SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
(1.) Man-made (2.) Natural
Separate administrative accounts
ISO 20000 Standard:
Hash
2. An audit of operational efficiency.
The appropriate role of an IS auditor in a control self-assessment
Concentrate on samples known to represent high risk
An IS audit
An Administrative
3. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
Formal waterfall
Function Point Analysis
Entire password for an encryption key
Main types of Controls
4. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
Vulnerability in the organization's PBX
Control Unit
An IS audit
The Requirements
5. A representation of how closely a sample represents an entire population.
Lacks specific expertise or resources to conduct an internal audit
Precision means
Deming Cycle
More difficult to perform
6. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
TCP/IP Link Layer
Examples of IT General Controls
Service Continuity Management
Tolerable Error Rate
7. Consists of two main packet transport protocols: TCP and UDP.
Statement of Impact
Notify the Audit Committee
TCP/IP Transport Layer
Background checks performed
8. A sampling technique where at least one exception is sought in a population
Project change request
Discovery Sampling
Confidence coefficient
Statement of Impact
9. An audit of an IS department's operations and systems.
Grid Computing
An IS audit
IT executives and the Board of Directors
Formal waterfall
10. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog
Business Realization
Business impact analysis
Buffers
To identify the tasks that are responsible for project delays
11. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
An Integrated Audit
Six steps of the Release Management process
Vulnerability in the organization's PBX
A Forensic Audit
12. An audit that combines an operational audit and a financial audit.
Deming Cycle
An Integrated Audit
Power system controls
Options for Risk Treatment
13. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Organizational culture and maturity
Geographic location
Notify the Audit Committee
Controls
14. A sampling technique where items are chosen based upon the auditor's judgment - usually based on risk or materiality.
Audit Methodologies
Confidence coefficient
Background checks performed
Judgmental sampling
15. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
ITIL definition of PROBLEM
The 7 phases and their order in the SDLC
Referential Integrity
Sampling
16. Support the functioning of the application controls
Power system controls
OSI: Network Layer
General Controls
The two Categories of Controls
17. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Power system controls
Examples of Application Controls
Cloud computing
Gantt Chart
18. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Critical Path Methodology
Input validation checking
Project change request
Sample Standard Deviation
19. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
TCP/IP Link Layer
Emergency Changes
Types of sampling an auditor can perform.
Concentrate on samples known to represent high risk
20. The portion of IT management that tracks the financial value of IT services that support organizational objectives. It includes 4 activities: (1.) Budgeting (2.) Capital Investment (3.) Expense Management (4.) Project accounting and project ROI (Ret
OSI: Data Link Layer
IT Services Financial Management
TCP/IP Network Model
Substantive Testing (test of transaction integrity)
21. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Deming Cycle
Segregation of duties issue in a high value process
Assess the maturity of its business processes
Background checks performed
22. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Substantive Testing (test of transaction integrity)
Inform the auditee
IT Strategy
Service Level Management
23. Defines internal controls and provides guidance for assessing and improving internal control systems.
Primary security features of relational databases
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Expected Error Rate
OSI: Data Link Layer
24. (1.) Automatic (2.) Manual
Information security policy
The two Categories of Controls
Statement of Impact
Overall audit risk
25. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Confidence coefficient
Substantive Testing
Elements of the COSO pyramid
Lacks specific expertise or resources to conduct an internal audit
26. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
Audit logging
More difficult to perform
Emergency Changes
The audit program
27. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
IT Strategy
Information security policy
Types of sampling an auditor can perform.
Hash
28. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
Sample Standard Deviation
Grid Computing
Separate administrative accounts
Cloud computing
29. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
Incident Management
The 4-item focus of a Balanced Scorecard
Inherent Risk
IT standards are not being reviewed often enough
30. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
Notify the Audit Committee
Network Layer Protocols
The 5 types of Evidence that the auditor will collect during an audit.
Application Controls
31. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
Service Continuity Management
Lacks specific expertise or resources to conduct an internal audit
The availability of IT systems
Emergency Changes
32. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
Elements of the COBIT Framework
Primary security features of relational databases
Separate administrative accounts
Business impact analysis
33. An auditor has discovered several errors in user account management: many terminated employees' computer accounts are still active. The best course of action - To improve the _________________ to reduce the number of exceptions. For a time - the proc
Employee termination process
Resource details
The Eight Types of Audits
A gate process
34. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
Insourcing
Security Awareness program
Personnel involved in the requirements phase of a software development project
Project change request
35. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
Rating Scale for Process Maturity
Prblem Management
The Release process
Server cluster
36. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
CPU
Transport Layer Protocols
Stay current with technology
Rating Scale for Process Maturity
37. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Insourcing
Overall audit risk
Examples of IT General Controls
Stop-or-go Sampling
38. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
A gate process
Controls
Control Risk
Annualized Loss Expectance (ALE)
39. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP
Data Link Layer Standards
The Steering Committee
Network Layer Protocols
Cloud computing
40. Disasters are generally grouped in terms of type: ______________.
(1.) Man-made (2.) Natural
Rating Scale for Process Maturity
Sampling
Input validation checking
41. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
CPU
The Eight Types of Audits
Options for Risk Treatment
Stratified Sampling
42. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Insourcing
Attribute Sampling
Emergency Changes
Six steps of the Release Management process
43. (1.) Objectives (2.) Components (3.) Business Units / Areas
Geographic location
Gantt Chart
TCP/IP Link Layer
Dimensions of the COSO cube
44. The first major task in a disaster recovery or business continuity planning project.
Employee termination process
The audit program
Business impact analysis
A Server Cluster
45. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
TCP/IP Transport Layer packet delivery
TCP/IP Network Model
A Virtual Server
Entire password for an encryption key
46. An audit that is performed in support of an anticipated or active legal proceeding.
A Forensic Audit
(1.) Polices (2.) Procedures (3.) Standards
Segregation of duties issue in a high value process
Business Continuity
47. To communication security policies - procedures - and other security-related information to an organization's employees.
Security Awareness program
Business impact analysis
A Financial Audit
OSI: Network Layer
48. Focuses on: post-event recovery and restoration of services
Disaster Recovery
OSI: Physical Layer
Sampling Risk
Buffers
49. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
More difficult to perform
Tolerable Error Rate
IT Services Financial Management
The 5 types of Evidence that the auditor will collect during an audit.
50. The highest number of errors that can exist without a result being materially misstated.
Tolerable Error Rate
The Requirements
WAN Protocols
Deming Cycle