SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
A Server Cluster
Grid Computing
Stratified Sampling
Substantive Testing
2. A sampling technique where items are chosen based upon the auditor's judgment - usually based on risk or materiality.
Recovery time objective
Control Unit
OSI: Network Layer
Judgmental sampling
3. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
The availability of IT systems
Gantt Chart
Variable Sampling
Wet pipe fire sprinkler system
4. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
Application Controls
Elements of the COSO pyramid
Deming Cycle
Dimensions of the COSO cube
5. Framework for auditing and measuring IT Service Management Processes.
Concentrate on samples known to represent high risk
ISO 20000 Standard:
OSI Layer 5: Session
Geographic location
6. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
The Release process
Frameworks
Cloud computing
Judgmental sampling
7. (1.) Physical (2.) Technical (4.) Administrative
The BCP process
Three Types of Controls
Application Controls
Server cluster
8. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
Hash
TCP/IP Transport Layer
Grid Computing
Cloud computing
9. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
A Service Provider audit
Hash
The Eight Types of Audits
Statistical Sampling
10. A sampling technique where at least one exception is sought in a population
OSI Layer 6: Presentation
Discovery Sampling
Notify the Audit Committee
Deming Cycle
11. Gantt: used to display ______________.
Gantt Chart
Resource details
Reduced sign-on
Split custody
12. IT Service Management is defined in ___________________ framework.
Documentation and interview personnel
General Controls
Antivirus software on the email servers
ITIL - IT Infrastructure Library
13. IT Governance is most concerned with ________.
Stay current with technology
Elements of the COBIT Framework
Service Level Management
IT Strategy
14. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
Hash
Service Continuity Management
The appropriate role of an IS auditor in a control self-assessment
The BCP process
15. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
A Compliance audit
The audit program
Attribute Sampling
Overall audit risk
16. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
An Operational Audit
Confidence coefficient
Incident Management
Tolerable Error Rate
17. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
Separate administrative accounts
Employees with excessive privileges
Documentation and interview personnel
Stratified Sampling
18. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
Examples of Application Controls
Employees with excessive privileges
Elements of the COSO pyramid
Separate administrative accounts
19. Subjective sampling is used when the auditor wants to _________________________.
Rating Scale for Process Maturity
Personnel involved in the requirements phase of a software development project
Concentrate on samples known to represent high risk
Formal waterfall
20. During an audit - the auditor should obtain 6 types of documents - (1.) Org charts (2.) ___________ (3.) third-party contracts (4.) policies and procedures (5.) standards (6.) system documentation
Elements of the COSO pyramid
Compliance Testing
To identify the tasks that are responsible for project delays
Department Charters
21. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
Control Unit
Grid Computing
A Financial Audit
Prblem Management
22. Defines internal controls and provides guidance for assessing and improving internal control systems.
Audit Methodologies
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
(1.) Polices (2.) Procedures (3.) Standards
Recovery time objective
23. Collections of Controls that work together to achieve an entire range of an organization's objectives.
Audit logging
Expected Error Rate
Frameworks
Concentrate on samples known to represent high risk
24. The party that performs strategic planning - addresses near-term and long-term requirements aligning business objectives - and technology strategies.
The Steering Committee
Database primary key
Statement of Impact
Incident Management
25. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
The 4-item focus of a Balanced Scorecard
Main types of Controls
Dimensions of the COSO cube
Hash
26. The sum of all samples divided by the number of samples.
CPU
Balanced Scorecard
A Sample Mean
The 4-item focus of a Balanced Scorecard
27. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Audit logging
The audit program
Variable Sampling
Business Realization
28. The delivery of messages from one station to another via one or more networks.. Routes packets between networks.
OSI: Network Layer
To identify the tasks that are responsible for project delays
Primary security features of relational databases
Vulnerability in the organization's PBX
29. ____________________ of the hot site is most important consideration for site selection. IF they are too close together then a single event may involve both locations
Structural fires and transportation accidents
objective and unbiased
Expected Error Rate
Geographic location
30. Disasters are generally grouped in terms of type: ______________.
Separate administrative accounts
Background checks performed
(1.) Man-made (2.) Natural
General Controls
31. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
Testing activities
Server cluster
Compliance Testing
TCP/IP Network Model
32. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
Annualized Loss Expectance (ALE)
The Steering Committee
Power system controls
An IS audit
33. The portion of IT management that tracks the financial value of IT services that support organizational objectives. It includes 4 activities: (1.) Budgeting (2.) Capital Investment (3.) Expense Management (4.) Project accounting and project ROI (Ret
The 4-item focus of a Balanced Scorecard
IT Services Financial Management
TCP/IP Link Layer
less than 24 hours
34. The first major task in a disaster recovery or business continuity planning project.
Main types of Controls
The 7 phases and their order in the SDLC
The Requirements
Business impact analysis
35. An audit of a third-party organization that provides services to other organizations.
TCP/IP Link Layer
A Service Provider audit
OSI Layer 7: Application
The 4-item focus of a Balanced Scorecard
36. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
Business Continuity
Database primary key
(1.) Polices (2.) Procedures (3.) Standards
TCP/IP Internet Layer
37. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
The Steering Committee
Expected Error Rate
Statistical Sampling
BCP Plans
38. An auditor has discovered several errors in user account management: many terminated employees' computer accounts are still active. The best course of action - To improve the _________________ to reduce the number of exceptions. For a time - the proc
Change management
Detection Risk
WAN Protocols
Employee termination process
39. Used to determine which business processes are the most critical - by ranking them in order of criticality
Antivirus software on the email servers
Primary security features of relational databases
Release management
Criticality analysis
40. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
(1.) Man-made (2.) Natural
Six steps of the Release Management process
A Service Provider audit
Insourcing
41. (1.) Link (2.) Internet (3.) Transport (4.) Application
The availability of IT systems
Annualized Loss Expectance (ALE)
TCP/IP Network Model
The best approach for identifying high risk areas for an audit
42. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
More difficult to perform
Criticality analysis
An Integrated Audit
Function Point Analysis
43. The memory locations in the CPU where arithmetic values are stored.
An Operational Audit
Configuration Management
Volumes of COSO framework
Registers
44. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
The Software Program Library
IT executives and the Board of Directors
A Cold Site
WAN Protocols
45. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Entire password for an encryption key
Deming Cycle
The 5 types of Evidence that the auditor will collect during an audit.
OSI Layer 7: Application
46. One of a database table's fields - whose value is unique.
IT Services Financial Management
Database primary key
Types of sampling an auditor can perform.
Detection Risk
47. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient
Sampling Risk
Judgmental sampling
CPU
Personnel involved in the requirements phase of a software development project
48. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
Detection Risk
Deming Cycle
Statistical Sampling
Business Continuity
49. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
Substantive Testing (test of transaction integrity)
Business impact analysis
Referential Integrity
An Integrated Audit
50. Consists of two main packet transport protocols: TCP and UDP.
Risk Management
TCP/IP Transport Layer
The Release process
Control Risk