ISACA CISA Exam Questions
Certified Information Systems Auditor (Page 7 )

Updated On: 21-Feb-2026

Which of the following would MOST effectively ensure the integrity of data transmitted over a network?

  1. Message encryption
  2. Steganography
  3. Certificate authority (CA)
  4. Message digest

Answer(s): D



Which of the following would be MOST useful to an IS auditor assessing the effectiveness of IT resource planning?

  1. Budget execution status
  2. A capacity analysis of IT operations
  3. A succession plan for key IT personnel
  4. A list of new applications to be implemented

Answer(s): B



An IS auditor is evaluating controls for monitoring the regulatory compliance of a third party that provides IT services to the organization. Which of the following should be the auditor's GREATEST concern?

  1. A gap analysis against regulatory requirements has not been conducted.
  2. The third-party disclosed a policy-related issue of noncompliance.
  3. The organization has not reviewed the third party's policies and procedures.
  4. The organization has not communicated regulatory requirements to the third party.

Answer(s): D



Which of the following is an audit reviewer's PRIMARY role with regard to evidence?

  1. Ensuring appropriate statistical sampling methods were used
  2. Ensuring evidence is labeled to show it was obtained from an approved source
  3. Ensuring unauthorized individuals do not tamper with evidence after it has been captured
  4. Ensuring evidence is sufficient to support audit conclusions

Answer(s): D



When an intrusion into an organization's network is detected, which of the following should be done FIRST?

  1. Contact law enforcement.
  2. Identify nodes that have been compromised.
  3. Block all compromised network nodes.
  4. Notify senior management

Answer(s): B






Post your Comments and Discuss ISACA CISA exam dumps with other Community members:

Join the CISA Discussion