New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISA Exam - Topic 1 Question 78 Discussion

Actual exam question for Isaca's CISA exam
Question #: 78
Topic #: 1
[All CISA Questions]

Which of the following is an example of shadow IT?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Caprice
3 months ago
Really? I thought shadow IT was only about unapproved software.
upvoted 0 times
...
Nakita
3 months ago
A is spot on, but D feels like a stretch.
upvoted 0 times
...
Dean
3 months ago
Wait, isn't B also a form of shadow IT?
upvoted 0 times
...
Nan
4 months ago
I think C is more of a problem, though.
upvoted 0 times
...
Emiko
4 months ago
Definitely A, that's classic shadow IT.
upvoted 0 times
...
Carey
4 months ago
I practiced a similar question, and I think A is definitely the best choice since it involves a cloud tool that IT doesn’t know about.
upvoted 0 times
...
Paola
4 months ago
I feel like C could be a good example too, but I’m not entirely sure if personal email counts as shadow IT.
upvoted 0 times
...
Sean
4 months ago
I remember discussing shadow IT in class, and I thought it was more about using unauthorized software, which makes me unsure about B and C.
upvoted 0 times
...
Trinidad
5 months ago
I think shadow IT is when employees use tools or services without IT's approval, so I’m leaning towards option A.
upvoted 0 times
...
Jessenia
5 months ago
I'm a little confused by the wording of these options. They all seem to involve some kind of unauthorized technology use, but I'm not sure which one specifically qualifies as shadow IT. I'll have to re-read the question and options more closely.
upvoted 0 times
...
Albina
5 months ago
Okay, I've got this. The correct answer is A - an employee using a cloud-based tool without IT approval. That's a classic example of shadow IT, where employees bypass official IT processes to use their own tools and services.
upvoted 0 times
...
Kenneth
5 months ago
Hmm, I'm a bit unsure about this one. I know shadow IT has to do with unauthorized use of technology, but I'm not totally clear on the specific criteria. I'll have to think this through carefully.
upvoted 0 times
...
Cherelle
5 months ago
This looks like a straightforward question about shadow IT. I think the key is to identify the examples that involve employees using unapproved IT resources or services without the knowledge or consent of the IT department.
upvoted 0 times
...
Ciara
5 months ago
Hmm, this seems like a pretty straightforward question. I'm pretty confident I can figure this out.
upvoted 0 times
...
Simona
5 months ago
Hmm, I'm a bit unsure about this one. I know other comprehensive income includes things like foreign currency translation differences and actuarial gains/losses, but I'm not totally sure about revaluation of non-current assets. I'll have to think this through carefully.
upvoted 0 times
...
Joanna
5 months ago
I think I saw a question like this before in practice—access points are definitely about connectivity, right?
upvoted 0 times
...
Rosio
9 months ago
Ha! Option D is my pick. Using the company tablet for social media? That's just asking for trouble. IT is going to have a field day with that one.
upvoted 0 times
Derrick
8 months ago
Yeah, any unauthorized use of technology can create problems for the company.
upvoted 0 times
...
Lai
8 months ago
I think option A is also a good example of shadow IT. Using unauthorized tools can cause security risks.
upvoted 0 times
...
Glen
8 months ago
I agree, using company devices for personal use is a big no-no.
upvoted 0 times
...
Kiley
8 months ago
That's definitely a risky move. IT is not going to be happy about that.
upvoted 0 times
...
Brittni
8 months ago
It's important to follow IT policies to protect company data.
upvoted 0 times
...
Lawrence
8 months ago
Definitely, it can open up security vulnerabilities.
upvoted 0 times
...
Reuben
9 months ago
I agree, using company resources for personal use is risky.
upvoted 0 times
...
...
Anglea
10 months ago
Definitely A. Using an unauthorized tool for business work is a big no-no. The IT department needs to know what's going on to keep things secure.
upvoted 0 times
Josphine
8 months ago
Shadow IT can create vulnerabilities that IT may not be able to protect against.
upvoted 0 times
...
Micaela
9 months ago
It's important for IT to be aware of all the tools being used in the company.
upvoted 0 times
...
Margart
9 months ago
I agree, using unauthorized tools can pose a security risk.
upvoted 0 times
...
...
Olene
10 months ago
I'm going with A as well. If IT doesn't know about the tool, it's definitely shadow IT. Trying to sneak around the system is a big no-no.
upvoted 0 times
Jutta
9 months ago
Shadow IT can cause security risks and compliance issues.
upvoted 0 times
...
Marylin
9 months ago
Definitely, it's important to follow company policies.
upvoted 0 times
...
Kaycee
9 months ago
I agree, using a tool without IT approval is risky.
upvoted 0 times
...
...
Rachael
10 months ago
Option A sounds like a clear case of shadow IT. Using an unapproved cloud tool for work without IT's knowledge is a textbook example.
upvoted 0 times
...
Mendy
11 months ago
I'm not sure, but I think C) An employee using personal email to communicate with clients without approval from IT could also be considered shadow IT.
upvoted 0 times
...
Lorrine
11 months ago
I agree with Nichelle, that definitely sounds like shadow IT.
upvoted 0 times
...
Nichelle
11 months ago
I think the answer is A) An employee using a cloud based order management tool without approval from IT.
upvoted 0 times
...

Save Cancel