ISACA CISA Exam Questions
Certified Information Systems Auditor (Page 4 )

Updated On: 21-Feb-2026

Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?

  1. Conceal data devices and information labels.
  2. Issue an access card to the vendor.
  3. Monitor and restrict vendor activities.
  4. Restrict use of portable and wireless devices.

Answer(s): C



An employee loses a mobile device resulting in loss of sensitive corporate data. Which of the following would have BEST prevented data leakage?

  1. Data encryption on the mobile device
  2. The triggering of remote data wipe capabilities
  3. Awareness training for mobile device users
  4. Complex password policy for mobile devices

Answer(s): A



During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:

  1. cost-benefit analysis.
  2. acceptance testing.
  3. application test cases.
  4. project plans.

Answer(s): D



Upon completion of audit work, an IS auditor should:

  1. provide a report to the auditee stating the initial findings.
  2. provide a report to senior management prior to discussion with the auditee.
  3. distribute a summary of general findings to the members of the auditing team.
  4. review the working papers with the auditee.

Answer(s): A



During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same areas simultaneously, which of the following is the BEST approach to optimize resources?

  1. Leverage the work performed by external audit for the internal audit testing.
  2. Ensure both the internal and external auditors perform the work simultaneously.
  3. Roll forward the general controls audit to the subsequent audit year.
  4. Request that the external audit team leverage the internal audit work.

Answer(s): A






Post your Comments and Discuss ISACA CISA exam dumps with other Community members:

Join the CISA Discussion