SlideShare a Scribd company logo
1 of 16
CISA CERTIFICATION:
AN OVERVIEW
Presented by
Md. Al Imran
M.Sc in MISS
CEH v8, ISO 27001 LA
THE CISA CERTIFICATION
 Certified Information Systems Auditor (CISA) is offered by
Information Systems Audit and Control Association
(ISACA).
 CISA Examination is open to all individuals and no
prequalification or education required.
 CISA certification provides an avenue for gaining insights
into the various aspects of Information systems audit,
security and internal controls.
 CISA certification is a base requirement for an Information
Systems Auditor.
THE CISA CERTIFICATION
 CISA examination and subsequent certifications aid the
candidate
with knowledge required to -
 Conduct IS Audits
 Frame security policies and procedures
 Implement Security policies and procedures
 Manage Information Technology
 Direct and Govern Information Technology
CISA CERTIFICATION: ELIGIBILITY,
REQUIREMENT, PROCESS
CISA certification
Required work experience
A minimum of 5 years of professional information systems
auditing, control or security work experience
The work experience for CISA certification must be gained
Within the 10-year period preceding the application date for
certification; OR
Within 5 years from the date of originally passing the exam
Process
Complete and submit a CISA Application for Certification
listing the details of professional experience in information
systems auditing, control or security work
CISA CERTIFICATION: MAINTENANCE
 CISA Certification Maintenance
Minimum of 20 contact hours of CPE annually; and
Minimum of 120 contact hours during a fixed 3-year
period
CISA CERTIFICATION: EXAMINATION
STRUCTURE
Number of Questions
Exam is paper and pencil based
The exam consists of 150 questions multiple choice questions
(MCQs)
No negative marking
 Duration of Exam
4 hours or 240 minutes
1.6 minute per question
 Passing Score
For passing a candidate must receive a scaled score of 450 or
higher to pass the exam out of the 800 scale score. A score of
450 represents a minimum consistent standard of knowledge.
CISA CERTIFICATION: READING
MATERIALS
CISA Review Manual 2016/2015 (ISACA Official
Publication)
CISA Review Questions, Answers & Explanations
Manual, 11th
Edition (ISACA Official Publication)
Additional resources from Internet.
At least One Mock Test
CISA CERTIFICATION: READING
STRATEGIES
What I have followed
Reading CISA Review Manual thoroughly (at least 2 times)
Practicing CISA Review Questions, Answers & Explanations
Manual until not understood the terms, language and concept of
the questions
Maintaining regularity
Understanding the concept
Please don’t memorize anything, it will not work at the exam.
Group discussion
Note: This method does not work for all, so judge yourself what
you like and go for that
QUESTIONS OVERVIEW
 The document used by the top management of organizations to delegate
authority to the IS audit function is the:
A. long-term audit plan.
B. audit charter.
C. audit planning methodology.
D. steering committee minutes.
Answer: B
The audit charter outlines the overall authority, scope and
responsibilities of the audit function to achieve the audit objectives
stated in it. This document serves as an instrument for the delegation of
authority to the IS audit function. Long-term audit planning relates to
those aspects of the audit plan that are impacted by the organization’s IT
strategy and environment. Audit planning commences only after the
audit charter has been approved by the highest level of management.
The audit planning methodologies are decided upon based on the
analysis of both long- and short-term audit issues. The steering
committee minutes should address the approval of the audit charter but
is not the driver that delegates authority.
QUESTIONS OVERVIEW CONTD..
 To reduce the possibility of losing data during processing, the
FIRST point at which control totals should be implemented is:
 A. during data preparation.
 B. in transit to the computer.
 C. between related computer runs.
 D. during the return of the data to the user department.
 Answer : A
 Explanation:
During data preparation is the best answer, because it establishes
control at the earliest point.
QUESTIONS OVERVIEW CONTD..
