Skip to Content

ISACA CISA Certified Information Systems Auditor Exam Questions and Answers – 9

The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.

ISACA Certified Information Systems Auditor (CISA) Exam Questions and Answers

CISA Question 981

Question

Database snapshots can provide an excellent audit trail for an IS auditor. True or false?

A. True
B. False

Answer

A. True

Explanation

Database snapshots can provide an excellent audit trail for an IS auditor.

CISA Question 982

Question

What is a data validation edit control that matches input data to an occurrence rate? Choose the BEST answer.

A. Accuracy check
B. Completeness check
C. Reasonableness check
D. Redundancy check

Answer

C. Reasonableness check

Explanation

A reasonableness check is a data validation edit control that matches input data to an occurrence rate.

CISA Question 983

Question

Processing controls ensure that data is accurate and complete, and is processed only through which of the following?

A. Documented routines
B. Authorized routines
C. Accepted routines
D. Approved routines

Answer

B. Authorized routines

Explanation

Processing controls ensure that data is accurate and complete, and is processed only through authorized routines.

CISA Question 984

Question

Data edits are implemented before processing and are considered which of the following?

A. Deterrent integrity controls
B. Detective integrity controls
C. Corrective integrity controls
D. Preventative integrity controls

Answer

D. Preventative integrity controls

Explanation

Data edits are implemented before processing and are considered preventive integrity controls.

CISA Question 985

Question

What is used as a control to detect loss, corruption, or duplication of data?

A. Redundancy check
B. Reasonableness check
C. Hash totals
D. Accuracy check

Answer

C. Hash totals

Explanation

Hash totals are used as a control to detect loss, corruption, or duplication of data.

CISA Question 986

Question

________________ should be implemented as early as data preparation to support data integrity at the earliest point possible.

A. Control totals
B. Authentication controls
C. Parity bits
D. Authorization controls

Answer

A. Control totals

Explanation

Control totals should be implemented as early as data preparation to support data integrity at the earliest point possible.

CISA Question 987

Question

When should an application-level edit check to verify that availability of funds was completed at the electronic funds transfer (EFT) interface?

A. Before transaction completion
B. Immediately after an EFT is initiated
C. During run-to-run total testing
D. Before an EFT is initiated

Answer

D. Before an EFT is initiated

Explanation

An application-level edit check to verify availability of funds should be completed at the electronic funds transfer (EFT) interface before an EFT is initiated.

CISA Question 988

Question

Whenever business processes have been re-engineered, the IS auditor attempts to identify and quantify the impact of any controls that might have
been removed, or controls that might not work as effectively after business process changes. True or false?

A. True
B. False

Answer

A. True

Explanation

Whenever business processes have been re-engineered, the IS auditor should attempt to identify and quantify the impact of any controls that might have been removed, or controls that might not work as effectively after business process changes.

CISA Question 989

Question

Business process re-engineering often results in ___________________ automation, which results in ____________ number of people using
technology. Fill in the blanks.

A. Increased; a greater
B. Increased; a fewer
C. Less; a fewer
D. Increased; the same

Answer

A. Increased; a greater

Explanation

Business process re-engineering often results in increased automation, which results in a greater number of people using technology.

CISA Question 990

Question

Which of the following exploit vulnerabilities to cause loss or damage to the organization and its assets?

A. Exposures
B. Threats
C. Hazards
D. Insufficient controls

Answer

B. Threats

Explanation

Threats exploit vulnerabilities to cause loss or damage to the organization and its assets.