ISACA CISA Exam (page: 67)
ISACA Certified Information Systems Auditor
Updated on: 02-Jan-2026

Viewing Page 67 of 366

Reconciliations have identified data discrepancies between an enterprise data warehouse and a revenue system for key financial reports. What is the GREATEST risk to the organization in this situation?

  1. The key financial reports may no longer be produced.
  2. Financial reports may be delayed.
  3. Undetected fraud may occur.
  4. Decisions may be made based on incorrect information.

Answer(s): D



An organization has recently implemented a Voice-over IP (VoIP) communication system. Which of the following should be the IS auditor's PRIMARY concern?

  1. Voice quality degradation due to packet loss
  2. Lack of integration of voice and data communications
  3. A single point of failure for both voice and data communications
  4. Inability to use virtual private networks (VPNs) for internal traffic

Answer(s): C



When evaluating the ability of a disaster recovery plan (DRP) to enable the recovery of IT processing capabilities, it is MOST important for the IS auditor to verify the plan is:

  1. stored at an offsite location.
  2. communicated to department heads.
  3. regularly reviewed.
  4. periodically tested.

Answer(s): D



During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST:

  1. conduct additional compliance testing.
  2. issue an intermediate report to management.
  3. perform a business impact analysis (BIA).
  4. evaluate the impact on current disaster recovery capability.

Answer(s): D



During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser.
Which of the following is the auditor's BEST recommendation to help prevent unauthorized access?

  1. Utilize strong anti-malware controls on all computing devices.
  2. Implement an intrusion detection system (IDS).
  3. Update security policies and procedures.
  4. Implement multi-factor authentication.

Answer(s): D



Viewing Page 67 of 366



Share your comments for ISACA CISA exam with other users:

Mike 8/20/2023 5:12:00 PM

the exam dumps are helping me get a solid foundation on the practical techniques and practices needed to be successful in the auditing world.
UNITED STATES


Sam 8/31/2023 10:32:00 AM

not bad but you question database from isaca
MALAYSIA


Deno 10/25/2023 1:14:00 AM

i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.
Anonymous