ISACA CISA Exam (page: 44)
ISACA Certified Information Systems Auditor
Updated on: 25-Dec-2025

Viewing Page 44 of 366

An organization sends daily backup media by courier to an offsite location. Which of the following provides the BEST evidence that the media is transported reliably?

  1. Documented backup media transport procedures
  2. Signed acknowledgments by offsite manager
  3. Certification of the courier company
  4. Delivery schedule of the backup media

Answer(s): B



As part of a recent business-critical initiative, an organization is re-purposing its customer data. However, its customers are unaware that their data is being used for another purpose What is the BEST recommendation to address the associated data privacy risk to the organization?

  1. Ensure the data processing activity remains onshore.
  2. Maintain an audit trail of the data analysis activity.
  3. Obtain customer consent for secondary use of the data.
  4. Adjust the existing data retention requirements.

Answer(s): C



An organization has adopted a backup and recovery strategy that involves copying on-premise virtual machine (VM) images to a cloud service provider. Which of the following provides the BEST assurance that VMs can be recovered in the event of a disaster?

  1. Existence of a disaster recovery plan (DRP) with specified roles for emergencies
  2. Periodic on-site restoration of VM images obtained from the cloud provider
  3. Procurement of adequate storage for the VM images form the cloud service provider
  4. Inclusion of the right to audit in the cloud service provider contract

Answer(s): B



During the implementation of an enterprise resource planning (ERP) system, an IS auditor is reviewing the results of user acceptance testing (UAT). The auditor's
PRIMARY focus should be to determine if:

  1. application interfaces have been satisfactorily tested.
  2. all errors found in the testing process have been corrected.
  3. the business process owner has signed off on the results.
  4. system integration testing was performed.

Answer(s): C



A help desk has been contacted regarding a lost business mobile device. The FIRST course of action should be to:

  1. consult the legal team regarding the impact of intellectual property loss.
  2. verify the user's identity through a challenge response system.
  3. involve the security response team to launch an investigation.
  4. attempt to locate the device remotely.

Answer(s): B



Viewing Page 44 of 366



Share your comments for ISACA CISA exam with other users:

Mike 8/20/2023 5:12:00 PM

the exam dumps are helping me get a solid foundation on the practical techniques and practices needed to be successful in the auditing world.
UNITED STATES


Sam 8/31/2023 10:32:00 AM

not bad but you question database from isaca
MALAYSIA


Deno 10/25/2023 1:14:00 AM

i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.
Anonymous