ISACA CISA Exam Questions
Certified Information Systems Auditor (Page 48 )

Updated On: 28-Feb-2026

A business unit cannot achieve desired segregation of duties between operations and programming due to size constraints. Which of the following is MOST important for the IS auditor to identify?

  1. Unauthorized user controls
  2. Compensating controls
  3. Controls over operational effectiveness
  4. Additional control weaknesses

Answer(s): B



The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:

  1. the access control system's configuration.
  2. how the latest system changes were implemented.
  3. the access rights that have been granted.
  4. the access control system's log settings.

Answer(s): C



Several unattended laptops containing sensitive customer data were stolen from personnel offices. Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?

  1. Enhance physical security.
  2. Require the use of cable locks.
  3. Require two-factor authentication.
  4. Encrypt the disk drive.

Answer(s): D



When classifying information, it is MOST important to align the classification to:

  1. business risk.
  2. data retention requirements.
  3. industry standards.
  4. security policy.

Answer(s): A



An organization's information security department has recently created a centralized governance model to ensure that network-related findings are remediated within the service level agreement (SLA). What should the IS auditor use to assess the maturity and capability of this governance model?

  1. Key risk indicators (KRIs)
  2. Key process controls
  3. Key data elements
  4. Key performance indicators (KPIs)

Answer(s): D






Post your Comments and Discuss ISACA CISA exam dumps with other Community members:

Join the CISA Discussion