Test your basic knowledge |

CISA: Certified Information Systems Auditor

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An audit of a third-party organization that provides services to other organizations.






2. (1.) Automatic (2.) Manual






3. Used to determine which business processes are the most critical - by ranking them in order of criticality






4. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices






5. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance






6. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase






7. An audit of an IS department's operations and systems.






8. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.






9. Individual events may often create combined threats to enterprise operations: A tornado might also spawn ____________________.






10. (1.) Objectives (2.) Components (3.) Business Units / Areas






11. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.






12. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25






13. Gantt: used to display ______________.






14. The maximum period of downtime for a process or application






15. (1.) Authentication (2.) Authorization (3.) Change Management (4.) Completeness checks (5.) Validation checks (6.) Input controls (7.) Output controls (8.) Problem management (9.) Identification/access controls






16. One of a database table's fields - whose value is unique.






17. To measure organizational performance and effectiveness against strategic goals.






18. Handle application processing






19. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.






20. (1.) Link (2.) Internet (3.) Transport (4.) Application






21. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie






22. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up






23. The risk that an IS auditor will overlook errors or exceptions during an audit.






24. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components






25. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.






26. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.






27. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications






28. IT Service Management is defined in ___________________ framework.






29. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning






30. (1.) Developers (2.) Architects (3.) Analysts (4.) Users






31. PERT: shows the ______________ critical path.






32. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect






33. An alternate processing center that contains no information processing equipment.






34. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.






35. An audit of operational efficiency.






36. Collections of Controls that work together to achieve an entire range of an organization's objectives.






37. Used to measure the relative maturity of an organization and its processes.






38. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.






39. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review






40. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg






41. Consists of two main packet transport protocols: TCP and UDP.






42. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.






43. Guide program execution through organization of resources and development of clear project objectives.






44. 1.) Executive Support (2.) Well-defined roles and responsibilities.






45. Concerned with electrical and physical specifications for devices. No frames or packets involved.






46. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)






47. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences






48. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.






49. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.






50. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.