 Information for detecting unauthorized input from a terminal
would be BEST provided by the:
 A. console log printout.
 B. transaction journal.
 C. automated suspense file listing.
 D. user error report.
 Answer : B
 Explanation:
The transaction journal would record all transaction activity,
which then could be compared to the authorized source documents
to identify any unauthorized input. A console log printout is not the
best, because it would not record activity from a specific terminal.
An automated suspense file listing would only list transaction
activity where an edit error occurred, while the user error report
would only list input that resulted in an edit error.
QUESTIONS OVERVIEW CONTD..
 Information for detecting unauthorized input from a terminal
would be BEST provided by the:
 A. console log printout.
 B. transaction journal.
 C. automated suspense file listing.
 D. user error report.
 Answer : B
 Explanation:
The transaction journal would record all transaction activity,
which then could be compared to the authorized source documents
to identify any unauthorized input. A console log printout is not the
best, because it would not record activity from a specific terminal.
An automated suspense file listing would only list transaction
activity where an edit error occurred, while the user error report
would only list input that resulted in an edit error.
QUESTIONS OVERVIEW CONTD..
 The MOST effective way to ensure that outsourced service
providers comply with the organization’s information security
policy would be:
 A. service level monitoring.
 B. penetration testing.
 C. periodically auditing.
 D. security awareness training.
 Answer : C
 Explanation:
Regular audit exercise can spot any gap in the information security
compliance. Service level monitoring can only pinpoint operational
issues in the organization’s operational environment. Penetration
testing can identify security vulnerability but cannot ensure
information compliance. Training can increase users’ awareness on
the information security policy, but is not more effective than
auditing.
QUESTIONS OVERVIEW CONTD..
 A project manager of a project that is scheduled to take 18 months
to complete announces that the project is in a healthy financial
position because, after 6 months, only one-sixth of the budget has
been spent. The IS auditor should FIRST determine:
 A. what amount of progress against schedule has been achieved.
 B. if the project budget can be reduced.
 C. if the project could be brought in ahead of schedule.
 D. if the budget savings can be applied to increase the project
scope.
 Answer : A
QUESTIONS OVERVIEW CONTD..
 Explanation:
Cost performance of a project cannot be properly assessed in isolation of
schedule performance. Cost cannot be assessed simply in terms of elapsed
time on a project. To properly assess the project budget position it is
necessary to know how much progress has actually been made and, given
this, what level of expenditure would be expected. It is possible that project
expenditure appears to be low because actual progress has been slow. Until
the analysis of project against schedule has been completed, it is impossible
to know whether there is any reason to reduce budget, if the project has
slipped behind schedule, then not only may there be no spare budget but it
is possible that extra expenditure may be needed to retrieve the slippage.
The low expenditure could actually be representative of a situation where
the project is likely to miss deadlines rather than potentially come in ahead
of time. If the project is found to be ahead of budget after adjusting for
actual progress, this is notnecessarily a good outcome because it points to
flaws in the original budgeting process; and, as said above, until further
analysis is undertaken, it cannot be determined whether any spare funds
actually exist. Further, if the project is behind schedule, then adding scope
may be the wrong thing to do.
REFERENCE
 http://www.slideshare.net/iAthena/cisa-certification-an-overview-
50830152?qid=d2b8cee8-bca5-4794-bc50-
e715d5d3f445&v=&b=&from_search=1
 www.isaca.org
 https://itauditsecurity.wordpress.com/2016/01/12/free-cisa-exam-
practice-questions/
 https://www.wiziq.com/tests/cisa-mock-test

More Related Content

What's hot

Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
Desmond Devendran
 
Chap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseChap6 2007 Cisa Review Course
Chap6 2007 Cisa Review Course
Desmond Devendran
 

What's hot (20)

CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016
 
Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010
 
Cisa exam mock test questions-1
Cisa exam mock test questions-1Cisa exam mock test questions-1
Cisa exam mock test questions-1
 
CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016
 
des
desdes
des
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 
Steps in it audit
Steps in it auditSteps in it audit
Steps in it audit
 
Chap1 2007 Cisa Review Course
Chap1 2007 Cisa Review CourseChap1 2007 Cisa Review Course
Chap1 2007 Cisa Review Course
 
Chap6 2007 Cisa Review Course
Chap6 2007 Cisa Review CourseChap6 2007 Cisa Review Course
Chap6 2007 Cisa Review Course
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Use Of Techniques And Technology In Internal Audit
Use Of Techniques And Technology In Internal AuditUse Of Techniques And Technology In Internal Audit
Use Of Techniques And Technology In Internal Audit
 
Security audit
Security auditSecurity audit
Security audit
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
2020 Updated Cisa Real Exam Questions
2020 Updated Cisa Real Exam Questions2020 Updated Cisa Real Exam Questions
2020 Updated Cisa Real Exam Questions
 
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
Integrating ISO 27001, ISO 20000, and Project Management – From Theory to Pra...
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information Systems
 
5.4 it security audit (mauritius)
5.4  it security audit (mauritius)5.4  it security audit (mauritius)
5.4 it security audit (mauritius)
 
Data analytics and audit coverage guide
Data analytics and audit coverage guideData analytics and audit coverage guide
Data analytics and audit coverage guide
 
Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-Practices
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 

Viewers also liked

Security Certification - Critical Review
Security Certification - Critical ReviewSecurity Certification - Critical Review
Security Certification - Critical Review
ISA Interchange
 
Software Security Frameworks
Software Security FrameworksSoftware Security Frameworks
Software Security Frameworks
Marco Morana
 
Itil v3-foundation-certification-exam2
Itil v3-foundation-certification-exam2Itil v3-foundation-certification-exam2
Itil v3-foundation-certification-exam2
seveman
 
COBIT 5 as an IT Management Best Practices Framework - by Goh Boon Nam
COBIT 5 as an IT Management Best Practices Framework - by Goh Boon NamCOBIT 5 as an IT Management Best Practices Framework - by Goh Boon Nam
COBIT 5 as an IT Management Best Practices Framework - by Goh Boon Nam
NUS-ISS
 
TYBSC IT SEM 6 IPR/CL
TYBSC IT SEM 6 IPR/CLTYBSC IT SEM 6 IPR/CL
TYBSC IT SEM 6 IPR/CL
WE-IT TUTORIALS
 

Viewers also liked (15)

CISA exam 100 practice question
CISA exam 100 practice questionCISA exam 100 practice question
CISA exam 100 practice question
 
Security Certification - Critical Review
Security Certification - Critical ReviewSecurity Certification - Critical Review
Security Certification - Critical Review
 
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
 
Software Security Frameworks
Software Security FrameworksSoftware Security Frameworks
Software Security Frameworks
 
Itil foundation v3 2011-Maroc
Itil foundation v3 2011-MarocItil foundation v3 2011-Maroc
Itil foundation v3 2011-Maroc
 
Passing CISA
Passing CISAPassing CISA
Passing CISA
 
ITIL V3 Foundation
ITIL V3 FoundationITIL V3 Foundation
ITIL V3 Foundation
 
Security Maturity Models.
Security Maturity Models.Security Maturity Models.
Security Maturity Models.
 
Evolution Of IPR
Evolution Of IPREvolution Of IPR
Evolution Of IPR
 
Examen-blanc-02-itil-v3-foundation
 Examen-blanc-02-itil-v3-foundation Examen-blanc-02-itil-v3-foundation
Examen-blanc-02-itil-v3-foundation
 
Itil v3-foundation-certification-exam2
Itil v3-foundation-certification-exam2Itil v3-foundation-certification-exam2
Itil v3-foundation-certification-exam2
 
