SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Framework for auditing and measuring IT Service Management Processes.
A Cold Site
ISO 20000 Standard:
Statement of Impact
WAN Protocols
2. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
The Requirements
Personnel involved in the requirements phase of a software development project
The Software Program Library
Release management
3. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
The Internet Layer in the TCP/IP model
Rating Scale for Process Maturity
Prblem Management
Network Layer Protocols
4. Describes the effect on the business if a process is incapacitated for any appreciable time
Statement of Impact
BCP Plans
Cloud computing
TCP/IP Link Layer
5. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
Employee termination process
Statement of Impact
Insourcing
PERT Diagram?
6. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
Information security policy
The typical Configuration Items in Configuration Management
Attribute Sampling
SDLC Phases
7. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
Change management
Tolerable Error Rate
BCP Plans
OSI: Transport Layer
8. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
(1.) Man-made (2.) Natural
Rating Scale for Process Maturity
A Problem
Categories of risk treatment
9. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
Confidence coefficient
A Cold Site
Stay current with technology
An Administrative
10. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
Power system controls
OSI: Data Link Layer
ITIL definition of CHANGE MANAGEMENT
Stratified Sampling
11. The maximum period of downtime for a process or application
Examples of Application Controls
OSI Layer 5: Session
Recovery time objective
Control Risk
12. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
Application Layer protocols
OSI Layer 5: Session
Project change request
Expected Error Rate
13. Handle application processing
Function Point Analysis
Application Controls
(1.) Polices (2.) Procedures (3.) Standards
Stratified Sampling
14. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
The 4-item focus of a Balanced Scorecard
Substantive Testing
Referential Integrity
An Operational Audit
15. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Application Controls
An Integrated Audit
Hash
Release management
16. To communication security policies - procedures - and other security-related information to an organization's employees.
Project change request
Sampling
TCP/IP Transport Layer packet delivery
Security Awareness program
17. Concerned with electrical and physical specifications for devices. No frames or packets involved.
Assess the maturity of its business processes
OSI: Physical Layer
Server cluster
A Virtual Server
18. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
Critical Path Methodology
A Server Cluster
Compliance Testing
The Requirements
19. IT Service Management is defined in ___________________ framework.
ITIL - IT Infrastructure Library
The Requirements
TCP/IP Transport Layer packet delivery
Structural fires and transportation accidents
20. Defines internal controls and provides guidance for assessing and improving internal control systems.
Database primary key
Recovery time objective
BCP Plans
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
21. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
Substantive Testing
Incident Management
ITIL definition of CHANGE MANAGEMENT
More difficult to perform
22. The party that performs strategic planning - addresses near-term and long-term requirements aligning business objectives - and technology strategies.
Prblem Management
Sampling
IT Service Management
The Steering Committee
23. The main hardware component of a computer system - which executes instructions in computer programs.
The availability of IT systems
Dimensions of the COSO cube
Lacks specific expertise or resources to conduct an internal audit
CPU
24. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
The Business Process Life Cycle
The 5 types of Evidence that the auditor will collect during an audit.
Detection Risk
Power system controls
25. Guide program execution through organization of resources and development of clear project objectives.
Geographic location
General Controls
The appropriate role of an IS auditor in a control self-assessment
Project Management Strategies
26. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
Examples of IT General Controls
The Eight Types of Audits
Split custody
Foreign Key
27. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Employee termination process
Emergency Changes
Personnel involved in the requirements phase of a software development project
Transport Layer Protocols
28. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
less than 24 hours
(1.) Polices (2.) Procedures (3.) Standards
A Compliance audit
The Internet Layer in the TCP/IP model
29. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Risk Management
Notify the Audit Committee
IT Service Management
30. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
A Server Cluster
Main types of Controls
Sampling
Documentation and interview personnel
31. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
Organizational culture and maturity
Elements of the COBIT Framework
A Problem
Application Controls
32. The inventory of all in-scope business processes and systems
The first step in a business impact analysis
Business Continuity
ITIL definition of PROBLEM
The best approach for identifying high risk areas for an audit
33. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
Notify the Audit Committee
Structural fires and transportation accidents
Precision means
Examples of IT General Controls
34. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
The Release process
Release management
Control Risk
Sampling Risk
35. (1.) Physical (2.) Technical (4.) Administrative
Department Charters
The 7 phases and their order in the SDLC
Three Types of Controls
Statement of Impact
36. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
OSI Layer 5: Session
Stop-or-go Sampling
Current and most up-to-date
Lacks specific expertise or resources to conduct an internal audit
37. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
WAN Protocols
TCP/IP Internet Layer
The Business Process Life Cycle
Split custody
38. An external IS auditor has discovered a _______________________ - The external auditor can only document the finding in the audit report. An external auditor is not in a position to implement controls.
CPU
A Forensic Audit
Segregation of duties issue in a high value process
Sample Standard Deviation
39. Used to estimate the effort required to develop a software program.
Function Point Analysis
Emergency Changes
The Business Process Life Cycle
Business impact analysis
40. The risk that an IS auditor will overlook errors or exceptions during an audit.
TCP/IP Transport Layer packet delivery
Project change request
Prblem Management
Detection Risk
41. 1.) Executive Support (2.) Well-defined roles and responsibilities.
A Sample Mean
Confidence coefficient
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Information security policy
42. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
Expected Error Rate
The Eight Types of Audits
Variable Sampling
A gate process
43. A maturity model that represents the aggregations of other maturity models.
Capability Maturity Model Integration (CMMI)
Capability Maturity Model
An IS audit
Audit logging
44. A condition often identified as a result of multiple incidents that exhibit common symptoms. Problems can also be identified from a single significant incident for which the impact is significant.
ITIL definition of PROBLEM
TCP/IP Transport Layer
Criticality analysis
WAN Protocols
45. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
Compliance Testing
Cloud computing
Dimensions of the COSO cube
Blade Computer Architecture
46. The first major task in a disaster recovery or business continuity planning project.
The Eight Types of Audits
Substantive Testing
Variable Sampling
Business impact analysis
47. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
A Forensic Audit
Capability Maturity Model Integration (CMMI)
Control Risk
Overall audit risk
48. Collections of Controls that work together to achieve an entire range of an organization's objectives.
The Steering Committee
Frameworks
TCP/IP Transport Layer
Overall audit risk
49. An audit of a third-party organization that provides services to other organizations.
OSI Layer 6: Presentation
Network Layer Protocols
The appropriate role of an IS auditor in a control self-assessment
A Service Provider audit
50. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
Formal waterfall
Wet pipe fire sprinkler system
OSI Layer 6: Presentation
A Financial Audit