SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
The availability of IT systems
Compliance Testing
Three Types of Controls
Criticality analysis
2. Defines internal controls and provides guidance for assessing and improving internal control systems.
Recovery time objective
Statistical Sampling
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Testing activities
3. (1.) Physical (2.) Technical (4.) Administrative
The Requirements
Input validation checking
Three Types of Controls
Detection Risk
4. Handle application processing
Application Controls
Formal waterfall
IT Services Financial Management
Options for Risk Treatment
5. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
IT Service Management
ITIL definition of PROBLEM
A Compliance audit
A Financial Audit
6. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
OSI: Data Link Layer
Judgmental sampling
Six steps of the Release Management process
(1.) Polices (2.) Procedures (3.) Standards
7. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
Frameworks
Critical Path Methodology
Antivirus software on the email servers
Rating Scale for Process Maturity
8. Used to measure the relative maturity of an organization and its processes.
Registers
Annualized Loss Expectance (ALE)
Capability Maturity Model
Confidence coefficient
9. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Information security policy
Capability Maturity Model
Precision means
Cloud computing
10. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
The availability of IT systems
Geographic location
ITIL definition of CHANGE MANAGEMENT
OSI: Data Link Layer
11. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
The Eight Types of Audits
A Forensic Audit
Network Layer Protocols
List of systems examined
12. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
Organizational culture and maturity
Attribute Sampling
Data Link Layer Standards
The Release process
13. A sampling technique where items are chosen based upon the auditor's judgment - usually based on risk or materiality.
The 5 types of Evidence that the auditor will collect during an audit.
Judgmental sampling
A Compliance audit
Antivirus software on the email servers
14. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
Confidence coefficient
OSI: Transport Layer
Service Level Management
Stay current with technology
15. An audit of operational efficiency.
An Administrative
A Sample Mean
Input validation checking
ISO 20000 Standard:
16. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
IT Service Management
Critical Path Methodology
The Requirements
The 5 types of Evidence that the auditor will collect during an audit.
17. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
Testing activities
less than 24 hours
Application Controls
A Forensic Audit
18. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
ISO 20000 Standard:
The Requirements
Employees with excessive privileges
A Service Provider audit
19. ITIL term used to describe the SDLC.
Database primary key
Release management
WAN Protocols
Categories of risk treatment
20. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
Substantive Testing
Reduced sign-on
Six steps of the Release Management process
Audit Methodologies
21. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
Employees with excessive privileges
Blade Computer Architecture
Entire password for an encryption key
The Eight Types of Audits
22. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
Grid Computing
Elements of the COSO pyramid
The 4-item focus of a Balanced Scorecard
A Virtual Server
23. A field in a record in one table that can reference a primary key in another table that can reference a primary key in another table.
Foreign Key
Critical Path Methodology
Concentrate on samples known to represent high risk
Control Unit
24. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
Statistical Sampling
The audit program
BCP Plans
Capability Maturity Model Integration (CMMI)
25. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
Critical Path Methodology
The Software Program Library
Insourcing
Power system controls
26. A collection of two or more servers that is designed to appear as a single server.
objective and unbiased
Server cluster
Documentation and interview personnel
Transport Layer Protocols
27. Lowest layer. Delivers messages (frames) from one station to another vial local network.
Inform the auditee
The Requirements
OSI: Physical Layer
TCP/IP Link Layer
28. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
The appropriate role of an IS auditor in a control self-assessment
Disaster Recovery
Buffers
Employee termination process
29. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
ISO 20000 Standard:
TCP/IP Internet Layer
Assess the maturity of its business processes
Discovery Sampling
30. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
A Financial Audit
A Virtual Server
Personnel involved in the requirements phase of a software development project
The Eight Types of Audits
31. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
Formal waterfall
A Financial Audit
Referential Integrity
Segregation of duties issue in a high value process
32. ____________________ of the hot site is most important consideration for site selection. IF they are too close together then a single event may involve both locations
Emergency Changes
Geographic location
Substantive Testing
Sampling Risk
33. (1.) Link (2.) Internet (3.) Transport (4.) Application
TCP/IP Network Model
Examples of IT General Controls
Entire password for an encryption key
Audit Methodologies
34. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
A Financial Audit
ITIL definition of CHANGE MANAGEMENT
Examples of IT General Controls
Department Charters
35. The first major task in a disaster recovery or business continuity planning project.
Advantages of outsourcing
Stop-or-go Sampling
Business impact analysis
Testing activities
36. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Notify the Audit Committee
Stop-or-go Sampling
Change management
Registers
37. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
Wet pipe fire sprinkler system
Critical Path Methodology
Prblem Management
Employee termination process
38. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
Risk Management
Sampling Risk
IT executives and the Board of Directors
Emergency Changes
39. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
General Controls
Primary security features of relational databases
Rating Scale for Process Maturity
Sample Standard Deviation
40. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Transport Layer Protocols
Control Risk
A Financial Audit
A Server Cluster
41. To measure organizational performance and effectiveness against strategic goals.
Inform the auditee
Balanced Scorecard
Control Unit
ITIL definition of CHANGE MANAGEMENT
42. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
Network Layer Protocols
Input validation checking
OSI Layer 5: Session
PERT Diagram?
43. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
Department Charters
Business Continuity
Substantive Testing
TCP/IP Internet Layer
44. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
OSI: Physical Layer
TCP/IP Transport Layer
An Operational Audit
OSI Layer 6: Presentation
45. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Sampling Risk
Hash
Personnel involved in the requirements phase of a software development project
Business Realization
46. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
A Compliance audit
Documentation and interview personnel
Configuration Management
Transport Layer Protocols
47. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.
Transport Layer Protocols
Controls
Main types of Controls
TCP/IP Internet Layer
48. To communication security policies - procedures - and other security-related information to an organization's employees.
A Service Provider audit
Audit logging
Overall audit risk
Security Awareness program
49. Used to estimate the effort required to develop a software program.
Primary security features of relational databases
Function Point Analysis
Control Risk
Three Types of Controls
50. IT Governance is most concerned with ________.
An IS audit
IT Strategy
Referential Integrity
Reduced sign-on