SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
Prblem Management
Substantive Testing (test of transaction integrity)
Disaster Recovery
Service Continuity Management
2. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
Risk Management
CPU
OSI: Data Link Layer
The 7 phases and their order in the SDLC
3. Disasters are generally grouped in terms of type: ______________.
Statistical Sampling
Employee termination process
Gantt Chart
(1.) Man-made (2.) Natural
4. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
Function Point Analysis
OSI: Data Link Layer
IT executives and the Board of Directors
Stratified Sampling
5. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
Confidence coefficient
Project change request
Service Continuity Management
PERT Diagram?
6. Gantt: used to display ______________.
More difficult to perform
Resource details
Input validation checking
Geographic location
7. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Three Types of Controls
Lacks specific expertise or resources to conduct an internal audit
Statistical Sampling
Substantive Testing (test of transaction integrity)
8. An external IS auditor has discovered a _______________________ - The external auditor can only document the finding in the audit report. An external auditor is not in a position to implement controls.
Segregation of duties issue in a high value process
Data Link Layer Standards
Sampling Risk
Criticality analysis
9. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Sampling Risk
Types of sampling an auditor can perform.
Overall audit risk
Volumes of COSO framework
10. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
IT executives and the Board of Directors
Gantt Chart
Frameworks
Vulnerability in the organization's PBX
11. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
ITIL definition of CHANGE MANAGEMENT
Examples of Application Controls
less than 24 hours
More difficult to perform
12. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Volumes of COSO framework
An Integrated Audit
To identify the tasks that are responsible for project delays
The Release process
13. Defines internal controls and provides guidance for assessing and improving internal control systems.
A Compliance audit
SDLC Phases
Concentrate on samples known to represent high risk
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
14. The first major task in a disaster recovery or business continuity planning project.
Business Continuity
Business impact analysis
Resource details
ITIL definition of CHANGE MANAGEMENT
15. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
Segregation of duties issue in a high value process
Vulnerability in the organization's PBX
Application Layer protocols
OSI Layer 6: Presentation
16. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
Frameworks
Capability Maturity Model Integration (CMMI)
Business Realization
ITIL - IT Infrastructure Library
17. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.
Testing activities
An IS audit
Expected Error Rate
Service Level Management
18. Describes the effect on the business if a process is incapacitated for any appreciable time
A Service Provider audit
Statement of Impact
Stay current with technology
Tolerable Error Rate
19. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
Controls
Blade Computer Architecture
Input validation checking
Capability Maturity Model Integration (CMMI)
20. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
Entire password for an encryption key
Variable Sampling
TCP/IP Network Model
Wet pipe fire sprinkler system
21. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
An Administrative
A Compliance audit
Foreign Key
The Requirements
22. PERT: shows the ______________ critical path.
Current and most up-to-date
The typical Configuration Items in Configuration Management
Input validation checking
Application Layer protocols
23. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
Network Layer Protocols
Statement of Impact
A Service Provider audit
Control Risk
24. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
Project Management Strategies
Employee termination process
(1.) Polices (2.) Procedures (3.) Standards
Sampling Risk
25. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Sample Standard Deviation
Statistical Sampling
Business Continuity
Server cluster
26. Used to measure the relative maturity of an organization and its processes.
A Server Cluster
OSI: Transport Layer
Capability Maturity Model
ITIL definition of PROBLEM
27. One of a database table's fields - whose value is unique.
Rating Scale for Process Maturity
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Database primary key
Information security policy
28. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
Referential Integrity
Elements of the COSO pyramid
List of systems examined
Rating Scale for Process Maturity
29. IT Service Management is defined in ___________________ framework.
Frameworks
Segregation of duties issue in a high value process
ITIL - IT Infrastructure Library
Deming Cycle
30. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
The audit program
(1.) Polices (2.) Procedures (3.) Standards
The Business Process Life Cycle
The typical Configuration Items in Configuration Management
31. Used to determine which business processes are the most critical - by ranking them in order of criticality
Split custody
Business Realization
Criticality analysis
Geographic location
32. (1.) Physical (2.) Technical (4.) Administrative
Department Charters
Sampling
Three Types of Controls
Audit Methodologies
33. Support the functioning of the application controls
Six steps of the Release Management process
A Virtual Server
General Controls
Disaster Recovery
34. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
OSI: Data Link Layer
SDLC Phases
Business Realization
Current and most up-to-date
35. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
The Business Process Life Cycle
TCP/IP Transport Layer packet delivery
Transport Layer Protocols
IT Service Management
36. (1.) General (2.) Application
Main types of Controls
Service Level Management
SDLC Phases
Geographic location
37. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Information security policy
Substantive Testing (test of transaction integrity)
Power system controls
TCP/IP Transport Layer packet delivery
38. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
TCP/IP Transport Layer
A Problem
Tolerable Error Rate
Buffers
39. An auditor has discovered several errors in user account management: many terminated employees' computer accounts are still active. The best course of action - To improve the _________________ to reduce the number of exceptions. For a time - the proc
TCP/IP Link Layer
Employee termination process
Formal waterfall
Volumes of COSO framework
40. Framework for auditing and measuring IT Service Management Processes.
The Eight Types of Audits
OSI: Physical Layer
ISO 20000 Standard:
ITIL definition of PROBLEM
41. The main hardware component of a computer system - which executes instructions in computer programs.
CPU
A Problem
The two Categories of Controls
Vulnerability in the organization's PBX
42. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
IT Strategy
Deming Cycle
Function Point Analysis
Business Continuity
43. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
Six steps of the Release Management process
Variable Sampling
Employees with excessive privileges
Overall audit risk
44. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
Recovery time objective
Concentrate on samples known to represent high risk
A Sample Mean
SDLC Phases
45. Handle application processing
Segregation of duties issue in a high value process
Compliance Testing
Network Layer Protocols
Application Controls
46. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
Sampling Risk
Foreign Key
Background checks performed
The Release process
47. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
A gate process
Formal waterfall
ISO 20000 Standard:
Input validation checking
48. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
TCP/IP Link Layer
Split custody
Examples of Application Controls
Rating Scale for Process Maturity
49. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
Referential Integrity
The Software Program Library
The best approach for identifying high risk areas for an audit
SDLC Phases
50. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
Wet pipe fire sprinkler system
List of systems examined
Overall audit risk
Hash