Download Certified Information Systems Auditor.CISA.ExamTopics.2026-03-16.1457q.tqb

Vendor: ISACA
Exam Code: CISA
Exam Name: Certified Information Systems Auditor
Date: Mar 16, 2026
File Size: 5 MB

How to open TQB files?

Files with TQB (Taurus Question Bank) extension can be opened by Taurus Exam Studio.

Demo Questions

Question 1
The results of an IS audit indicating the need to strengthen controls has been communicated to the appropriate stakeholders. Which of the following is the BEST way for management to enforce implementation of the recommendations?
  1. Copy senior management on communications related to the audit
  2. Have stakeholders develop a business case for control changes
  3. Assign ownership to each remediation activity
  4. Request auditors to design a roadmap for closure
Correct answer: C
Question 2
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST:
  1. conduct additional compliance testing.
  2. issue an intermediate report to management.
  3. perform a business impact analysis (BIA).
  4. evaluate the impact on current disaster recovery capability.
Correct answer: D
Question 3
When evaluating the ability of a disaster recovery plan (DRP) to enable the recovery of IT processing capabilities, it is MOST important for the IS auditor to verify the plan is:
  1. stored at an offsite location.
  2. communicated to department heads.
  3. regularly reviewed.
  4. periodically tested.
Correct answer: D
Question 4
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which of the following should be the IS auditor's PRIMARY concern?
  1. Voice quality degradation due to packet loss
  2. Lack of integration of voice and data communications
  3. A single point of failure for both voice and data communications
  4. Inability to use virtual private networks (VPNs) for internal traffic
Correct answer: C
Question 5
The PRIMARY objective of IT service level management is to:
  1. improve IT cost control.
  2. manage computer operations activities.
  3. satisfy customer requirements.
  4. increase awareness of IT services.
Correct answer: C
Question 6
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
  1. note the noncompliance in the audit working papers.
  2. determine why the procedures were not followed.
  3. issue an audit memorandum identifying the noncompliance.
  4. include the noncompliance in the audit report.
Correct answer: B
Question 7
While reviewing an organization's business continuity plan (BCP), an IS auditor observes that a recently developed application is not included. The IS auditor should:
  1. ensure that the criticality of the application is determined.
  2. include in the audit findings that the BCP is incomplete.
  3. recommend that the application be incorporated in the BCP.
  4. ignore the observation as the application is not mission critical.
Correct answer: A
Question 8
Which of the following is MOST important to determine when conducting a post-implementation review?
  1. Whether the solution architecture complies with IT standards
  2. Whether success criteria have been achieved
  3. Whether lessons learned have been documented
  4. Whether the project has been delivered within the approved budget
Correct answer: B
Question 9
An organization uses multiple offsite data center facilities. Which of the following is MOST important to consider when choosing related backup devices and media?
  1. Associated costs
  2. Standardization
  3. Backup media capacity
  4. Restoration speed
Correct answer: B
Question 10
A USB device containing sensitive production data was lost by an employee, and its contents were subsequently found published online. Which of the following controls is the BEST recommendation to prevent a similar recurrence?
  1. Monitoring data being down loaded on USB devices
  2. Using a strong encryption algorithm
  3. Training users on USB device security
  4. Electronically tracking portable devices
Correct answer: B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!