ISACA CISA Exam Questions
Certified Information Systems Auditor (Page 35 )

Updated On: 24-Feb-2026

Which of the following is the MOST significant risk associated with the use of virtualization?

  1. Insufficient network bandwidth
  2. Single point of failure
  3. Inadequate configuration
  4. Performance issues of hosts

Answer(s): B



Which of the following is MOST important to consider when scheduling follow-up audits?

  1. The impact if corrective actions are not taken
  2. The amount of time the auditee has agreed to spend with auditors
  3. The efforts required for independent verification with new auditors
  4. Controls and detection risks related to the observations

Answer(s): A



Secure code reviews as part of a continuous deployment program are which type of control?

  1. Detective
  2. Corrective
  3. Logical
  4. Preventive

Answer(s): D



Which of the following would BEST detect unauthorized modification of data by a database administrator (DBA)?

  1. Audit database change requests
  2. Audit database activity logs
  3. Review changes to edit checks
  4. Compare data to input records

Answer(s): B



In a typical system development life cycle (SDLC), which group is PRIMARILY responsible for confirming compliance with requirements?

  1. Steering committee
  2. Risk management
  3. Quality assurance (QA)
  4. Internal audit

Answer(s): C






Post your Comments and Discuss ISACA CISA exam dumps with other Community members:

Join the CISA Discussion