Skip to Content

ISACA CISA Certified Information Systems Auditor Exam Questions and Answers – 23

The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.

ISACA Certified Information Systems Auditor (CISA) Exam Questions and Answers

CISA Question 2451

Question

During a computer forensics investigation, what is the PRIMARY reason for obtaining a bit-for-bit copy of data in storage?

A. To document findings
B. To obtain residual data
C. To obtain data as well as source code details
D. To transfer the data into a controlled location

Answer

B. To obtain residual data

CISA Question 2452

Question

Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor’s BEST recommendation?

A. Ensure the business signs off on end-to-end user acceptance test results.
B. Ensure corrected program code is compiled in a dedicated server.
C. Ensure change management reports are independently reviewed.
D. Ensure programmers cannot access code after the completion of program edits.

Answer

B. Ensure corrected program code is compiled in a dedicated server.

CISA Question 2453

Question

Which cloud deployment model is MOST likely to be limited in scalability?

A. Public
B. Private
C. Hybrid
D. Community

Answer

B. Private

CISA Question 2454

Question

A programmer has made unauthorized changes to key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?

A. The user requirements were not documented.
B. Payroll files were not under the control of a librarian.
C. The programmer did not involve the user in testing.
D. The programmer has access to the production programs.

Answer

D. The programmer has access to the production programs.

CISA Question 2455

Question

Which of the following is the MOST reliable control to prevent double payments made as a result of payment system batch jobs restarting after processing errors?

A. Database rollback in case of processing errors
B. Review of batch job competition logs
C. Duplicate verification at the last possible point in processing
D. Restart procedures integrated in job controls

Answer

C. Duplicate verification at the last possible point in processing

CISA Question 2456

Question

Which of the following is used in providing logical access control to restrict updating or deleting business information in a relational database?

A. Trigger
B. View
C. Join
D. Primary key

Answer

B. View

CISA Question 2457

Question

Which of the following is the MOST effective way to minimize the risk of a SQL injection attack?

A. Reconfiguring content filtering settings
B. Performing activity monitoring
C. Using secure coding practices
D. Implementing an intrusion detection tool

Answer

C. Using secure coding practices

CISA Question 2458

Question

Which of the following methods should be used to purge confidential data from write-once optical media?

A. Degauss the media.
B. Destroy the media.
C. Remove the references to data from the access index.
D. Write over the data with null values.

Answer

B. Destroy the media.

CISA Question 2459

Question

Which of the following is the BEST physical security solution for granting and restricting access to individuals based on their unique access needs?

A. Bolting door locks
B. Cipher locks
C. Closed-circuit television (CCTV)
D. Electronic badge system

Answer

D. Electronic badge system

CISA Question 2460

Question

Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?

A. Preventive
B. Deterrent
C. Corrective
D. Detective

Answer

A. Preventive