SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An audit that is performed in support of an anticipated or active legal proceeding.
A Forensic Audit
A Cold Site
Prblem Management
Balanced Scorecard
2. Used to determine which business processes are the most critical - by ranking them in order of criticality
The Release process
Criticality analysis
Main types of Controls
The 4-item focus of a Balanced Scorecard
3. (1.) Physical (2.) Technical (4.) Administrative
Detection Risk
The Requirements
Prblem Management
Three Types of Controls
4. Gantt: used to display ______________.
Change management
Resource details
OSI: Transport Layer
OSI Layer 7: Application
5. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
A Compliance audit
Three Types of Controls
Control Risk
Discovery Sampling
6. The first major task in a disaster recovery or business continuity planning project.
Business impact analysis
Concentrate on samples known to represent high risk
Elements of the COBIT Framework
WAN Protocols
7. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Assess the maturity of its business processes
OSI: Data Link Layer
Three Types of Controls
Sampling
8. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
TCP/IP Transport Layer packet delivery
Dimensions of the COSO cube
Rating Scale for Process Maturity
Categories of risk treatment
9. A maturity model that represents the aggregations of other maturity models.
Capability Maturity Model Integration (CMMI)
Foreign Key
Precision means
The typical Configuration Items in Configuration Management
10. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
IT Service Management
Audit Methodologies
Input validation checking
Sampling Risk
11. What type of testing is performed to determine if control procedures have proper design and are operating properly?
The Release process
Compliance Testing
Incident Management
Testing activities
12. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Blade Computer Architecture
Lacks specific expertise or resources to conduct an internal audit
Critical Path Methodology
OSI: Data Link Layer
13. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
Variable Sampling
Data Link Layer Standards
Referential Integrity
The availability of IT systems
14. The maximum period of downtime for a process or application
OSI Layer 7: Application
An Administrative
Recovery time objective
The Steering Committee
15. (1.) Feasibility (2.) Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation
(1.) Polices (2.) Procedures (3.) Standards
The 7 phases and their order in the SDLC
Critical Path Methodology
BCP Plans
16. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
More difficult to perform
An IS audit
Vulnerability in the organization's PBX
Referential Integrity
17. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
Control Unit
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Database primary key
Service Level Management
18. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
Testing activities
Business Realization
The 4-item focus of a Balanced Scorecard
Grid Computing
19. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP
The 5 types of Evidence that the auditor will collect during an audit.
Data Link Layer Standards
ITIL - IT Infrastructure Library
Power system controls
20. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Hash
Audit logging
The Internet Layer in the TCP/IP model
TCP/IP Link Layer
21. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Background checks performed
Audit Methodologies
Expected Error Rate
An Operational Audit
22. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
SDLC Phases
Stop-or-go Sampling
Geographic location
(1.) Polices (2.) Procedures (3.) Standards
23. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
TCP/IP Internet Layer
Cloud computing
Expected Error Rate
Antivirus software on the email servers
24. The highest number of errors that can exist without a result being materially misstated.
Tolerable Error Rate
Overall audit risk
General Controls
Resource details
25. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
Annualized Loss Expectance (ALE)
less than 24 hours
Grid Computing
Power system controls
26. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
Advantages of outsourcing
OSI: Network Layer
Gantt Chart
List of systems examined
27. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
A Server Cluster
Elements of the COBIT Framework
Primary security features of relational databases
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
28. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Stratified Sampling
Business impact analysis
Control Risk
Tolerable Error Rate
29. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
Frameworks
Examples of IT General Controls
Prblem Management
List of systems examined
30. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
SDLC Phases
ISO 20000 Standard:
Risk Management
Grid Computing
31. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
TCP/IP Network Model
Main types of Controls
Registers
Stratified Sampling
32. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
IT executives and the Board of Directors
Organizational culture and maturity
Criticality analysis
Buffers
33. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
Network Layer Protocols
Vulnerability in the organization's PBX
Rating Scale for Process Maturity
CPU
34. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
Reduced sign-on
OSI Layer 7: Application
Wet pipe fire sprinkler system
Stop-or-go Sampling
35. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
Volumes of COSO framework
Sampling Risk
Formal waterfall
Release management
36. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
Information security policy
The Business Process Life Cycle
Stop-or-go Sampling
Database primary key
37. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
The BCP process
Capability Maturity Model
Business impact analysis
A Financial Audit
38. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
TCP/IP Transport Layer
Separate administrative accounts
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
A Financial Audit
39. Lowest layer. Delivers messages (frames) from one station to another vial local network.
objective and unbiased
List of systems examined
TCP/IP Link Layer
CPU
40. The sum of all samples divided by the number of samples.
Database primary key
TCP/IP Transport Layer packet delivery
A Sample Mean
Annualized Loss Expectance (ALE)
41. Delivery of packets from one station to another - on the same network or on different networks.
Business impact analysis
The best approach for identifying high risk areas for an audit
Gantt Chart
The Internet Layer in the TCP/IP model
42. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
The best approach for identifying high risk areas for an audit
Referential Integrity
A Sample Mean
Substantive Testing (test of transaction integrity)
43. A critical application is backed up once per day. The recovery point objective (RPO) for an application that is backed up once per day cannot be ________.
TCP/IP Transport Layer packet delivery
The two Categories of Controls
less than 24 hours
Segregation of duties issue in a high value process
44. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
Advantages of outsourcing
A Sample Mean
Concentrate on samples known to represent high risk
Documentation and interview personnel
45. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
To identify the tasks that are responsible for project delays
Elements of the COSO pyramid
Deming Cycle
Options for Risk Treatment
46. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
Documentation and interview personnel
Server cluster
Testing activities
The best approach for identifying high risk areas for an audit
47. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
Configuration Management
More difficult to perform
Personnel involved in the requirements phase of a software development project
Statistical Sampling
48. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Confidence coefficient
The Software Program Library
Categories of risk treatment
Release management
49. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
Capability Maturity Model Integration (CMMI)
Application Layer protocols
Separate administrative accounts
CPU
50. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Critical Path Methodology
Personnel involved in the requirements phase of a software development project
A Service Provider audit
Cloud computing
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests