Free CPA ISC (Information Systems & Controls) Practice Questions
The CPA ISC discipline section tests information technology, data management, and cybersecurity concepts. Practice 400 questions on systems architecture, data governance, privacy controls, and SOC engagements.
Everything You Need to Pass
1,028+ Practice Questions
Every question includes a detailed, step-by-step solution.
Flashcards & Spaced Repetition
Smart review cards that adapt to what you need to study.
Timed Mock Exams
Full-length practice exams simulating the real test.
Performance Analytics
Track accuracy by topic and difficulty to find weak spots.
Personalized Study Plan
Dynamic schedule based on your exam date and progress.
Sample Questions
Question 1
Easy
Which authentication factor category does a fingerprint scan belong to?
Solution
D is correct. A fingerprint scan is a biometric authentication factor classified as 'something you are.' Biometric factors are based on unique physical or behavioral characteristics of the individual, including fingerprints, retinal patterns, iris scans, facial recognition, voiceprints, and behavioral biometrics. These characteristics are inherent to the person and cannot be easily shared or transferred.
A is incorrect because 'something you know' refers to knowledge-based factors like passwords and PINs, not physical characteristics.
B is incorrect because 'something you have' refers to physical objects in the user's possession, not biological traits.
C is incorrect because 'somewhere you are' is a location-based factor, not a biometric characteristic.
A is incorrect because 'something you know' refers to knowledge-based factors like passwords and PINs, not physical characteristics.
B is incorrect because 'something you have' refers to physical objects in the user's possession, not biological traits.
C is incorrect because 'somewhere you are' is a location-based factor, not a biometric characteristic.
Question 2
Medium
A SOC 2+ engagement differs from a standard SOC 2 engagement in that a SOC 2+ report:
Solution
A is correct. A SOC 2+ engagement includes the standard Trust Services Criteria plus additional criteria from other frameworks such as HIPAA, NIST Cybersecurity Framework, ISO 27001, or the Cloud Security Alliance STAR framework. The additional criteria are mapped alongside the Trust Services Criteria, allowing the service organization to demonstrate compliance with multiple standards in a single report.
B is incorrect because SOC 2+ does not replace the Trust Services Criteria; it supplements them with additional frameworks.
B is incorrect because the system description remains a required element in SOC 2+ engagements.
C is incorrect because SOC 2+ is not restricted to any specific industry; any service organization can elect to include additional criteria relevant to its operations.
B is incorrect because SOC 2+ does not replace the Trust Services Criteria; it supplements them with additional frameworks.
B is incorrect because the system description remains a required element in SOC 2+ engagements.
C is incorrect because SOC 2+ is not restricted to any specific industry; any service organization can elect to include additional criteria relevant to its operations.
Question 3
Hard
A financial services company must comply with both NIST CSF and ISO 27001. The CISO notes that NIST CSF is descriptive and flexible while ISO 27001 is prescriptive and certifiable. How should the organization BEST leverage both frameworks in its security program?
Solution
A is correct. NIST CSF and ISO 27001 are complementary. NIST CSF provides a flexible, risk-based structure organized around five functions that works well for strategic cybersecurity governance. ISO 27001 provides a prescriptive ISMS with specific Annex A controls that can be audited and certified. By using NIST CSF as the overarching risk management framework and mapping its categories and subcategories to specific ISO 27001 controls, the organization achieves both strategic risk management and certifiable compliance.
D is incorrect because NIST CSF offers valuable strategic risk management capabilities that ISO 27001 alone does not fully address, and using both is industry best practice.
C is incorrect because artificially separating technical and administrative controls between frameworks creates gaps and misses the benefit of integrated mapping.
B is incorrect because SOC 2 Trust Services Criteria serve a different purpose (service organization assurance) and do not replace enterprise cybersecurity frameworks.
D is incorrect because NIST CSF offers valuable strategic risk management capabilities that ISO 27001 alone does not fully address, and using both is industry best practice.
C is incorrect because artificially separating technical and administrative controls between frameworks creates gaps and misses the benefit of integrated mapping.
B is incorrect because SOC 2 Trust Services Criteria serve a different purpose (service organization assurance) and do not replace enterprise cybersecurity frameworks.
Topics
Information Systems and Data Management
422 questions
Security, Confidentiality and Privacy
399 questions
Considerations for SOC Engagements
207 questions
About FreeFellow
FreeFellow is a free exam prep platform for actuarial (SOA & CAS), CFA, CFP, CPA, CAIA, and securities licensing candidates. Every question includes a detailed solution. Full lessons, flashcards with spaced repetition, timed mock exams, performance analytics, and a personalized study plan are all included — no paywalls, no ads.