SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
Frameworks
Deming Cycle
Rating Scale for Process Maturity
Annualized Loss Expectance (ALE)
2. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
Main types of Controls
OSI Layer 7: Application
Business Realization
The Requirements
3. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
Categories of risk treatment
Advantages of outsourcing
The Eight Types of Audits
Current and most up-to-date
4. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
The 7 phases and their order in the SDLC
Separate administrative accounts
The typical Configuration Items in Configuration Management
Audit Methodologies
5. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
Change management
Annualized Loss Expectance (ALE)
Categories of risk treatment
Foreign Key
6. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
Application Controls
Elements of the COSO pyramid
Registers
Risk Management
7. Used to translate or transform data from lower layers into formats that the application layer can work with.
ITIL definition of CHANGE MANAGEMENT
OSI Layer 6: Presentation
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Volumes of COSO framework
8. (1.) General (2.) Application
A Virtual Server
Main types of Controls
Cloud computing
CPU
9. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Hash
Background checks performed
WAN Protocols
Statistical Sampling
10. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
TCP/IP Transport Layer packet delivery
Six steps of the Release Management process
Current and most up-to-date
PERT Diagram?
11. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
Six steps of the Release Management process
(1.) Man-made (2.) Natural
objective and unbiased
ITIL definition of CHANGE MANAGEMENT
12. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
Structural fires and transportation accidents
Personnel involved in the requirements phase of a software development project
Formal waterfall
Control Risk
13. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
Annualized Loss Expectance (ALE)
An Administrative
An Integrated Audit
An IS audit
14. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
Types of sampling an auditor can perform.
Insourcing
Resource details
Rating Scale for Process Maturity
15. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
The availability of IT systems
Detection Risk
OSI Layer 5: Session
The first step in a business impact analysis
16. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
Documentation and interview personnel
Business Realization
Assess the maturity of its business processes
Stop-or-go Sampling
17. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
WAN Protocols
OSI Layer 6: Presentation
The audit program
Cloud computing
18. The memory locations in the CPU where arithmetic values are stored.
Information security policy
Registers
Vulnerability in the organization's PBX
The Eight Types of Audits
19. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
To identify the tasks that are responsible for project delays
Resource details
Deming Cycle
Hash
20. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
TCP/IP Link Layer
Notify the Audit Committee
Prblem Management
Service Level Management
21. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
CPU
An Integrated Audit
Entire password for an encryption key
Balanced Scorecard
22. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
OSI Layer 7: Application
Formal waterfall
Substantive Testing (test of transaction integrity)
Audit logging
23. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
Deming Cycle
Stop-or-go Sampling
Audit logging
Critical Path Methodology
24. (1.) Feasibility (2.) Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation
less than 24 hours
The 7 phases and their order in the SDLC
(1.) Polices (2.) Procedures (3.) Standards
Application Controls
25. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
ITIL definition of CHANGE MANAGEMENT
The availability of IT systems
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Volumes of COSO framework
26. Framework for auditing and measuring IT Service Management Processes.
Gantt Chart
IT executives and the Board of Directors
A Virtual Server
ISO 20000 Standard:
27. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
A Forensic Audit
An Integrated Audit
OSI: Data Link Layer
Volumes of COSO framework
28. (1.) TCP (2.) UDP
The Steering Committee
Personnel involved in the requirements phase of a software development project
Database primary key
Transport Layer Protocols
29. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
Examples of IT General Controls
Insourcing
Attribute Sampling
The Software Program Library
30. A collection of two or more servers that is designed to appear as a single server.
Server cluster
The Release process
OSI: Data Link Layer
Tolerable Error Rate
31. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
The audit program
Data Link Layer Standards
Primary security features of relational databases
The two Categories of Controls
32. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Emergency Changes
TCP/IP Transport Layer packet delivery
ISO 20000 Standard:
Notify the Audit Committee
33. One of a database table's fields - whose value is unique.
Database primary key
Incident Management
Service Continuity Management
OSI: Data Link Layer
34. A maturity model that represents the aggregations of other maturity models.
The 7 phases and their order in the SDLC
Capability Maturity Model Integration (CMMI)
Server cluster
A Sample Mean
35. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
The Software Program Library
Power system controls
Entire password for an encryption key
Insourcing
36. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
PERT Diagram?
The Business Process Life Cycle
Split custody
Dimensions of the COSO cube
37. An external IS auditor has discovered a _______________________ - The external auditor can only document the finding in the audit report. An external auditor is not in a position to implement controls.
Separate administrative accounts
The two Categories of Controls
Formal waterfall
Segregation of duties issue in a high value process
38. Used to estimate the effort required to develop a software program.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Configuration Management
A Service Provider audit
Function Point Analysis
39. Guide program execution through organization of resources and development of clear project objectives.
The two Categories of Controls
ISO 20000 Standard:
Project Management Strategies
Organizational culture and maturity
40. Gantt: used to display ______________.
List of systems examined
Stratified Sampling
Resource details
A Problem
41. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
less than 24 hours
Detection Risk
SDLC Phases
Compliance Testing
42. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
IT Strategy
An Integrated Audit
Substantive Testing
Six steps of the Release Management process
43. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
An Administrative
Audit logging
List of systems examined
Employees with excessive privileges
44. A critical application is backed up once per day. The recovery point objective (RPO) for an application that is backed up once per day cannot be ________.
Wet pipe fire sprinkler system
A Forensic Audit
Service Continuity Management
less than 24 hours
45. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
List of systems examined
Variable Sampling
Substantive Testing (test of transaction integrity)
Control Unit
46. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
Variable Sampling
A Service Provider audit
Department Charters
Overall audit risk
47. Disasters are generally grouped in terms of type: ______________.
Employee termination process
The audit program
Options for Risk Treatment
(1.) Man-made (2.) Natural
48. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
More difficult to perform
Antivirus software on the email servers
A Virtual Server
Server cluster
49. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
Inherent Risk
(1.) Polices (2.) Procedures (3.) Standards
Annualized Loss Expectance (ALE)
Statement of Impact
50. An audit that combines an operational audit and a financial audit.
An Integrated Audit
A Sample Mean
Hash
To identify the tasks that are responsible for project delays