Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 10

Mary Smith

Fri, 17 Apr 2026

CISA—Certified Information Systems Auditor - Part 10

1. An IS auditor observes a system performance monitoring tool which states that a server critical to the organization averages high CPU utilization across a cluster of four virtual servers throughout the audit period. To determine if further investigation is required, an IS auditor should review:

A) the system process activity log
B) system baselines
C) the number of CPUs allocated to each virtual machine
D) organizational objectives



2. An IS auditor has discovered that a cloud-based application was not included in an application inventory that was used to confirm the scope of an audit. The business process owner explained that the application will be audited by a third party in the next year. The auditor's NEXT step should be to:

A) evaluate the impact of the cloud application on the audit scope
B) revise the audit scope to include the cloud-based application
C) review the audit report when performed by the third party
D) report the control deficiency to senior management



3. Which of the following should MOST concern an IS auditor reviewing an intrusion detection system (IDS)?

A) Number of false-negatives
B) Number of false-positives
C) Legitimate traffic blocked by the system
D) Reliability of IDS logs



4. Multiple invoices are usually received for individual purchase orders, since purchase orders require staggered delivery dates. Which of the following is the BEST audit technique to test for duplicate payments?

A) Run the data on the software programs used to process supplier payments.
B) Use generalized audit software on the invoice transaction file.
C) Run the data on the software programs used to process purchase orders.
D) Use generalized audit software on the purchase order transaction file.



5. An IS auditor considering the risks associated with spooling sensitive reports for off-line printing will be the MOST concerned that:

A) data can easily be read by operators
B) data can more easily be amended by unauthorized persons
C) unauthorized copies of reports can be printed
D) output will be lost if the system should fail



1. Right Answer: B
Explanation:

2. Right Answer: D
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: A
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment