ISACA CISA Exam (page: 26)
ISACA Certified Information Systems Auditor
Updated on: 25-Dec-2025

Viewing Page 26 of 366

An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?

  1. The data model is not clearly documented.
  2. The vendor development team is located overseas.
  3. The cost of outsourcing is lower than in-house development.
  4. A training plan for business users has not been developed.

Answer(s): A



An employee has accidentally posted confidential data to the company's social media page. Which of the following is the BEST control to prevent this from recurring?

  1. Establish two-factor access control for social media accounts.
  2. Implement a moderator approval process.
  3. Require all updates to be made by the marketing director.
  4. Perform periodic audits of social media updates.

Answer(s): B



Which of the following is MOST important to include in a contract with a software development service provider?

  1. A list of key performance indicators (KPIs)
  2. Service level agreement (SLA)
  3. Ownership of intellectual property
  4. Explicit contract termination requirements

Answer(s): C



An IS auditors reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance that both incoming and outgoing internet traffic is controlled?

  1. Load batancer
  2. Security information and event management (SIEM) system
  3. Intrusion detection system (IDS)
  4. Statetul firewall

Answer(s): D



An organization needs to comply with data privacy regulations forbidding the display of personally identifiable information (PII) on customer bills or receipts.
However, it is a business requirement to display at least one attribute so that customers can verify the bills or receipts are intended for them. What is the BEST recommendation?

  1. Data sanitization
  2. Data masking
  3. Data encryption
  4. Data tokenization

Answer(s): B



Viewing Page 26 of 366



Share your comments for ISACA CISA exam with other users:

Mike 8/20/2023 5:12:00 PM

the exam dumps are helping me get a solid foundation on the practical techniques and practices needed to be successful in the auditing world.
UNITED STATES


Sam 8/31/2023 10:32:00 AM

not bad but you question database from isaca
MALAYSIA


Deno 10/25/2023 1:14:00 AM

i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.
Anonymous