SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (1.) Link (2.) Internet (3.) Transport (4.) Application
More difficult to perform
TCP/IP Network Model
A Forensic Audit
Insourcing
2. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
The first step in a business impact analysis
Organizational culture and maturity
The BCP process
Hash
3. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
IT executives and the Board of Directors
A Financial Audit
The BCP process
TCP/IP Network Model
4. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
A Financial Audit
OSI Layer 5: Session
OSI: Data Link Layer
(1.) Polices (2.) Procedures (3.) Standards
5. An audit that is performed in support of an anticipated or active legal proceeding.
A Forensic Audit
Structural fires and transportation accidents
To identify the tasks that are responsible for project delays
Attribute Sampling
6. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
objective and unbiased
The BCP process
Documentation and interview personnel
Testing activities
7. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
Documentation and interview personnel
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Registers
Grid Computing
8. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
Prblem Management
Project Management Strategies
A Sample Mean
Segregation of duties issue in a high value process
9. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
(1.) Polices (2.) Procedures (3.) Standards
The best approach for identifying high risk areas for an audit
OSI: Transport Layer
A Server Cluster
10. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
Blade Computer Architecture
Capability Maturity Model
Database primary key
Reduced sign-on
11. One of a database table's fields - whose value is unique.
The typical Configuration Items in Configuration Management
TCP/IP Internet Layer
Database primary key
Notify the Audit Committee
12. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
WAN Protocols
Emergency Changes
Entire password for an encryption key
Testing activities
13. (1.) TCP (2.) UDP
Transport Layer Protocols
OSI Layer 6: Presentation
Sampling Risk
Vulnerability in the organization's PBX
14. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
The typical Configuration Items in Configuration Management
A Financial Audit
OSI: Physical Layer
Organizational culture and maturity
15. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
Documentation and interview personnel
Employee termination process
Capability Maturity Model Integration (CMMI)
OSI: Physical Layer
16. The maximum period of downtime for a process or application
The Release process
BCP Plans
Recovery time objective
Network Layer Protocols
17. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
A Virtual Server
Concentrate on samples known to represent high risk
Sampling
Capability Maturity Model
18. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them
Dimensions of the COSO cube
Inherent Risk
Referential Integrity
WAN Protocols
19. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
OSI: Network Layer
IT Service Management
Network Layer Protocols
OSI: Transport Layer
20. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
Referential Integrity
Controls
Antivirus software on the email servers
The Internet Layer in the TCP/IP model
21. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
Expected Error Rate
Business impact analysis
A Cold Site
Audit Methodologies
22. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.
Service Level Management
less than 24 hours
Examples of Application Controls
Background checks performed
23. (1.) Access controls (2.) Encryption (3.) Audit logging
Control Risk
Disaster Recovery
Sampling Risk
Primary security features of relational databases
24. Lowest layer. Delivers messages (frames) from one station to another vial local network.
Transport Layer Protocols
TCP/IP Link Layer
Discovery Sampling
Current and most up-to-date
25. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
Six steps of the Release Management process
Grid Computing
The best approach for identifying high risk areas for an audit
Buffers
26. Used to measure the relative maturity of an organization and its processes.
Substantive Testing (test of transaction integrity)
The availability of IT systems
ISO 20000 Standard:
Capability Maturity Model
27. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
TCP/IP Transport Layer packet delivery
Primary security features of relational databases
Advantages of outsourcing
Change management
28. Used to estimate the effort required to develop a software program.
Business Realization
Function Point Analysis
OSI: Network Layer
Lacks specific expertise or resources to conduct an internal audit
29. An audit that combines an operational audit and a financial audit.
An Integrated Audit
Criticality analysis
Disaster Recovery
Options for Risk Treatment
30. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
An Operational Audit
Options for Risk Treatment
The Internet Layer in the TCP/IP model
Concentrate on samples known to represent high risk
31. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
The audit program
Critical Path Methodology
TCP/IP Link Layer
More difficult to perform
32. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
Sampling Risk
Buffers
Business Realization
Recovery time objective
33. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
Control Unit
Antivirus software on the email servers
Buffers
Department Charters
34. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
PERT Diagram?
Recovery time objective
The typical Configuration Items in Configuration Management
objective and unbiased
35. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Sample Standard Deviation
A Compliance audit
A Sample Mean
A Problem
36. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
IT standards are not being reviewed often enough
A Sample Mean
Antivirus software on the email servers
Documentation and interview personnel
37. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
The Eight Types of Audits
Statistical Sampling
Stay current with technology
Audit Methodologies
38. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
OSI: Transport Layer
Stop-or-go Sampling
OSI Layer 6: Presentation
Substantive Testing (test of transaction integrity)
39. Used to determine which business processes are the most critical - by ranking them in order of criticality
Criticality analysis
Stay current with technology
The Requirements
Prblem Management
40. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Audit logging
Expected Error Rate
A Virtual Server
Segregation of duties issue in a high value process
41. During an audit - the auditor should obtain 6 types of documents - (1.) Org charts (2.) ___________ (3.) third-party contracts (4.) policies and procedures (5.) standards (6.) system documentation
Department Charters
Transport Layer Protocols
(1.) Man-made (2.) Natural
Application Controls
42. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Lacks specific expertise or resources to conduct an internal audit
Power system controls
Stay current with technology
TCP/IP Transport Layer
43. (1.) General (2.) Application
The Requirements
The typical Configuration Items in Configuration Management
IT Services Financial Management
Main types of Controls
44. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Discovery Sampling
Employees with excessive privileges
ISO 20000 Standard:
Cloud computing
45. The sum of all samples divided by the number of samples.
(1.) Man-made (2.) Natural
A Sample Mean
Hash
OSI: Network Layer
46. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
Rating Scale for Process Maturity
A Server Cluster
Risk Management
TCP/IP Internet Layer
47. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP
Audit logging
Service Level Management
Inherent Risk
Data Link Layer Standards
48. Concerned with electrical and physical specifications for devices. No frames or packets involved.
Organizational culture and maturity
OSI: Physical Layer
Employee termination process
Critical Path Methodology
49. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
Notify the Audit Committee
PERT Diagram?
Organizational culture and maturity
Emergency Changes
50. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
Lacks specific expertise or resources to conduct an internal audit
ITIL definition of CHANGE MANAGEMENT
Stop-or-go Sampling
Geographic location