The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.
Table of Contents
- CISA Question 701
- Question
- Answer
- CISA Question 702
- Question
- Answer
- CISA Question 703
- Question
- Answer
- CISA Question 704
- Question
- Answer
- CISA Question 705
- Question
- Answer
- CISA Question 706
- Question
- Answer
- CISA Question 707
- Question
- Answer
- CISA Question 708
- Question
- Answer
- CISA Question 709
- Question
- Answer
- CISA Question 710
- Question
- Answer
CISA Question 701
Question
Which of the following should be performed FIRST when preparing to deploy a major upgrade to a critical online application?
A. Update the disaster recovery process.
B. Update the business impact analysis (BIA).
C. Test the rollback process.
D. Review data backup procedures.
Answer
C. Test the rollback process.
CISA Question 702
Question
Which of the following metrics would BEST measure the agility of an organization’s IT function?
A. Average time to turn strategic IT objectives into an agreed upon and approved initiative
B. Average number of learning and training hours per IT staff member
C. Frequency of security assessments against the most recent standards and guidelines
D. Percentage of staff with sufficient IT-related skills for the competency required of their roles.
Answer
A. Average time to turn strategic IT objectives into an agreed upon and approved initiative
CISA Question 703
Question
An organization globally distributes a free phone application that includes a module to gather and report user information. The application includes a privacy notice alerting users to the data gathering. Which of the following presents the GREATEST risk?
A. The data gathering notice is available in only one language.
B. There is no framework to delete personal data.
C. There may be a backlash among users when the data gathering is revealed.
D. The data is not properly encrypted on the application server.
Answer
D. The data is not properly encrypted on the application server.
CISA Question 704
Question
Which of the following is BEST for providing uninterrupted services?
A. Snapshots
B. Differential backup
C. Televaulting
D. Mirroring
Answer
D. Mirroring
CISA Question 705
Question
Which of the following BEST enables timely detection of changes in the IT environment to support informed decision making by management?
A. Continuous monitoring
B. Sampling checks on high-risk areas
C. Change management reports
D. Established key risk indicators (KRIs)
Answer
A. Continuous monitoring
CISA Question 706
Question
Which of the following controls would BEST ensure that payroll system rate changes are valid?
A. Only a payroll department manager can input the new rate.
B. Rate changes require visual verification before acceptance.
C. Rate changes must be entered twice to ensure that they are entered correctly.
D. Rate changes are reported to and independently verified by a manager.
Answer
D. Rate changes are reported to and independently verified by a manager.
CISA Question 707
Question
Which of the following is the MOST effective control for emergency changes to application programs?
A. Processing the change through change control with review of the change the following day
B. Keeping a sealed envelope containing a password that operators can use to make emergency changes
C. Periodically checking the application program libraries to detect whether unauthorized changes have been made
D. Preparing and approving program change forms before the changes are made
Answer
A. Processing the change through change control with review of the change the following day
CISA Question 708
Question
Which of the following components of a scheduling tool BEST prevents job failures due to insufficient system resources?
A. Job dependencies
B. Delayed job starts
C. Exception handling
D. Error alerts
Answer
C. Exception handling
CISA Question 709
Question
When physical destruction is not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
A. Recycling the disk
B. Reformatting
C. Deleting files sequentially
D. Overwriting multiple times
Answer
D. Overwriting multiple times
CISA Question 710
Question
An employee loses a mobile device resulting in loss of sensitive corporate data. Which of the following would have BEST prevented data leakage?
A. Awareness training for mobile device users
B. Data encryption on the mobile device
C. The triggering of remote data wipe capabilities
D. Complex password policy for mobile devices
Answer
C. The triggering of remote data wipe capabilities