SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
Information systems access
Criticality analysis
The typical Configuration Items in Configuration Management
Three Types of Controls
2. The inventory of all in-scope business processes and systems
The first step in a business impact analysis
Capability Maturity Model Integration (CMMI)
OSI: Physical Layer
A Compliance audit
3. An audit that is performed in support of an anticipated or active legal proceeding.
Judgmental sampling
A Forensic Audit
OSI: Transport Layer
Change management
4. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
TCP/IP Transport Layer packet delivery
Employees with excessive privileges
Antivirus software on the email servers
SDLC Phases
5. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.
TCP/IP Internet Layer
Criticality analysis
A Problem
Main types of Controls
6. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.
Configuration Management
A Forensic Audit
Database primary key
less than 24 hours
7. A Fire sprinkler system has water in its pipes - and sprinkler heads emit water only if the ambient temperature reaches 220 deg. F. This is a ________________. The system is charged with water and will discharge water out of any sprinkler head whose
Capability Maturity Model
Wet pipe fire sprinkler system
Configuration Management
The best approach for identifying high risk areas for an audit
8. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Overall audit risk
Attribute Sampling
A Server Cluster
More difficult to perform
9. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
TCP/IP Network Model
The availability of IT systems
Detection Risk
An Administrative
10. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient
Cloud computing
Current and most up-to-date
Sampling Risk
Capability Maturity Model
11. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
OSI Layer 6: Presentation
TCP/IP Network Model
The appropriate role of an IS auditor in a control self-assessment
Data Link Layer Standards
12. (1.) Physical (2.) Technical (4.) Administrative
Deming Cycle
Three Types of Controls
Audit logging
ITIL definition of CHANGE MANAGEMENT
13. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Configuration Management
Incident Management
Rating Scale for Process Maturity
Inform the auditee
14. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
Sampling
Options for Risk Treatment
ITIL definition of PROBLEM
The BCP process
15. A field in a record in one table that can reference a primary key in another table that can reference a primary key in another table.
Separate administrative accounts
Reduced sign-on
Foreign Key
An Administrative
16. What type of testing is performed to determine if control procedures have proper design and are operating properly?
Confidence coefficient
Documentation and interview personnel
CPU
Compliance Testing
17. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Blade Computer Architecture
Information systems access
Volumes of COSO framework
Types of sampling an auditor can perform.
18. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
Resource details
Business Realization
Hash
Types of sampling an auditor can perform.
19. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
Application Layer protocols
Advantages of outsourcing
Application Controls
WAN Protocols
20. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Substantive Testing (test of transaction integrity)
IT Strategy
IT standards are not being reviewed often enough
Variable Sampling
21. IT Service Management is defined in ___________________ framework.
ITIL - IT Infrastructure Library
Stratified Sampling
A Problem
A gate process
22. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
Inherent Risk
The Requirements
The audit program
Database primary key
23. The portion of IT management that tracks the financial value of IT services that support organizational objectives. It includes 4 activities: (1.) Budgeting (2.) Capital Investment (3.) Expense Management (4.) Project accounting and project ROI (Ret
The Requirements
OSI: Network Layer
IT Services Financial Management
Dimensions of the COSO cube
24. The highest number of errors that can exist without a result being materially misstated.
Annualized Loss Expectance (ALE)
Expected Error Rate
The Software Program Library
Tolerable Error Rate
25. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
Documentation and interview personnel
Annualized Loss Expectance (ALE)
The Internet Layer in the TCP/IP model
Volumes of COSO framework
26. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
Release management
OSI Layer 7: Application
Elements of the COBIT Framework
The 5 types of Evidence that the auditor will collect during an audit.
27. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
More difficult to perform
Discovery Sampling
Attribute Sampling
Overall audit risk
28. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Substantive Testing
Information systems access
Discovery Sampling
A Service Provider audit
29. Contains programs that communicate directly with the end user.
Geographic location
Antivirus software on the email servers
OSI Layer 7: Application
TCP/IP Transport Layer
30. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Vulnerability in the organization's PBX
WAN Protocols
Confidence coefficient
The first step in a business impact analysis
31. One of a database table's fields - whose value is unique.
Database primary key
Overall audit risk
OSI: Data Link Layer
A Financial Audit
32. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
Business Continuity
Resource details
Hash
Sampling
33. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
Power system controls
Substantive Testing
Project Management Strategies
TCP/IP Network Model
34. (1.) General (2.) Application
Service Continuity Management
Main types of Controls
Transport Layer Protocols
CPU
35. 1.) Executive Support (2.) Well-defined roles and responsibilities.
Elements of the COBIT Framework
An Integrated Audit
Categories of risk treatment
Information security policy
36. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
TCP/IP Network Model
The best approach for identifying high risk areas for an audit
Capability Maturity Model Integration (CMMI)
Elements of the COSO pyramid
37. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
General Controls
Gantt Chart
Balanced Scorecard
Capability Maturity Model Integration (CMMI)
38. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
OSI: Physical Layer
Documentation and interview personnel
The 5 types of Evidence that the auditor will collect during an audit.
An Administrative
39. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
The two Categories of Controls
objective and unbiased
Emergency Changes
IT standards are not being reviewed often enough
40. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
The best approach for identifying high risk areas for an audit
Assess the maturity of its business processes
Personnel involved in the requirements phase of a software development project
Business Continuity
41. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
The audit program
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
OSI: Data Link Layer
Frameworks
42. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Notify the Audit Committee
TCP/IP Network Model
To identify the tasks that are responsible for project delays
The 7 phases and their order in the SDLC
43. Delivery of packets from one station to another - on the same network or on different networks.
Capability Maturity Model
The Internet Layer in the TCP/IP model
Detection Risk
Stratified Sampling
44. Used to translate or transform data from lower layers into formats that the application layer can work with.
Input validation checking
Critical Path Methodology
ISO 20000 Standard:
OSI Layer 6: Presentation
45. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Entire password for an encryption key
OSI: Network Layer
Types of sampling an auditor can perform.
Separate administrative accounts
46. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Information security policy
A Virtual Server
Critical Path Methodology
47. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
Main types of Controls
OSI Layer 5: Session
Power system controls
A Financial Audit
48. Guide program execution through organization of resources and development of clear project objectives.
Information systems access
Server cluster
Project Management Strategies
The 7 phases and their order in the SDLC
49. Individual events may often create combined threats to enterprise operations: A tornado might also spawn ____________________.
Precision means
Testing activities
Structural fires and transportation accidents
Overall audit risk
50. The party that performs strategic planning - addresses near-term and long-term requirements aligning business objectives - and technology strategies.
OSI: Data Link Layer
Discovery Sampling
The Steering Committee
less than 24 hours