ISACA CISA Exam Questions
Certified Information Systems Auditor (Page 3 )

Updated On: 21-Feb-2026

An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor's PRIMARY concern is that:

  1. a clear business case has been established.
  2. the new hardware meets established security standards.
  3. a full, visible audit trail will be included.
  4. the implementation plan meets user requirements.

Answer(s): A



To confirm integrity for a hashed message, the receiver should use:

  1. the same hashing algorithm as the sender's to create a binary image of the file.
  2. a different hashing algorithm from the sender's to create a numerical representation of the file.
  3. a different hashing algorithm from the sender's to create a binary image of the file.
  4. the same hashing algorithm as the sender's to create a numerical representation of the file.

Answer(s): D



An organization is implementing a new system that supports a month-end business process. Which of the following implementation strategies would be MOST efficient to decrease business downtime?

  1. Cutover
  2. Phased
  3. Pilot
  4. Parallel

Answer(s): D



Which of the following should be the FIRST step in managing the impact of a recently discovered zero-day attack?

  1. Estimating potential damage
  2. Identifying vulnerable assets
  3. Evaluating the likelihood of attack
  4. Assessing the impact of vulnerabilities

Answer(s): B



Which of the following is the BEST way to ensure that an application is performing according to its specifications?

  1. Pilot testing
  2. System testing
  3. Integration testing
  4. Unit testing

Answer(s): B






Post your Comments and Discuss ISACA CISA exam dumps with other Community members:

Join the CISA Discussion