Practice Free CISA Exam Online Questions
Which of the following is the BEST way to mitigate risk to an organization’s network associated with
devices permitted under a bring your own device (BYOD) policy?
- A . Require personal devices to be reviewed by IT staff.
- B . Enable port security on all network switches.
- C . Implement a network access control system.
- D . Ensure the policy requires antivirus software on devices.
C
Explanation:
The best way to mitigate risk to an organization’s network associated with devices permitted under a BYOD policy is to implement a network access control system, as this will allow the organization to monitor, authenticate, and authorize the devices that connect to the network, and to enforce security policies and compliance requirements12. A network access control system can help to prevent unauthorized or compromised devices from accessing sensitive data or resources, and to detect and isolate any potential threats or vulnerabilities34.
References
1: Network Access Control (NAC) – ISACA 2: Network Access Control (NAC) – Cisco 3: BYOD Security Risks: 6 Ways to Protect Your Organization – ReliaQuest5 4: How to Mitigate BYOD Risks and Challenges – CIOReview6
Which of the following is the MOST important success factor for implementing a data loss prevention (DLP) tool?
- A . Implementing the tool in monitor mode to avoid unnecessary blocking of communication
- B . Defining and configuring policies and tool rule sets to monitor sensitive data movement
- C . Testing the tool in a test environment before moving to the production environment
- D . Assigning responsibilities for maintaining the tool to applicable data owners and stakeholders
B
Explanation:
The success of a DLP implementation relies heavily on accurately defining and configuring the policies and rule sets. These configurations ensure that the DLP tool effectively monitors and controls the movement of sensitive data within the organization, thereby preventing data loss.
References
ISACA CISA Review Manual 27th Edition, Page 301-302 (Data Loss Prevention)
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
- A . Purchase of information management tools
- B . Business use cases and scenarios
- C . Access rights provisioned according to scheme
- D . Detailed data classification scheme
C
Explanation:
Access rights provisioned according to scheme would best help to support an auditor’s conclusion about the effectiveness of an implemented data classification program. This would indicate that the data classification program has been properly implemented and enforced, and that the data is protected according to its sensitivity and value. The other options are not sufficient to demonstrate the effectiveness of a data classification program, as they do not show how the data is actually accessed and used by authorized users.
References:
CISA Review Manual (Digital Version), Chapter 6, Section 6.2.31
CISA Review Questions, Answers & Explanations Database, Question ID 2042
Which of the following BEST contributes to the quality of an audit of a business-critical application?
- A . Assigning the audit to independent external auditors
- B . Reviewing previous findings reported by the application owner
- C . Identifying common coding errors made by the development team
- D . Involving the application owner early in the audit planning process
D
Explanation:
Involving the application owner early in the audit planning process is the best way to contribute to the quality of an audit of a business-critical application. The application owner has a deep understanding of the application and its business context, which can provide valuable insights for the audit. Early involvement can also help ensure that the audit is aligned with the business objectives and risks, and that any potential issues are identified and addressed promptly12.
References:
Business Critical Applications: An In-Depth Look
Framework for Audit Quality – IFAC
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
- A . The contract does not contain a right-to-audit clause.
- B . An operational level agreement (OLA) was not negotiated.
- C . Several vendor deliverables missed the commitment date.
- D . Software escrow was not negotiated.
D
Explanation:
The greatest concern for an IS auditor reviewing contracts for licensed software that executes a critical business process is that software escrow was not negotiated. Software escrow is an arrangement where a third-party holds a copy of the source code and documentation of a licensed software in a secure location. The software escrow agreement specifies the conditions under which the licensee can access the escrowed materials, such as in case of bankruptcy, termination, or breach of contract by the licensor. Software escrow is important for ensuring the continuity and availability of a critical business process that depends on a licensed software. Without software escrow, the licensee may face significant risks and challenges in maintaining, modifying, or recovering the software in case of any disruption or dispute with the licensor.
References:
CISA Review Manual (Digital Version)
CISA Questions, Answers & Explanations Database
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
- A . Assurance that the new system meets functional requirements
- B . More time for users to complete training for the new system
- C . Significant cost savings over other system implemental or approaches
- D . Assurance that the new system meets performance requirements
D
Explanation:
Explanation:
Parallel processing is a system implementation approach that involves running the new system and the old system simultaneously for a period of time until the new system is verified and accepted. The primary advantage of parallel processing is that it provides assurance that the new system meets performance requirements and produces the same or better results as the old system. Parallel processing also minimizes the risk of system failure and data loss, as the old system can be used as a backup or fallback option in case of any problems with the new system.
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
- A . Assurance that the new system meets functional requirements
- B . More time for users to complete training for the new system
- C . Significant cost savings over other system implemental or approaches
- D . Assurance that the new system meets performance requirements
D
Explanation:
Explanation:
Parallel processing is a system implementation approach that involves running the new system and the old system simultaneously for a period of time until the new system is verified and accepted. The primary advantage of parallel processing is that it provides assurance that the new system meets performance requirements and produces the same or better results as the old system. Parallel processing also minimizes the risk of system failure and data loss, as the old system can be used as a backup or fallback option in case of any problems with the new system.
Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?
- A . Unit the use of logs to only those purposes for which they were collected
- B . Restrict the transfer of log files from host machine to online storage
- C . Only collect logs from servers classified as business critical
- D . Limit log collection to only periods of increased security activity
A
Explanation:
Limiting the use of logs to only those purposes for which they were collected is the best way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs, because it minimizes the risk of unauthorized access, misuse, or leakage of personal data that may be embedded in the logs. Logs should be collected and processed in accordance with the data protection principles and regulations, such as the General Data Protection Regulation (GDPR)12. Restricting the transfer of log files from host machine to online storage, only collecting logs from servers classified as business critical, and limiting log collection to only periods of increased security activity are not effective ways to address data privacy concerns, because they do not prevent or mitigate the potential disclosure of personal data in the logs.
References: 1: CISA Review Manual (Digital Version), Chapter 5, Section 5.4.4 2: CISA Online Review Course, Module 5, Lesson 4
Which of the following BEST enables a benefits realization process for a system development project?
- A . Metrics for the project have been selected before the project begins.
- B . Project budget includes costs to execute the project and costs associated with the solution.
- C . Estimates of business benefits are backed by similar previously completed projects.
- D . Metrics are evaluated immediately after the project has been implemented.
A
Explanation:
A benefits realization process is a systematic way of identifying, defining, planning, tracking and realizing the benefits from a project or program. Benefits are the measurable improvements that result from the delivery of project outputs and outcomes. Benefits realization management (BRM) is the practice of ensuring that benefits are derived from outputs and outcomes.
One of the best practices for BRM is to select metrics for the project before it begins. Metrics are the indicators that measure the performance and value of the project and its benefits. By selecting metrics in advance, the project team can align the project objectives with the expected benefits, establish a baseline for comparison, and monitor and evaluate the progress and results of the project. Metrics also help to communicate the value of the project to stakeholders and justify the investment.
The other options are not as effective as selecting metrics before the project begins. Project budget is an important factor for BRM, but it does not enable the benefits realization process by itself. It only reflects the costs of executing the project and delivering the solution, not the benefits or value that are expected from them. Estimates of business benefits are useful for planning and forecasting, but they are not sufficient for BRM. They need to be validated by actual data and evidence from similar projects or other sources. Metrics are evaluated after the project has been implemented, but this is only one part of the benefits realization process. BRM requires continuous monitoring and evaluation throughout the project life cycle and beyond, to ensure that benefits are sustained and optimized.
References:
ISACA, CISA Review Manual, 27th Edition, 2019, p. 3261
PMI, Benefits Realization Management: A Practice Guide, 20192
APM, What is benefits management and project success?, 20213
Which of the following is MOST important for an IS auditor to verify when evaluating an organization’s firewall?
- A . Logs are being collected in a separate protected host
- B . Automated alerts are being sent when a risk is detected
- C . Insider attacks are being controlled
- D . Access to configuration files Is restricted.
A
Explanation:
A firewall is a device or software that monitors and controls the incoming and outgoing network traffic based on predefined rules. A firewall can help protect an organization’s network and information systems from unauthorized or malicious access, by filtering or blocking unwanted or harmful packets. The most important thing for an IS auditor to verify when evaluating an organization’s firewall is that the logs are being collected in a separate protected host. Logs are records of events or activities that occur on a system or network, such as connections, requests, responses, errors, and alerts. Logs can provide valuable information for auditing, monitoring, troubleshooting, and investigating security incidents. However, logs can also be tampered with, deleted, or corrupted by attackers or insiders who want to hide their tracks or evidence of their actions. Therefore, it is essential that logs are stored in a separate host that is isolated and secured from the network and the firewall itself, to prevent unauthorized access or modification of the logs. Automated alerts are being sent when a risk is detected is a good practice for enhancing the security and efficiency of a firewall, but it is not the most important thing for an IS auditor to verify, as alerts may not always be accurate, timely, or actionable. Insider attacks are being controlled is a desirable outcome for a firewall, but it is not the most important thing for an IS auditor to verify, as insider attacks may involve other factors or methods that bypass or compromise the firewall, such as social engineering, credential theft, or physical access. Access to configuration files is restricted is a critical control for ensuring the security and integrity of a firewall, but it is not the most important thing for an IS auditor to verify, as configuration files may not reflect the actual state or performance of the firewall.