SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The portion of IT management that tracks the financial value of IT services that support organizational objectives. It includes 4 activities: (1.) Budgeting (2.) Capital Investment (3.) Expense Management (4.) Project accounting and project ROI (Ret
Registers
Inform the auditee
The typical Configuration Items in Configuration Management
IT Services Financial Management
2. To communication security policies - procedures - and other security-related information to an organization's employees.
Security Awareness program
Sampling
SDLC Phases
Geographic location
3. (1.) Objectives (2.) Components (3.) Business Units / Areas
Dimensions of the COSO cube
Sampling Risk
Inherent Risk
objective and unbiased
4. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
5. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
Input validation checking
Personnel involved in the requirements phase of a software development project
Substantive Testing (test of transaction integrity)
Power system controls
6. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Separate administrative accounts
Inform the auditee
Release management
The typical Configuration Items in Configuration Management
7. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Capability Maturity Model Integration (CMMI)
Entire password for an encryption key
objective and unbiased
Compliance Testing
8. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
A Server Cluster
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Main types of Controls
OSI: Transport Layer
9. Consists of two main packet transport protocols: TCP and UDP.
PERT Diagram?
TCP/IP Transport Layer
The Requirements
Organizational culture and maturity
10. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
Change management
Separate administrative accounts
Categories of risk treatment
Risk Management
11. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Organizational culture and maturity
Antivirus software on the email servers
Emergency Changes
Lacks specific expertise or resources to conduct an internal audit
12. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
The best approach for identifying high risk areas for an audit
Capability Maturity Model Integration (CMMI)
Sampling Risk
Blade Computer Architecture
13. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
Annualized Loss Expectance (ALE)
Geographic location
ITIL definition of CHANGE MANAGEMENT
The first step in a business impact analysis
14. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
Documentation and interview personnel
Hash
Tolerable Error Rate
WAN Protocols
15. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
Deming Cycle
Substantive Testing
IT Service Management
Primary security features of relational databases
16. (1.) Automatic (2.) Manual
The best approach for identifying high risk areas for an audit
Controls
The Business Process Life Cycle
The two Categories of Controls
17. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
Service Level Management
Referential Integrity
Controls
More difficult to perform
18. PERT: shows the ______________ critical path.
Statement of Impact
Current and most up-to-date
IT standards are not being reviewed often enough
Referential Integrity
19. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
Elements of the COBIT Framework
Sampling Risk
Information security policy
Insourcing
20. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
Background checks performed
Blade Computer Architecture
Judgmental sampling
The Requirements
21. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
A Service Provider audit
Server cluster
Notify the Audit Committee
Geographic location
22. Describes the effect on the business if a process is incapacitated for any appreciable time
Overall audit risk
The Requirements
Function Point Analysis
Statement of Impact
23. A Fire sprinkler system has water in its pipes - and sprinkler heads emit water only if the ambient temperature reaches 220 deg. F. This is a ________________. The system is charged with water and will discharge water out of any sprinkler head whose
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Formal waterfall
Testing activities
Wet pipe fire sprinkler system
24. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
Personnel involved in the requirements phase of a software development project
Background checks performed
The appropriate role of an IS auditor in a control self-assessment
Confidence coefficient
25. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
Database primary key
The availability of IT systems
Business Continuity
The typical Configuration Items in Configuration Management
26. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.
Risk Management
TCP/IP Internet Layer
Substantive Testing
Options for Risk Treatment
27. An alternate processing center that contains no information processing equipment.
A Cold Site
Sample Standard Deviation
More difficult to perform
An Operational Audit
28. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
The two Categories of Controls
BCP Plans
OSI: Transport Layer
Foreign Key
29. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
Stratified Sampling
Change management
Split custody
An Integrated Audit
30. (1.) TCP (2.) UDP
Six steps of the Release Management process
Transport Layer Protocols
Three Types of Controls
Stop-or-go Sampling
31. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
OSI Layer 7: Application
objective and unbiased
Entire password for an encryption key
Annualized Loss Expectance (ALE)
32. Collections of Controls that work together to achieve an entire range of an organization's objectives.
IT Service Management
Frameworks
Change management
Project change request
33. An audit of an IS department's operations and systems.
An IS audit
Sampling Risk
Lacks specific expertise or resources to conduct an internal audit
OSI: Physical Layer
34. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
Advantages of outsourcing
BCP Plans
IT Services Financial Management
Database primary key
35. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Foreign Key
Assess the maturity of its business processes
The Steering Committee
Sampling
36. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
Organizational culture and maturity
Project change request
Wet pipe fire sprinkler system
The Software Program Library
37. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
Elements of the COSO pyramid
Department Charters
Attribute Sampling
Substantive Testing
38. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
Dimensions of the COSO cube
TCP/IP Link Layer
Database primary key
SDLC Phases
39. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
The availability of IT systems
The Eight Types of Audits
An IS audit
The typical Configuration Items in Configuration Management
40. Lowest layer. Delivers messages (frames) from one station to another vial local network.
Dimensions of the COSO cube
TCP/IP Link Layer
Rating Scale for Process Maturity
Concentrate on samples known to represent high risk
41. The risk that an IS auditor will overlook errors or exceptions during an audit.
Detection Risk
Volumes of COSO framework
Precision means
Reduced sign-on
42. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
WAN Protocols
Employees with excessive privileges
Application Layer protocols
Elements of the COBIT Framework
43. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
Organizational culture and maturity
Emergency Changes
Application Layer protocols
TCP/IP Transport Layer packet delivery
44. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Transport Layer Protocols
Substantive Testing
PERT Diagram?
Annualized Loss Expectance (ALE)
45. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
An Operational Audit
TCP/IP Network Model
IT Services Financial Management
A Server Cluster
46. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
OSI: Data Link Layer
A Virtual Server
Sampling Risk
Organizational culture and maturity
47. During an audit - the auditor should obtain 6 types of documents - (1.) Org charts (2.) ___________ (3.) third-party contracts (4.) policies and procedures (5.) standards (6.) system documentation
The appropriate role of an IS auditor in a control self-assessment
Organizational culture and maturity
Department Charters
Separate administrative accounts
48. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
A Sample Mean
Incident Management
Testing activities
Advantages of outsourcing
49. Framework for auditing and measuring IT Service Management Processes.
ISO 20000 Standard:
Examples of IT General Controls
Hash
Audit Methodologies
50. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
Critical Path Methodology
(1.) Polices (2.) Procedures (3.) Standards
An Administrative
Service Level Management