100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

CISA Exam Questions (QAE) QUESTIONS WELL ANSWERED

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
01-11-2025
Written in
2025/2026

CISA Exam Questions (QAE) QUESTIONS WELL ANSWERED

Institution
CISA
Course
CISA










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISA
Course
CISA

Document information

Uploaded on
November 1, 2025
Number of pages
18
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CISA Exam Questions (QAE)
QUESTIONS WELL ANSWERED

An IS auditor finds a small number of user access requests that were not authorized by
managers through the normal predefined workflow steps and escalation rules. The IS auditor
should - ANS ✔✔:The IS auditor needs to perform substantive testing and additional analysis to
determine why the approval and workflow processes are not working as intended. Before
making any recommendation, the IS auditor should gain a good understanding of the scope of
the problem and the factors that caused this incident. The IS auditor should identify whether
the issue was caused by managers not following procedures, a problem with the workflow of
the automated system or a combination of the two.



An internal IS audit function is planning a general IS audit. Which of the following activities takes
place during the FIRST step of the planning phase? - ANS ✔✔A risk assessment should be
performed to determine how internal audit resources should be allocated to ensure that all
material items will be addressed.



During an IS audit, which is the BEST method for an IS auditor to evaluate the implementation
of segregation of duties within an IT department? - ANS ✔✔Discussing the implementation of
segregation of duties with the IT managers is the best way to determine how responsibilities are
assigned within the department.



An IS auditor reviewing a network log discovers that an employee ran elevated commands on
their PC by invoking the task scheduler to launch restricted applications. This is an example
what type of attack? - ANS ✔✔This is a type of attack where higher-level system authority is
obtained by various methods. In this example, the task scheduler service runs with
administrator permissions, and a security flaw allows programs launched by the scheduler to
run at the same permission level.



An IS auditor reviewing digital rights management applications should expect to find an
extensive use for which of the following technologies? - ANS ✔✔This is a technique for

,concealing the existence of messages or information within another message. An increasingly
important steganographical technique is digital watermarking, which hides data within data
(e.g., by encoding rights information in a picture or music file without altering the picture or
music's perceivable aesthetic qualities).



An IS auditor recommends that an initial validation control be programmed into a credit card
transaction capture application. The initial validation process would MOST likely - ANS ✔✔:The
initial validation should confirm whether the card is valid. This validity is established through the
card number and personal identification number entered by the user.



Which of the following preventive controls BEST helps secure a web application? - ANS ✔✔Of
the given choices, teaching developers to write secure code is the best way to secure a web
application.



An IS auditor is testing employee access to a large financial system, and the IS auditor selected a
sample from the current employee list provided by the auditee. Which of the following
evidence is the MOST reliable to support the testing? - ANS ✔✔The access list generated by the
system is the most reliable, because it is the most objective evidence to perform a comparison
against the samples selected. The evidence is objective, because it was generated by the system
rather than by an individual.



While reviewing the process for continuous monitoring of the capacity and performance of IT
resources, an IS auditor should PRIMARILY ensure that the process is focused on - ANS
✔✔:Accurate capacity monitoring of IT resources would be the most critical element of a
continuous monitoring process.



Which of the following processes will be MOST effective in reducing the risk that unauthorized
software on a backup server is distributed to the production server? - ANS ✔✔It is common
practice for software changes to be tracked and controlled using version control software. An IS
auditor should review reports or logs from this system to identify the software that is promoted
to production. Only moving the versions on the version control system program will prevent the
transfer of development or earlier versions.

, An organization is replacing a payroll program that it developed in-house, with the relevant
subsystem of a commercial enterprise resource planning (ERP) system. Which of the following
would represent the HIGHEST potential risk? - ANS ✔✔The most significant risk after a payroll
system conversion is loss of data integrity and not being able to pay employees in a timely and
accurate manner or have records of past payments. As a result, maintaining data integrity and
accuracy during migration is paramount.



During the audit of an acquired software package, an IS auditor finds that the software purchase
was based on information obtained through the Internet, rather than from responses to a
request for proposal. The IS auditor should FIRST - ANS ✔✔:In the case of a deviation from the
predefined procedures, an IS auditor should first ensure that the procedure followed for
acquiring the software is consistent with the business objectives and has been approved by the
appropriate authorities.



The PRIMARY benefit of an enterprise architecture initiative is to - ANS ✔✔:The primary focus
of the enterprise architecture (EA) is to ensure that technology investments are consistent with
the platform, data and development standards of the IT organization



therefore, the goal of the EA is to help the organization to implement the technology that is
most effective. - ANS ✔✔



Which of the following is an advantage of prototyping? - ANS ✔✔Prototype systems can provide
significant time and cost savings through better user interaction and the ability to rapidly adapt
to changing requirements



however, they also have several disadvantages, including loss of overall security focus, project
oversight and implementation of a prototype that is not yet ready for production. - ANS ✔✔



Which of the following is the responsibility of information asset owners? - ANS ✔✔It is the
responsibility of owners to define the criticality (and sensitivity) levels of information assets.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BravelRadon Havard School
Follow You need to be logged in order to follow users or courses
Sold
890
Member since
4 year
Number of followers
540
Documents
43704
Last sold
4 days ago
EXAM HUB

Welcome to Exam Hub Are you looking for high-quality, exam-ready notes, past papers, Test Banks, and well-researched study materials to boost your grades? You’re in the right place! I create and upload detailed, easy-to-understand, and well-structured documents across multiple subjects. All my materials are designed to help you study , save time, and excel in your coursework and exams! On this page NURSING EXAMS,STUDY GUIDES,TESTBANKS AND QUALITY EXAMS IS THE KEY TO STUDENTS CAREER EXCELLENCE, you find all documents, package deals, and flashcards offered by BravelRadon (EXAM HUB STORES!)....kindly recommend a friend for A+ GARANTEEd either you are a first-year student or final-year graduation! best of luck!

Read more Read less
3,5

158 reviews

5
57
4
30
3
32
2
8
1
31

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions