SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient
A Problem
Sampling Risk
Capability Maturity Model Integration (CMMI)
Department Charters
2. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
objective and unbiased
List of systems examined
Service Level Management
Advantages of outsourcing
3. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
(1.) Polices (2.) Procedures (3.) Standards
Employee termination process
Confidence coefficient
Volumes of COSO framework
4. Subjective sampling is used when the auditor wants to _________________________.
Risk Management
Concentrate on samples known to represent high risk
Registers
ITIL definition of PROBLEM
5. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
Dimensions of the COSO cube
Sampling Risk
Project change request
An Operational Audit
6. Framework for auditing and measuring IT Service Management Processes.
Tolerable Error Rate
Options for Risk Treatment
ISO 20000 Standard:
Registers
7. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
objective and unbiased
Disaster Recovery
Overall audit risk
TCP/IP Transport Layer packet delivery
8. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
Overall audit risk
OSI: Network Layer
Rating Scale for Process Maturity
The 5 types of Evidence that the auditor will collect during an audit.
9. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
Examples of IT General Controls
OSI: Network Layer
The 4-item focus of a Balanced Scorecard
Risk Management
10. Disasters are generally grouped in terms of type: ______________.
Prblem Management
Inform the auditee
(1.) Man-made (2.) Natural
less than 24 hours
11. An audit of an IS department's operations and systems.
An IS audit
Transport Layer Protocols
Substantive Testing
The 4-item focus of a Balanced Scorecard
12. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
Referential Integrity
Network Layer Protocols
Security Awareness program
Six steps of the Release Management process
13. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
The audit program
Organizational culture and maturity
Information security policy
Inherent Risk
14. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
Sample Standard Deviation
TCP/IP Network Model
The Release process
Prblem Management
15. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
More difficult to perform
IT Services Financial Management
Referential Integrity
Tolerable Error Rate
16. (1.) Authentication (2.) Authorization (3.) Change Management (4.) Completeness checks (5.) Validation checks (6.) Input controls (7.) Output controls (8.) Problem management (9.) Identification/access controls
Examples of Application Controls
(1.) Man-made (2.) Natural
Volumes of COSO framework
Wet pipe fire sprinkler system
17. The means by which management establishes and measures processes by which organizational objectives are achieved
Controls
OSI Layer 5: Session
Sampling Risk
Capability Maturity Model
18. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
TCP/IP Transport Layer packet delivery
The Internet Layer in the TCP/IP model
Segregation of duties issue in a high value process
A Compliance audit
19. Used to translate or transform data from lower layers into formats that the application layer can work with.
Geographic location
Examples of IT General Controls
Change management
OSI Layer 6: Presentation
20. To review and approve proposed changes to systems and infrastructure. This helps to reduce the risk of unintended events and unplanned downtime.
A Financial Audit
An Integrated Audit
IT standards are not being reviewed often enough
Change management
21. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
Sampling
Power system controls
Notify the Audit Committee
The Eight Types of Audits
22. Used to measure the relative maturity of an organization and its processes.
Change management
Capability Maturity Model
Release management
WAN Protocols
23. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Substantive Testing (test of transaction integrity)
IT Services Financial Management
Variable Sampling
Lacks specific expertise or resources to conduct an internal audit
24. Collections of Controls that work together to achieve an entire range of an organization's objectives.
Frameworks
Wet pipe fire sprinkler system
Resource details
Audit logging
25. The first major task in a disaster recovery or business continuity planning project.
OSI Layer 6: Presentation
Business Continuity
Business impact analysis
TCP/IP Link Layer
26. (1.) General (2.) Application
Main types of Controls
Organizational culture and maturity
Audit Methodologies
Balanced Scorecard
27. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
Sample Standard Deviation
A gate process
TCP/IP Transport Layer packet delivery
The two Categories of Controls
28. Handle application processing
The 5 types of Evidence that the auditor will collect during an audit.
Application Controls
The appropriate role of an IS auditor in a control self-assessment
Primary security features of relational databases
29. (1.) Access controls (2.) Encryption (3.) Audit logging
Primary security features of relational databases
Documentation and interview personnel
Network Layer Protocols
Testing activities
30. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
OSI Layer 5: Session
TCP/IP Internet Layer
Control Unit
Incident Management
31. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
Examples of IT General Controls
Recovery time objective
Project Management Strategies
The Requirements
32. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP
Six steps of the Release Management process
Sampling Risk
Data Link Layer Standards
Resource details
33. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
A Server Cluster
Project change request
The typical Configuration Items in Configuration Management
ISO 20000 Standard:
34. (1.) Physical (2.) Technical (4.) Administrative
Primary security features of relational databases
Gantt Chart
Incident Management
Three Types of Controls
35. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
To identify the tasks that are responsible for project delays
TCP/IP Network Model
Information systems access
Transport Layer Protocols
36. The risk that an IS auditor will overlook errors or exceptions during an audit.
Documentation and interview personnel
The availability of IT systems
Detection Risk
Substantive Testing
37. Defines internal controls and provides guidance for assessing and improving internal control systems.
Database primary key
Registers
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Primary security features of relational databases
38. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
Stay current with technology
List of systems examined
The first step in a business impact analysis
Dimensions of the COSO cube
39. A collection of two or more servers that is designed to appear as a single server.
ISO 20000 Standard:
OSI Layer 6: Presentation
Server cluster
Service Level Management
40. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Control Risk
Testing activities
OSI: Transport Layer
Documentation and interview personnel
41. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
Network Layer Protocols
Control Unit
WAN Protocols
IT executives and the Board of Directors
42. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
Expected Error Rate
Function Point Analysis
Application Controls
Types of sampling an auditor can perform.
43. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
IT standards are not being reviewed often enough
Types of sampling an auditor can perform.
Blade Computer Architecture
A Compliance audit
44. Any event which is not part of the standard operation of service and which causes or may cause an interruption to or reduction in quality of that service. Includes THREE incident types: (1.) Service Outage (2.) Service Slowdown (3.) Software Bug
Rating Scale for Process Maturity
Structural fires and transportation accidents
The 5 types of Evidence that the auditor will collect during an audit.
Incident Management
45. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
TCP/IP Network Model
The Steering Committee
Cloud computing
PERT Diagram?
46. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Release management
The Steering Committee
An Integrated Audit
Sampling
47. An audit of operational efficiency.
ITIL definition of PROBLEM
IT Service Management
Deming Cycle
An Administrative
48. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
The best approach for identifying high risk areas for an audit
Detection Risk
The Release process
Tolerable Error Rate
49. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
BCP Plans
less than 24 hours
Detection Risk
The Internet Layer in the TCP/IP model
50. The highest number of errors that can exist without a result being materially misstated.
Tolerable Error Rate
TCP/IP Internet Layer
A Compliance audit
Primary security features of relational databases