SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
A Financial Audit
OSI: Network Layer
Application Layer protocols
Reduced sign-on
2. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
PERT Diagram?
Gantt Chart
IT Strategy
ITIL definition of CHANGE MANAGEMENT
3. To measure organizational performance and effectiveness against strategic goals.
Balanced Scorecard
Confidence coefficient
Deming Cycle
Capability Maturity Model
4. An audit that is performed in support of an anticipated or active legal proceeding.
The 7 phases and their order in the SDLC
Project Management Strategies
A Forensic Audit
Criticality analysis
5. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
Substantive Testing
Examples of IT General Controls
Split custody
ISO 20000 Standard:
6. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Documentation and interview personnel
Prblem Management
Advantages of outsourcing
Cloud computing
7. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
OSI: Data Link Layer
Confidence coefficient
A Cold Site
Stay current with technology
8. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
The best approach for identifying high risk areas for an audit
(1.) Polices (2.) Procedures (3.) Standards
The Eight Types of Audits
A Virtual Server
9. An audit that combines an operational audit and a financial audit.
An Integrated Audit
Substantive Testing (test of transaction integrity)
Release management
Recovery time objective
10. A condition often identified as a result of multiple incidents that exhibit common symptoms. Problems can also be identified from a single significant incident for which the impact is significant.
Reduced sign-on
Substantive Testing
ITIL definition of PROBLEM
The best approach for identifying high risk areas for an audit
11. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
Variable Sampling
Formal waterfall
ITIL definition of CHANGE MANAGEMENT
(1.) Polices (2.) Procedures (3.) Standards
12. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
Organizational culture and maturity
Substantive Testing (test of transaction integrity)
Options for Risk Treatment
Project Management Strategies
13. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Sampling
Sampling Risk
IT Service Management
Personnel involved in the requirements phase of a software development project
14. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
IT Service Management
The Requirements
An Integrated Audit
Network Layer Protocols
15. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
Current and most up-to-date
Balanced Scorecard
Elements of the COSO pyramid
Audit Methodologies
16. The highest number of errors that can exist without a result being materially misstated.
The two Categories of Controls
Tolerable Error Rate
TCP/IP Network Model
IT executives and the Board of Directors
17. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
TCP/IP Internet Layer
Service Continuity Management
objective and unbiased
Controls
18. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
Stratified Sampling
Elements of the COBIT Framework
Blade Computer Architecture
Geographic location
19. An audit of operational efficiency.
An Administrative
Frameworks
OSI: Network Layer
Power system controls
20. The sum of all samples divided by the number of samples.
A Sample Mean
Sample Standard Deviation
Statement of Impact
Primary security features of relational databases
21. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
Lacks specific expertise or resources to conduct an internal audit
Tolerable Error Rate
The Business Process Life Cycle
The best approach for identifying high risk areas for an audit
22. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
OSI: Network Layer
Capability Maturity Model Integration (CMMI)
To identify the tasks that are responsible for project delays
Risk Management
23. The portion of IT management that tracks the financial value of IT services that support organizational objectives. It includes 4 activities: (1.) Budgeting (2.) Capital Investment (3.) Expense Management (4.) Project accounting and project ROI (Ret
Six steps of the Release Management process
IT Services Financial Management
Reduced sign-on
Separate administrative accounts
24. Defines internal controls and provides guidance for assessing and improving internal control systems.
PERT Diagram?
To identify the tasks that are responsible for project delays
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Network Layer Protocols
25. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
Advantages of outsourcing
Examples of Application Controls
IT executives and the Board of Directors
An Administrative
26. (1.) General (2.) Application
The best approach for identifying high risk areas for an audit
Elements of the COBIT Framework
Main types of Controls
Incident Management
27. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them
Entire password for an encryption key
Foreign Key
OSI: Transport Layer
Inherent Risk
28. Describes the effect on the business if a process is incapacitated for any appreciable time
Substantive Testing (test of transaction integrity)
The Requirements
Statement of Impact
TCP/IP Transport Layer
29. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
Primary security features of relational databases
Stop-or-go Sampling
Data Link Layer Standards
An Administrative
30. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
Examples of Application Controls
OSI: Transport Layer
Business Continuity
TCP/IP Link Layer
31. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
The Release process
Foreign Key
Examples of Application Controls
The Software Program Library
32. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog
Project Management Strategies
Buffers
Formal waterfall
Function Point Analysis
33. Guide program execution through organization of resources and development of clear project objectives.
Reduced sign-on
ITIL - IT Infrastructure Library
Project Management Strategies
The 7 phases and their order in the SDLC
34. The first major task in a disaster recovery or business continuity planning project.
Primary security features of relational databases
The two Categories of Controls
Segregation of duties issue in a high value process
Business impact analysis
35. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
Service Continuity Management
Statistical Sampling
Personnel involved in the requirements phase of a software development project
Elements of the COSO pyramid
36. Lowest layer. Delivers messages (frames) from one station to another vial local network.
ISO 20000 Standard:
(1.) Man-made (2.) Natural
An Integrated Audit
TCP/IP Link Layer
37. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
Cloud computing
Expected Error Rate
Vulnerability in the organization's PBX
Split custody
38. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Function Point Analysis
SDLC Phases
IT Strategy
Assess the maturity of its business processes
39. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
TCP/IP Transport Layer packet delivery
Categories of risk treatment
Statement of Impact
Separate administrative accounts
40. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
Cloud computing
Types of sampling an auditor can perform.
Capability Maturity Model Integration (CMMI)
less than 24 hours
41. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Overall audit risk
IT Services Financial Management
Control Risk
Power system controls
42. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
The Internet Layer in the TCP/IP model
Examples of IT General Controls
Power system controls
Testing activities
43. Used to estimate the effort required to develop a software program.
OSI: Physical Layer
Discovery Sampling
Statistical Sampling
Function Point Analysis
44. To communication security policies - procedures - and other security-related information to an organization's employees.
Security Awareness program
Documentation and interview personnel
The Internet Layer in the TCP/IP model
TCP/IP Transport Layer packet delivery
45. (1.) Objectives (2.) Components (3.) Business Units / Areas
Dimensions of the COSO cube
Segregation of duties issue in a high value process
Rating Scale for Process Maturity
Discovery Sampling
46. (1.) Authentication (2.) Authorization (3.) Change Management (4.) Completeness checks (5.) Validation checks (6.) Input controls (7.) Output controls (8.) Problem management (9.) Identification/access controls
The BCP process
Inherent Risk
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Examples of Application Controls
47. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
OSI: Data Link Layer
Precision means
Release management
Attribute Sampling
48. A critical application is backed up once per day. The recovery point objective (RPO) for an application that is backed up once per day cannot be ________.
The availability of IT systems
Business Continuity
less than 24 hours
The BCP process
49. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
A Virtual Server
Personnel involved in the requirements phase of a software development project
Capability Maturity Model Integration (CMMI)
Examples of IT General Controls
50. Any event which is not part of the standard operation of service and which causes or may cause an interruption to or reduction in quality of that service. Includes THREE incident types: (1.) Service Outage (2.) Service Slowdown (3.) Software Bug
Organizational culture and maturity
Recovery time objective
Sampling
Incident Management