100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISA Practice Exam Spring 2024 Questions and Correct Answers with Detailed Rationales

Rating
-
Sold
-
Pages
30
Grade
A+
Uploaded on
10-12-2025
Written in
2025/2026

CISA Practice Exam Spring 2024 Questions and Correct Answers with Detailed Rationales Which of the following would be MOST important for an IS auditor to verify while conducting a business continuity audit? A. Data backups are performed on a timely basis. B.A recovery site is contracted for and available as needed. C. Human safety procedures are in place. D. Insurance coverage is adequate and premiums are current. C. Human safety procedures are in place. Explanation: The most important element in any business continuity process is the protection of human life. This takes precedence over all other aspects of the plan. An IS auditor reviewing a network log discovers that an employee ran elevated commands on their PC by invoking the task scheduler to launch restricted applications. This is an example what type of attack? A. A race condition B.A privilege escalation C.A buffer overflow D. An impersonation B.A privilege escalation Explanation: This is a type of attack where higher-level system authority is obtained by various methods. In this example, the task scheduler service runs with administrator permissions, and a security flaw allows programs launched by the scheduler to run at the same permission level. A comprehensive and effective email policy should address the issues of email structure, policy enforcement, monitoring and: A. recovery. B. retention. C. rebuilding. D. reuse. B. retention. Explanation: Besides being a good practice, laws and regulations may require an organization to keep information that has an impact on the financial statements. The prevalence of lawsuits in which email communication is held in the same regard as the official form of classic paper makes the retention policy of corporate email a necessity. All email generated on an organization’s hardware is the property of the organization, and an email policy should address the retention of messages, considering both known and unforeseen litigation. The policy should also address the destruction of emails after a specified time to protect the nature and confidentiality of the messages themselves. An IS auditor who was involved in designing an organization's business continuity plan (BCP) has been assigned to audit the plan. The IS auditor should: A. decline the assignment. B. inform management of the possible conflict of interest after completing the audit assignment. C. inform the BCP team of the possible conflict of interest prior to beginning the assignment. D. communicate the possibility of conflict of interest to audit management prior to starting the assignment. D. communicate the possibility of conflict of interest to audit management prior to starting the assignment. Explanation: A possible conflict of interest, likely to affect the IS auditor’s independence, should be brought to the attention of management prior to starting the assignment. Which of the following is the MOST critical element to effectively execute a disaster recovery plan? A. Offsite storage of backup data B. Up-to-date list of key disaster recovery contacts C. Availability of a replacement data center D. Clearly defined recovery time objective (RTO) A. Offsite storage of backup data Explanation: Remote storage of backups is the most critical disaster recovery plan (DRP) element of the items listed because access to backup data is required to restore systems. An IS auditor found that the enterprise architecture (EA) recently adopted by an organization has an adequate current-state representation. However, the organization has started a separate project to develop a future-state representation. The IS auditor should: A. recommend that this separate project be completed as soon as possible. B. report this issue as a finding in the audit report. C. recommend the adoption of the Zachmann framework. D.re-scope the audit to include the separate project as part of the current audit. B. report this issue as a finding in the audit report. Explanation: It is critical for the EA to include the future state because the gap between the current state and the future state will determine IT strategic and tactical plans. If the EA does not include a future-state representation, it is not complete, and this issue should be reported as a finding. What is the PRIMARY consideration for an IS auditor reviewing the prioritization and coordination of IT projects and program management? A. Projects are aligned with the organization’s strategy. B. Identified project risk is monitored and mitigated. C. Controls related to project planning and budgeting are appropriate. D.IT project metrics are reported accurately. A. Projects are aligned with the organization’s strategy. Explanation: The primary goal of IT projects is to add value to the business, so they must be aligned with the business strategy to achieve the intended results. Therefore, the IS auditor should first focus on ensuring this alignment. An enterprise is developing a strategy to upgrade to a newer version of its database software. Which of the following tasks can an IS auditor perform without compromising the objectivity of the IS audit function? A. Advise on the adoption of application controls to the new database software. B. Provide future estimates of the licensing expenses to the project team. C. Recommend to the project manager how to improve the efficiency of the migration. D. Review the acceptance test case documentation before the tests are carried out. D. Review the acceptance test case documentation before the tests are carried out. The review of the test cases will facilitate the objective of a successful migration and ensure that proper testing is conducted. An IS auditor can advise as to the completeness of the test cases. While designing the business continuity plan for an airline reservation system, the MOST appropriate method of data transfer/backup at an offsite location would be: A. shadow file processing. B. electronic vaulting. C. hard-disk mirroring. D. hot-site provisioning. A. shadow file processing. Which of the following should be a MAJOR concern for an IS auditor reviewing a business continuity plan? A. The plan is approved by the chief information officer. B. The plan contact lists have not been updated. C. Test results are not adequately documented. D. The training schedule for recovery personnel is not included. C. Test results are not adequately documented.

