SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
Controls
The Release process
Department Charters
Information security policy
2. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
TCP/IP Internet Layer
Statement of Impact
Six steps of the Release Management process
Rating Scale for Process Maturity
3. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
A Problem
Types of sampling an auditor can perform.
To identify the tasks that are responsible for project delays
Substantive Testing
4. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
Application Controls
The Business Process Life Cycle
Formal waterfall
OSI: Physical Layer
5. (1.) Feasibility (2.) Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation
A Server Cluster
ITIL definition of CHANGE MANAGEMENT
The 7 phases and their order in the SDLC
Notify the Audit Committee
6. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
Audit logging
Application Layer protocols
Formal waterfall
WAN Protocols
7. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
OSI: Transport Layer
Compliance Testing
Substantive Testing (test of transaction integrity)
Referential Integrity
8. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
BCP Plans
Release management
Split custody
Information systems access
9. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.
TCP/IP Internet Layer
Blade Computer Architecture
TCP/IP Link Layer
PERT Diagram?
10. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
Expected Error Rate
Insourcing
Current and most up-to-date
Capability Maturity Model
11. (1.) Link (2.) Internet (3.) Transport (4.) Application
The Eight Types of Audits
TCP/IP Internet Layer
TCP/IP Network Model
Split custody
12. (1.) Physical (2.) Technical (4.) Administrative
Variable Sampling
Three Types of Controls
Project change request
Segregation of duties issue in a high value process
13. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
Business Continuity
Wet pipe fire sprinkler system
Documentation and interview personnel
Function Point Analysis
14. A representation of how closely a sample represents an entire population.
Precision means
The Business Process Life Cycle
A Sample Mean
Options for Risk Treatment
15. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
SDLC Phases
Substantive Testing
Expected Error Rate
An Operational Audit
16. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
To identify the tasks that are responsible for project delays
Antivirus software on the email servers
The availability of IT systems
TCP/IP Internet Layer
17. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
Business impact analysis
Personnel involved in the requirements phase of a software development project
The 5 types of Evidence that the auditor will collect during an audit.
The Business Process Life Cycle
18. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
The 4-item focus of a Balanced Scorecard
ITIL definition of PROBLEM
Elements of the COBIT Framework
Frameworks
19. Defines internal controls and provides guidance for assessing and improving internal control systems.
Statement of Impact
Business Continuity
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
ITIL definition of CHANGE MANAGEMENT
20. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
Stratified Sampling
Primary security features of relational databases
Three Types of Controls
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
21. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
Examples of Application Controls
List of systems examined
Variable Sampling
The availability of IT systems
22. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
An Administrative
Data Link Layer Standards
Entire password for an encryption key
Sampling Risk
23. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
Incident Management
Background checks performed
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
The first step in a business impact analysis
24. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
To identify the tasks that are responsible for project delays
OSI Layer 5: Session
Overall audit risk
Project change request
25. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
Testing activities
Precision means
Database primary key
The Internet Layer in the TCP/IP model
26. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Attribute Sampling
The availability of IT systems
Notify the Audit Committee
OSI Layer 6: Presentation
27. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
Change management
OSI Layer 5: Session
A Financial Audit
To identify the tasks that are responsible for project delays
28. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
TCP/IP Transport Layer
The Software Program Library
Sample Standard Deviation
Input validation checking
29. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
(1.) Man-made (2.) Natural
Expected Error Rate
Release management
The appropriate role of an IS auditor in a control self-assessment
30. A sampling technique where at least one exception is sought in a population
Grid Computing
Split custody
Discovery Sampling
Blade Computer Architecture
31. To review and approve proposed changes to systems and infrastructure. This helps to reduce the risk of unintended events and unplanned downtime.
Concentrate on samples known to represent high risk
Main types of Controls
Change management
ITIL definition of PROBLEM
32. Delivery of packets from one station to another - on the same network or on different networks.
The Internet Layer in the TCP/IP model
Dimensions of the COSO cube
Employees with excessive privileges
Power system controls
33. (1.) Automatic (2.) Manual
OSI Layer 7: Application
Employees with excessive privileges
The two Categories of Controls
Balanced Scorecard
34. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.
CPU
The audit program
Service Level Management
A Forensic Audit
35. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
Frameworks
Audit logging
Blade Computer Architecture
Examples of IT General Controls
36. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
Prblem Management
Hash
The 5 types of Evidence that the auditor will collect during an audit.
OSI Layer 7: Application
38. A field in a record in one table that can reference a primary key in another table that can reference a primary key in another table.
ITIL definition of PROBLEM
less than 24 hours
Statistical Sampling
Foreign Key
39. An audit that is performed in support of an anticipated or active legal proceeding.
A Forensic Audit
Six steps of the Release Management process
Sampling
A gate process
40. PERT: shows the ______________ critical path.
Configuration Management
Control Unit
The availability of IT systems
Current and most up-to-date
41. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
Power system controls
TCP/IP Internet Layer
Project change request
Disaster Recovery
42. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
Emergency Changes
Separate administrative accounts
Stop-or-go Sampling
List of systems examined
43. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
CPU
Confidence coefficient
IT Strategy
Overall audit risk
44. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
Controls
Reduced sign-on
Substantive Testing (test of transaction integrity)
Capability Maturity Model Integration (CMMI)
45. The portion of IT management that tracks the financial value of IT services that support organizational objectives. It includes 4 activities: (1.) Budgeting (2.) Capital Investment (3.) Expense Management (4.) Project accounting and project ROI (Ret
Judgmental sampling
BCP Plans
OSI: Physical Layer
IT Services Financial Management
46. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Hash
Gantt Chart
Input validation checking
Discovery Sampling
47. An alternate processing center that contains no information processing equipment.
Split custody
Volumes of COSO framework
A Cold Site
Blade Computer Architecture
48. Application controls limit ___________ in three ways: (1.) Point of Entry (Input Controls) (2.) During consumption (process controls) (3.) At the point of expression (Output Controls)
OSI: Physical Layer
Inherent Risk
Information systems access
Variable Sampling
49. A collection of two or more servers that is designed to appear as a single server.
A Cold Site
Server cluster
Department Charters
A Problem
50. Lowest layer. Delivers messages (frames) from one station to another vial local network.
TCP/IP Link Layer
Substantive Testing
The BCP process
TCP/IP Network Model
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests