ISACA CISA Exam Questions
Certified Information Systems Auditor (Page 57 )

Updated On: 28-Feb-2026

A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure in the affected country. Which of the following would be MOST helpful in making this assessment?

  1. Identifying data security threats in the affected jurisdiction
  2. Reviewing data classification procedures associated with the affected jurisdiction
  3. Identifying business processes associated with personal data exchange with the affected jurisdiction
  4. Developing an inventory of all business entities that exchange personal data with the affected jurisdiction

Answer(s): C



When responding to an ongoing denial of service (DoS) attack, an organization's FIRST course of action should be to:

  1. minimize impact.
  2. investigate damage.
  3. analyze the attack path.
  4. restore service.

Answer(s): A



Which of the following BEST describes an audit risk?

  1. The financial report may contain undetected material errors.
  2. Employees have been misappropriating funds.
  3. The company is being sued for false accusations.
  4. Key employees have not taken vacation for 2 years.

Answer(s): A



In an IT organization where many responsibilities are shared, which of the following is the BEST control for detecting unauthorized data changes?

  1. Users are required to periodically rotate responsibilities.
  2. Segregation of duties conflicts are periodically reviewed.
  3. Data changes are logged in an outside application.
  4. Data changes are independently reviewed by another group.

Answer(s): D



End users have been demanding the ability to use their own devices for work, but want to keep personal information out of corporate control. Which of the following would be MOST effective at reducing the risk of security incidents while satisfying end user requirements?

  1. Encrypt corporate data on the devices.
  2. Enable remote wipe capabilities for the devices.
  3. Require complex passwords.
  4. Implement an acceptable use policy.

Answer(s): A






Post your Comments and Discuss ISACA CISA exam dumps with other Community members:

Join the CISA Discussion