Test your basic knowledge |

CISA: Certified Information Systems Auditor

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.






2. The sum of all samples divided by the number of samples.






3. A technique that is used to select a portion of a population when it is not feasible to test an entire population.






4. (1.) General (2.) Application






5. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication






6. An audit of operational efficiency.






7. A representation of how closely a sample represents an entire population.






8. The main hardware component of a computer system - which executes instructions in computer programs.






9. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk






10. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.






11. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management






12. What type of testing is performed to determine if control procedures have proper design and are operating properly?






13. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes






14. ITIL term used to describe the SDLC.






15. The first major task in a disaster recovery or business continuity planning project.






16. During an audit - the auditor should obtain 6 types of documents - (1.) Org charts (2.) ___________ (3.) third-party contracts (4.) policies and procedures (5.) standards (6.) system documentation






17. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?






18. Concerned with electrical and physical specifications for devices. No frames or packets involved.






19. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.






20. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.






21. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment






22. Consists of two main packet transport protocols: TCP and UDP.






23. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.






24. Collections of Controls that work together to achieve an entire range of an organization's objectives.






25. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.






26. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.






27. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery






28. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices






29. Defines internal controls and provides guidance for assessing and improving internal control systems.






30. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC






31. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.






32. PERT: shows the ______________ critical path.






33. A critical application is backed up once per day. The recovery point objective (RPO) for an application that is backed up once per day cannot be ________.






34. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.






35. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.






36. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.






37. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences






38. A collection of two or more servers that is designed to appear as a single server.






39. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg






40. A maturity model that represents the aggregations of other maturity models.






41. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.






42. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.






43. (1.) Link (2.) Internet (3.) Transport (4.) Application






44. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified






45. A Fire sprinkler system has water in its pipes - and sprinkler heads emit water only if the ambient temperature reaches 220 deg. F. This is a ________________. The system is charged with water and will discharge water out of any sprinkler head whose






46. Any event which is not part of the standard operation of service and which causes or may cause an interruption to or reduction in quality of that service. Includes THREE incident types: (1.) Service Outage (2.) Service Slowdown (3.) Software Bug






47. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)






48. Subjective sampling is used when the auditor wants to _________________________.






49. Disasters are generally grouped in terms of type: ______________.






50. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.