Free CISA Practice Test Questions 2026

1020 Questions


Last Updated On :


Topic 3: Exam Pool C

An organization s data retention policy states that all data will be backed up, retained for 10 years, and then destroyed. When conducting an audit of the long-term offsite backup program, an IS auditor should:


A.

verify that business owners review data before it is destroyed.


B.

verify that there is a process to ensure readability and restore capability


C.

confirm that business interruption insurance coverage is in place.


D.

review data classification schemes for appropriate security levels.





B.
  

verify that there is a process to ensure readability and restore capability



An IS auditor is planning to audit an organization's infrastructure for access, patching, and change management. Which of the following is the BEST way to prioritize the systems?


A.

Complexity of the environment


B.

Criticality of the system


C.

System hierarchy within the infrastructure


D.

System retirement plan





B.
  

Criticality of the system



Which of the following are BEST suited for continuous auditing?


A.

Manual transactions


B.

Irregular transactions


C.

Low-value transactions


D.

Real-time transactions





B.
  

Irregular transactions



Which of the following is the FIRST step when conducting a business impact analysis?


A.

identifying critical information resources


B.

Identifying events impacting continuity of operations


C.

Analyzing past transaction volumes


D.

Creating a data classification scheme





A.
  

identifying critical information resources



The GREATEST benefit of risk-based auditing is that it:


A.

demonstrates compliance with regulatory requirements


B.

enables alignment of resources to significant risk areas.


C.

allows an organization to identify and eliminate low-risk areas


D.

identifies problem areas within an organization





B.
  

enables alignment of resources to significant risk areas.



A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:


A.

use a proxy server to filter out Internet sites that should not be accessed.


B.

keep a manual log of Internet access.


C.

monitor remote access activities.


D.

include a statement in its security policy about Internet use.





A.
  

use a proxy server to filter out Internet sites that should not be accessed.



Which of the following is a directive control?


A.

Establishing an information security operations team


B.

Updating data loss prevention software


C.

Implementing an information security policy


D.

Configuring data encryption software





C.
  

Implementing an information security policy



During business process reengineering (BPR) of a bank's teller activities, an IS auditor should evaluate:


A.

the impact of changed business processes.


B.

the cost of new controls.


C.

BPR project plans


D.

continuous improvement and monitoring plans





A.
  

the impact of changed business processes.



To create a digital signature in a message using asymmetric encryption, it is necessary to:


A.

First use a symmetric algorithm for the authentication sequence


B.

encrypt the authentication sequence using a public key.


C.

transmit the actual digital signature in unencrypted clear text.


D.

encrypt the authentication sequence using a private key.





B.
  

encrypt the authentication sequence using a public key.



Which of the following is the MOST likely cause of a successful firewall penetration?


A.

Use of a Trojan to bypass the firewall


B.

Loophole m firewall vendor's code


C.

Virus infection


D.

Firewall misconfiguration by the administrator





D.
  

Firewall misconfiguration by the administrator



A security administrator should have read-only access for which of the following?


A.

Router configuration


B.

Password policy


C.

Security logs


D.

Services/daemons configuration





C.
  

Security logs



Which of the following is the PRIMARY reason for an IS auditor to use computer-assisted audit techniques (CAATs)?


A.

To efficiently test an entire population


B.

To perform direct testing of production data


C.

To conduct automated sampling for testing


D.

To enable quicker access to information





A.
  

To efficiently test an entire population




Page 25 out of 85 Pages
PreviousNext
1213141516171819202122232425262728293031323334353637
CISA Practice Test Home

What Makes Our Practice Test So Effective?

Real-World Scenario Mastery: Our CISA practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.

Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before exam day arrives.

Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive CISA practice exam questions pool covering all topics, the real exam feels like just another practice session.