ISACA CISA Exam Questions
Certified Information Systems Auditor (Page 27 )

Updated On: 24-Feb-2026

An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?

  1. The data model is not clearly documented.
  2. The vendor development team is located overseas.
  3. The cost of outsourcing is lower than in-house development.
  4. A training plan for business users has not been developed.

Answer(s): A



An employee has accidentally posted confidential data to the company's social media page. Which of the following is the BEST control to prevent this from recurring?

  1. Establish two-factor access control for social media accounts.
  2. Implement a moderator approval process.
  3. Require all updates to be made by the marketing director.
  4. Perform periodic audits of social media updates.

Answer(s): B



Which of the following is MOST important to include in a contract with a software development service provider?

  1. A list of key performance indicators (KPIs)
  2. Service level agreement (SLA)
  3. Ownership of intellectual property
  4. Explicit contract termination requirements

Answer(s): C



An IS auditors reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance that both incoming and outgoing internet traffic is controlled?

  1. Load batancer
  2. Security information and event management (SIEM) system
  3. Intrusion detection system (IDS)
  4. Statetul firewall

Answer(s): D



An organization needs to comply with data privacy regulations forbidding the display of personally identifiable information (PII) on customer bills or receipts.
However, it is a business requirement to display at least one attribute so that customers can verify the bills or receipts are intended for them. What is the BEST recommendation?

  1. Data sanitization
  2. Data masking
  3. Data encryption
  4. Data tokenization

Answer(s): B






Post your Comments and Discuss ISACA CISA exam dumps with other Community members:

Join the CISA Discussion