CISA

  Home  Information Technology (IT)  CISA


“CISA Interview Questions and Answers will guide us now that Certified Information Systems Auditor (CISA) is a professional certification for information technology audit professionals sponsored by ISACA, formerly the Information Systems Audit and Control Association. Candidates for the certification must meet requirements set by ISACA. So get preparation for the exam and job inter of CISA with this Certified Information Systems Auditor (CISA) Questions with Answers guide”



25 CISA Questions And Answers

2⟩ As updates to an online order entry system are processed, the updates are recorded on a transaction tape and a hard copy transaction log. At the end of the day, the order entry files are backed up on tape. During the backup procedure, a drive malfunctions and the order entry files are lost. Which of the following are necessary to restore these files?

1. The previous day's backup file and the current transaction tape

2. The previous day's transaction file and the current transaction tape

3. The current transaction tape and the current hard copy transaction log

4. The current hard copy transaction log and the previous day's transaction file

Answer: 1

 120 views

14⟩ The PRIMARY advantage of a continuous audit approach is that it

1. does not require an IS auditor to collect evidence on system reliability while processing is taking place.

2. requires the IS auditor to review and follow up immediately on all information collected.

3. can improve system security when used in time-sharing environments that process a large number of transactions.

4. does not depend on the complexity of an organization's computer systems.

Answer: C

 145 views

16⟩ Corrective action has been taken by an auditee immediately after the identification of a reportable finding. The auditor should

1. include the finding in the final report because the IS auditor is responsible for an accurate report of all findings.

2. not include the finding in the final report because the audit report should include only unresolved findings.

3. not include the finding in the final report because corrective action can be verified by the IS auditor during the audit.

4. include the finding in the closing meeting for discussion purposes only.

Answer: A

 170 views

17⟩ An IS auditor reviewing database controls discovered that changes to the database during normal working hours were handled through a standard set of procedures. However, changes made after normal hours required only an abbreviated number of steps. In this situation, which of the following would be considered an adequate set of compensating controls?

1. Allow changes to be made only with the DBA user account.

2. Make changes to the database after granting access to a normal user account

3. Use the DBA user account to make changes, log the changes and review the change log the following day.

4. Use the normal user account to make changes, log the changes and review the change log the following day.

Answer: 3

 142 views

20⟩ An IS auditor is performing a network security review of a telecom company that provides Internet connection services to shopping malls for their wireless customers. The company uses wireless transport layer security (WTLS) and secure socket layers (SSL) technology for protecting their customers payment information. The IS auditor should be MOST concerned, if a hacker

1. compromised the wireless application protocol (WAP) gateway.

2. installed a sniffing program in front of the server.

3. stole a customer's PDA.

4. listened to the wireless transmission.

Answer: A

 156 views