ISACA CISA Exam (page: 22)
ISACA Certified Information Systems Auditor
Updated on: 25-Dec-2025

Viewing Page 22 of 366

An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the
BEST way to prevent accepting bad data?

  1. Purchase data cleansing tools from a reputable vendor.
  2. Appoint data quality champions across the organization.
  3. Obtain error codes indicating failed data feeds.
  4. Implement business rules to reject invalid data.

Answer(s): D



Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?

  1. Determine which databases will be in scope.
  2. Identify the most critical database controls.
  3. Evaluate the types of databases being used.
  4. Perform a business impact analysis (BIA).

Answer(s): A



Which of the following is an IS auditor's GREATEST concern when an organization does not regularly update software on individual workstations in the internal environment?

  1. The organization may not be in compliance with licensing agreements.
  2. System functionality may not meet business requirements.
  3. The system may have version control issues.
  4. The organization may be more susceptible to cyber-attacks.

Answer(s): D



An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?

  1. The standard is met as long as a supervisor reviews the new auditors' work.
  2. The standard is met as long as one member has a globally recognized audit certification.
  3. Team member assignments must be based on individual competencies.
  4. Technical co-sourcing must be used to help the new staff.

Answer(s): C



Which of the following is a social engineering attack method?

  1. A hacker walks around an office building using scanning tools to search for a wireless network to gain access.
  2. An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.
  3. An unauthorized person attempts to gain access to secure premises by following an authorized person through a secure door.
  4. An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.

Answer(s): B



Viewing Page 22 of 366



Share your comments for ISACA CISA exam with other users:

Mike 8/20/2023 5:12:00 PM

the exam dumps are helping me get a solid foundation on the practical techniques and practices needed to be successful in the auditing world.
UNITED STATES


Sam 8/31/2023 10:32:00 AM

not bad but you question database from isaca
MALAYSIA


Deno 10/25/2023 1:14:00 AM

i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.
Anonymous