1. Home
  2. Isaca
  3. Isaca CISA
  4. CISA Exam Info

Isaca CISA Exam Questions - Navigate Your Path to Success

The Isaca Certified Information Systems Auditor (CISA) exam is a good choice for Business Process Manager Enterprise Data Manager Mobile Computing Expert and if the candidate manages to pass Isaca Certified Information Systems Auditor exam, he/she will earn Isaca CISA Certification. Below are some essential facts for Isaca CISA exam candidates:

  • In actual Isaca Certified Information Systems Auditor (CISA) exam, a candidate can expect 90 Questions and the officially allowed time is expected to be around 120 Minutes.
  • TrendyCerts offers 1405 Questions that are based on actual Isaca CISA syllabus.
  • Our Isaca CISA Exam Practice Questions were last updated on: Mar 14, 2025

Sample Questions for Isaca CISA Exam Preparation

Question 1

Which of the following is found in an audit charter?

Correct : B

The authority given to the audit function is one of the components that is found in an audit charter.According to the IIA, the audit charter is a formal document that defines internal audit's purpose, authority, responsibility and position within the organization1.The authority given to the audit function includes the scope of its activities, the access to records, personnel and physical properties relevant to its work, and the independence and objectivity of its staff2.The authority given to the audit function helps to ensure that internal auditors can perform their duties effectively and efficiently, and that they can provide assurance and consulting services that add value and improve the organization's operations3.

The other options are not found in an audit charter.The process of developing the annual audit plan is not part of the audit charter, but rather a separate document that outlines the methodology, criteria and resources for selecting and prioritizing audit engagements based on a risk assessment4.Required training for audit staff is not part of the audit charter, but rather a component of the quality assurance and improvement program that evaluates the competence and performance of internal auditors and provides them with opportunities for professional development5. Audit objectives and scope are not part of the audit charter, but rather specific elements of each individual audit engagement that define the expected outcomes and the boundaries of the audit work.


Options Selected by Other Users:
A :
1 Votes 10%
B :
10 Votes 100%
C :
1 Votes 10%
D :
1 Votes 10%
Question 2

In a review of the organization standards and guidelines for IT management, which of the following should be included in an IS development methodology?

Correct : B

Risk management techniques should be included in an IS development methodology. An IS development methodology is a set of guidelines, standards, and procedures that provide a structured and consistent approach to developing information systems.A good IS development methodology should cover all the phases of the system development life cycle (SDLC), from planning and analysis to design, implementation, testing, and maintenance1.

Risk management techniques are an essential part of an IS development methodology, as they help to identify, assess, prioritize, mitigate, monitor, and communicate the risks that may affect the success of the system development project.Risk management techniques can also help to ensure that the system meets the requirements and expectations of the stakeholders, complies with the relevant laws and regulations, and delivers value to the organization2.

The other options are not as relevant or appropriate as risk management techniques for an IS development methodology.Value-added activity analysis is a technique for evaluating the efficiency and effectiveness of business processes, but it is not specific to IS development3.Access control rules are policies and mechanisms for restricting or granting access to information systems and resources, but they are more related to security management than IS development4.Incident management techniques are methods for handling and resolving incidents that disrupt the normal operation of information systems and services, but they are more related to service management than IS development5.


ISACA, CISA Review Manual, 27th Edition, 2019, p.1911

ISACA, CISA Review Manual, 27th Edition, 2019, p.1942

Value-Added Activity Analysis3

Access Control Rules4

Incident Management Techniques5

Options Selected by Other Users:
A :
0 Votes 0%
B :
7 Votes 70%
C :
1 Votes 10%
D :
0 Votes 0%
Isaca CISA