SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The highest number of errors that can exist without a result being materially misstated.
Tolerable Error Rate
Resource details
Reduced sign-on
Critical Path Methodology
2. An audit of a third-party organization that provides services to other organizations.
OSI: Network Layer
Rating Scale for Process Maturity
A Service Provider audit
TCP/IP Network Model
3. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
IT standards are not being reviewed often enough
OSI: Physical Layer
OSI: Data Link Layer
List of systems examined
4. Guide program execution through organization of resources and development of clear project objectives.
Data Link Layer Standards
Cloud computing
Capability Maturity Model
Project Management Strategies
5. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
The Release process
The Steering Committee
Documentation and interview personnel
Audit logging
6. An alternate processing center that contains no information processing equipment.
Balanced Scorecard
Grid Computing
Lacks specific expertise or resources to conduct an internal audit
A Cold Site
7. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
SDLC Phases
Information security policy
Buffers
The 5 types of Evidence that the auditor will collect during an audit.
8. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
A Sample Mean
The Business Process Life Cycle
TCP/IP Network Model
An Administrative
9. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
Power system controls
Confidence coefficient
ITIL definition of PROBLEM
Cloud computing
10. Disasters are generally grouped in terms of type: ______________.
Change management
(1.) Man-made (2.) Natural
Primary security features of relational databases
A Forensic Audit
11. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
List of systems examined
Sampling Risk
Business Realization
Advantages of outsourcing
12. (1.) Automatic (2.) Manual
Inform the auditee
Substantive Testing (test of transaction integrity)
Personnel involved in the requirements phase of a software development project
The two Categories of Controls
13. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
Notify the Audit Committee
The audit program
Categories of risk treatment
Options for Risk Treatment
14. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
Audit logging
A Forensic Audit
PERT Diagram?
IT Services Financial Management
15. During an audit - the auditor should obtain 6 types of documents - (1.) Org charts (2.) ___________ (3.) third-party contracts (4.) policies and procedures (5.) standards (6.) system documentation
Department Charters
Confidence coefficient
Cloud computing
Wet pipe fire sprinkler system
16. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
17. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
An Operational Audit
More difficult to perform
A Problem
Types of sampling an auditor can perform.
18. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
A Server Cluster
Frameworks
Configuration Management
Variable Sampling
19. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Configuration Management
Inform the auditee
The BCP process
An Operational Audit
20. A Fire sprinkler system has water in its pipes - and sprinkler heads emit water only if the ambient temperature reaches 220 deg. F. This is a ________________. The system is charged with water and will discharge water out of any sprinkler head whose
Wet pipe fire sprinkler system
Stop-or-go Sampling
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
The Steering Committee
21. The risk that an IS auditor will overlook errors or exceptions during an audit.
Function Point Analysis
Lacks specific expertise or resources to conduct an internal audit
Background checks performed
Detection Risk
22. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
Documentation and interview personnel
Sample Standard Deviation
Options for Risk Treatment
Project change request
23. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Entire password for an encryption key
Cloud computing
Sampling Risk
Statement of Impact
24. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
Grid Computing
ISO 20000 Standard:
Balanced Scorecard
The Requirements
25. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
Function Point Analysis
WAN Protocols
Separate administrative accounts
Deming Cycle
26. To measure organizational performance and effectiveness against strategic goals.
Elements of the COSO pyramid
Balanced Scorecard
OSI: Network Layer
Attribute Sampling
27. Support the functioning of the application controls
Configuration Management
A gate process
General Controls
(1.) Polices (2.) Procedures (3.) Standards
28. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.
Service Level Management
Expected Error Rate
OSI: Data Link Layer
IT standards are not being reviewed often enough
29. An audit that is performed in support of an anticipated or active legal proceeding.
A Forensic Audit
Elements of the COBIT Framework
List of systems examined
Release management
30. (1.) TCP (2.) UDP
Organizational culture and maturity
Statistical Sampling
Transport Layer Protocols
The typical Configuration Items in Configuration Management
31. To communication security policies - procedures - and other security-related information to an organization's employees.
Reduced sign-on
The 5 types of Evidence that the auditor will collect during an audit.
A gate process
Security Awareness program
32. Contains programs that communicate directly with the end user.
Information systems access
OSI Layer 7: Application
The 7 phases and their order in the SDLC
The Software Program Library
33. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
Frameworks
Examples of IT General Controls
A Sample Mean
The Software Program Library
34. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
Department Charters
Inherent Risk
Reduced sign-on
Risk Management
35. What type of testing is performed to determine if control procedures have proper design and are operating properly?
Structural fires and transportation accidents
The Requirements
Compliance Testing
Power system controls
36. (1.) Access controls (2.) Encryption (3.) Audit logging
Background checks performed
Employees with excessive privileges
Options for Risk Treatment
Primary security features of relational databases
37. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
Input validation checking
Elements of the COSO pyramid
Recovery time objective
The Internet Layer in the TCP/IP model
38. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
Sample Standard Deviation
Antivirus software on the email servers
Substantive Testing (test of transaction integrity)
(1.) Polices (2.) Procedures (3.) Standards
39. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
TCP/IP Internet Layer
Detection Risk
OSI Layer 7: Application
The typical Configuration Items in Configuration Management
40. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
The 5 types of Evidence that the auditor will collect during an audit.
CPU
Hash
The Eight Types of Audits
41. The inventory of all in-scope business processes and systems
Assess the maturity of its business processes
Split custody
Business Continuity
The first step in a business impact analysis
42. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.
TCP/IP Internet Layer
A Forensic Audit
The appropriate role of an IS auditor in a control self-assessment
An Administrative
43. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
Antivirus software on the email servers
Configuration Management
Personnel involved in the requirements phase of a software development project
Elements of the COSO pyramid
44. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
Annualized Loss Expectance (ALE)
Overall audit risk
Prblem Management
The Eight Types of Audits
45. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
Referential Integrity
The typical Configuration Items in Configuration Management
Geographic location
The Release process
46. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog
Change management
Buffers
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Compliance Testing
47. ____________________ of the hot site is most important consideration for site selection. IF they are too close together then a single event may involve both locations
Detection Risk
Geographic location
Notify the Audit Committee
Business impact analysis
48. PERT: shows the ______________ critical path.
Main types of Controls
Current and most up-to-date
Detection Risk
Inherent Risk
49. The maximum period of downtime for a process or application
Organizational culture and maturity
Background checks performed
Judgmental sampling
Recovery time objective
50. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Sample Standard Deviation
General Controls
Expected Error Rate
The best approach for identifying high risk areas for an audit
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests