SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
TCP/IP Link Layer
Transport Layer Protocols
Lacks specific expertise or resources to conduct an internal audit
Referential Integrity
2. (1.) Objectives (2.) Components (3.) Business Units / Areas
Stay current with technology
Grid Computing
Critical Path Methodology
Dimensions of the COSO cube
3. The inventory of all in-scope business processes and systems
IT Strategy
The first step in a business impact analysis
Six steps of the Release Management process
OSI Layer 7: Application
4. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
Variable Sampling
PERT Diagram?
Business Realization
Substantive Testing (test of transaction integrity)
5. (1.) General (2.) Application
Main types of Controls
TCP/IP Transport Layer
List of systems examined
CPU
6. Used to determine which business processes are the most critical - by ranking them in order of criticality
A gate process
A Cold Site
Criticality analysis
Dimensions of the COSO cube
7. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg
The typical Configuration Items in Configuration Management
The BCP process
Control Unit
Current and most up-to-date
8. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
The Software Program Library
Entire password for an encryption key
Configuration Management
Annualized Loss Expectance (ALE)
9. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
To identify the tasks that are responsible for project delays
Examples of IT General Controls
The typical Configuration Items in Configuration Management
Substantive Testing (test of transaction integrity)
10. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
A Cold Site
Current and most up-to-date
Confidence coefficient
Input validation checking
11. The main hardware component of a computer system - which executes instructions in computer programs.
Separate administrative accounts
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
ITIL definition of PROBLEM
CPU
12. A condition often identified as a result of multiple incidents that exhibit common symptoms. Problems can also be identified from a single significant incident for which the impact is significant.
WAN Protocols
General Controls
ITIL definition of PROBLEM
Confidence coefficient
13. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
OSI: Data Link Layer
The best approach for identifying high risk areas for an audit
The BCP process
TCP/IP Link Layer
14. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Sample Standard Deviation
Notify the Audit Committee
Hash
An Administrative
15. Contains programs that communicate directly with the end user.
Emergency Changes
Main types of Controls
OSI Layer 7: Application
Information systems access
16. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
Information systems access
Gantt Chart
More difficult to perform
Network Layer Protocols
17. PERT: shows the ______________ critical path.
Deming Cycle
Server cluster
Precision means
Current and most up-to-date
18. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
Elements of the COBIT Framework
The appropriate role of an IS auditor in a control self-assessment
Personnel involved in the requirements phase of a software development project
Judgmental sampling
19. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
Network Layer Protocols
Dimensions of the COSO cube
Elements of the COSO pyramid
Referential Integrity
20. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
Network Layer Protocols
A Virtual Server
Function Point Analysis
A Sample Mean
21. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
IT Strategy
A Sample Mean
The typical Configuration Items in Configuration Management
Assess the maturity of its business processes
22. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
Testing activities
Categories of risk treatment
Grid Computing
Stay current with technology
23. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
Substantive Testing
Prblem Management
Sampling Risk
To identify the tasks that are responsible for project delays
24. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
BCP Plans
Overall audit risk
Foreign Key
The Software Program Library
25. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
Grid Computing
Statement of Impact
IT standards are not being reviewed often enough
OSI: Data Link Layer
26. During an audit - the auditor should obtain 6 types of documents - (1.) Org charts (2.) ___________ (3.) third-party contracts (4.) policies and procedures (5.) standards (6.) system documentation
Network Layer Protocols
Department Charters
Server cluster
A Server Cluster
27. Handle application processing
Volumes of COSO framework
Transport Layer Protocols
Primary security features of relational databases
Application Controls
28. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
The two Categories of Controls
Employee termination process
More difficult to perform
The best approach for identifying high risk areas for an audit
29. The highest number of errors that can exist without a result being materially misstated.
Balanced Scorecard
Service Continuity Management
BCP Plans
Tolerable Error Rate
30. Collections of Controls that work together to achieve an entire range of an organization's objectives.
Structural fires and transportation accidents
Frameworks
OSI: Network Layer
Buffers
31. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
Notify the Audit Committee
A Financial Audit
Statistical Sampling
BCP Plans
32. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Audit logging
Attribute Sampling
Server cluster
Project Management Strategies
33. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
Criticality analysis
Risk Management
CPU
(1.) Polices (2.) Procedures (3.) Standards
34. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Current and most up-to-date
Foreign Key
The typical Configuration Items in Configuration Management
Emergency Changes
35. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Stratified Sampling
Information systems access
Inform the auditee
Assess the maturity of its business processes
36. Used to estimate the effort required to develop a software program.
Function Point Analysis
Gantt Chart
Annualized Loss Expectance (ALE)
The typical Configuration Items in Configuration Management
37. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
objective and unbiased
Volumes of COSO framework
List of systems examined
Business impact analysis
38. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
(1.) Man-made (2.) Natural
OSI: Network Layer
The Software Program Library
Grid Computing
39. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
Server cluster
Foreign Key
Service Continuity Management
Application Layer protocols
40. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
Application Layer protocols
Recovery time objective
Incident Management
Power system controls
41. Any event which is not part of the standard operation of service and which causes or may cause an interruption to or reduction in quality of that service. Includes THREE incident types: (1.) Service Outage (2.) Service Slowdown (3.) Software Bug
The Internet Layer in the TCP/IP model
Incident Management
More difficult to perform
TCP/IP Internet Layer
42. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
Categories of risk treatment
Buffers
Annualized Loss Expectance (ALE)
The 7 phases and their order in the SDLC
43. IT Governance is most concerned with ________.
The audit program
Sampling Risk
Project change request
IT Strategy
44. An audit that combines an operational audit and a financial audit.
Separate administrative accounts
less than 24 hours
An Integrated Audit
ITIL definition of PROBLEM
45. Support the functioning of the application controls
General Controls
CPU
PERT Diagram?
OSI: Network Layer
46. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
A Financial Audit
Substantive Testing
Capability Maturity Model Integration (CMMI)
The Software Program Library
47. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient
The best approach for identifying high risk areas for an audit
Audit logging
Sampling Risk
Configuration Management
48. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
The Eight Types of Audits
Information security policy
Confidence coefficient
Hash
49. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
Testing activities
Split custody
A gate process
Wet pipe fire sprinkler system
50. Delivery of packets from one station to another - on the same network or on different networks.
The Internet Layer in the TCP/IP model
Elements of the COSO pyramid
TCP/IP Link Layer
ISO 20000 Standard: