ISACA CISA Exam Questions
Certified Information Systems Auditor (Page 64 )

Updated On: 28-Feb-2026

Coding standards provide which of the following?

  1. Access control tables
  2. Data flow diagrams
  3. Field naming conventions
  4. Program documentation

Answer(s): C



During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?

  1. Post-implementation review phase
  2. Design review phase
  3. User acceptance testing (UAT) phase
  4. Final implementation phase

Answer(s): A



Due to a high volume of customer orders, an organization plans to implement a new application for customers to use for online ordering. Which type of testing is
MOST important to ensure the security of the application prior to go-live?

  1. Stress testing
  2. User acceptance testing (UAT)
  3. Vulnerability testing
  4. Regression testing

Answer(s): C



During an audit of identity and access management, an IS auditor finds that the engagement audit plan does not include the testing of controls that regulate access by third parties. Which of the following would be the auditor's BEST course of action?

  1. Add testing of third-party access controls to the scope of the audit.
  2. Plan to test these controls in another audit.
  3. Determine whether the risk has been identified in the planning documents.
  4. Escalate the deficiency to audit management.

Answer(s): C



What is the PRIMARY reason for conducting a risk assessment when developing an annual IS audit plan?

  1. Identify and prioritize audit areas
  2. Determine the existence of controls in audit areas
  3. Provide assurance material items will be covered
  4. Decide which audit procedures and techniques to use

Answer(s): A



Viewing page 64 of 366
Viewing questions 316 - 320 out of 1823 questions



Post your Comments and Discuss ISACA CISA exam dumps with other Community members:

CISA Exam Discussions & Posts

AI Tutor