Skip to Content

ISACA CISA Certified Information Systems Auditor Exam Questions and Answers – 23

The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.

ISACA Certified Information Systems Auditor (CISA) Exam Questions and Answers

CISA Question 2441

Question

To create a digital signature in a message using asymmetric encryption, it is necessary to:

A. first use a symmetric algorithm for the authentication sequence.
B. encrypt the authentication sequence using a public key.
C. transmit the actual digital signature in unencrypted clear text.
D. encrypt the authentication sequence using a private key.

Answer

D. encrypt the authentication sequence using a private key.

CISA Question 2442

Question

Which of the following BEST helps to identify errors during data transfer?

A. Decrease the size of data transfer packets.
B. Test the integrity of the data transfer.
C. Review and verify the data transfer sequence numbers.
D. Enable a logging process for data transfer.

Answer

B. Test the integrity of the data transfer.

CISA Question 2443

Question

Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?

A. Substantive testing
B. Walk-through reviews
C. Compliance testing
D. Design documentation reviews

Answer

A. Substantive testing

CISA Question 2444

Question

Which of the following strategies BEST optimizes data storage without compromising data retention practices?

A. Limiting the size of the file attachments being sent via email
B. Automatically deleting emails older than one year
C. Moving emails to a virtual email vault after 30 days
D. Allowing employees to store large emails on flash drives

Answer

C. Moving emails to a virtual email vault after 30 days

CISA Question 2445

Question

For a company that outsources payroll processing, which of the following is the BEST way to ensure that only authorized employees are paid?

A. The company’s bank reconciliations should be independently prepared and checked.
B. Employees should receive pay statements showing gross pay, net pay, and deductions.
C. Only payroll employees should be given the password for data entry and report retrieval.
D. Electronic payroll reports should be independently reviewed.

Answer

A. The company’s bank reconciliations should be independently prepared and checked.

CISA Question 2446

Question

Which of the following would provide the MOST assurance that an application will work in a live environment?

A. Walking through the programs to view the results of error processing
B. Processing of test data to prove that data can be passed between individual programs
C. Walking through the programs to view the results of processing copies of production data.
D. Processing of valid and erroneous data in an acceptance test environment

Answer

D. Processing of valid and erroneous data in an acceptance test environment

CISA Question 2447

Question

When reviewing an end-user computing (EUC) application, which of the following techniques is MOST appropriate for testing program logic?

A. Integrated testing facility
B. Test decking
C. Re-performance
D. Key calculation inspection

Answer

B. Test decking

CISA Question 2448

Question

A retailer normally uses a scanner to read product labels and input product codes and prices. The unit is not functioning and staff are keying information manually.
With respect to the accuracy of the input, it is likely that:

A. audit risk has increased.
B. control risk has increased.
C. inherent risk has decreased.
D. detection risk has decreased.

Answer

C. inherent risk has decreased.

CISA Question 2449

Question

IS management has decided to replace the current single-server-based local area network (LAN) with three interconnected servers running different operating systems. Existing applications and data on the old server have been exclusively distributed on the new servers. This will MOST likely result in:

A. disclosure of information.
B. multiple authentication.
C. data incompleteness.
D. data unavailability.

Answer

B. multiple authentication.

CISA Question 2450

Question

Controls related to authorized modifications to production programs are BEST tested by:

A. testing only the authorizations to implement the new program.
B. tracing modifications from the executable program back to the original request for change.
C. reviewing only the actual lines of source code changed in the program.
D. tracing modifications from the original request for change forward to the executable program.

Answer

D. tracing modifications from the original request for change forward to the executable program.