Try 12 Certified Information Systems Auditor (CISA) sample questions and practice-test preview prompts on audit planning, evidence, governance, IT operations, systems acquisition, and information-asset protection.
Certified Information Systems Auditor (CISA) is ISACA’s IT audit and assurance credential. It is a strong candidate for scenario-based practice because questions often require choosing the best audit step, evidence source, control implication, or governance response.
Use these 12 original sample questions for initial self-assessment. The full IT Mastery route for CISA is not available yet; try the preview and use the Notify me form if this is your target route.
CISA questions often ask for the best audit response, not the best technical fix. Practice should train role discipline: identify the evidence, report the finding, or evaluate the control without taking over management’s job.
These questions are original IT Mastery preview items for CISA audit and assurance judgment. They are not official ISACA exam questions.
Topic: audit role
During an audit, the auditor finds that privileged access reviews are not performed for a critical finance system. What is the best auditor response?
Best answer: B
Explanation: The auditor should evaluate and report the control issue, not take over management’s responsibility for remediation. Evidence, risk impact, and clear reporting are central to CISA-style reasoning.
Topic: evidence quality
Which evidence is generally strongest when testing whether production changes were approved before deployment?
Best answer: D
Explanation: System-generated records tied to the actual change workflow are stronger than verbal statements or unrelated documents. CISA questions often test evidence reliability and relevance.
Topic: audit planning
An audit begins with low-risk scope assumptions, but recent incidents show repeated unauthorized changes in the same environment. What should the auditor do?
Best answer: A
Explanation: Audit planning is risk-based. New information that changes risk should affect scope, testing depth, or audit procedures.
Topic: remediation ownership
An auditor recommends stronger segregation of duties. Management asks the auditor to design the new access matrix. What is the best response?
Best answer: C
Explanation: Auditors can clarify criteria and risk, but management owns control design and implementation. Taking over remediation can impair independence.
Topic: change management
An application team migrates emergency changes to production before formal approval, then documents approval after the fact. What is the key audit concern?
Best answer: D
Explanation: Emergency changes may be legitimate, but they still need controlled authorization and post-implementation review. After-the-fact approval can indicate weak control operation.
Topic: resilience
Management states that backups are performed nightly. What evidence best supports recoverability?
Best answer: B
Explanation: Backup existence is not the same as recoverability. Restore testing and recovery-objective evidence are more relevant to business resilience.
Topic: third-party risk
A business-critical process is outsourced to a service provider. What should the auditor assess first?
Best answer: A
Explanation: Outsourcing does not remove accountability. The auditor should evaluate governance, control responsibilities, monitoring, and evidence that provider controls support business requirements.
Topic: access review
An access review asks managers to approve lists of users, but managers do not know what the system roles allow. What is the main control weakness?
Best answer: C
Explanation: Access reviews need informed reviewers. If managers cannot understand privileges, the review may become a rubber-stamp control.
Topic: incident response audit
After a security incident, what audit evidence is most useful for assessing whether the response process operated effectively?
Best answer: D
Explanation: Effective incident response is demonstrated by process evidence: detection, escalation, containment, communication, review, and improvement.
Topic: data integrity
An interface transfers customer records from one system to another nightly. What audit test best addresses completeness and accuracy?
Best answer: B
Explanation: Data-interface assurance requires reconciling what was sent, transformed, rejected, and received. Counts and exception handling are stronger than surface-level review.
Topic: audit reporting
Which audit finding is most useful to management?
Best answer: A
Explanation: Useful findings connect evidence to criteria, impact, cause, and action. This helps management prioritize remediation.
Topic: independence
An auditor previously helped implement the control being audited. What should happen?
Best answer: C
Explanation: Prior implementation involvement can impair objectivity. The issue should be disclosed and managed through reassignment or other safeguards.
| Area | What to check |
|---|---|
| Role discipline | Choose audit evaluation and reporting steps, not management remediation work. |
| Evidence | Prefer reliable, relevant, independently verifiable evidence. |
| Risk focus | Adjust scope and testing when new risk information appears. |
| Findings | Connect condition, criteria, cause, risk, and recommendation clearly. |