SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A Fire sprinkler system has water in its pipes - and sprinkler heads emit water only if the ambient temperature reaches 220 deg. F. This is a ________________. The system is charged with water and will discharge water out of any sprinkler head whose
Wet pipe fire sprinkler system
IT standards are not being reviewed often enough
Stop-or-go Sampling
Detection Risk
2. An external IS auditor has discovered a _______________________ - The external auditor can only document the finding in the audit report. An external auditor is not in a position to implement controls.
Segregation of duties issue in a high value process
CPU
IT Services Financial Management
Emergency Changes
3. PERT: shows the ______________ critical path.
Annualized Loss Expectance (ALE)
Expected Error Rate
Current and most up-to-date
(1.) Man-made (2.) Natural
4. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
The Software Program Library
Sampling Risk
Referential Integrity
Annualized Loss Expectance (ALE)
5. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Split custody
CPU
Sampling
IT Service Management
6. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Background checks performed
Volumes of COSO framework
Stay current with technology
Audit logging
7. Used to measure the relative maturity of an organization and its processes.
Vulnerability in the organization's PBX
Grid Computing
A Service Provider audit
Capability Maturity Model
8. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
Reduced sign-on
Personnel involved in the requirements phase of a software development project
Balanced Scorecard
Sampling Risk
9. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
Foreign Key
OSI Layer 5: Session
Statistical Sampling
Entire password for an encryption key
10. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Inform the auditee
Recovery time objective
Examples of Application Controls
The Requirements
11. The highest number of errors that can exist without a result being materially misstated.
Examples of IT General Controls
Structural fires and transportation accidents
Cloud computing
Tolerable Error Rate
12. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
Network Layer Protocols
Segregation of duties issue in a high value process
Sampling Risk
ITIL definition of CHANGE MANAGEMENT
13. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
A Financial Audit
Documentation and interview personnel
Referential Integrity
A gate process
14. To measure organizational performance and effectiveness against strategic goals.
Balanced Scorecard
The audit program
Examples of Application Controls
OSI: Data Link Layer
15. IT Service Management is defined in ___________________ framework.
A Problem
Application Layer protocols
ITIL - IT Infrastructure Library
Grid Computing
16. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Substantive Testing
Insourcing
Confidence coefficient
Notify the Audit Committee
17. (1.) Feasibility (2.) Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation
Judgmental sampling
List of systems examined
The 7 phases and their order in the SDLC
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
18. Contains programs that communicate directly with the end user.
A gate process
OSI Layer 7: Application
The BCP process
OSI: Network Layer
19. A collection of two or more servers that is designed to appear as a single server.
Application Layer protocols
Server cluster
IT Strategy
Information systems access
20. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
Audit Methodologies
A gate process
Database primary key
Attribute Sampling
21. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
Transport Layer Protocols
ITIL definition of CHANGE MANAGEMENT
Examples of IT General Controls
Network Layer Protocols
22. Used to determine which business processes are the most critical - by ranking them in order of criticality
ITIL definition of PROBLEM
Criticality analysis
Entire password for an encryption key
Application Layer protocols
23. Delivery of packets from one station to another - on the same network or on different networks.
Expected Error Rate
IT Service Management
Incident Management
The Internet Layer in the TCP/IP model
24. An audit of an IS department's operations and systems.
An IS audit
The two Categories of Controls
Foreign Key
CPU
25. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
The availability of IT systems
Attribute Sampling
Risk Management
OSI Layer 6: Presentation
26. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
A gate process
To identify the tasks that are responsible for project delays
Employees with excessive privileges
Statistical Sampling
27. Disasters are generally grouped in terms of type: ______________.
Organizational culture and maturity
The Release process
(1.) Man-made (2.) Natural
Primary security features of relational databases
28. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
Disaster Recovery
Business impact analysis
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Personnel involved in the requirements phase of a software development project
29. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
Separate administrative accounts
Categories of risk treatment
Expected Error Rate
A Cold Site
30. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
Volumes of COSO framework
Security Awareness program
A Compliance audit
Annualized Loss Expectance (ALE)
31. Defines internal controls and provides guidance for assessing and improving internal control systems.
Database primary key
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
IT standards are not being reviewed often enough
Compliance Testing
32. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
Formal waterfall
Sampling Risk
Separate administrative accounts
Database primary key
33. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
IT Service Management
ITIL definition of CHANGE MANAGEMENT
Split custody
Tolerable Error Rate
34. (1.) Access controls (2.) Encryption (3.) Audit logging
ITIL - IT Infrastructure Library
Balanced Scorecard
Primary security features of relational databases
An Integrated Audit
35. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them
IT Service Management
Attribute Sampling
TCP/IP Link Layer
Inherent Risk
36. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
WAN Protocols
Criticality analysis
Confidence coefficient
An Operational Audit
38. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Project change request
List of systems examined
Sample Standard Deviation
IT standards are not being reviewed often enough
39. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
Confidence coefficient
Database primary key
The typical Configuration Items in Configuration Management
Primary security features of relational databases
40. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Control Risk
OSI: Physical Layer
Sampling Risk
Attribute Sampling
41. Used to translate or transform data from lower layers into formats that the application layer can work with.
OSI: Data Link Layer
OSI Layer 6: Presentation
Overall audit risk
Notify the Audit Committee
42. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
Deming Cycle
The Business Process Life Cycle
Balanced Scorecard
Main types of Controls
43. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
Control Unit
Statement of Impact
Foreign Key
ITIL definition of CHANGE MANAGEMENT
44. A sampling technique where at least one exception is sought in a population
Information security policy
Prblem Management
Discovery Sampling
A Service Provider audit
45. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
CPU
Insourcing
Substantive Testing (test of transaction integrity)
Primary security features of relational databases
46. The sum of all samples divided by the number of samples.
Rating Scale for Process Maturity
Data Link Layer Standards
A Sample Mean
An IS audit
47. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
A Virtual Server
Resource details
Volumes of COSO framework
Reduced sign-on
48. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
BCP Plans
Business Continuity
Separate administrative accounts
Deming Cycle
49. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
Judgmental sampling
Compliance Testing
The audit program
Expected Error Rate
50. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
(1.) Polices (2.) Procedures (3.) Standards
The best approach for identifying high risk areas for an audit
Primary security features of relational databases
Employee termination process