COBIT 5 as an IT Management Best Practices Framework - by Goh Boon Nam
COBIT 5 as an IT Management Best Practices Framework - by Goh Boon NamCOBIT 5 as an IT Management Best Practices Framework - by Goh Boon Nam
COBIT 5 as an IT Management Best Practices Framework - by Goh Boon Nam
 
Ipr, Intellectual Property Rights
Ipr, Intellectual Property RightsIpr, Intellectual Property Rights
Ipr, Intellectual Property Rights
 
COBIT®5 - Foundation
COBIT®5 - FoundationCOBIT®5 - Foundation
COBIT®5 - Foundation
 
TYBSC IT SEM 6 IPR/CL
TYBSC IT SEM 6 IPR/CLTYBSC IT SEM 6 IPR/CL
TYBSC IT SEM 6 IPR/CL
 

Similar to Cisa Certification Overview

1.8.0 SITTNER CONOCO TRAIN HOW TO SURVIVE AN AUDIT
1.8.0 SITTNER CONOCO TRAIN HOW TO SURVIVE AN AUDIT1.8.0 SITTNER CONOCO TRAIN HOW TO SURVIVE AN AUDIT
1.8.0 SITTNER CONOCO TRAIN HOW TO SURVIVE AN AUDIT
SCOTT SITTNER
 
Cap_Labor_Publication
Cap_Labor_PublicationCap_Labor_Publication
Cap_Labor_Publication
lijithomasswa
 
Chap005 tb-sample
Chap005 tb-sampleChap005 tb-sample
Chap005 tb-sample
Ying Sun
 

Similar to Cisa Certification Overview (20)

auditing Fram . from the start to Reporting .pdf
auditing Fram . from the start to Reporting .pdfauditing Fram . from the start to Reporting .pdf
auditing Fram . from the start to Reporting .pdf
 
Future audit analytics
Future audit analyticsFuture audit analytics
Future audit analytics
 
Jason uyderv pmi 2 16 12
Jason uyderv pmi 2 16 12Jason uyderv pmi 2 16 12
Jason uyderv pmi 2 16 12
 
Nextcard Case Essay
Nextcard Case EssayNextcard Case Essay
Nextcard Case Essay
 
Are You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAATAre You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAAT
 
DISA 3-qbank with exp.docx
DISA 3-qbank with exp.docxDISA 3-qbank with exp.docx
DISA 3-qbank with exp.docx
 
DISA 3-qbank with exp.docx
DISA 3-qbank with exp.docxDISA 3-qbank with exp.docx
DISA 3-qbank with exp.docx
 
Is Your Audit Department Highly Effective?
Is Your Audit Department Highly Effective?Is Your Audit Department Highly Effective?
Is Your Audit Department Highly Effective?
 
1.8.0 SITTNER CONOCO TRAIN HOW TO SURVIVE AN AUDIT
1.8.0 SITTNER CONOCO TRAIN HOW TO SURVIVE AN AUDIT1.8.0 SITTNER CONOCO TRAIN HOW TO SURVIVE AN AUDIT
1.8.0 SITTNER CONOCO TRAIN HOW TO SURVIVE AN AUDIT
 
Cap_Labor_Publication
Cap_Labor_PublicationCap_Labor_Publication
Cap_Labor_Publication
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAH
 
Audit planning- Review Questionnaire.
Audit planning- Review Questionnaire.Audit planning- Review Questionnaire.
Audit planning- Review Questionnaire.
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
 
Agile auditing for financial services
Agile auditing for financial services  Agile auditing for financial services
Agile auditing for financial services
 
Kansas Elsas Top-Cycle
Kansas Elsas Top-CycleKansas Elsas Top-Cycle
Kansas Elsas Top-Cycle
 
Retrospective data analytics slides
Retrospective data analytics slidesRetrospective data analytics slides
Retrospective data analytics slides
 
Devry acct 555 entire course
Devry acct 555 entire courseDevry acct 555 entire course
Devry acct 555 entire course
 
Chap005 tb-sample
Chap005 tb-sampleChap005 tb-sample
Chap005 tb-sample
 

More from Al Imran, CISA (6)

Developing portale tool for digital forensic
Developing portale tool for digital forensicDeveloping portale tool for digital forensic
Developing portale tool for digital forensic
 
Digital Forensics: The next 10 years
Digital Forensics: The next 10 yearsDigital Forensics: The next 10 years
Digital Forensics: The next 10 years
 
SSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkSSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wireshark
 
Ramadan health tips
Ramadan health tipsRamadan health tips
Ramadan health tips
 
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
 
Bangla OCR
Bangla OCRBangla OCR
Bangla OCR
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

Cisa Certification Overview

  • 1. CISA CERTIFICATION: AN OVERVIEW Presented by Md. Al Imran M.Sc in MISS CEH v8, ISO 27001 LA
  • 2. THE CISA CERTIFICATION  Certified Information Systems Auditor (CISA) is offered by Information Systems Audit and Control Association (ISACA).  CISA Examination is open to all individuals and no prequalification or education required.  CISA certification provides an avenue for gaining insights into the various aspects of Information systems audit, security and internal controls.  CISA certification is a base requirement for an Information Systems Auditor.
  • 3. THE CISA CERTIFICATION  CISA examination and subsequent certifications aid the candidate with knowledge required to -  Conduct IS Audits  Frame security policies and procedures  Implement Security policies and procedures  Manage Information Technology  Direct and Govern Information Technology
  • 4. CISA CERTIFICATION: ELIGIBILITY, REQUIREMENT, PROCESS CISA certification Required work experience A minimum of 5 years of professional information systems auditing, control or security work experience The work experience for CISA certification must be gained Within the 10-year period preceding the application date for certification; OR Within 5 years from the date of originally passing the exam Process Complete and submit a CISA Application for Certification listing the details of professional experience in information systems auditing, control or security work
  • 5. CISA CERTIFICATION: MAINTENANCE  CISA Certification Maintenance Minimum of 20 contact hours of CPE annually; and Minimum of 120 contact hours during a fixed 3-year period
  • 6. CISA CERTIFICATION: EXAMINATION STRUCTURE Number of Questions Exam is paper and pencil based The exam consists of 150 questions multiple choice questions (MCQs) No negative marking  Duration of Exam 4 hours or 240 minutes 1.6 minute per question  Passing Score For passing a candidate must receive a scaled score of 450 or higher to pass the exam out of the 800 scale score. A score of 450 represents a minimum consistent standard of knowledge.
  • 7. CISA CERTIFICATION: READING MATERIALS CISA Review Manual 2016/2015 (ISACA Official Publication) CISA Review Questions, Answers & Explanations Manual, 11th Edition (ISACA Official Publication) Additional resources from Internet. At least One Mock Test
  • 8. CISA CERTIFICATION: READING STRATEGIES What I have followed Reading CISA Review Manual thoroughly (at least 2 times) Practicing CISA Review Questions, Answers & Explanations Manual until not understood the terms, language and concept of the questions Maintaining regularity Understanding the concept Please don’t memorize anything, it will not work at the exam. Group discussion Note: This method does not work for all, so judge yourself what you like and go for that
  • 9. QUESTIONS OVERVIEW  The document used by the top management of organizations to delegate authority to the IS audit function is the: A. long-term audit plan. B. audit charter. C. audit planning methodology. D. steering committee minutes. Answer: B The audit charter outlines the overall authority, scope and responsibilities of the audit function to achieve the audit objectives stated in it. This document serves as an instrument for the delegation of authority to the IS audit function. Long-term audit planning relates to those aspects of the audit plan that are impacted by the organization’s IT strategy and environment. Audit planning commences only after the audit charter has been approved by the highest level of management. The audit planning methodologies are decided upon based on the analysis of both long- and short-term audit issues. The steering committee minutes should address the approval of the audit charter but is not the driver that delegates authority.
