SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (1.) Access controls (2.) Encryption (3.) Audit logging
Blade Computer Architecture
Separate administrative accounts
Primary security features of relational databases
Referential Integrity
2. Gantt: used to display ______________.
Precision means
The Software Program Library
Resource details
Stay current with technology
3. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
Statistical Sampling
Inform the auditee
Testing activities
Annualized Loss Expectance (ALE)
4. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
An Integrated Audit
Separate administrative accounts
Information systems access
Tolerable Error Rate
5. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.
Business Realization
The availability of IT systems
Configuration Management
Documentation and interview personnel
6. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Control Unit
Emergency Changes
Formal waterfall
Advantages of outsourcing
7. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Inherent Risk
Inform the auditee
Cloud computing
Server cluster
8. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
The Software Program Library
TCP/IP Transport Layer packet delivery
ISO 20000 Standard:
The typical Configuration Items in Configuration Management
9. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
Change management
Function Point Analysis
Elements of the COBIT Framework
Antivirus software on the email servers
10. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
WAN Protocols
Primary security features of relational databases
The appropriate role of an IS auditor in a control self-assessment
Annualized Loss Expectance (ALE)
11. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
The Business Process Life Cycle
Wet pipe fire sprinkler system
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Documentation and interview personnel
12. PERT: shows the ______________ critical path.
Current and most up-to-date
Department Charters
The Business Process Life Cycle
Separate administrative accounts
13. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
TCP/IP Transport Layer
To identify the tasks that are responsible for project delays
Project change request
Judgmental sampling
14. IT Service Management is defined in ___________________ framework.
Current and most up-to-date
ITIL - IT Infrastructure Library
An Administrative
Options for Risk Treatment
15. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
Volumes of COSO framework
A Problem
Capability Maturity Model
Separate administrative accounts
16. An audit of an IS department's operations and systems.
An IS audit
Resource details
Notify the Audit Committee
A Sample Mean
17. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
less than 24 hours
Deming Cycle
Stay current with technology
A Service Provider audit
18. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
The Steering Committee
Documentation and interview personnel
Employees with excessive privileges
Department Charters
19. An audit that combines an operational audit and a financial audit.
Inherent Risk
Control Risk
Transport Layer Protocols
An Integrated Audit
20. Concerned with electrical and physical specifications for devices. No frames or packets involved.
OSI: Physical Layer
Insourcing
Categories of risk treatment
Business Realization
21. ITIL term used to describe the SDLC.
Gantt Chart
Resource details
Release management
The Release process
22. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
Registers
Attribute Sampling
Business Realization
Elements of the COBIT Framework
23. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
Insourcing
Volumes of COSO framework
WAN Protocols
ITIL definition of PROBLEM
24. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
Assess the maturity of its business processes
Control Unit
Critical Path Methodology
Controls
25. An audit of operational efficiency.
The Requirements
A gate process
Gantt Chart
An Administrative
26. Individual events may often create combined threats to enterprise operations: A tornado might also spawn ____________________.
Structural fires and transportation accidents
To identify the tasks that are responsible for project delays
Service Level Management
SDLC Phases
27. To measure organizational performance and effectiveness against strategic goals.
Sampling
Blade Computer Architecture
Balanced Scorecard
Primary security features of relational databases
28. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
BCP Plans
The first step in a business impact analysis
The 5 types of Evidence that the auditor will collect during an audit.
Controls
29. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
The Software Program Library
Types of sampling an auditor can perform.
Network Layer Protocols
Gantt Chart
30. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
TCP/IP Transport Layer packet delivery
IT standards are not being reviewed often enough
Frameworks
Control Risk
31. The risk that an IS auditor will overlook errors or exceptions during an audit.
Detection Risk
Prblem Management
Separate administrative accounts
Segregation of duties issue in a high value process
32. The maximum period of downtime for a process or application
Control Unit
less than 24 hours
Notify the Audit Committee
Recovery time objective
33. Used to determine which business processes are the most critical - by ranking them in order of criticality
Documentation and interview personnel
Criticality analysis
Six steps of the Release Management process
Employees with excessive privileges
34. A representation of how closely a sample represents an entire population.
TCP/IP Transport Layer
Precision means
Hash
Segregation of duties issue in a high value process
35. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP
Service Level Management
Data Link Layer Standards
Cloud computing
The Software Program Library
36. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
Attribute Sampling
Project Management Strategies
Advantages of outsourcing
List of systems examined
37. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
Notify the Audit Committee
Structural fires and transportation accidents
An Administrative
The 5 types of Evidence that the auditor will collect during an audit.
38. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
less than 24 hours
Documentation and interview personnel
Blade Computer Architecture
Notify the Audit Committee
39. Defines internal controls and provides guidance for assessing and improving internal control systems.
Information systems access
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
OSI: Physical Layer
ITIL definition of PROBLEM
40. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
The two Categories of Controls
OSI Layer 5: Session
To identify the tasks that are responsible for project delays
The BCP process
41. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
OSI: Transport Layer
ITIL definition of CHANGE MANAGEMENT
Power system controls
The typical Configuration Items in Configuration Management
42. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
Emergency Changes
Stratified Sampling
Control Unit
Elements of the COBIT Framework
43. During an audit - the auditor should obtain 6 types of documents - (1.) Org charts (2.) ___________ (3.) third-party contracts (4.) policies and procedures (5.) standards (6.) system documentation
Department Charters
Geographic location
Statement of Impact
Inherent Risk
44. An auditor has discovered several errors in user account management: many terminated employees' computer accounts are still active. The best course of action - To improve the _________________ to reduce the number of exceptions. For a time - the proc
Prblem Management
Employee termination process
Buffers
Disaster Recovery
45. To communication security policies - procedures - and other security-related information to an organization's employees.
Concentrate on samples known to represent high risk
Three Types of Controls
A Service Provider audit
Security Awareness program
46. Handle application processing
SDLC Phases
Application Controls
Notify the Audit Committee
Server cluster
47. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
The Eight Types of Audits
Grid Computing
The best approach for identifying high risk areas for an audit
Capability Maturity Model Integration (CMMI)
48. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Testing activities
A Financial Audit
Lacks specific expertise or resources to conduct an internal audit
TCP/IP Network Model
49. The portion of IT management that tracks the financial value of IT services that support organizational objectives. It includes 4 activities: (1.) Budgeting (2.) Capital Investment (3.) Expense Management (4.) Project accounting and project ROI (Ret
Emergency Changes
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
IT Services Financial Management
Security Awareness program
50. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
OSI: Physical Layer
Grid Computing
Split custody
Sampling