SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
Configuration Management
Inherent Risk
Hash
Options for Risk Treatment
2. The risk that an IS auditor will overlook errors or exceptions during an audit.
Substantive Testing (test of transaction integrity)
Structural fires and transportation accidents
Types of sampling an auditor can perform.
Detection Risk
3. To measure organizational performance and effectiveness against strategic goals.
Balanced Scorecard
Capability Maturity Model
OSI: Data Link Layer
Three Types of Controls
4. During an audit - the auditor should obtain 6 types of documents - (1.) Org charts (2.) ___________ (3.) third-party contracts (4.) policies and procedures (5.) standards (6.) system documentation
The Business Process Life Cycle
TCP/IP Network Model
The first step in a business impact analysis
Department Charters
5. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
TCP/IP Transport Layer packet delivery
A gate process
The first step in a business impact analysis
Stratified Sampling
6. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
Antivirus software on the email servers
Controls
SDLC Phases
List of systems examined
7. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
An Operational Audit
The appropriate role of an IS auditor in a control self-assessment
Tolerable Error Rate
Statistical Sampling
8. The means by which management establishes and measures processes by which organizational objectives are achieved
Separate administrative accounts
Controls
Transport Layer Protocols
Inform the auditee
9. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
A Server Cluster
Database primary key
Categories of risk treatment
General Controls
10. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Emergency Changes
Business impact analysis
Elements of the COSO pyramid
A Cold Site
11. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
Stop-or-go Sampling
Statement of Impact
The Business Process Life Cycle
Release management
12. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
OSI Layer 6: Presentation
Examples of IT General Controls
The appropriate role of an IS auditor in a control self-assessment
Personnel involved in the requirements phase of a software development project
13. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
OSI Layer 5: Session
Inform the auditee
More difficult to perform
Application Controls
14. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Deming Cycle
Confidence coefficient
Buffers
The two Categories of Controls
15. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
Application Layer protocols
OSI: Data Link Layer
Employee termination process
Blade Computer Architecture
16. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
The Business Process Life Cycle
Information security policy
Dimensions of the COSO cube
A Problem
17. Disasters are generally grouped in terms of type: ______________.
Change management
The Requirements
A Service Provider audit
(1.) Man-made (2.) Natural
18. To review and approve proposed changes to systems and infrastructure. This helps to reduce the risk of unintended events and unplanned downtime.
Critical Path Methodology
The Internet Layer in the TCP/IP model
Options for Risk Treatment
Change management
19. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Lacks specific expertise or resources to conduct an internal audit
OSI: Network Layer
A gate process
TCP/IP Link Layer
20. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg
Concentrate on samples known to represent high risk
Recovery time objective
Overall audit risk
The BCP process
21. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
Examples of Application Controls
Primary security features of relational databases
A Compliance audit
Registers
22. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Sampling
Resource details
Sampling Risk
Network Layer Protocols
23. Any event which is not part of the standard operation of service and which causes or may cause an interruption to or reduction in quality of that service. Includes THREE incident types: (1.) Service Outage (2.) Service Slowdown (3.) Software Bug
The Steering Committee
Incident Management
(1.) Man-made (2.) Natural
Antivirus software on the email servers
24. One of a database table's fields - whose value is unique.
Personnel involved in the requirements phase of a software development project
Database primary key
ISO 20000 Standard:
Application Controls
25. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Hash
IT Service Management
Background checks performed
The audit program
26. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
Three Types of Controls
less than 24 hours
The appropriate role of an IS auditor in a control self-assessment
Frameworks
27. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
Examples of Application Controls
Referential Integrity
Insourcing
Judgmental sampling
28. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
PERT Diagram?
The first step in a business impact analysis
Network Layer Protocols
Prblem Management
29. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them
Risk Management
Inherent Risk
Discovery Sampling
Prblem Management
30. A sampling technique where at least one exception is sought in a population
Incident Management
Buffers
Discovery Sampling
Database primary key
31. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
Formal waterfall
Inherent Risk
Input validation checking
Criticality analysis
32. Framework for auditing and measuring IT Service Management Processes.
The typical Configuration Items in Configuration Management
IT standards are not being reviewed often enough
ISO 20000 Standard:
Buffers
33. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Prblem Management
Criticality analysis
Service Continuity Management
34. The sum of all samples divided by the number of samples.
Capability Maturity Model Integration (CMMI)
A Sample Mean
OSI: Physical Layer
Lacks specific expertise or resources to conduct an internal audit
35. The highest number of errors that can exist without a result being materially misstated.
Stratified Sampling
Substantive Testing
Tolerable Error Rate
Insourcing
36. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
Project change request
A Financial Audit
Stay current with technology
Risk Management
37. (1.) Link (2.) Internet (3.) Transport (4.) Application
The Business Process Life Cycle
TCP/IP Network Model
Function Point Analysis
Stay current with technology
38. What type of testing is performed to determine if control procedures have proper design and are operating properly?
Service Continuity Management
Sampling Risk
Compliance Testing
Emergency Changes
39. Focuses on: post-event recovery and restoration of services
Stratified Sampling
Disaster Recovery
Sampling
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
40. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
Release management
OSI: Data Link Layer
Annualized Loss Expectance (ALE)
Information security policy
41. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Examples of Application Controls
An Operational Audit
Substantive Testing
OSI: Transport Layer
42. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Release management
Primary security features of relational databases
Attribute Sampling
Elements of the COSO pyramid
43. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
ITIL definition of CHANGE MANAGEMENT
Audit Methodologies
The 7 phases and their order in the SDLC
Split custody
44. A maturity model that represents the aggregations of other maturity models.
Capability Maturity Model Integration (CMMI)
Audit Methodologies
Insourcing
Elements of the COSO pyramid
45. IT Service Management is defined in ___________________ framework.
ITIL - IT Infrastructure Library
Control Risk
Examples of IT General Controls
Recovery time objective
46. Gantt: used to display ______________.
Examples of IT General Controls
To identify the tasks that are responsible for project delays
Types of sampling an auditor can perform.
Resource details
47. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
The Eight Types of Audits
Application Layer protocols
List of systems examined
Expected Error Rate
48. To communication security policies - procedures - and other security-related information to an organization's employees.
The first step in a business impact analysis
Entire password for an encryption key
Options for Risk Treatment
Security Awareness program
49. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
Resource details
Vulnerability in the organization's PBX
objective and unbiased
Employees with excessive privileges
50. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Entire password for an encryption key
Grid Computing
The Steering Committee
Employee termination process