SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
ISO 20000 Standard:
Segregation of duties issue in a high value process
The 5 types of Evidence that the auditor will collect during an audit.
A Sample Mean
2. An auditor has discovered several errors in user account management: many terminated employees' computer accounts are still active. The best course of action - To improve the _________________ to reduce the number of exceptions. For a time - the proc
Employee termination process
The Requirements
A Server Cluster
Elements of the COSO pyramid
3. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
Audit logging
General Controls
Risk Management
less than 24 hours
4. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them
The audit program
OSI Layer 6: Presentation
Volumes of COSO framework
Inherent Risk
5. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Segregation of duties issue in a high value process
Blade Computer Architecture
Application Controls
An Operational Audit
6. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
Application Controls
Advantages of outsourcing
TCP/IP Link Layer
A gate process
7. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
The BCP process
Service Continuity Management
Expected Error Rate
Network Layer Protocols
8. (1.) TCP (2.) UDP
Employees with excessive privileges
OSI: Data Link Layer
Transport Layer Protocols
Service Continuity Management
9. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
Elements of the COSO pyramid
Transport Layer Protocols
Current and most up-to-date
The Requirements
10. (1.) Automatic (2.) Manual
Power system controls
Foreign Key
The two Categories of Controls
A Cold Site
11. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Assess the maturity of its business processes
BCP Plans
A Forensic Audit
Volumes of COSO framework
12. An audit that is performed in support of an anticipated or active legal proceeding.
A Compliance audit
A Forensic Audit
Department Charters
Stratified Sampling
13. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
SDLC Phases
BCP Plans
Cloud computing
Expected Error Rate
14. The inventory of all in-scope business processes and systems
IT Service Management
The first step in a business impact analysis
Service Continuity Management
objective and unbiased
15. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
Concentrate on samples known to represent high risk
ITIL definition of CHANGE MANAGEMENT
Gantt Chart
Project change request
16. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Audit logging
A Server Cluster
Transport Layer Protocols
A Compliance audit
17. (1.) Authentication (2.) Authorization (3.) Change Management (4.) Completeness checks (5.) Validation checks (6.) Input controls (7.) Output controls (8.) Problem management (9.) Identification/access controls
Attribute Sampling
Inform the auditee
Examples of IT General Controls
Examples of Application Controls
18. Lowest layer. Delivers messages (frames) from one station to another vial local network.
Types of sampling an auditor can perform.
TCP/IP Transport Layer
TCP/IP Link Layer
Background checks performed
19. (1.) Physical (2.) Technical (4.) Administrative
OSI: Physical Layer
Referential Integrity
Three Types of Controls
TCP/IP Link Layer
20. Describes the effect on the business if a process is incapacitated for any appreciable time
Project change request
An IS audit
Statement of Impact
TCP/IP Internet Layer
21. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
TCP/IP Network Model
ITIL definition of CHANGE MANAGEMENT
Three Types of Controls
Service Continuity Management
22. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
objective and unbiased
Sample Standard Deviation
Testing activities
Cloud computing
23. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
Capability Maturity Model Integration (CMMI)
IT standards are not being reviewed often enough
Annualized Loss Expectance (ALE)
Service Continuity Management
24. (1.) Link (2.) Internet (3.) Transport (4.) Application
(1.) Polices (2.) Procedures (3.) Standards
Vulnerability in the organization's PBX
TCP/IP Network Model
Project change request
25. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
OSI Layer 6: Presentation
Hash
Elements of the COSO pyramid
Grid Computing
26. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
Capability Maturity Model
(1.) Man-made (2.) Natural
General Controls
A Server Cluster
27. 1.) Executive Support (2.) Well-defined roles and responsibilities.
Information security policy
Sampling Risk
IT Services Financial Management
Referential Integrity
28. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
The appropriate role of an IS auditor in a control self-assessment
Control Unit
The Internet Layer in the TCP/IP model
Antivirus software on the email servers
29. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.
Examples of IT General Controls
TCP/IP Internet Layer
A Service Provider audit
Entire password for an encryption key
30. The party that performs strategic planning - addresses near-term and long-term requirements aligning business objectives - and technology strategies.
Detection Risk
Attribute Sampling
Sampling Risk
The Steering Committee
31. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Documentation and interview personnel
Database primary key
Notify the Audit Committee
A Problem
32. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
Foreign Key
Stratified Sampling
An Operational Audit
Documentation and interview personnel
33. (1.) Feasibility (2.) Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation
The 7 phases and their order in the SDLC
Employees with excessive privileges
Vulnerability in the organization's PBX
OSI: Transport Layer
34. To measure organizational performance and effectiveness against strategic goals.
Balanced Scorecard
The Steering Committee
Concentrate on samples known to represent high risk
Statement of Impact
35. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
The Steering Committee
The appropriate role of an IS auditor in a control self-assessment
Frameworks
IT Service Management
36. Support the functioning of the application controls
General Controls
Testing activities
More difficult to perform
ITIL - IT Infrastructure Library
37. Used to estimate the effort required to develop a software program.
General Controls
Configuration Management
Function Point Analysis
Change management
38. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
OSI Layer 6: Presentation
Stratified Sampling
The BCP process
Structural fires and transportation accidents
39. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
An Administrative
Elements of the COBIT Framework
Main types of Controls
Employees with excessive privileges
40. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
Current and most up-to-date
Background checks performed
The Release process
SDLC Phases
41. A representation of how closely a sample represents an entire population.
Precision means
Dimensions of the COSO cube
BCP Plans
Background checks performed
42. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
Options for Risk Treatment
Gantt Chart
Variable Sampling
Business Realization
43. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
Foreign Key
The best approach for identifying high risk areas for an audit
Business Continuity
General Controls
44. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Inform the auditee
Grid Computing
Incident Management
Data Link Layer Standards
45. IT Governance is most concerned with ________.
Sampling Risk
OSI: Data Link Layer
IT Strategy
Project change request
46. Collections of Controls that work together to achieve an entire range of an organization's objectives.
Primary security features of relational databases
TCP/IP Transport Layer
List of systems examined
Frameworks
47. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
Elements of the COBIT Framework
Business Continuity
Gantt Chart
Recovery time objective
48. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Structural fires and transportation accidents
Substantive Testing (test of transaction integrity)
OSI: Transport Layer
49. The risk that an IS auditor will overlook errors or exceptions during an audit.
Employees with excessive privileges
A Cold Site
Current and most up-to-date
Detection Risk
50. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
Function Point Analysis
The availability of IT systems
Application Controls
A Service Provider audit