100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CISA EXAM REVISION QUESTIONS AND 100% CORRECT ANSWERS

Rating
-
Sold
-
Pages
31
Grade
A+
Uploaded on
28-08-2025
Written in
2025/2026

CISA EXAM REVISION QUESTIONS AND 100% CORRECT ANSWERS

Institution
CISA
Course
CISA











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISA
Course
CISA

Document information

Uploaded on
August 28, 2025
Number of pages
31
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CISA EXAM REVISION QUESTIONS
AND 100% CORRECT ANSWERS!!
Question #:19 - (Exam Topic 3)

Which of the following should be the PRIMARY role of an internal audit function in
the management of identified business risks?

A. Establishing a risk appetite

B. Establishing a risk management framework

C. Validating enterprise risk management (ERM)

D. Operating the risk management framework

C. Validating enterprise risk management (ERM).

Question #:20 - (Exam Topic 3)

Which of the following is the MAJOR advantage of automating internal controls?

A. To enable the review of large value transactions

B. To efficiently test large volumes of data

C. To help identity transactions with no segregation of

duties D. To assist in performing analytical reviews

B. To efficiently test large volumes of data.

Question #:23 - (Exam Topic 3)

In an IT organization where many responsibilities are shared which of the following is
the BEST control for detecting unauthorized 2data changes'?

A. Users are required to periodically rotate responsibilities

B. Segregation of duties conflicts are periodically reviewed

,C. Data changes are independently reviewed by another group

D. Data changes are logged in an outside application

C. Data changes are independently reviewed by another group.

Question #:34 - (Exam Topic 3)

When auditing an organization's software acquisition process the BEST way for an IS
auditor to understand the software benefits to the organization would be to review the

A. feasibility study

B. business case

C. request for proposal (RFP)

D. alignment with IT strategy

B. business case.

Question #:35 - (Exam Topic 3)

Demonstrated support from which of the following roles in an organization has the MOST
influence over information security 4governance?

A. Chief information security officer (CISO)

B. Information security steering committee

C. Board of directors

D. Chief information officer (CIO)

C. Board of directors.

Question #:37 - (Exam Topic 3)

A senior auditor is reviewing work papers prepared by a junior auditor indicating that
a finding was removed after the auditee said they corrected the problem. Which of the
following is the senior auditor s MOST appropriate course of action?

A. Ask the auditee to retest

,B. Approve the work papers as written

C. Have the finding reinstated

D. Refer the issue to the audit director

A. Ask the auditee to retest.

Question #:49 - (Exam Topic 3)

Which of the following is the MOST important outcome of an information security
program?

A. Operating system weaknesses are more easily identified.

B. Emerging security technologies are better understood and accepted.

C. The cost to mitigate information security risk is reduced.

D. Organizational awareness of security responsibilities is improved.

D. Organizational awareness of security responsibilities is improved.

Question #:55 - (Exam Topic 3)

Which of the following BEST enables the effectiveness of an agile project for the
rapid development of a new software application?

A. Project segments are established.

B. The work is separated into phases.

C. The work is separated into sprints.

D. Project milestones are created.

C. The work is separated into sprints.

Question #:56 - (Exam Topic 3)

Which of the following provides the BEST assurance of data integrity after file transfers?

A. Check digits

, B. Monetary unit sampling

C. Hash values

D. Reasonableness check

C. Hash values.

Question #:61 - (Exam Topic 3)

Backup procedures for an organization's critical data are considered to be which type
of control?

A. Directive

B. Corrective

C. Detective

D. Compensating

B. Corrective.

Question #:62 - (Exam Topic 3)

An IS auditor has been tasked to review the processes that prevent fraud within a business
expense claim system. Which of the following stakeholders is MOST important to involve
in this review?

A. Information security manager

B. Quality assurance (QA) manager

C. Business department executive

D. Business process owner

D. Business process owner.

Question #:70 - (Exam Topic 3)

What is the PRIMARY benefit of using one-time passwords?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUINTER New York College Of Dentistry
View profile
Follow You need to be logged in order to follow users or courses
Sold
352
Member since
2 year
Number of followers
104
Documents
38721
Last sold
2 days ago

3.4

59 reviews

5
26
4
8
3
7
2
2
1
16

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions