CISA Online Practice Questions

Home / ISACA / CISA

Latest CISA Exam Practice Questions

The practice questions for CISA exam was last updated on 2026-02-24 .

Viewing page 1 out of 38 pages.

Viewing questions 1 out of 190 questions.

Question#1

Which of the following should be given GREATEST consideration when implementing the use of an open-source product?

A. Support
B. Performance
C. Confidentiality
D. Usability

Explanation:
Support should be given the greatest consideration when implementing the use of an open-source product, as open-source software may not have the same level of technical support, maintenance, and updates as proprietary software1. Open-source software users may have to rely on the community of developers and users, online forums, or third-party vendors for support, which may not be timely, reliable, or consistent2. Therefore, before implementing an open-source product, users should evaluate the availability and quality of support options, such as documentation, forums, mailing lists, bug trackers, chat channels, etc.3

Question#2

If enabled within firewall rules, which of the following services would present the GREATEST risk?

A. Simple mail transfer protocol (SMTP)
B. Simple object access protocol (SOAP)
C. Hypertext transfer protocol (HTTP)
D. File transfer protocol (FTP)

Explanation:
File transfer protocol (FTP) is a service that allows users to transfer files between computers over a network. If enabled within firewall rules, FTP would present the greatest risk, as it can expose sensitive data to unauthorized access, modification, or deletion. FTP does not provide encryption or authentication, which makes it vulnerable to eavesdropping, spoofing, and tampering attacks. Simple mail transfer protocol (SMTP), simple object access protocol (SOAP), and hypertext transfer protocol (HTTP) are also services that can be used to exchange data over a network, but they have more security features than FTP, such as encryption, authentication, or validation.
Reference: CISA Review Manual (Digital Version)

Question#3

An IS auditor is reviewing a decision to consolidate processing for multiple applications onto a single large server.
Which of the following is the MOST significant impact from this decision?

A. Higher operating system license fees
B. More applications affected by a server outage
C. Simplified asset management
D. Fewer application servers requiring vulnerability scans

Explanation:
Comprehensive and Detailed Step-by-Step
Consolidating multiple applications on asingle serverincreases the risk that aserver outagewillimpact multiple applicationssimultaneously.
More Applications Affected by Outage (Correct Answer C B)
Asingle point of failurecoulddisrupt multiple services.
Example:If aconsolidated server crashes, all hosted applications gooffline.
Higher OS License Fees (Incorrect C A)
License feesmay increase, butdowntime risk is a greater concern.
Simplified Asset Management (Incorrect C C)
True, butdoes not outweigh the availability risk.
Fewer Vulnerability Scans (Incorrect C D)
Reducing the number of serversdoes not reduce security risks.
Reference: ISACA CISA Review Manual
NIST 800-160 (System Security Engineering)

Question#4

Which of the following should be done FIRST when planning a penetration test?

A. Execute nondisclosure agreements (NDAs).
B. Determine reporting requirements for vulnerabilities.
C. Define the testing scope.
D. Obtain management consent for the testing.

Explanation:
The first step when planning a penetration test is to obtain management consent for the testing. This is because a penetration test involves simulating a cyberattack against theorganization’s systems and networks, which may have legal, ethical, and operational implications. Without proper authorization from management, a penetration test may violate laws, policies, contracts, or service level agreements. Management consent also helps define the objectives, scope, and boundaries of the test, as well as the roles and responsibilities of the testers and the stakeholders. Obtaining management consent for the testing also demonstrates due care and due diligence on the part of the testers and the organization.
Executing nondisclosure agreements (NDAs), determining reporting requirements for vulnerabilities, and defining the testing scope are important steps when planning a penetration test, but they are not the first step. These steps should be done after obtaining management consent for the testing, as they depend on the approval and involvement of management and other parties.

Question#5

Which of the following should an IS auditor review when evaluating information systems governance for a large organization?

A. Approval processes for new system implementations
B. Procedures for adding a new user to the invoice processing system
C. Approval processes for updating the corporate website
D. Procedures for regression testing system changes

Explanation:
Information systems governance is the set of policies, processes, structures, and practices that ensure the alignment of IT with business objectives, the delivery of value from IT investments, the management of IT risks, and the optimization of IT resources1. Information systems governance is a strategic and high-level function that covers the entire organization and its IT portfolio. Therefore, an IS auditor should review the aspects of information systems governance that are relevant to the organization’s vision, mission, goals, and strategies.
One of the aspects that an IS auditor should review when evaluating information systems governance for a large organization is the approval processes for new system implementations. This is because new system implementations are significant IT investments that require careful planning, analysis, design, development, testing, deployment, and evaluation to ensure that they meet the business requirements, deliver the expected benefits, comply with the relevant standards and regulations, and minimize the potential risks2. The approval processes for new system implementations should involve the appropriate stakeholders, such as senior management, business owners, IT managers, project managers, users, and auditors, who have the authority and responsibility to approve or reject the proposed system implementations based on predefined criteria and metrics3. The approval processes for new system implementations should also be documented, transparent, consistent, and timely to ensure accountability and traceability4. Therefore, an IS auditor should review the approval processes for new system implementations to assess whether they are aligned with the information systems governance framework and objectives.
The other possible options are:
Procedures for adding a new user to the invoice processing system: This is an operational task that involves granting access rights and permissions to a specific user for a specific system based on the principle of least privilege. This is not a strategic or high-level function that falls under information systems governance. Therefore, an IS auditor should not review this aspect when evaluating information systems governance for a large organization.
Approval processes for updating the corporate website: This is a tactical task that involves making changes or enhancements to the content or design of the corporate website based on the business needs and feedback. This is not a strategic or high-level function that falls under information systems governance. Therefore, an IS auditor should not review this aspect when evaluating information systems governance for a large organization.
Procedures for regression testing system changes: This is a technical task that involves verifying that existing system functionalities are not adversely affected by new system changes or updates. This is not a strategic or high-level function that falls under information systems governance. Therefore, an IS auditor should not review this aspect when evaluating information systems governance for a large organization.
Reference: 1: What is IT Governance? - Definition from Techopedia 2: System Implementation - an overview | ScienceDirect Topics 3: Project Approval Process - Project Management Knowledge 4: 5 Best Practices For A Successful Project Approval Process | Kissflow Project: Principle of Least Privilege (POLP) | Imperva: How to Update Your Website Content - 7 Step Guide | HostGator Blog: What Is Regression Testing? Definition & Best Practices | BrowserStack

Disclaimer

This page is for educational and exam preparation reference only. It is not affiliated with ISACA, CISA Certification, or the official exam provider. Candidates should refer to official documentation and training for authoritative information.

Exam Code: CISAQ & A: 1452 Q&AsUpdated:  2026-02-24

  Get All CISA Q&As