ISACA CISA Exam Questions
Certified Information Systems Auditor (Page 28 )

Updated On: 24-Feb-2026

Which of the following development practices would BEST mitigate the risk associated with theft of user credentials transmitted between mobile devices and the corporate network?

  1. Enforce the validation of digital certificates used in the communication sessions.
  2. Release mobile applications in debugging mode to allow for easy troubleshooting.
  3. Embed cryptographic keys within the mobile application source code.
  4. Allow persistent sessions behveen mobile applications and the corporate network.

Answer(s): A



Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization's goals?

  1. Enterprise architecture (EA)
  2. Key performance indicators (KPIs)
  3. Balanced scorecard
  4. Enterprise dashboard

Answer(s): C



Which of the following cloud deployment models would BEST meet the needs of a startup software development organization with limited initial capital?

  1. Community
  2. Hybrid
  3. Private
  4. Public

Answer(s): D



Which of the following is MOST effective in detecting an intrusion attempt?

  1. Using packet filter software
  2. Using smart cards with one-time passwords
  3. Installing biometrics-based authentication
  4. Analyzing system logs

Answer(s): D



The MOST important reason why an IT risk assessment should be updated on a regular basis is to:

  1. utilize IT resources in a cost-effective manner.
  2. react to changes in the IT environment.
  3. comply with data classification changes.
  4. comply with risk management policies.

Answer(s): B






Post your Comments and Discuss ISACA CISA exam dumps with other Community members:

Join the CISA Discussion