SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
SDLC Phases
Entire password for an encryption key
The 7 phases and their order in the SDLC
ITIL definition of PROBLEM
2. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
Change management
The 5 types of Evidence that the auditor will collect during an audit.
Wet pipe fire sprinkler system
The first step in a business impact analysis
3. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
Resource details
Project Management Strategies
Personnel involved in the requirements phase of a software development project
BCP Plans
4. Subjective sampling is used when the auditor wants to _________________________.
Power system controls
Sampling Risk
Concentrate on samples known to represent high risk
Organizational culture and maturity
5. (1.) General (2.) Application
The Software Program Library
Critical Path Methodology
Precision means
Main types of Controls
6. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
Organizational culture and maturity
OSI: Physical Layer
ITIL definition of PROBLEM
Critical Path Methodology
7. ____________________ of the hot site is most important consideration for site selection. IF they are too close together then a single event may involve both locations
TCP/IP Transport Layer
Geographic location
Annualized Loss Expectance (ALE)
Assess the maturity of its business processes
8. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
Substantive Testing (test of transaction integrity)
Input validation checking
Inherent Risk
The Internet Layer in the TCP/IP model
9. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Emergency Changes
A Cold Site
Current and most up-to-date
Entire password for an encryption key
10. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
A Cold Site
Types of sampling an auditor can perform.
Options for Risk Treatment
The Internet Layer in the TCP/IP model
11. (1.) TCP (2.) UDP
Statistical Sampling
Transport Layer Protocols
Prblem Management
Rating Scale for Process Maturity
12. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
Organizational culture and maturity
Main types of Controls
A gate process
Control Risk
13. IT Service Management is defined in ___________________ framework.
Project Management Strategies
ITIL - IT Infrastructure Library
Incident Management
IT executives and the Board of Directors
14. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
CPU
OSI Layer 7: Application
To identify the tasks that are responsible for project delays
Elements of the COSO pyramid
15. 1.) Executive Support (2.) Well-defined roles and responsibilities.
Resource details
Statistical Sampling
ITIL definition of CHANGE MANAGEMENT
Information security policy
16. Individual events may often create combined threats to enterprise operations: A tornado might also spawn ____________________.
Structural fires and transportation accidents
Options for Risk Treatment
Cloud computing
Controls
17. An alternate processing center that contains no information processing equipment.
OSI: Transport Layer
The 7 phases and their order in the SDLC
A Cold Site
Data Link Layer Standards
18. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
An Integrated Audit
Overall audit risk
Employee termination process
Project change request
19. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
Personnel involved in the requirements phase of a software development project
Business Realization
Primary security features of relational databases
ITIL definition of PROBLEM
20. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Stratified Sampling
Sampling
Gantt Chart
Confidence coefficient
21. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
The 5 types of Evidence that the auditor will collect during an audit.
Business Continuity
Control Unit
IT Services Financial Management
22. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
Structural fires and transportation accidents
Advantages of outsourcing
Annualized Loss Expectance (ALE)
OSI: Network Layer
23. Lowest layer. Delivers messages (frames) from one station to another vial local network.
TCP/IP Link Layer
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Emergency Changes
Hash
24. The first major task in a disaster recovery or business continuity planning project.
Business impact analysis
Wet pipe fire sprinkler system
To identify the tasks that are responsible for project delays
Business Continuity
25. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
The Release process
Three Types of Controls
Project Management Strategies
SDLC Phases
26. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
Examples of IT General Controls
Sampling Risk
Wet pipe fire sprinkler system
Variable Sampling
27. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
Audit logging
OSI Layer 6: Presentation
Antivirus software on the email servers
Network Layer Protocols
28. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
List of systems examined
A gate process
Risk Management
Audit logging
29. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
Registers
Gantt Chart
The Steering Committee
The Requirements
30. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
Gantt Chart
IT standards are not being reviewed often enough
Capability Maturity Model
SDLC Phases
31. Delivery of packets from one station to another - on the same network or on different networks.
The Internet Layer in the TCP/IP model
Capability Maturity Model Integration (CMMI)
The Eight Types of Audits
Blade Computer Architecture
32. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Sample Standard Deviation
Split custody
Grid Computing
A Forensic Audit
33. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Hash
A Financial Audit
Background checks performed
PERT Diagram?
34. Used to estimate the effort required to develop a software program.
Primary security features of relational databases
Function Point Analysis
IT Services Financial Management
To identify the tasks that are responsible for project delays
35. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
PERT Diagram?
Elements of the COSO pyramid
Resource details
(1.) Man-made (2.) Natural
36. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
Audit Methodologies
OSI: Network Layer
ITIL definition of CHANGE MANAGEMENT
Main types of Controls
37. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them
Inherent Risk
An Administrative
Elements of the COBIT Framework
Current and most up-to-date
38. An audit that is performed in support of an anticipated or active legal proceeding.
BCP Plans
A Service Provider audit
A Forensic Audit
OSI: Transport Layer
39. (1.) Physical (2.) Technical (4.) Administrative
Confidence coefficient
Three Types of Controls
Discovery Sampling
Project Management Strategies
40. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Volumes of COSO framework
The Business Process Life Cycle
IT Service Management
Three Types of Controls
41. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog
Buffers
Categories of risk treatment
The Release process
Power system controls
42. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
Controls
Transport Layer Protocols
Background checks performed
Examples of IT General Controls
43. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
A Virtual Server
BCP Plans
Employees with excessive privileges
ITIL - IT Infrastructure Library
44. The risk that an IS auditor will overlook errors or exceptions during an audit.
ITIL definition of PROBLEM
Detection Risk
TCP/IP Transport Layer packet delivery
Change management
45. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
less than 24 hours
Notify the Audit Committee
ITIL - IT Infrastructure Library
SDLC Phases
46. Used to determine which business processes are the most critical - by ranking them in order of criticality
Criticality analysis
Structural fires and transportation accidents
Frameworks
Project change request
47. The means by which management establishes and measures processes by which organizational objectives are achieved
An Administrative
Lacks specific expertise or resources to conduct an internal audit
Controls
Cloud computing
48. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
OSI: Transport Layer
The first step in a business impact analysis
Annualized Loss Expectance (ALE)
A Compliance audit
49. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Overall audit risk
Examples of Application Controls
The two Categories of Controls
An Operational Audit
50. Contains programs that communicate directly with the end user.
The first step in a business impact analysis
An IS audit
OSI Layer 7: Application
The audit program
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests