SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. During an audit - the auditor should obtain 6 types of documents - (1.) Org charts (2.) ___________ (3.) third-party contracts (4.) policies and procedures (5.) standards (6.) system documentation
Department Charters
A Sample Mean
Annualized Loss Expectance (ALE)
Stratified Sampling
2. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
Entire password for an encryption key
Background checks performed
Six steps of the Release Management process
Types of sampling an auditor can perform.
3. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
Main types of Controls
SDLC Phases
A Server Cluster
Notify the Audit Committee
4. The memory locations in the CPU where arithmetic values are stored.
WAN Protocols
Registers
The first step in a business impact analysis
A Problem
5. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
The Eight Types of Audits
Capability Maturity Model
Security Awareness program
Configuration Management
6. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
Gantt Chart
Stratified Sampling
A Compliance audit
Six steps of the Release Management process
7. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
An IS audit
The typical Configuration Items in Configuration Management
Volumes of COSO framework
List of systems examined
8. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg
TCP/IP Link Layer
The BCP process
Transport Layer Protocols
TCP/IP Network Model
9. What type of testing is performed to determine if control procedures have proper design and are operating properly?
The best approach for identifying high risk areas for an audit
Function Point Analysis
Disaster Recovery
Compliance Testing
10. The first major task in a disaster recovery or business continuity planning project.
OSI Layer 6: Presentation
A Forensic Audit
Structural fires and transportation accidents
Business impact analysis
11. The maximum period of downtime for a process or application
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
objective and unbiased
The 4-item focus of a Balanced Scorecard
Recovery time objective
12. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
Business Continuity
less than 24 hours
Variable Sampling
Grid Computing
13. IT Governance is most concerned with ________.
objective and unbiased
IT Strategy
The BCP process
Discovery Sampling
14. Lowest layer. Delivers messages (frames) from one station to another vial local network.
Elements of the COSO pyramid
TCP/IP Link Layer
Confidence coefficient
Control Risk
15. An audit that combines an operational audit and a financial audit.
Current and most up-to-date
An Integrated Audit
Foreign Key
Emergency Changes
16. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
OSI Layer 6: Presentation
Precision means
Options for Risk Treatment
Change management
17. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Overall audit risk
The appropriate role of an IS auditor in a control self-assessment
Service Level Management
Variable Sampling
18. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
Business Continuity
Documentation and interview personnel
Volumes of COSO framework
A Server Cluster
19. A collection of two or more servers that is designed to appear as a single server.
Function Point Analysis
Server cluster
Inherent Risk
List of systems examined
20. A sampling technique where at least one exception is sought in a population
Examples of IT General Controls
An Operational Audit
Discovery Sampling
Attribute Sampling
21. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
Examples of IT General Controls
TCP/IP Transport Layer
Overall audit risk
ITIL definition of CHANGE MANAGEMENT
22. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.
Statement of Impact
ISO 20000 Standard:
Configuration Management
Tolerable Error Rate
23. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
Separate administrative accounts
TCP/IP Link Layer
General Controls
OSI Layer 6: Presentation
24. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Critical Path Methodology
Substantive Testing (test of transaction integrity)
(1.) Man-made (2.) Natural
A Problem
25. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
General Controls
The best approach for identifying high risk areas for an audit
Recovery time objective
Three Types of Controls
26. Support the functioning of the application controls
Information systems access
General Controls
Data Link Layer Standards
Categories of risk treatment
27. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
A Forensic Audit
Frameworks
Substantive Testing
The 5 types of Evidence that the auditor will collect during an audit.
28. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
Capability Maturity Model Integration (CMMI)
The 4-item focus of a Balanced Scorecard
Business Continuity
Controls
29. An audit of a third-party organization that provides services to other organizations.
WAN Protocols
A Service Provider audit
The 7 phases and their order in the SDLC
Tolerable Error Rate
30. The means by which management establishes and measures processes by which organizational objectives are achieved
Controls
objective and unbiased
Grid Computing
ITIL definition of CHANGE MANAGEMENT
31. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
Examples of IT General Controls
Incident Management
Cloud computing
Types of sampling an auditor can perform.
32. (1.) Authentication (2.) Authorization (3.) Change Management (4.) Completeness checks (5.) Validation checks (6.) Input controls (7.) Output controls (8.) Problem management (9.) Identification/access controls
Foreign Key
Background checks performed
Examples of Application Controls
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
33. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
List of systems examined
Control Unit
Three Types of Controls
The Steering Committee
34. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
Statement of Impact
Examples of IT General Controls
The appropriate role of an IS auditor in a control self-assessment
IT Service Management
35. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
The Release process
(1.) Polices (2.) Procedures (3.) Standards
Segregation of duties issue in a high value process
Elements of the COSO pyramid
36. To review and approve proposed changes to systems and infrastructure. This helps to reduce the risk of unintended events and unplanned downtime.
Detection Risk
To identify the tasks that are responsible for project delays
Critical Path Methodology
Change management
37. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
OSI: Data Link Layer
Inherent Risk
Antivirus software on the email servers
Referential Integrity
38. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
Separate administrative accounts
TCP/IP Network Model
IT Services Financial Management
WAN Protocols
39. Subjective sampling is used when the auditor wants to _________________________.
Categories of risk treatment
The best approach for identifying high risk areas for an audit
Concentrate on samples known to represent high risk
Sampling Risk
40. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
TCP/IP Transport Layer
The appropriate role of an IS auditor in a control self-assessment
Segregation of duties issue in a high value process
Criticality analysis
41. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
Sampling Risk
Business Continuity
Categories of risk treatment
Audit Methodologies
42. (1.) Physical (2.) Technical (4.) Administrative
A Financial Audit
The Steering Committee
The 7 phases and their order in the SDLC
Three Types of Controls
43. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
(1.) Polices (2.) Procedures (3.) Standards
Annualized Loss Expectance (ALE)
ITIL definition of CHANGE MANAGEMENT
Antivirus software on the email servers
44. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
Lacks specific expertise or resources to conduct an internal audit
Project change request
A gate process
Service Continuity Management
45. To communication security policies - procedures - and other security-related information to an organization's employees.
The first step in a business impact analysis
Audit Methodologies
SDLC Phases
Security Awareness program
46. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
The availability of IT systems
Employee termination process
Grid Computing
Business impact analysis
47. (1.) General (2.) Application
Main types of Controls
General Controls
Primary security features of relational databases
A Server Cluster
48. To measure organizational performance and effectiveness against strategic goals.
Variable Sampling
Gantt Chart
The best approach for identifying high risk areas for an audit
Balanced Scorecard
49. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Sampling
Project change request
Variable Sampling
Main types of Controls
50. A Fire sprinkler system has water in its pipes - and sprinkler heads emit water only if the ambient temperature reaches 220 deg. F. This is a ________________. The system is charged with water and will discharge water out of any sprinkler head whose
Wet pipe fire sprinkler system
Data Link Layer Standards
IT standards are not being reviewed often enough
Examples of IT General Controls
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests