensive Practice Questions and Correct Answers with
Detailed Rationales
In a public key infrastructure (PKI), which of the following may be relied upon to
prove that an online transaction was authorized by a specific customer?

A. Nonrepudiation
B. Encryption
C. Authentication
D. Integrity

correct answer is A.

Which of the following BEST ensures the integrity of a server's operating system
(OS)?

A. Protecting the server in a secure location
B. Setting a boot password
C. Hardening the server configuration
D. Implementing activity logging
correct answer is C.

The PRIMARY purpose of an IT forensic audit is:

A. to participate in investigations related to corporate fraud.
B. the systematic collection and analysis of evidence after a system irregularity.
C. to assess the correctness of an organization's financial statements.
D. to preserve evidence of criminal activity.
The correct answer is B.

The IS auditor is reviewing an organization's human resources (HR) database
implementation. The IS auditor discovers that the database servers are clustered for
high availability, all default database accounts have been removed and database

,audit logs are kept and reviewed on a weekly basis. What other area should the IS
auditor check to ensure that the databases are appropriately secured?

A. Database digital signatures
B. Database encryption nonces and other variables
C. Database media access control (MAC) address authentication
D. Database initialization parameters
The correct answer is D.

Which of the following processes will be MOST effective in reducing the risk that
unauthorized software on a backup server is distributed to the production server?

A. Manually copy files to accomplish replication.
B. Review changes in the software version control system.
C. Ensure that developers do not have access to the backup server.
D. Review the access control log of the backup server.
The correct answer is B.

A consulting firm has created a File Transfer Protocol (FTP) site for the purpose of
receiving financial data and has communicated the site's address, user ID and
password to the financial services company in separate email messages. The
company is to transmit its data to the FTP site after manually encrypting the data.
The IS auditor's GREATEST concern with this process is that:

A. the users may not remember to manually encrypt the data before transmission.
B. the site credentials were sent to the financial services company via email.
C. personnel at the consulting firm may obtain access to sensitive data.
D. the use of a shared user ID to the FTP site does not allow for user accountability.
correct answer is A.

In the course of performing a risk analysis, an IS auditor has identified threats and
potential impacts. Next, the IS auditor should:

A. identify and assess the risk assessment process used by management.

,B. identify information assets and the underlying systems.
C. disclose the threats and impacts to management.
D. identify and evaluate the existing controls.
correct answer is D.

A. certificate revocation list (CRL).
B. digital signature.
C. digital certificate.
D. receiver's private key.
Correct answer is C.

When performing a review of a business process reengineering (BPR) effort, which
of the following choices would be the PRIMARY concern?

A. Controls are eliminated as part of the BPR effort.
B. Resources are not adequate to support the BPR process.
C. The audit department is not involved in the BPR effort.
D. The BPR effort includes employees with limited knowledge of the process area.
The correct answer is A.

An IS auditor suspects an incident (attack) is occurring while an audit is being
performed on a financial system. What should the IS auditor do FIRST?

A. Request that the system be shut down to preserve evidence.
B. Report the incident to management.
C. Ask for immediate suspension of the suspect accounts.
D. Immediately investigate the source and nature of the incident.
The correct answer is B.

Online banking transactions are being posted to the database when processing
suddenly comes to a halt. The integrity of the transaction processing is BEST
ensured by:

A. database integrity checks.

, B. validation checks.
C. input controls.
D. database commits and rollbacks.
Correct answer is D.

Which of the following would be evaluated as a preventive control by an IS auditor
performing an audit?

A. Transaction logs
B. Before and after image reporting
C. Table lookups
D. Tracing and tagging
the answer is C.

As a driver of IT governance, transparency of IT's cost, value and risk is primarily
achieved through:

A. performance measurement.
B. strategic alignment.
C. value delivery.
D. resource management.
the answer is A.

Which of the following choices is the MOST effective control that should be
implemented to ensure accountability for application users accessing sensitive data
in the human resource management system (HRMS) and among interfacing
applications to the HRMS?

A. Two-factor authentication
B. A digital certificate
C. Audit trails
D. Single sign-on authentication
the answer is C.
$11.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
NurseQueen1
4.7
(3)

Get to know the seller

Seller avatar
NurseQueen1 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
4
Member since
1 year
Number of followers
0
Documents
202
Last sold
1 week ago
NurseQueen

Welcome to top Grade Exam for high quality study materials, exam guides and notes that will help you ace your exams and stay ahead in your studies. I offer detailed study notes ,w ell elaborated comprehensive answers and well organized summaries across a range of subjects including ,nursing,mental health, medical surgeon,economics,arts,business management and many others. Whether you're preparing for final exams or looking for help with assignments, you will find the resources you need here. With years of experience as a student and a dedicated tutor, I ensure that each document is carefully crafted ,accurate and easy to understand. Browse through my collection today and start studying smarter. I'm here to help you succeed.

Read more Read less
4.7

3 reviews

5
2
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions