SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
Frameworks
The two Categories of Controls
Risk Management
A Virtual Server
2. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
OSI: Physical Layer
SDLC Phases
IT Service Management
Disaster Recovery
3. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Inform the auditee
Wet pipe fire sprinkler system
Examples of Application Controls
Main types of Controls
4. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
The availability of IT systems
Types of sampling an auditor can perform.
ITIL - IT Infrastructure Library
SDLC Phases
5. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
A Service Provider audit
The audit program
IT Services Financial Management
Capability Maturity Model Integration (CMMI)
6. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
BCP Plans
Dimensions of the COSO cube
Gantt Chart
(1.) Polices (2.) Procedures (3.) Standards
7. A collection of two or more servers that is designed to appear as a single server.
Server cluster
Insourcing
Business Realization
Registers
8. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
OSI Layer 5: Session
A Virtual Server
Stop-or-go Sampling
Inherent Risk
9. The maximum period of downtime for a process or application
To identify the tasks that are responsible for project delays
Service Level Management
Recovery time objective
ITIL - IT Infrastructure Library
10. Defines internal controls and provides guidance for assessing and improving internal control systems.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
A Cold Site
Concentrate on samples known to represent high risk
Entire password for an encryption key
11. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
Employees with excessive privileges
TCP/IP Transport Layer packet delivery
Prblem Management
Current and most up-to-date
12. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
Categories of risk treatment
Options for Risk Treatment
Prblem Management
ITIL definition of PROBLEM
13. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
Dimensions of the COSO cube
Incident Management
The 4-item focus of a Balanced Scorecard
Recovery time objective
14. (1.) Authentication (2.) Authorization (3.) Change Management (4.) Completeness checks (5.) Validation checks (6.) Input controls (7.) Output controls (8.) Problem management (9.) Identification/access controls
Examples of Application Controls
Transport Layer Protocols
Project Management Strategies
Geographic location
15. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
Detection Risk
Types of sampling an auditor can perform.
Annualized Loss Expectance (ALE)
Precision means
16. Gantt: used to display ______________.
Grid Computing
TCP/IP Transport Layer
Criticality analysis
Resource details
17. The main hardware component of a computer system - which executes instructions in computer programs.
CPU
The Business Process Life Cycle
Insourcing
Background checks performed
18. Support the functioning of the application controls
Capability Maturity Model Integration (CMMI)
OSI: Data Link Layer
General Controls
The best approach for identifying high risk areas for an audit
19. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
Service Level Management
Employees with excessive privileges
Buffers
The 4-item focus of a Balanced Scorecard
20. A maturity model that represents the aggregations of other maturity models.
Transport Layer Protocols
TCP/IP Transport Layer packet delivery
Elements of the COSO pyramid
Capability Maturity Model Integration (CMMI)
21. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
Service Continuity Management
Critical Path Methodology
The typical Configuration Items in Configuration Management
Vulnerability in the organization's PBX
22. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
ISO 20000 Standard:
Expected Error Rate
A Compliance audit
The typical Configuration Items in Configuration Management
23. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
An Operational Audit
Controls
OSI: Data Link Layer
A Problem
24. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient
Testing activities
Balanced Scorecard
Sampling Risk
OSI: Transport Layer
25. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
IT Service Management
IT Services Financial Management
An Operational Audit
Elements of the COBIT Framework
26. Describes the effect on the business if a process is incapacitated for any appreciable time
Statement of Impact
Antivirus software on the email servers
Critical Path Methodology
Entire password for an encryption key
27. A field in a record in one table that can reference a primary key in another table that can reference a primary key in another table.
Foreign Key
Entire password for an encryption key
Audit Methodologies
Personnel involved in the requirements phase of a software development project
28. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
Documentation and interview personnel
Gantt Chart
Criticality analysis
Risk Management
29. An external IS auditor has discovered a _______________________ - The external auditor can only document the finding in the audit report. An external auditor is not in a position to implement controls.
Business impact analysis
An IS audit
Data Link Layer Standards
Segregation of duties issue in a high value process
30. Used to estimate the effort required to develop a software program.
Inherent Risk
Function Point Analysis
Entire password for an encryption key
Expected Error Rate
31. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
OSI: Transport Layer
Attribute Sampling
OSI: Data Link Layer
The best approach for identifying high risk areas for an audit
32. Concerned with electrical and physical specifications for devices. No frames or packets involved.
Stop-or-go Sampling
OSI: Physical Layer
Department Charters
Input validation checking
33. During an audit - the auditor should obtain 6 types of documents - (1.) Org charts (2.) ___________ (3.) third-party contracts (4.) policies and procedures (5.) standards (6.) system documentation
Department Charters
Background checks performed
The appropriate role of an IS auditor in a control self-assessment
The 5 types of Evidence that the auditor will collect during an audit.
34. The portion of IT management that tracks the financial value of IT services that support organizational objectives. It includes 4 activities: (1.) Budgeting (2.) Capital Investment (3.) Expense Management (4.) Project accounting and project ROI (Ret
Network Layer Protocols
Annualized Loss Expectance (ALE)
IT Services Financial Management
Information systems access
35. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Organizational culture and maturity
Background checks performed
An Operational Audit
The BCP process
36. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. (1.) General (2.) Application
TCP/IP Transport Layer packet delivery
Six steps of the Release Management process
Main types of Controls
objective and unbiased
38. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
Three Types of Controls
Advantages of outsourcing
To identify the tasks that are responsible for project delays
The Eight Types of Audits
39. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
Confidence coefficient
IT Service Management
Business Continuity
Substantive Testing
40. Used to measure the relative maturity of an organization and its processes.
ISO 20000 Standard:
A Compliance audit
Capability Maturity Model
Discovery Sampling
41. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
OSI: Transport Layer
Network Layer Protocols
Grid Computing
A Service Provider audit
42. The means by which management establishes and measures processes by which organizational objectives are achieved
Critical Path Methodology
Segregation of duties issue in a high value process
Controls
Antivirus software on the email servers
43. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
Recovery time objective
To identify the tasks that are responsible for project delays
Vulnerability in the organization's PBX
A Compliance audit
44. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
Input validation checking
Hash
A Virtual Server
The Release process
45. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
A Server Cluster
Dimensions of the COSO cube
CPU
Three Types of Controls
46. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP
Data Link Layer Standards
Hash
Annualized Loss Expectance (ALE)
(1.) Polices (2.) Procedures (3.) Standards
47. Individual events may often create combined threats to enterprise operations: A tornado might also spawn ____________________.
OSI: Transport Layer
Structural fires and transportation accidents
OSI Layer 5: Session
Options for Risk Treatment
48. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
(1.) Polices (2.) Procedures (3.) Standards
OSI: Transport Layer
CPU
Application Layer protocols
49. Collections of Controls that work together to achieve an entire range of an organization's objectives.
The appropriate role of an IS auditor in a control self-assessment
TCP/IP Network Model
A Sample Mean
Frameworks
50. IT Service Management is defined in ___________________ framework.
Attribute Sampling
ITIL - IT Infrastructure Library
Personnel involved in the requirements phase of a software development project
Concentrate on samples known to represent high risk