100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CISA FINAL EXAM QUESTIONS AND 100% CORRECT ANSWERS

Rating
-
Sold
-
Pages
29
Grade
A+
Uploaded on
28-08-2025
Written in
2025/2026

CISA FINAL EXAM QUESTIONS AND 100% CORRECT ANSWERS

Institution
CISA
Course
CISA










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISA
Course
CISA

Document information

Uploaded on
August 28, 2025
Number of pages
29
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CISA FINAL EXAM QUESTIONS
AND 100% CORRECT ANSWERS!!
5. While reviewing the IT infrastructure, an IS auditor notices that storage resources
are continuously being added. The IS auditor should:
A. recommend the use of disk mirroring.
B. review the adequacy of offsite storage.
C. review the capacity management process.
D. recommend the use of a compression algorithm.

C

6. During a compliance audit of a small bank, the IS auditor notes that both the IT and
accounting functions are being performed by the same user of the financial system.
Which of the following reviews conducted by a supervisor would represent the BEST
compensating control?
A. Audit trails that show the date and time of the transaction.
B. A summary daily report with the total numbers and dollar amounts of each transaction.
C. User account administration.
D. Computer log files that show individual transactions in the financial system.

D

7. From a control perspective, the PRIMARY objective of classifying information assets
is to:
A. establish guidelines for the level of access controls that should be
assigned. B. ensure access controls are assigned to all information assets.
C. assist management and auditors in risk assessment. D.
identify which assets need to be insured against losses.

,A

8. To gain an understanding of the effectiveness of an organization's planning and
management of investments in IT assets, an IS auditor should review the:
A. enterprise data model.
B. IT balanced scorecard (BSC).
C. IT organizational structure. D.
historical financial statements.

B

9. When using a universal storage bus (USB) flash drive to transport confidential corporate
data to an offsite location, an effective control would be to:
A. carry the flash drive in a portable safe.
B. assure management that you will not lose the flash drive. C.
request that management deliver the flash drive by courier. D.
encrypt the folder containing the data with a strong key.

D

10. For a mission-critical application with a low recovery time objective (RTO), the IS
auditor would recommend the use of which of the following recovery strategies?
A. Mobile site.
B. Redundant site.
C. Hot site.
D. Reciprocal agreements.

B

11. When reviewing IS strategies, an IS auditor can BEST assess whether IS
strategy supports the organizations' business objectives by determining whether IS:
A. has all the personnel and equipment it needs.
B. plans are consistent with management strategy.
C. uses its equipment and personnel efficiently and effectively.
D. has sufficient excess capacity to respond to changing directions.

, B

12. Which of the following system and data conversion strategies provides the
GREATEST redundancy?
A. Direct cutover
B. Pilot study
C. Phased approach
D. Parallel run

D

13. Web and e-mail filtering tools are PRIMARILY valuable to an organization because
they:
A. protect the organization from viruses and non-business materials.
B. maximize employee performance.
C. safeguard the organization's image.
D. assist the organization in preventing legal issues.

A

14. The PRIMARY reason an IS auditor performs a functional walkthrough during
the preliminary phase of an audit assignment is to:
A. understand the business process.
B. comply with auditing standards.
C. identify control weakness.
D. plan substantive testing.

A

15. An IS auditor discovers that the chief information officer (CIO) of an organization is
using a wireless broadband modem utilizing global system for mobile communications
(GSM) technology. This modem is being used to connect the CIO's laptop to the
corporate virtual private network (VPN) when the CIO travels outside of the office. The
IS auditor should:
A. do nothing since the inherent security features of GSM technology are appropriate.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUINTER New York College Of Dentistry
View profile
Follow You need to be logged in order to follow users or courses
Sold
352
Member since
2 year
Number of followers
104
Documents
38721
Last sold
2 days ago

3.4

59 reviews

5
26
4
8
3
7
2
2
1
16

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions