Free CISA Practice Test Questions 2026

1020 Questions


Last Updated On :


Topic 2: Exam Pool B

Which of the following should be the PRIMARY consideration when developing an IT strategy?


A.

Alignment with the IT investment portfolio


B.

IT key performance indicators based on business objectives


C.

Short and long-term plans for the enterprise IT architecture


D.

Alignment with overall business objectives





A.
  

Alignment with the IT investment portfolio



..risk that the IS auditor will not find an error that has occurred is identified by which of the following terms?


A.

Control


B.

Prevention


C.

Inherent


D.

Detection





D.
  

Detection



Which of the following is the BEST reason for an organization to develop a business continuity plan?


A.

To avoid the costs resulting from the failure of key systems and processes


B.

To establish business un« prioritization of systems projects, and strategies


C.

To develop a detailed desertion of information systems and processes


D.

To identify the users of information systems and processes





B.
  

To establish business un« prioritization of systems projects, and strategies



Which of the following should be reviewed FIRST when planning an IS audit?


A.

IS audit standards


B.

Annual business unit budget


C.

Recent financial information


D.

The business environment





D.
  

The business environment



maturity model is useful in the assessment of IT service management because it:


A.

defines the level of control required to meet business needs 


B.

provides a benchmark for process improvement


C.

specifies the mechanism needed to achieve defined service levels 


D.

indicates the service levels requited for the business area.





B.
  

provides a benchmark for process improvement



MOST critical security weakness of a packet level firewall is that it can be circumvented by:


A.

using a dictionary attack of encrypted passwords


B.

deciphering the signature information of the packets


C.

intercepting packets and viewing passwords sent in clear text


D.

changing the source address on incoming packets





B.
  

deciphering the signature information of the packets



Which of the following is a detective control?


A.

Echo checks m telecommunications


B.

Programmed edit checks


C.

A router rule restricting a service


D.

Procedures for authorizing transactions





B.
  

Programmed edit checks



An organization uses electronic funds transfer (EFT) to pay its vendors. Which of the following should be an IS auditor s MAIN focus while reviewing controls in the accounts payable Application?


A.

Amount of disbursements


B.

Volume of transactions


C.

Changes to the vendor master file


D.

Frequency of transactions





C.
  

Changes to the vendor master file



Which of the following would BEST facilitate the detection of internal fraud perpetrated by an individual?


A.

Mandatory leave


B.

Flexible time


C.

Corporate fraud hotline


D.

Segregation of duties





A.
  

Mandatory leave



When evaluating the recent implementation of an intrusion detection system (IDS), an IS auditor should be MOST concerned with inappropriate:


A.

training


B.

encryption


C.

tuning


D.

patching





C.
  

tuning



The PRIMARY advantage of object-oriented technology is enhanced:


A.

management of sequential program execution for data access


B.

management of a restricted variety of data types for a data object


C.

grouping of objects into methods for data access


D.

efficiency due to the re-use of elements of logic





C.
  

grouping of objects into methods for data access



When reviewing backup policies, an IS auditor MUST verify that backup intervals of critical systems do not exceed which of the following?


A.

Service level objective (SLO)


B.

Recovery time objective (RTO)


C.

Maximum acceptable outage (MAO)


D.

Recovery point objective (RPO)





D.
  

Recovery point objective (RPO)




Page 17 out of 85 Pages
PreviousNext
4567891011121314151617181920212223242526272829
CISA Practice Test Home

What Makes Our Practice Test So Effective?

Real-World Scenario Mastery: Our CISA practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.

Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before exam day arrives.

Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive CISA practice exam questions pool covering all topics, the real exam feels like just another practice session.