Practice Free CISA Exam Online Questions
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
- A . To improve traceability
- B . To prevent piggybacking
- C . To implement multi-factor authentication
- D . To reduce maintenance costs
A
Explanation:
The primary reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center is to improve traceability (A). Traceability is the ability to track and monitor the activities and movements of individuals or objects within a system or environment. Traceability is important for ensuring security, accountability, and compliance in a data center, where sensitive and critical data are stored and processed.
An RFID access card system can improve traceability by using RFID technology to verify and record the identity and access of each user who enters or exits the data center. RFID stands for Radio Frequency Identification, and it enables wireless communication between a reader and an RFID tag. An RFID tag is installed in a door key card or fob, which users use to gain access to the data center. An RFID reader is installed near the door, and it contains an antenna that receives data transmitted by the RFID tag. A control panel is a computer server that reads and interprets the data passed along by the RFID reader. A database is a storage system that stores the data collected by the control panel1.
An RFID access card system can provide several benefits for traceability, such as123:
It can uniquely identify each user and their access level, and prevent unauthorized access or impersonation.
It can record the date, time, and duration of each user’s access, and generate logs and reports for auditing purposes.
It can monitor the location and status of each user within the data center, and alert security personnel in case of any anomalies or emergencies.
It can integrate with other security systems, such as cameras, alarms, or biometrics, to enhance verification and protection.
A universal PIN code system, on the other hand, can compromise traceability by using a single or shared personal identification number (PIN) to grant access to multiple users. A universal PIN code system can pose several risks for traceability, such as4:
It can be easily guessed, stolen, shared, or compromised by malicious actors or insiders.
It can not distinguish between different users or their access levels, and allow unauthorized or excessive access.
It can not record or track the activities or movements of each user within the data center, and create gaps or errors in the audit trail.
It can not integrate with other security systems, and provide limited verification and protection.
Therefore, an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center to improve traceability.
References:
RFID Access Control Guide: 4 Best RFID Access Control Systems – ButterflyMX
Choosing Card Technology in 2023 | ICT
RFID Vs Magnetic Key Cards: What’s The Difference? – Go Safer Security
RFID vs Barcode – Advantages, Disadvantages & Differences
Which of the following is MOST effective for controlling visitor access to a data center?
- A . Visitors are escorted by an authorized employee
- B . Pre-approval of entry requests
- C . Visitors sign in at the front desk upon arrival
- D . Closed-circuit television (CCTV) is used to monitor the facilities
A
Explanation:
The most effective way for controlling visitor access to a data center is to ensure that visitors are escorted by an authorized employee, as this prevents unauthorized or malicious actions by the visitors and provides accountability and supervision. Pre-approval of entry requests, visitors signing in at the front desk upon arrival, and closed-circuit television (CCTV) are also useful measures, but they are not as effective as escorting visitors, as they do not prevent or detect unauthorized or malicious actions by the visitors in real time.
References: CISA Review Manual (Digital Version), Chapter 5: Protection of Information Assets, Section 5.1: Physical Access Controls1
Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?
- A . Independence
- B . Integrity
- C . Materiality
- D . Accountability
A
Explanation:
Independence would be most impacted if an IS auditor were to assist with the implementation of recommended control enhancements, as this would create a conflict of interest and impair the objectivity and credibility of the IS auditor. Integrity, materiality, and accountability are important attributes of an IS auditor, but they are not directly affected by the involvement in the implementation of control enhancements.
References: CISA Review Manual (Digital Version), Chapter 1: Information Systems Auditing Process, Section 1.1: IS Audit Standards, Guidelines and Codes of Ethics
Which of the following is a concern associated with virtualization?
- A . The physical footprint of servers could decrease within the data center.
- B . Performance issues with the host could impact the guest operating systems.
- C . Processing capacity may be shared across multiple operating systems.
- D . One host may have multiple versions of the same operating system.
B
Explanation:
A concern associated with virtualization is that performance issues with the host could impact the guest operating systems, which are the operating systems that run on virtual machines within the host. For example, if the host has insufficient memory, CPU, disk space, or network bandwidth, it could affect the performance and availability of the guest operating systems and the applications running on them. The physical footprint of servers could decrease within the data center, processing capacity may be shared across multiple operating systems, and one host may have multiple versions of the same operating system are not concerns associated with virtualization, but rather benefits or features of virtualization that can help reduce costs, improve efficiency, and enhance flexibility.
References: CISA Review Manual (Digital Version), Chapter 4: Information Systems
Operations and Business Resilience, Section 4.2: IT Service Delivery and Support
An IS auditor is tasked to review an organization’s plan-do-check-act (PDCA) method for improving
IT-related processes and wants to determine the accuracy of defined targets to be achieved.
Which of the following steps in the PDCA process should the auditor PRIMARILY focus on in this situation?
- A . Check
- B . Plan
- C . Do
- D . Act
B
Explanation:
In the PDCA cycle, the "Plan" phase is where targets and objectives are defined. Focusing on this phase allows the auditor to evaluate the accuracy and appropriateness of the defined targets before they are implemented and measured in subsequent phases.
References
ISACA CISA Review Manual 27th Edition, Page 315-316 (PDCA Cycle)
In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?
- A . Planning phase
- B . Execution phase
- C . Follow-up phase
- D . Selection phase
A
Explanation:
The planning phase is the stage of the internal audit process where contact is established with the individuals responsible for the business processes in scope for review. The planning phase involves defining the objectives, scope, and criteria of the audit, as well as identifying the key risks and controls related to the audited area. The planning phase also involves communicating with the auditee to obtain relevant information, documents, and data, as well as to schedule interviews, walkthroughs, and meetings. The planning phase aims to ensure that the audit team has a clear understanding of the audited area and its context, and that the audit plan is aligned with the expectations and needs of the auditee and other stakeholders.
The execution phase is the stage of the internal audit process where the audit team performs the audit procedures according to the audit plan. The execution phase involves testing the design and operating effectiveness of the controls, collecting and analyzing evidence, documenting the audit work and results, and identifying any issues or findings. The execution phase aims to provide sufficient and appropriate evidence to support the audit conclusions and recommendations.
The follow-up phase is the stage of the internal audit process where the audit team monitors and verifies the implementation of the corrective actions agreed upon by the auditee in response to the audit findings. The follow-up phase involves reviewing the evidence provided by the auditee, conducting additional tests or interviews if necessary, and evaluating whether the corrective actions have adequately addressed the root causes of the findings. The follow-up phase aims to ensure that the auditee has taken timely and effective actions to improve its processes and controls.
The selection phase is not a standard stage of the internal audit process, but it may refer to the process of selecting which areas or functions to audit based on a risk assessment or an annual audit plan. The selection phase involves evaluating the inherent and residual risks of each potential auditable area, considering the impact, likelihood, and frequency of those risks, as well as other factors such as regulatory requirements, stakeholder expectations, previous audit results, and available resources. The selection phase aims to prioritize and allocate the audit resources to those areas that present the highest risks or opportunities for improvement.
Therefore, option A is the correct answer.
References:
Stages and phases of internal audit – piranirisk.com
Step-by-Step Internal Audit Checklist | AuditBoard
Audit Process | The Office of Internal Audit – University of Oregon
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization’s enterprise architecture (EA) program?
- A . The architecture review board is chaired by the CIO
- B . IT application owners have sole responsibility for architecture approval
- C . The EA program governs projects that are not IT-related
- D . Information security requirements are reviewed by the EA program
B
Explanation:
IT application owners having sole responsibility for architecture approval (B) is a major concern because it indicates a lack of oversight and segregation of duties. EA decisions should be reviewed by a cross-functional governance body to ensure alignment with security, compliance, and business objectives.
Other options:
The CIO chairing the review board (A) may indicate centralized leadership but is not inherently a risk.
EA governing non-IT projects (C) may indicate scope expansion but is not a security risk.
Security requirements being reviewed (D) is a best practice and not a concern.
Reference: ISACA CISA Review Manual, IT Governance and Management of IT
Which of the following BEST mitigates the risk of SQL injection attacks against applications exposed to the internet?
- A . Web application firewall (WAF)
- B . SQL server hardening
- C . Patch management program
- D . SQL server physical controls
A
Explanation:
A Web Application Firewall (WAF) (A) is the best control to mitigate SQL injection attacks because it can detect and block malicious SQL queries before they reach the application. WAFs analyze incoming requests, filter SQL injection attempts, and provide an additional layer of security for web applications.
Other options:
SQL server hardening (B) improves security but does not specifically address SQL injection. Patch management (C) is necessary but does not provide immediate protection against new SQL injection attacks.
Physical controls (D) are unrelated to application-layer threats like SQL injection.
Reference: ISACA CISA Review Manual, Information Security
Which of the following is the BEST control to help ensure that security requirements are considered throughout the life cycle of an agile software development project?
- A . Documenting security control requirements and obtaining internal audit sign off
- B . Including project team members who can provide security expertise
- C . Reverting to traditional waterfall software development life cycle (SDLC) techniques
- D . Requiring the project to go through accreditation before release into production
Of the following who should be responsible for cataloging and inventorying robotic process automation (RPA) processes?
- A . IT personnel
- B . Business owner
- C . Information security personnel
- D . Data steward
B
Explanation:
The business owner is best positioned to catalog and inventory robotic process automation (RPA) processes because they understand the processes, objectives, and associated risks. They ensure that RPA aligns with business goals and compliance requirements.
IT Personnel (Option A): Typically support implementation and maintenance but may lack insight into business processes.
Information Security Personnel (Option C): Focus on securing processes but are not responsible for inventorying them.
Data Steward (Option D): Primarily responsible for data governance, not RPA process inventory.
Reference: ISACA CISA Review Manual, Job Practice Area 1: Governance and Management of IT.