SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The first major task in a disaster recovery or business continuity planning project.
Business impact analysis
SDLC Phases
TCP/IP Transport Layer
Business Realization
2. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
Deming Cycle
ISO 20000 Standard:
A Compliance audit
Substantive Testing (test of transaction integrity)
3. Framework for auditing and measuring IT Service Management Processes.
An Operational Audit
Overall audit risk
Vulnerability in the organization's PBX
ISO 20000 Standard:
4. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
Examples of IT General Controls
Stratified Sampling
Audit logging
Main types of Controls
5. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
OSI: Data Link Layer
Employee termination process
Registers
Business Continuity
6. Guide program execution through organization of resources and development of clear project objectives.
The Release process
Project Management Strategies
The appropriate role of an IS auditor in a control self-assessment
The 5 types of Evidence that the auditor will collect during an audit.
7. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog
Statistical Sampling
Sampling Risk
Buffers
Incident Management
8. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.
A Service Provider audit
Substantive Testing (test of transaction integrity)
Service Level Management
Business impact analysis
9. Any event which is not part of the standard operation of service and which causes or may cause an interruption to or reduction in quality of that service. Includes THREE incident types: (1.) Service Outage (2.) Service Slowdown (3.) Software Bug
TCP/IP Transport Layer
OSI: Network Layer
Main types of Controls
Incident Management
10. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Emergency Changes
Variable Sampling
Disaster Recovery
Project change request
11. (1.) Link (2.) Internet (3.) Transport (4.) Application
SDLC Phases
Criticality analysis
TCP/IP Network Model
Segregation of duties issue in a high value process
12. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
Attribute Sampling
SDLC Phases
Advantages of outsourcing
Configuration Management
13. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
OSI: Transport Layer
Substantive Testing (test of transaction integrity)
TCP/IP Transport Layer packet delivery
The 7 phases and their order in the SDLC
14. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
Configuration Management
Insourcing
Expected Error Rate
Network Layer Protocols
15. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
objective and unbiased
The Steering Committee
(1.) Man-made (2.) Natural
Inform the auditee
16. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
Project Management Strategies
Split custody
Expected Error Rate
Audit Methodologies
17. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
ISO 20000 Standard:
Controls
An Operational Audit
Testing activities
18. (1.) Access controls (2.) Encryption (3.) Audit logging
Primary security features of relational databases
Service Level Management
Service Continuity Management
Security Awareness program
19. (1.) Physical (2.) Technical (4.) Administrative
A Problem
Three Types of Controls
The Eight Types of Audits
Buffers
20. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
Critical Path Methodology
Department Charters
Insourcing
Options for Risk Treatment
21. Concerned with electrical and physical specifications for devices. No frames or packets involved.
OSI: Physical Layer
Separate administrative accounts
An Integrated Audit
Three Types of Controls
22. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
IT Service Management
Expected Error Rate
ITIL - IT Infrastructure Library
Antivirus software on the email servers
23. To communication security policies - procedures - and other security-related information to an organization's employees.
Confidence coefficient
Security Awareness program
Volumes of COSO framework
IT executives and the Board of Directors
24. Consists of two main packet transport protocols: TCP and UDP.
Personnel involved in the requirements phase of a software development project
The BCP process
Control Unit
TCP/IP Transport Layer
25. An audit of a third-party organization that provides services to other organizations.
Confidence coefficient
ITIL - IT Infrastructure Library
Business impact analysis
A Service Provider audit
26. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
General Controls
Audit logging
Rating Scale for Process Maturity
An Integrated Audit
27. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
Split custody
The Release process
Registers
More difficult to perform
28. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
(1.) Polices (2.) Procedures (3.) Standards
IT Services Financial Management
The audit program
Sample Standard Deviation
29. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
IT executives and the Board of Directors
Referential Integrity
Audit logging
A gate process
30. Subjective sampling is used when the auditor wants to _________________________.
Reduced sign-on
Capability Maturity Model Integration (CMMI)
General Controls
Concentrate on samples known to represent high risk
31. Used to estimate the effort required to develop a software program.
Primary security features of relational databases
Main types of Controls
Function Point Analysis
More difficult to perform
32. (1.) General (2.) Application
The typical Configuration Items in Configuration Management
A Virtual Server
Capability Maturity Model Integration (CMMI)
Main types of Controls
33. The delivery of messages from one station to another via one or more networks.. Routes packets between networks.
OSI: Network Layer
Precision means
The Business Process Life Cycle
Criticality analysis
34. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
OSI: Transport Layer
WAN Protocols
Project Management Strategies
Deming Cycle
35. The memory locations in the CPU where arithmetic values are stored.
Frameworks
A Sample Mean
Registers
Types of sampling an auditor can perform.
36. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
An IS audit
The BCP process
Security Awareness program
Types of sampling an auditor can perform.
37. A representation of how closely a sample represents an entire population.
The 7 phases and their order in the SDLC
Capability Maturity Model Integration (CMMI)
A Service Provider audit
Precision means
38. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
Formal waterfall
Inform the auditee
A Service Provider audit
Elements of the COBIT Framework
39. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
Prblem Management
Formal waterfall
OSI Layer 6: Presentation
Application Controls
40. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
Segregation of duties issue in a high value process
The Business Process Life Cycle
OSI Layer 7: Application
Elements of the COBIT Framework
41. Disasters are generally grouped in terms of type: ______________.
The Software Program Library
Critical Path Methodology
(1.) Man-made (2.) Natural
Advantages of outsourcing
42. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
Wet pipe fire sprinkler system
Advantages of outsourcing
Grid Computing
Types of sampling an auditor can perform.
43. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
Security Awareness program
Testing activities
A Virtual Server
More difficult to perform
44. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
Recovery time objective
The Requirements
Separate administrative accounts
The Release process
45. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Options for Risk Treatment
Control Risk
TCP/IP Transport Layer packet delivery
Inform the auditee
46. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
A Service Provider audit
Referential Integrity
The best approach for identifying high risk areas for an audit
(1.) Polices (2.) Procedures (3.) Standards
47. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
Service Level Management
An Integrated Audit
The Eight Types of Audits
less than 24 hours
48. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Substantive Testing (test of transaction integrity)
Structural fires and transportation accidents
Database primary key
Stay current with technology
49. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
Configuration Management
IT executives and the Board of Directors
Project Management Strategies
IT standards are not being reviewed often enough
50. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
Notify the Audit Committee
Audit logging
Reduced sign-on
The 4-item focus of a Balanced Scorecard