Certified Information Systems Auditor (CISA) Interview Preparation Guide
Download PDF

CISA Interview Questions and Answers will guide us now that Certified Information Systems Auditor (CISA) is a professional certification for information technology audit professionals sponsored by ISACA, formerly the Information Systems Audit and Control Association. Candidates for the certification must meet requirements set by ISACA. So get preparation for the exam and job inter of CISA with this Certified Information Systems Auditor (CISA) Questions with Answers guide

25 CISA Questions and Answers:

1 :: As updates to an online order entry system are processed, the updates are recorded on a transaction tape and a hard copy transaction log. At the end of the day, the order entry files are backed up on tape. During the backup procedure, a drive malfunctions and the order entry files are lost. Which of the following are necessary to restore these files?

1. The previous day's backup file and the current transaction tape
2. The previous day's transaction file and the current transaction tape
3. The current transaction tape and the current hard copy transaction log
4. The current hard copy transaction log and the previous day's transaction file

Answer: 1

2 :: While designing the business continuity plan (BCP) for an airline reservation system, the MOST appropriate method of data transfer/backup at an offsite location would be:

1. shadow file processing.
2. electronic vaulting.
3. hard-disk mirroring.
4. hot-site provisioning.

Answer: 1

4 :: Which of the following risks could result from inadequate software baselining?

1. Scope creep
2. Sign-off delays
3. Software integrity violations
4. Inadequate controls

Answer: 1

6 :: Which of the following is a dynamic analysis tool for the purpose of testing software modules?

1. Black box test
2. Desk checking
3. Structured walk-through
4. Design and code

Answer: 1

7 :: Online banking transactions are being posted to the database when processing suddenly comes to a halt. The integrity of the transaction processing is BEST ensured by:

1. database integrity checks.
2. validation checks.
3. input controls.
4. database commits and rollbacks.

Answer: 4

9 :: An IS auditor reviewing database controls discovered that changes to the database during normal working hours were handled through a standard set of procedures. However, changes made after normal hours required only an abbreviated number of steps. In this situation, which of the following would be considered an adequate set of compensating controls?

1. Allow changes to be made only with the DBA user account.
2. Make changes to the database after granting access to a normal user account
3. Use the DBA user account to make changes, log the changes and review the change log the following day.
4. Use the normal user account to make changes, log the changes and review the change log the following day.

Answer: 3

10 :: Which of the following represents the GREATEST potential risk in an EDI environment?

1. Transaction authorization
2. Loss or duplication of EDI transmissions
3. Transmission delay
4. Deletion or manipulation of transactions prior to or after establishment of application controls

Answer: 1