ISACA CISA Exam Questions
Certified Information Systems Auditor (Page 32 )

Updated On: 24-Feb-2026

Which of the following is MOST important for an IS auditor to review when assessing the integrity of encryption controls for data at rest?

  1. Protection of encryption keys
  2. Encryption of test data
  3. Frequency of encryption key changes
  4. Length of encryption keys

Answer(s): A



An IS audit manager finds that data manipulation logic developed by the audit analytics team leads to incorrect conclusions. This inaccurate logic is MOST likely an indication of which of the following?

  1. The team's poor understanding of the business process being analyzed
  2. Incompatibility between data volume and analytics processing capacity
  3. Poor change controls over data sets collected from the business
  4. Poor security controls that grant inappropriate access to analysis produced

Answer(s): A



Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?

  1. Blocking external IM traffic
  2. Blocking attachments in IM
  3. Allowing only corporate IM solutions
  4. Encrypting IM traffic

Answer(s): C



An IS auditor noted that a change to a critical calculation was placed into the production environment without being tested. Which of the following is the BEST way to obtain assurance that the calculation functions correctly?

  1. Check regular execution of the calculation batch job.
  2. Interview the lead system developer.
  3. Obtain post-change approval from management.
  4. Perform substantive testing using computer-assisted audit techniques (CAATs).

Answer(s): D



The use of cookies constitutes the MOST significant security threat when they are used for:

  1. obtaining a public key from a certification authority (CA).
  2. forwarding email and Internet Protocol (IP) addresses.
  3. authenticating using username and password.
  4. downloading files from the host server.

Answer(s): C






Post your Comments and Discuss ISACA CISA exam dumps with other Community members:

Join the CISA Discussion