  • 10. QUESTIONS OVERVIEW CONTD..  To reduce the possibility of losing data during processing, the FIRST point at which control totals should be implemented is:  A. during data preparation.  B. in transit to the computer.  C. between related computer runs.  D. during the return of the data to the user department.  Answer : A  Explanation: During data preparation is the best answer, because it establishes control at the earliest point.
  • 11. QUESTIONS OVERVIEW CONTD..  Information for detecting unauthorized input from a terminal would be BEST provided by the:  A. console log printout.  B. transaction journal.  C. automated suspense file listing.  D. user error report.  Answer : B  Explanation: The transaction journal would record all transaction activity, which then could be compared to the authorized source documents to identify any unauthorized input. A console log printout is not the best, because it would not record activity from a specific terminal. An automated suspense file listing would only list transaction activity where an edit error occurred, while the user error report would only list input that resulted in an edit error.
  • 12. QUESTIONS OVERVIEW CONTD..  Information for detecting unauthorized input from a terminal would be BEST provided by the:  A. console log printout.  B. transaction journal.  C. automated suspense file listing.  D. user error report.  Answer : B  Explanation: The transaction journal would record all transaction activity, which then could be compared to the authorized source documents to identify any unauthorized input. A console log printout is not the best, because it would not record activity from a specific terminal. An automated suspense file listing would only list transaction activity where an edit error occurred, while the user error report would only list input that resulted in an edit error.
  • 13. QUESTIONS OVERVIEW CONTD..  The MOST effective way to ensure that outsourced service providers comply with the organization’s information security policy would be:  A. service level monitoring.  B. penetration testing.  C. periodically auditing.  D. security awareness training.  Answer : C  Explanation: Regular audit exercise can spot any gap in the information security compliance. Service level monitoring can only pinpoint operational issues in the organization’s operational environment. Penetration testing can identify security vulnerability but cannot ensure information compliance. Training can increase users’ awareness on the information security policy, but is not more effective than auditing.
  • 14. QUESTIONS OVERVIEW CONTD..  A project manager of a project that is scheduled to take 18 months to complete announces that the project is in a healthy financial position because, after 6 months, only one-sixth of the budget has been spent. The IS auditor should FIRST determine:  A. what amount of progress against schedule has been achieved.  B. if the project budget can be reduced.  C. if the project could be brought in ahead of schedule.  D. if the budget savings can be applied to increase the project scope.  Answer : A
  • 15. QUESTIONS OVERVIEW CONTD..  Explanation: Cost performance of a project cannot be properly assessed in isolation of schedule performance. Cost cannot be assessed simply in terms of elapsed time on a project. To properly assess the project budget position it is necessary to know how much progress has actually been made and, given this, what level of expenditure would be expected. It is possible that project expenditure appears to be low because actual progress has been slow. Until the analysis of project against schedule has been completed, it is impossible to know whether there is any reason to reduce budget, if the project has slipped behind schedule, then not only may there be no spare budget but it is possible that extra expenditure may be needed to retrieve the slippage. The low expenditure could actually be representative of a situation where the project is likely to miss deadlines rather than potentially come in ahead of time. If the project is found to be ahead of budget after adjusting for actual progress, this is notnecessarily a good outcome because it points to flaws in the original budgeting process; and, as said above, until further analysis is undertaken, it cannot be determined whether any spare funds actually exist. Further, if the project is behind schedule, then adding scope may be the wrong thing to do.
  • 16. REFERENCE  http://www.slideshare.net/iAthena/cisa-certification-an-overview- 50830152?qid=d2b8cee8-bca5-4794-bc50- e715d5d3f445&v=&b=&from_search=1  www.isaca.org  https://itauditsecurity.wordpress.com/2016/01/12/free-cisa-exam- practice-questions/  https://www.wiziq.com/tests/cisa-mock-test