SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Project change request
The Eight Types of Audits
IT executives and the Board of Directors
Attribute Sampling
2. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
Insourcing
(1.) Polices (2.) Procedures (3.) Standards
Deming Cycle
Documentation and interview personnel
3. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. Collections of Controls that work together to achieve an entire range of an organization's objectives.
A Problem
Structural fires and transportation accidents
Concentrate on samples known to represent high risk
Frameworks
5. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
A Compliance audit
Database primary key
Deming Cycle
An Administrative
6. The main hardware component of a computer system - which executes instructions in computer programs.
Options for Risk Treatment
CPU
Sampling Risk
Project change request
7. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.
Service Level Management
Grid Computing
Examples of IT General Controls
Reduced sign-on
8. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
OSI Layer 5: Session
A Virtual Server
An Integrated Audit
ITIL definition of PROBLEM
9. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
Employees with excessive privileges
OSI Layer 5: Session
IT Strategy
Testing activities
10. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg
The BCP process
Overall audit risk
The 4-item focus of a Balanced Scorecard
Formal waterfall
11. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
A Financial Audit
Sampling Risk
CPU
Statement of Impact
12. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
ITIL - IT Infrastructure Library
The Release process
Statement of Impact
Variable Sampling
13. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
Server cluster
Input validation checking
Frameworks
Data Link Layer Standards
14. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP
Project change request
OSI: Data Link Layer
Data Link Layer Standards
Service Level Management
15. Defines internal controls and provides guidance for assessing and improving internal control systems.
Buffers
SDLC Phases
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Separate administrative accounts
16. An audit that is performed in support of an anticipated or active legal proceeding.
ISO 20000 Standard:
SDLC Phases
A Forensic Audit
less than 24 hours
17. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
OSI Layer 6: Presentation
An Operational Audit
Formal waterfall
Categories of risk treatment
18. Support the functioning of the application controls
A Compliance audit
General Controls
Documentation and interview personnel
Inherent Risk
19. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
A Financial Audit
Audit logging
Control Risk
Elements of the COBIT Framework
20. Used to translate or transform data from lower layers into formats that the application layer can work with.
OSI Layer 6: Presentation
(1.) Man-made (2.) Natural
Inherent Risk
TCP/IP Transport Layer packet delivery
21. An audit of operational efficiency.
An Administrative
A Forensic Audit
Detection Risk
A Compliance audit
22. (1.) Automatic (2.) Manual
The two Categories of Controls
OSI: Transport Layer
Advantages of outsourcing
The Software Program Library
23. The memory locations in the CPU where arithmetic values are stored.
An Integrated Audit
Service Continuity Management
Power system controls
Registers
24. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
IT executives and the Board of Directors
Detection Risk
Three Types of Controls
Grid Computing
25. The highest number of errors that can exist without a result being materially misstated.
Tolerable Error Rate
The Steering Committee
An Integrated Audit
(1.) Man-made (2.) Natural
26. A collection of two or more servers that is designed to appear as a single server.
Server cluster
Main types of Controls
WAN Protocols
Audit Methodologies
27. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
Types of sampling an auditor can perform.
Tolerable Error Rate
List of systems examined
Documentation and interview personnel
28. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Substantive Testing (test of transaction integrity)
BCP Plans
Transport Layer Protocols
Rating Scale for Process Maturity
29. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
The 5 types of Evidence that the auditor will collect during an audit.
Primary security features of relational databases
Types of sampling an auditor can perform.
Categories of risk treatment
30. IT Governance is most concerned with ________.
IT Strategy
Confidence coefficient
Statement of Impact
Discovery Sampling
31. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Tolerable Error Rate
IT Services Financial Management
Cloud computing
Main types of Controls
32. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
Antivirus software on the email servers
Separate administrative accounts
IT Service Management
Database primary key
33. A Fire sprinkler system has water in its pipes - and sprinkler heads emit water only if the ambient temperature reaches 220 deg. F. This is a ________________. The system is charged with water and will discharge water out of any sprinkler head whose
A Sample Mean
Geographic location
Compliance Testing
Wet pipe fire sprinkler system
34. ____________________ of the hot site is most important consideration for site selection. IF they are too close together then a single event may involve both locations
Examples of Application Controls
OSI: Network Layer
Security Awareness program
Geographic location
35. (1.) General (2.) Application
Recovery time objective
Judgmental sampling
Main types of Controls
Wet pipe fire sprinkler system
36. Consists of two main packet transport protocols: TCP and UDP.
TCP/IP Transport Layer
An Operational Audit
The two Categories of Controls
Organizational culture and maturity
37. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
The Steering Committee
Configuration Management
Power system controls
General Controls
38. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
Referential Integrity
The Requirements
Discovery Sampling
Control Risk
39. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Audit logging
Stratified Sampling
Assess the maturity of its business processes
The Release process
40. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
(1.) Polices (2.) Procedures (3.) Standards
Release management
Emergency Changes
Statistical Sampling
41. To communication security policies - procedures - and other security-related information to an organization's employees.
Balanced Scorecard
Security Awareness program
ITIL definition of PROBLEM
Registers
42. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
Grid Computing
The availability of IT systems
Testing activities
Assess the maturity of its business processes
43. A sampling technique where at least one exception is sought in a population
Grid Computing
Discovery Sampling
objective and unbiased
Examples of Application Controls
44. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
The Requirements
The Release process
Inherent Risk
Background checks performed
45. An alternate processing center that contains no information processing equipment.
A Cold Site
Critical Path Methodology
Stratified Sampling
less than 24 hours
46. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient
Sampling Risk
A Virtual Server
Testing activities
Dimensions of the COSO cube
47. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
Rating Scale for Process Maturity
The audit program
Wet pipe fire sprinkler system
The Internet Layer in the TCP/IP model
48. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
Stop-or-go Sampling
More difficult to perform
Examples of IT General Controls
Resource details
49. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Stay current with technology
Lacks specific expertise or resources to conduct an internal audit
TCP/IP Network Model
Split custody
50. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Cloud computing
The two Categories of Controls
Expected Error Rate
Hash