Skip to Content

ISACA CISA Certified Information Systems Auditor Exam Questions and Answers – 2

The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.

ISACA Certified Information Systems Auditor (CISA) Exam Questions and Answers

CISA Question 131

Question

Which of the following user actions constitutes the GREATEST risk for introducing viruses into a local network?

A. Downloading a file from an external server
B. Uploading a file onto an internal server
C. Opening an email attachment
D. Viewing a hypertext markup language (HTML) document

Answer

A. Downloading a file from an external server

CISA Question 132

Question

The practice of performing backups reflects which type of internal control?

A. Corrective
B. Preventive
C. Detective
D. Compensating

Answer

A. Corrective

CISA Question 133

Question

What is the MOST important consideration of any disaster response plan?

A. Personnel safety
B. Business resumption
C. Adequate resource capacity
D. IT asset protection

Answer

A. Personnel safety

CISA Question 134

Question

An IS auditor is evaluating the risk of zero-day attacks and related mitigating controls for an organization. The auditor’s BEST recommendation is to implement:

A. a demilitarized zone (DMZ).
B. a signature-based antivirus program.
C. a heuristic intrusion prevention system (IPS).
D. an intrusion detection system (IDS).

Answer

C. a heuristic intrusion prevention system (IPS).

CISA Question 135

Question

Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?

A. Temperature sensors
B. Air pressure sensors
C. Humidity sensors
D. Water sensors

Answer

D. Water sensors

CISA Question 136

Question

Which of the following is the BEST method to secure credit card information displayed by an application used by both customer service representatives and fraud analysts?

A. Truncation
B. One-way hash
C. Encryption
D. Masking

Answer

C. Encryption

CISA Question 137

Question

The PRIMARY purpose of conducting a test of an alternate site as part of a disaster recovery program is to:

A. assess security awareness among employees.
B. determine recovery time objectives (RTOs).
C. verify the alternate infrastructure works as designed.
D. identify hidden costs for maintaining the site.

Answer

C. verify the alternate infrastructure works as designed.

CISA Question 138

Question

Which of the following BEST help to ensure system resiliency for a business application that processes high-volume and real-time retail transactions?

A. Adequate resourcing for the incident response team
B. Adequate encryption between applications
C. Adequate application clustering
D. Adequate reciprocal recovery agreement

Answer

C. Adequate application clustering

CISA Question 139

Question

A manager identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor in this scenario?

A. Hacktivists
B. Deleted log data
C. Terminated staff
D. Unauthorized access

Answer

C. Terminated staff

CISA Question 140

Question

Which of the following is the BEST control to help prevent sensitive data leaving an organization via email?

A. Scanning outgoing emails
B. Providing encryption solutions for employees
C. Conducting periodic phishing tests
D. Blocking outbound emails sent without encryption

Answer

D. Blocking outbound emails sent without encryption

Alex Lim is a certified IT Technical Support Architect with over 15 years of experience in designing, implementing, and troubleshooting complex IT systems and networks. He has worked for leading IT companies, such as Microsoft, IBM, and Cisco, providing technical support and solutions to clients across various industries and sectors. Alex has a bachelor’s degree in computer science from the National University of Singapore and a master’s degree in information security from the Massachusetts Institute of Technology. He is also the author of several best-selling books on IT technical support, such as The IT Technical Support Handbook and Troubleshooting IT Systems and Networks. Alex lives in Bandar, Johore, Malaysia with his wife and two chilrdren. You can reach him at [email protected] or follow him on Website | Twitter | Facebook

    Ads Blocker Image Powered by Code Help Pro

    Your Support Matters...

    We run an independent site that is committed to delivering valuable content, but it comes with its challenges. Many of our readers use ad blockers, causing our advertising revenue to decline. Unlike some websites, we have not implemented paywalls to restrict access. Your support can make a significant difference. If you find this website useful and choose to support us, it would greatly secure our future. We appreciate your help. If you are currently using an ad blocker, please consider disabling it for our site. Thank you for your understanding and support.