ISACA CISA Exam (page: 35)
ISACA Certified Information Systems Auditor
Updated on: 25-Dec-2025

Viewing Page 35 of 366

Which of the following BEST facilitates detection of zero-day exploits?

  1. Anti-malware software
  2. User behavior analytics
  3. Intrusion detection systems (IDS)
  4. Intrusion prevention systems (IPS)

Answer(s): B



Which of the following is MOST important to review when evaluating the performance of a critical web application?

  1. Business-defined application response times
  2. Feedback from customer satisfaction surveys
  3. Roles and responsibilities for reporting
  4. Strategy for application performance monitoring in the cloud

Answer(s): A



Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?

  1. The lack of acceptance criteria behind user requirements
  2. The lack of completion of all requirements at the end of each sprint
  3. The lack of technical documentation to support the program code
  4. The lack of a detailed unit and system test plan

Answer(s): A



The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?

  1. Technology risk
  2. Inherent risk
  3. Detection risk
  4. Control risk

Answer(s): C



Which type of control has been established when an organization implements a security information and event management (SIEM) system?

  1. Preventive
  2. Detective
  3. Directive
  4. Corrective

Answer(s): B



Viewing Page 35 of 366



Share your comments for ISACA CISA exam with other users:

Mike 8/20/2023 5:12:00 PM

the exam dumps are helping me get a solid foundation on the practical techniques and practices needed to be successful in the auditing world.
UNITED STATES


Sam 8/31/2023 10:32:00 AM

not bad but you question database from isaca
MALAYSIA


Deno 10/25/2023 1:14:00 AM

i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.
Anonymous