SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Concerned with electrical and physical specifications for devices. No frames or packets involved.
OSI: Physical Layer
Three Types of Controls
(1.) Man-made (2.) Natural
Sample Standard Deviation
2. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Volumes of COSO framework
A Virtual Server
Testing activities
Inherent Risk
3. Subjective sampling is used when the auditor wants to _________________________.
Concentrate on samples known to represent high risk
OSI Layer 5: Session
Input validation checking
An Operational Audit
4. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
Transport Layer Protocols
Employees with excessive privileges
Formal waterfall
Critical Path Methodology
5. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
Split custody
Detection Risk
Buffers
Blade Computer Architecture
6. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
Assess the maturity of its business processes
More difficult to perform
Structural fires and transportation accidents
Server cluster
7. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
Rating Scale for Process Maturity
Input validation checking
Discovery Sampling
Volumes of COSO framework
8. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
IT Service Management
Elements of the COSO pyramid
Statistical Sampling
The typical Configuration Items in Configuration Management
9. A field in a record in one table that can reference a primary key in another table that can reference a primary key in another table.
Resource details
Documentation and interview personnel
Foreign Key
Power system controls
10. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
Information security policy
Personnel involved in the requirements phase of a software development project
(1.) Polices (2.) Procedures (3.) Standards
Organizational culture and maturity
11. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
TCP/IP Transport Layer packet delivery
Stratified Sampling
Discovery Sampling
The availability of IT systems
12. Collections of Controls that work together to achieve an entire range of an organization's objectives.
Rating Scale for Process Maturity
Current and most up-to-date
Frameworks
Inform the auditee
13. Used to measure the relative maturity of an organization and its processes.
An Administrative
To identify the tasks that are responsible for project delays
Testing activities
Capability Maturity Model
14. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
A Virtual Server
Volumes of COSO framework
Segregation of duties issue in a high value process
Audit logging
15. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.
objective and unbiased
IT executives and the Board of Directors
Risk Management
TCP/IP Internet Layer
16. Consists of two main packet transport protocols: TCP and UDP.
TCP/IP Transport Layer
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
The 7 phases and their order in the SDLC
TCP/IP Internet Layer
17. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
ITIL definition of PROBLEM
Judgmental sampling
OSI: Data Link Layer
Segregation of duties issue in a high value process
18. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
Control Unit
IT standards are not being reviewed often enough
TCP/IP Link Layer
Sample Standard Deviation
19. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
ITIL - IT Infrastructure Library
Precision means
Elements of the COSO pyramid
TCP/IP Internet Layer
20. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
IT standards are not being reviewed often enough
Disaster Recovery
Substantive Testing (test of transaction integrity)
Wet pipe fire sprinkler system
21. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
Antivirus software on the email servers
Function Point Analysis
Documentation and interview personnel
Inherent Risk
22. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Types of sampling an auditor can perform.
Emergency Changes
Input validation checking
Statement of Impact
23. The inventory of all in-scope business processes and systems
Business Realization
The first step in a business impact analysis
Assess the maturity of its business processes
A Forensic Audit
24. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
The audit program
A Problem
The 7 phases and their order in the SDLC
Compliance Testing
25. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
OSI: Transport Layer
Input validation checking
ITIL definition of CHANGE MANAGEMENT
Gantt Chart
26. The maximum period of downtime for a process or application
Recovery time objective
OSI: Data Link Layer
A Server Cluster
Categories of risk treatment
27. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
IT Strategy
A Cold Site
A gate process
Control Risk
28. The highest number of errors that can exist without a result being materially misstated.
Tolerable Error Rate
ISO 20000 Standard:
Balanced Scorecard
Structural fires and transportation accidents
29. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
A Problem
Audit Methodologies
Testing activities
The 7 phases and their order in the SDLC
30. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
Transport Layer Protocols
The Eight Types of Audits
A Compliance audit
Sample Standard Deviation
31. An alternate processing center that contains no information processing equipment.
Rating Scale for Process Maturity
less than 24 hours
A Cold Site
Stay current with technology
32. IT Governance is most concerned with ________.
The best approach for identifying high risk areas for an audit
Volumes of COSO framework
IT Strategy
Split custody
33. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
TCP/IP Internet Layer
Notify the Audit Committee
Statement of Impact
Volumes of COSO framework
34. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
Current and most up-to-date
TCP/IP Transport Layer packet delivery
OSI: Physical Layer
Types of sampling an auditor can perform.
35. One of a database table's fields - whose value is unique.
Database primary key
Application Layer protocols
less than 24 hours
Blade Computer Architecture
36. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them
Inherent Risk
Capability Maturity Model Integration (CMMI)
Foreign Key
An Integrated Audit
37. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
Cloud computing
Release management
ITIL definition of CHANGE MANAGEMENT
The Business Process Life Cycle
38. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
SDLC Phases
Substantive Testing (test of transaction integrity)
Statement of Impact
Types of sampling an auditor can perform.
39. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
Stratified Sampling
Service Level Management
Service Continuity Management
Structural fires and transportation accidents
40. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
Elements of the COBIT Framework
Organizational culture and maturity
An IS audit
Stay current with technology
41. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
Examples of Application Controls
Application Layer protocols
The best approach for identifying high risk areas for an audit
Risk Management
42. Disasters are generally grouped in terms of type: ______________.
Business Continuity
(1.) Man-made (2.) Natural
WAN Protocols
Transport Layer Protocols
43. The party that performs strategic planning - addresses near-term and long-term requirements aligning business objectives - and technology strategies.
Formal waterfall
The two Categories of Controls
The Steering Committee
Structural fires and transportation accidents
44. Guide program execution through organization of resources and development of clear project objectives.
Project Management Strategies
Information systems access
Service Continuity Management
TCP/IP Internet Layer
45. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
ITIL - IT Infrastructure Library
WAN Protocols
Categories of risk treatment
Separate administrative accounts
46. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
Buffers
The availability of IT systems
Network Layer Protocols
A Server Cluster
47. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
ITIL definition of PROBLEM
Risk Management
Grid Computing
Business Realization
48. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Business impact analysis
Options for Risk Treatment
Input validation checking
An Operational Audit
49. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
An IS audit
The Software Program Library
Structural fires and transportation accidents
Sampling Risk
50. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Cloud computing
The Requirements
OSI: Data Link Layer
The Business Process Life Cycle