ISACA CISA Exam Questions
Certified Information Systems Auditor (Page 50 )

Updated On: 28-Feb-2026

Which type of attack poses the GREATEST risk to an organization's most sensitive data?

  1. Spear phishing attack
  2. Insider attack
  3. Password attack
  4. Eavesdropping attack

Answer(s): B



Using swipe cards to limit employee access to restricted areas requires implementing which additional control?

  1. Physical sign-in of all employees for access to restricted areas
  2. Initial escort of all new hires by a current employee
  3. Periodic review of access profiles by management
  4. Employee-access criteria determined on the basis of IS experience

Answer(s): C



To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?

  1. Include strategic objectives in IT staff performance objectives.
  2. Review IT staff job descriptions for alignment.
  3. Identify required IT skill sets that support key business processes.
  4. Develop quarterly training for each IT staff member.

Answer(s): C



An internal audit department reports directly to the chief financial officer (CFO) of an organization. This MOST likely leads to:

  1. audit findings becoming more business-oriented.
  2. concern over the independence of the auditor.
  3. audit recommendations receiving greater attention.
  4. biased audit findings and recommendations

Answer(s): B



An internal audit department recently established a quality assurance (QA) program. Which of the following activities is MOST important to include as part of the
QA program requirements?

  1. Long-term internal audit resource planning
  2. Feedback from internal audit staff
  3. Analysis of user satisfaction reports from business lines
  4. Ongoing monitoring of the audit activities

Answer(s): D






Post your Comments and Discuss ISACA CISA exam dumps with other Community members:

Join the CISA Discussion