SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
Foreign Key
Overall audit risk
A Server Cluster
Statistical Sampling
2. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
(1.) Polices (2.) Procedures (3.) Standards
Stay current with technology
A Service Provider audit
Employees with excessive privileges
3. A field in a record in one table that can reference a primary key in another table that can reference a primary key in another table.
Structural fires and transportation accidents
Business impact analysis
Discovery Sampling
Foreign Key
4. 1.) Executive Support (2.) Well-defined roles and responsibilities.
Volumes of COSO framework
Emergency Changes
Information security policy
Stay current with technology
5. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them
The BCP process
Inherent Risk
The Steering Committee
The 4-item focus of a Balanced Scorecard
6. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.
ITIL - IT Infrastructure Library
TCP/IP Internet Layer
Employees with excessive privileges
The Internet Layer in the TCP/IP model
7. (1.) Link (2.) Internet (3.) Transport (4.) Application
Security Awareness program
Lacks specific expertise or resources to conduct an internal audit
Volumes of COSO framework
TCP/IP Network Model
8. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
The 5 types of Evidence that the auditor will collect during an audit.
Testing activities
Main types of Controls
Concentrate on samples known to represent high risk
9. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Gantt Chart
less than 24 hours
Main types of Controls
Confidence coefficient
10. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP
Data Link Layer Standards
The 7 phases and their order in the SDLC
Attribute Sampling
IT standards are not being reviewed often enough
11. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
Project change request
Business Continuity
Split custody
The audit program
12. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
An IS audit
The best approach for identifying high risk areas for an audit
BCP Plans
Six steps of the Release Management process
13. Framework for auditing and measuring IT Service Management Processes.
Service Continuity Management
Transport Layer Protocols
ISO 20000 Standard:
Frameworks
14. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Substantive Testing
Inherent Risk
Employees with excessive privileges
Emergency Changes
15. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg
Transport Layer Protocols
The BCP process
Blade Computer Architecture
Volumes of COSO framework
16. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Audit Methodologies
Control Risk
Types of sampling an auditor can perform.
Organizational culture and maturity
17. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
Stratified Sampling
Change management
Expected Error Rate
Service Continuity Management
18. A maturity model that represents the aggregations of other maturity models.
WAN Protocols
An Administrative
Capability Maturity Model Integration (CMMI)
Geographic location
19. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
Resource details
Project change request
ITIL definition of CHANGE MANAGEMENT
Lacks specific expertise or resources to conduct an internal audit
20. A sampling technique where items are chosen based upon the auditor's judgment - usually based on risk or materiality.
Controls
The 7 phases and their order in the SDLC
Sampling
Judgmental sampling
21. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
Substantive Testing (test of transaction integrity)
The availability of IT systems
Control Risk
Application Layer protocols
22. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
Insourcing
Background checks performed
Examples of IT General Controls
TCP/IP Transport Layer
23. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
OSI: Data Link Layer
The Requirements
Insourcing
Criticality analysis
24. (1.) Objectives (2.) Components (3.) Business Units / Areas
Employees with excessive privileges
Dimensions of the COSO cube
A gate process
Business Continuity
25. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
The best approach for identifying high risk areas for an audit
The Release process
Sampling
Control Unit
26. To communication security policies - procedures - and other security-related information to an organization's employees.
Security Awareness program
Function Point Analysis
Risk Management
Statement of Impact
27. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
Disaster Recovery
Options for Risk Treatment
Notify the Audit Committee
OSI: Transport Layer
28. Guide program execution through organization of resources and development of clear project objectives.
Project Management Strategies
IT Services Financial Management
PERT Diagram?
Reduced sign-on
29. A sampling technique where at least one exception is sought in a population
TCP/IP Transport Layer
Control Risk
Elements of the COBIT Framework
Discovery Sampling
30. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
Documentation and interview personnel
ITIL definition of CHANGE MANAGEMENT
Variable Sampling
Project change request
31. The memory locations in the CPU where arithmetic values are stored.
Registers
Release management
Examples of IT General Controls
Precision means
32. (1.) Automatic (2.) Manual
The two Categories of Controls
Audit logging
Recovery time objective
The typical Configuration Items in Configuration Management
33. An audit that is performed in support of an anticipated or active legal proceeding.
A Forensic Audit
Substantive Testing (test of transaction integrity)
Options for Risk Treatment
Detection Risk
34. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
Business Realization
Gantt Chart
Assess the maturity of its business processes
Project change request
35. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
TCP/IP Transport Layer
Deming Cycle
TCP/IP Link Layer
Reduced sign-on
36. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog
Documentation and interview personnel
Buffers
Notify the Audit Committee
Discovery Sampling
37. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
Six steps of the Release Management process
Statistical Sampling
objective and unbiased
Recovery time objective
38. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
Service Level Management
Categories of risk treatment
Types of sampling an auditor can perform.
A Financial Audit
39. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
Critical Path Methodology
A Virtual Server
Judgmental sampling
Attribute Sampling
40. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
Types of sampling an auditor can perform.
Referential Integrity
Structural fires and transportation accidents
Database primary key
41. (1.) Physical (2.) Technical (4.) Administrative
Concentrate on samples known to represent high risk
Three Types of Controls
Examples of Application Controls
Formal waterfall
42. Concerned with electrical and physical specifications for devices. No frames or packets involved.
IT Service Management
A Cold Site
IT Services Financial Management
OSI: Physical Layer
43. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
Statement of Impact
The Eight Types of Audits
Dimensions of the COSO cube
The availability of IT systems
44. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
Stay current with technology
(1.) Man-made (2.) Natural
Control Unit
Expected Error Rate
45. Disasters are generally grouped in terms of type: ______________.
Change management
(1.) Man-made (2.) Natural
The Software Program Library
Deming Cycle
46. (1.) Feasibility (2.) Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation
IT Service Management
Capability Maturity Model Integration (CMMI)
Hash
The 7 phases and their order in the SDLC
47. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
Stay current with technology
Dimensions of the COSO cube
Business Continuity
Judgmental sampling
48. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
The 7 phases and their order in the SDLC
A gate process
SDLC Phases
Notify the Audit Committee
49. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
An Operational Audit
less than 24 hours
A Compliance audit
The Requirements
50. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
Control Unit
The Software Program Library
Dimensions of the COSO cube
PERT Diagram?