ISACA CISA Exam Questions
Certified Information Systems Auditor (Page 56 )

Updated On: 28-Feb-2026

During an audit of a disaster recovery plan (DRP) for a critical business area, an IS auditor finds that not all critical systems are covered. What should the auditor do NEXT?

  1. Evaluate the impact of not covering the systems
  2. Escalate the finding to senior management
  3. Evaluate the prior year's audit results regarding critical system coverage
  4. Verify whether the systems are part of the business impact analysis (BIA)

Answer(s): D



Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects. Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?

  1. Peer organization staffing benchmarks
  2. Human resources (HR) sourcing strategy
  3. Budgeted forecast for the next financial year
  4. Records of actual time spent on projects

Answer(s): D



A bank's web-hosting provider has just completed an internal IT security audit and provides only a summary of the findings to the bank's auditor. Which of the following should be the bank's GREATEST concern?

  1. The audit scope may not have addressed critical areas.
  2. The audit procedures are not provided to the bank.
  3. The bank's auditors are not independent of the service provider.
  4. The audit may be duplicative of the bank's internal audit procedures

Answer(s): A



An incorrect version of source code was amended by a development team. This MOST likely indicates a weakness in:

  1. change management.
  2. project management.
  3. incident management.
  4. quality assurance (QA).

Answer(s): D



An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?

  1. Configure to auto-wipe after multiple failed access attempts.
  2. Require employees to attend security awareness training.
  3. Enable device auto-lock function.
  4. Password protect critical data files.

Answer(s): A






Post your Comments and Discuss ISACA CISA exam dumps with other Community members:

Join the CISA Discussion