Show more Read less
Institution
CISA - Certified Information Systems Auditor
Course
CISA - Certified Information Systems Auditor










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISA - Certified Information Systems Auditor
Course
CISA - Certified Information Systems Auditor

Document information

Uploaded on
December 10, 2025
Number of pages
30
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • cisa practice exam spring

Content preview

CISA Practice Exam Spring 2024 Questions and Correct Answers with
Detailed Rationales
Which of the following would be MOST important for an IS auditor to verify
while conducting a business continuity audit?
A. Data backups are performed on a timely basis.
B.A recovery site is contracted for and available as needed.
C. Human safety procedures are in place.
D. Insurance coverage is adequate and premiums are current.


C. Human safety procedures are in place.
Explanation: The most important element in any business continuity process is the
protection of human life. This takes precedence over all other aspects of the plan.
An IS auditor reviewing a network log discovers that an employee ran elevated
commands on their PC by invoking the task scheduler to launch restricted
applications. This is an example what type of attack?
A. A race condition
B.A privilege escalation
C.A buffer overflow
D. An impersonation
B.A privilege escalation
Explanation: This is a type of attack where higher-level system authority is
obtained by various methods. In this example, the task scheduler service runs with
administrator permissions, and a security flaw allows programs launched by the
scheduler to run at the same permission level.
A comprehensive and effective email policy should address the issues of email
structure, policy enforcement, monitoring and:
A. recovery.
B. retention.

,C. rebuilding.
D. reuse.
B. retention.
Explanation: Besides being a good practice, laws and regulations may require an
organization to keep information that has an impact on the financial statements.
The prevalence of lawsuits in which email communication is held in the same
regard as the official form of classic paper makes the retention policy of corporate
email a necessity. All email generated on an organization’s hardware is the
property of the organization, and an email policy should address the retention of
messages, considering both known and unforeseen litigation. The policy should
also address the destruction of emails after a specified time to protect the nature
and confidentiality of the messages themselves.
An IS auditor who was involved in designing an organization's business continuity
plan (BCP) has been assigned to audit the plan. The IS auditor should:
A. decline the assignment.
B. inform management of the possible conflict of interest after completing the
audit assignment.
C. inform the BCP team of the possible conflict of interest prior to beginning the
assignment.
D. communicate the possibility of conflict of interest to audit management prior to
starting the assignment.
D. communicate the possibility of conflict of interest to audit management prior to
starting the assignment.
Explanation: A possible conflict of interest, likely to affect the IS auditor’s
independence, should be brought to the attention of management prior to starting
the assignment.
Which of the following is the MOST critical element to effectively execute a
disaster recovery plan?
A. Offsite storage of backup data
B. Up-to-date list of key disaster recovery contacts
C. Availability of a replacement data center

, D. Clearly defined recovery time objective (RTO)
A. Offsite storage of backup data
Explanation: Remote storage of backups is the most critical disaster recovery plan
(DRP) element of the items listed because access to backup data is required to
restore systems.
An IS auditor found that the enterprise architecture (EA) recently adopted by an
organization has an adequate current-state representation. However, the
organization has started a separate project to develop a future-state representation.
The IS auditor should:
A. recommend that this separate project be completed as soon as possible.
B. report this issue as a finding in the audit report.
C. recommend the adoption of the Zachmann framework.
D.re-scope the audit to include the separate project as part of the current audit.
B. report this issue as a finding in the audit report.
Explanation: It is critical for the EA to include the future state because the gap
between the current state and the future state will determine IT strategic and
tactical plans. If the EA does not include a future-state representation, it is not
complete, and this issue should be reported as a finding.
What is the PRIMARY consideration for an IS auditor reviewing the prioritization
and coordination of IT projects and program management?
A. Projects are aligned with the organization’s strategy.
B. Identified project risk is monitored and mitigated.
C. Controls related to project planning and budgeting are appropriate.
D.IT project metrics are reported accurately.
A. Projects are aligned with the organization’s strategy.
Explanation: The primary goal of IT projects is to add value to the business, so
they must be aligned with the business strategy to achieve the intended results.
Therefore, the IS auditor should first focus on ensuring this alignment.
$10.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
NurseQueen1
4.7
(3)

Get to know the seller

Seller avatar
NurseQueen1 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
4
Member since
1 year
Number of followers
0
Documents
202
Last sold
1 week ago
NurseQueen

Welcome to top Grade Exam for high quality study materials, exam guides and notes that will help you ace your exams and stay ahead in your studies. I offer detailed study notes ,w ell elaborated comprehensive answers and well organized summaries across a range of subjects including ,nursing,mental health, medical surgeon,economics,arts,business management and many others. Whether you're preparing for final exams or looking for help with assignments, you will find the resources you need here. With years of experience as a student and a dedicated tutor, I ensure that each document is carefully crafted ,accurate and easy to understand. Browse through my collection today and start studying smarter. I'm here to help you succeed.

Read more Read less
4.7

3 reviews

5
2
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions