SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
The Steering Committee
Confidence coefficient
Sampling Risk
Power system controls
2. A maturity model that represents the aggregations of other maturity models.
Service Continuity Management
Capability Maturity Model Integration (CMMI)
ITIL definition of PROBLEM
An Administrative
3. Framework for auditing and measuring IT Service Management Processes.
ISO 20000 Standard:
Structural fires and transportation accidents
Audit logging
Main types of Controls
4. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
OSI: Data Link Layer
Department Charters
Hash
The Release process
5. The first major task in a disaster recovery or business continuity planning project.
Database primary key
Business impact analysis
Grid Computing
Examples of Application Controls
6. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
Options for Risk Treatment
PERT Diagram?
IT Service Management
Input validation checking
7. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
Assess the maturity of its business processes
IT Services Financial Management
Grid Computing
Antivirus software on the email servers
8. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
Tolerable Error Rate
Prblem Management
Control Risk
Deming Cycle
9. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
A Forensic Audit
Employees with excessive privileges
Dimensions of the COSO cube
Elements of the COBIT Framework
10. Used to measure the relative maturity of an organization and its processes.
Application Layer protocols
Business Continuity
Stay current with technology
Capability Maturity Model
11. Support the functioning of the application controls
Service Continuity Management
General Controls
Detection Risk
OSI Layer 5: Session
12. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
Server cluster
A gate process
Rating Scale for Process Maturity
Recovery time objective
13. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
BCP Plans
Wet pipe fire sprinkler system
Critical Path Methodology
Incident Management
14. One of a database table's fields - whose value is unique.
Database primary key
Segregation of duties issue in a high value process
Examples of IT General Controls
Deming Cycle
15. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
Risk Management
Network Layer Protocols
Variable Sampling
Separate administrative accounts
16. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
Balanced Scorecard
General Controls
Network Layer Protocols
The Business Process Life Cycle
17. ITIL term used to describe the SDLC.
A Cold Site
Release management
Inherent Risk
Antivirus software on the email servers
18. (1.) Link (2.) Internet (3.) Transport (4.) Application
A Service Provider audit
The appropriate role of an IS auditor in a control self-assessment
Detection Risk
TCP/IP Network Model
19. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
List of systems examined
Business Realization
Application Layer protocols
Lacks specific expertise or resources to conduct an internal audit
20. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
Statement of Impact
Options for Risk Treatment
Separate administrative accounts
Judgmental sampling
21. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
TCP/IP Transport Layer packet delivery
Business Realization
The Release process
Sampling Risk
22. An auditor has discovered several errors in user account management: many terminated employees' computer accounts are still active. The best course of action - To improve the _________________ to reduce the number of exceptions. For a time - the proc
The Software Program Library
Data Link Layer Standards
Employee termination process
OSI: Transport Layer
23. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
Disaster Recovery
The BCP process
Network Layer Protocols
SDLC Phases
24. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
A Cold Site
Types of sampling an auditor can perform.
Compliance Testing
Expected Error Rate
25. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
Types of sampling an auditor can perform.
A Forensic Audit
Application Controls
The first step in a business impact analysis
26. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Sample Standard Deviation
Rating Scale for Process Maturity
Formal waterfall
Cloud computing
27. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
Categories of risk treatment
The Software Program Library
Notify the Audit Committee
Grid Computing
28. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
A Server Cluster
Documentation and interview personnel
Personnel involved in the requirements phase of a software development project
More difficult to perform
30. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
Audit logging
A Service Provider audit
objective and unbiased
Service Level Management
31. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
Deming Cycle
Categories of risk treatment
Incident Management
Prblem Management
32. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
Antivirus software on the email servers
An IS audit
Power system controls
Buffers
33. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
Attribute Sampling
Control Risk
IT executives and the Board of Directors
Advantages of outsourcing
34. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
IT executives and the Board of Directors
A gate process
Substantive Testing
ISO 20000 Standard:
35. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
Business Continuity
Statistical Sampling
Input validation checking
IT standards are not being reviewed often enough
36. Consists of two main packet transport protocols: TCP and UDP.
Overall audit risk
TCP/IP Transport Layer
An IS audit
Substantive Testing (test of transaction integrity)
37. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
Business impact analysis
A Virtual Server
TCP/IP Transport Layer
A Compliance audit
38. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them
A Financial Audit
Volumes of COSO framework
The Requirements
Inherent Risk
39. (1.) General (2.) Application
TCP/IP Network Model
Main types of Controls
Prblem Management
General Controls
40. The highest number of errors that can exist without a result being materially misstated.
IT Services Financial Management
Grid Computing
More difficult to perform
Tolerable Error Rate
41. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
The two Categories of Controls
Sampling
The Steering Committee
The Internet Layer in the TCP/IP model
42. Any event which is not part of the standard operation of service and which causes or may cause an interruption to or reduction in quality of that service. Includes THREE incident types: (1.) Service Outage (2.) Service Slowdown (3.) Software Bug
Transport Layer Protocols
Criticality analysis
Incident Management
Variable Sampling
43. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
Discovery Sampling
Six steps of the Release Management process
SDLC Phases
Network Layer Protocols
44. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Separate administrative accounts
Assess the maturity of its business processes
Geographic location
IT executives and the Board of Directors
45. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
IT standards are not being reviewed often enough
Referential Integrity
Gantt Chart
Service Level Management
46. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
The first step in a business impact analysis
ISO 20000 Standard:
OSI Layer 5: Session
Referential Integrity
47. (1.) Physical (2.) Technical (4.) Administrative
Stratified Sampling
Confidence coefficient
Three Types of Controls
A Sample Mean
48. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
A Financial Audit
Business impact analysis
The 4-item focus of a Balanced Scorecard
Assess the maturity of its business processes
49. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
Structural fires and transportation accidents
A Server Cluster
TCP/IP Transport Layer
WAN Protocols
50. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
OSI: Physical Layer
Overall audit risk
The best approach for identifying high risk areas for an audit
Service Level Management