SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
A Sample Mean
A Compliance audit
Buffers
Input validation checking
2. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
Critical Path Methodology
Disaster Recovery
Statement of Impact
A Financial Audit
3. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
An Operational Audit
Service Continuity Management
Incident Management
Business Realization
4. Lowest layer. Delivers messages (frames) from one station to another vial local network.
Service Continuity Management
Business Realization
TCP/IP Link Layer
Audit logging
5. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
The 4-item focus of a Balanced Scorecard
Lacks specific expertise or resources to conduct an internal audit
Control Unit
Current and most up-to-date
6. One of a database table's fields - whose value is unique.
Database primary key
Main types of Controls
Variable Sampling
OSI: Physical Layer
7. (1.) General (2.) Application
Inform the auditee
A Server Cluster
Main types of Controls
Gantt Chart
8. The means by which management establishes and measures processes by which organizational objectives are achieved
Controls
Change management
General Controls
Dimensions of the COSO cube
9. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
TCP/IP Link Layer
Advantages of outsourcing
ITIL definition of CHANGE MANAGEMENT
The Internet Layer in the TCP/IP model
10. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
IT standards are not being reviewed often enough
Registers
Confidence coefficient
Overall audit risk
11. Subjective sampling is used when the auditor wants to _________________________.
Judgmental sampling
Audit Methodologies
Concentrate on samples known to represent high risk
Information systems access
12. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
A Compliance audit
Function Point Analysis
The 5 types of Evidence that the auditor will collect during an audit.
The best approach for identifying high risk areas for an audit
13. A representation of how closely a sample represents an entire population.
Sampling Risk
Precision means
ITIL definition of PROBLEM
Audit logging
14. (1.) Link (2.) Internet (3.) Transport (4.) Application
The first step in a business impact analysis
TCP/IP Network Model
Notify the Audit Committee
List of systems examined
15. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
More difficult to perform
objective and unbiased
Hash
Function Point Analysis
16. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
Blade Computer Architecture
Service Continuity Management
Balanced Scorecard
Foreign Key
17. (1.) Automatic (2.) Manual
Concentrate on samples known to represent high risk
Resource details
Information systems access
The two Categories of Controls
18. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
The best approach for identifying high risk areas for an audit
ITIL definition of CHANGE MANAGEMENT
Incident Management
Overall audit risk
19. IT Service Management is defined in ___________________ framework.
ITIL - IT Infrastructure Library
Configuration Management
Audit Methodologies
Business impact analysis
20. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
Application Layer protocols
Transport Layer Protocols
Employees with excessive privileges
Change management
21. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Control Risk
Split custody
Wet pipe fire sprinkler system
Stay current with technology
22. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
The 4-item focus of a Balanced Scorecard
Control Unit
Stop-or-go Sampling
Referential Integrity
23. Disasters are generally grouped in terms of type: ______________.
Business Realization
(1.) Man-made (2.) Natural
ITIL definition of PROBLEM
BCP Plans
24. An auditor has discovered several errors in user account management: many terminated employees' computer accounts are still active. The best course of action - To improve the _________________ to reduce the number of exceptions. For a time - the proc
Buffers
Server cluster
Employee termination process
Prblem Management
25. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
Business Realization
Capability Maturity Model
The 5 types of Evidence that the auditor will collect during an audit.
Split custody
26. (1.) Access controls (2.) Encryption (3.) Audit logging
Separate administrative accounts
Data Link Layer Standards
Primary security features of relational databases
The best approach for identifying high risk areas for an audit
27. An audit of an IS department's operations and systems.
Advantages of outsourcing
An IS audit
Stay current with technology
Substantive Testing (test of transaction integrity)
28. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
Stratified Sampling
Six steps of the Release Management process
The 7 phases and their order in the SDLC
Notify the Audit Committee
29. A maturity model that represents the aggregations of other maturity models.
Capability Maturity Model Integration (CMMI)
Examples of Application Controls
Project change request
Emergency Changes
30. Delivery of packets from one station to another - on the same network or on different networks.
The Software Program Library
The Internet Layer in the TCP/IP model
The Requirements
Inherent Risk
31. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
Organizational culture and maturity
Business Realization
Stratified Sampling
The Release process
32. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
Categories of risk treatment
The audit program
(1.) Polices (2.) Procedures (3.) Standards
Blade Computer Architecture
33. The memory locations in the CPU where arithmetic values are stored.
Registers
Three Types of Controls
Substantive Testing
Inherent Risk
34. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Concentrate on samples known to represent high risk
Categories of risk treatment
Notify the Audit Committee
A Forensic Audit
35. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
OSI: Data Link Layer
The Release process
A Server Cluster
Gantt Chart
36. (1.) Objectives (2.) Components (3.) Business Units / Areas
ISO 20000 Standard:
(1.) Man-made (2.) Natural
Dimensions of the COSO cube
The Internet Layer in the TCP/IP model
37. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg
The BCP process
IT executives and the Board of Directors
(1.) Polices (2.) Procedures (3.) Standards
Personnel involved in the requirements phase of a software development project
38. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
The Steering Committee
Inform the auditee
Information systems access
Rating Scale for Process Maturity
39. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
OSI: Network Layer
A Compliance audit
Documentation and interview personnel
The first step in a business impact analysis
40. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
To identify the tasks that are responsible for project delays
The Eight Types of Audits
The availability of IT systems
The audit program
41. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
42. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.
TCP/IP Network Model
Configuration Management
Split custody
PERT Diagram?
43. The party that performs strategic planning - addresses near-term and long-term requirements aligning business objectives - and technology strategies.
The typical Configuration Items in Configuration Management
Project Management Strategies
Attribute Sampling
The Steering Committee
44. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
Current and most up-to-date
The first step in a business impact analysis
Power system controls
The typical Configuration Items in Configuration Management
45. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
TCP/IP Transport Layer packet delivery
The typical Configuration Items in Configuration Management
The Release process
Risk Management
46. The risk that an IS auditor will overlook errors or exceptions during an audit.
The BCP process
An Integrated Audit
Background checks performed
Detection Risk
47. A sampling technique where at least one exception is sought in a population
Discovery Sampling
CPU
The Business Process Life Cycle
TCP/IP Transport Layer
48. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
Configuration Management
A gate process
Personnel involved in the requirements phase of a software development project
A Virtual Server
49. Guide program execution through organization of resources and development of clear project objectives.
Incident Management
Service Continuity Management
Project Management Strategies
The Release process
50. An audit of a third-party organization that provides services to other organizations.
Risk Management
Input validation checking
Security Awareness program
A Service Provider audit