SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
IT Service Management
Change management
objective and unbiased
Insourcing
2. An audit that combines an operational audit and a financial audit.
Controls
Control Unit
Volumes of COSO framework
An Integrated Audit
3. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
Categories of risk treatment
The Software Program Library
The 5 types of Evidence that the auditor will collect during an audit.
Referential Integrity
4. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
Configuration Management
IT executives and the Board of Directors
Segregation of duties issue in a high value process
Foreign Key
5. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
Volumes of COSO framework
Documentation and interview personnel
ITIL - IT Infrastructure Library
Critical Path Methodology
6. (1.) Feasibility (2.) Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation
Statistical Sampling
Control Risk
The 7 phases and their order in the SDLC
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
7. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog
Capability Maturity Model Integration (CMMI)
Sampling Risk
OSI: Data Link Layer
Buffers
8. A field in a record in one table that can reference a primary key in another table that can reference a primary key in another table.
IT Strategy
General Controls
TCP/IP Transport Layer packet delivery
Foreign Key
9. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
Project change request
Sample Standard Deviation
Main types of Controls
Structural fires and transportation accidents
10. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
TCP/IP Link Layer
Dimensions of the COSO cube
Background checks performed
Structural fires and transportation accidents
11. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
OSI: Network Layer
A Virtual Server
Project Management Strategies
Sampling
12. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
Project change request
Capability Maturity Model Integration (CMMI)
Information systems access
Personnel involved in the requirements phase of a software development project
13. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
Business Continuity
Stop-or-go Sampling
The two Categories of Controls
Business Realization
14. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Rating Scale for Process Maturity
A Service Provider audit
Cloud computing
To identify the tasks that are responsible for project delays
16. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
Formal waterfall
The Requirements
IT standards are not being reviewed often enough
Stop-or-go Sampling
17. The maximum period of downtime for a process or application
less than 24 hours
PERT Diagram?
Recovery time objective
Network Layer Protocols
18. An audit of an IS department's operations and systems.
Judgmental sampling
Formal waterfall
Power system controls
An IS audit
19. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
ITIL definition of CHANGE MANAGEMENT
Deming Cycle
CPU
Tolerable Error Rate
20. ITIL term used to describe the SDLC.
Application Controls
Change management
Data Link Layer Standards
Release management
21. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
OSI Layer 6: Presentation
Application Layer protocols
Critical Path Methodology
Stratified Sampling
22. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
The Requirements
TCP/IP Network Model
Application Layer protocols
A Forensic Audit
23. IT Governance is most concerned with ________.
Business Continuity
Assess the maturity of its business processes
IT Strategy
Separate administrative accounts
24. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
Current and most up-to-date
The audit program
Reduced sign-on
Balanced Scorecard
25. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Advantages of outsourcing
Wet pipe fire sprinkler system
Overall audit risk
Employees with excessive privileges
26. (1.) Physical (2.) Technical (4.) Administrative
Three Types of Controls
Critical Path Methodology
Stratified Sampling
Segregation of duties issue in a high value process
27. IT Service Management is defined in ___________________ framework.
objective and unbiased
Capability Maturity Model Integration (CMMI)
ITIL - IT Infrastructure Library
Primary security features of relational databases
28. PERT: shows the ______________ critical path.
The Software Program Library
Data Link Layer Standards
Statement of Impact
Current and most up-to-date
29. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Substantive Testing
Balanced Scorecard
Elements of the COBIT Framework
Statement of Impact
30. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
CPU
IT Service Management
Hash
A Forensic Audit
31. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
Configuration Management
The Business Process Life Cycle
(1.) Polices (2.) Procedures (3.) Standards
SDLC Phases
32. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
Segregation of duties issue in a high value process
An IS audit
Background checks performed
Application Layer protocols
33. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Controls
Attribute Sampling
A Sample Mean
The 7 phases and their order in the SDLC
34. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
Annualized Loss Expectance (ALE)
Project Management Strategies
Business Realization
The best approach for identifying high risk areas for an audit
35. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Documentation and interview personnel
Confidence coefficient
Server cluster
PERT Diagram?
36. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
The Release process
Change management
Project Management Strategies
Examples of IT General Controls
37. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Antivirus software on the email servers
Project change request
A Forensic Audit
Inform the auditee
38. Describes the effect on the business if a process is incapacitated for any appreciable time
Statement of Impact
An Operational Audit
OSI Layer 6: Presentation
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
39. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
Stop-or-go Sampling
Current and most up-to-date
OSI: Transport Layer
PERT Diagram?
40. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Stay current with technology
Assess the maturity of its business processes
Sampling Risk
The two Categories of Controls
41. Framework for auditing and measuring IT Service Management Processes.
Input validation checking
ISO 20000 Standard:
Balanced Scorecard
The first step in a business impact analysis
42. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
Release management
less than 24 hours
Insourcing
The Eight Types of Audits
43. Subjective sampling is used when the auditor wants to _________________________.
Variable Sampling
Statement of Impact
Concentrate on samples known to represent high risk
Stay current with technology
44. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
Stratified Sampling
The audit program
Examples of IT General Controls
PERT Diagram?
45. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Attribute Sampling
Hash
Deming Cycle
Input validation checking
46. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient
The Software Program Library
Sampling Risk
A Sample Mean
The Eight Types of Audits
47. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
The 4-item focus of a Balanced Scorecard
Input validation checking
OSI: Transport Layer
Volumes of COSO framework
48. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
Department Charters
Recovery time objective
Service Continuity Management
Inherent Risk
49. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Main types of Controls
Buffers
CPU
An Operational Audit
50. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
OSI: Transport Layer
The audit program
PERT Diagram?
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests