ISACA CISA Exam Questions
Certified Information Systems Auditor (Page 44 )

Updated On: 27-Feb-2026

An organization that has suffered a cyberattack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?

  1. The chain of custody has not been documented.
  2. An imaging process was used to obtain a copy of the data from each computer.
  3. Audit was only involved during extraction of the information.
  4. The legal department has not been engaged.

Answer(s): A



The members of an emergency incident response team should be:

  1. assigned at the time of each incident.
  2. appointed by the CISO.
  3. restricted to IT personnel.
  4. selected from multiple departments.

Answer(s): D



Which of the following is the BEST indicator that an application system's agreed-upon level of service has been met?

  1. Transaction response time
  2. Bandwidth usage logs
  3. CPU utilization reports
  4. Security incident reports

Answer(s): A



The PRIMARY benefit to using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:

  1. disperses dry chemical suppressants exclusively.
  2. has a decreased risk of leakage.
  3. allows more time to abort release of the suppressant.
  4. is more effective at suppressing flames.

Answer(s): B



After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?

  1. Updating the continuity plan for critical resources
  2. Updating the security policy
  3. Verifying that access privileges have been reviewed
  4. Investigating access rights for expiration dates

Answer(s): C






Post your Comments and Discuss ISACA CISA exam dumps with other Community members:

Join the CISA Discussion