ISACA CISA Exam Questions
Certified Information Systems Auditor (Page 10 )

Updated On: 24-Feb-2026

During audit fieldwork, an IS auditor learns that employees are allowed to connect their personal devices to company-owned computers. How can the auditor
BEST validate that appropriate security controls are in place to prevent data loss?

  1. Verify the data loss prevention (DLP) tool is properly configured by the organization.
  2. Review compliance with data loss and applicable mobile device user acceptance policies.
  3. Verify employees have received appropriate mobile device security awareness training.
  4. Conduct a walk-through to view results of an employee plugging in a device to transfer confidential data.

Answer(s): B



Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?

  1. Implementation methodology
  2. Test results
  3. Purchasing guidelines and policies
  4. Results of live processing

Answer(s): D



Which of the following is an advantage of using agile software development methodology over the waterfall methodology?

  1. Quicker end user acceptance
  2. Clearly defined business expectations
  3. Quicker deliverables
  4. Less funding required overall

Answer(s): C



In an online application, which of the following would provide the MOST information about the transaction audit trail?

  1. File layouts
  2. Data architecture
  3. System/process flowchart
  4. Source code documentation

Answer(s): C



On a public-key cryptosystem when there is no previous knowledge between parties, which of the following will BEST help to prevent one person from using a fictitious key to impersonate someone else?

  1. Send a certificate that can be verified by a certification authority with the public key.
  2. Encrypt the message containing the sender's public key, using the recipient's public key.
  3. Send the public key to the recipient prior to establishing the connection.
  4. Encrypt the message containing the sender's public key, using a private-key cryptosystem.

Answer(s): A






Post your Comments and Discuss ISACA CISA exam dumps with other Community members:

Join the CISA Discussion