Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 367

Mary Smith

Sat, 21 Feb 2026

CISA—Certified Information Systems Auditor - Part 367

1. Which of the following should be the MOST important consideration when determining which information system application to audit?

A) Cost-benefit analysis
B) Available resources
C) Business impact analysis
D) Newly implemented systems



2. In an organization that has a staff-rotation policy, the MOST appropriate access control model is:

A) role based.
B) discretionary.
C) mandatory.
D) lattice based.



3. Which of the following should be an IS auditor's BEST recommendation to prevent installation of unlicensed software on employees' company-provided devices?

A) Enforce audit logging of software installation activities.
B) Restrict software installation authority to administrative users only.
C) Implement software blacklisting.
D) Remove unlicensed software from end-user devices.



4. Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls?

A) Verify that confidential files cannot be transmitted to a personal USB device.
B) Conduct interviews to identify possible data protection vulnerabilities.
C) Review data classification levels based on industry best practice.
D) Verify that current DLP software is installed on all computer systems.



5. When protecting the confidentiality of information assets, the MOST effective control practice is the:

A) awareness training of personnel on regulatory requirements.
B) enforcement of a need-to-know access control philosophy.
C) utilization of a dual-factor authentication mechanism.
D) configuration of read-only access to all users.



1. Right Answer: C
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment