SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
Disaster Recovery
A Virtual Server
Input validation checking
OSI: Transport Layer
2. Guide program execution through organization of resources and development of clear project objectives.
Project Management Strategies
Stay current with technology
Six steps of the Release Management process
Capability Maturity Model Integration (CMMI)
3. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
Insourcing
Transport Layer Protocols
Types of sampling an auditor can perform.
Rating Scale for Process Maturity
4. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
Business Continuity
Control Unit
Personnel involved in the requirements phase of a software development project
Risk Management
5. What type of testing is performed to determine if control procedures have proper design and are operating properly?
A Forensic Audit
Registers
The Steering Committee
Compliance Testing
6. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
An Administrative
Overall audit risk
Inform the auditee
IT executives and the Board of Directors
7. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Overall audit risk
TCP/IP Network Model
Stratified Sampling
A Problem
8. The first major task in a disaster recovery or business continuity planning project.
ITIL - IT Infrastructure Library
Business impact analysis
Precision means
Confidence coefficient
9. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Dimensions of the COSO cube
Frameworks
Annualized Loss Expectance (ALE)
Confidence coefficient
10. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
A Forensic Audit
Substantive Testing
TCP/IP Link Layer
OSI Layer 7: Application
11. 1.) Executive Support (2.) Well-defined roles and responsibilities.
Business Continuity
Information security policy
A Virtual Server
(1.) Man-made (2.) Natural
12. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
More difficult to perform
The Software Program Library
Resource details
Business Realization
13. A Fire sprinkler system has water in its pipes - and sprinkler heads emit water only if the ambient temperature reaches 220 deg. F. This is a ________________. The system is charged with water and will discharge water out of any sprinkler head whose
Criticality analysis
The Software Program Library
An Administrative
Wet pipe fire sprinkler system
14. Used to estimate the effort required to develop a software program.
Critical Path Methodology
Function Point Analysis
Annualized Loss Expectance (ALE)
Main types of Controls
15. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
Assess the maturity of its business processes
A Sample Mean
List of systems examined
A Virtual Server
16. Consists of two main packet transport protocols: TCP and UDP.
Rating Scale for Process Maturity
TCP/IP Transport Layer
Sample Standard Deviation
Capability Maturity Model Integration (CMMI)
17. An auditor has discovered several errors in user account management: many terminated employees' computer accounts are still active. The best course of action - To improve the _________________ to reduce the number of exceptions. For a time - the proc
Employee termination process
Business Continuity
Statistical Sampling
Function Point Analysis
18. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
Discovery Sampling
Three Types of Controls
The Release process
SDLC Phases
19. An audit that is performed in support of an anticipated or active legal proceeding.
Compliance Testing
The 4-item focus of a Balanced Scorecard
A Forensic Audit
Blade Computer Architecture
20. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
Change management
A Forensic Audit
Sample Standard Deviation
Service Continuity Management
21. A sampling technique where items are chosen based upon the auditor's judgment - usually based on risk or materiality.
Release management
Criticality analysis
Judgmental sampling
List of systems examined
22. (1.) Automatic (2.) Manual
Application Layer protocols
Formal waterfall
The two Categories of Controls
Expected Error Rate
23. Individual events may often create combined threats to enterprise operations: A tornado might also spawn ____________________.
Structural fires and transportation accidents
Criticality analysis
BCP Plans
IT Services Financial Management
24. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
Three Types of Controls
Examples of IT General Controls
A Compliance audit
IT Service Management
25. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Attribute Sampling
A Virtual Server
The 5 types of Evidence that the auditor will collect during an audit.
The availability of IT systems
26. (1.) General (2.) Application
Variable Sampling
Notify the Audit Committee
Main types of Controls
Audit Methodologies
27. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
Notify the Audit Committee
Annualized Loss Expectance (ALE)
Stop-or-go Sampling
less than 24 hours
28. ____________________ of the hot site is most important consideration for site selection. IF they are too close together then a single event may involve both locations
Vulnerability in the organization's PBX
Geographic location
ITIL definition of CHANGE MANAGEMENT
IT Strategy
29. To measure organizational performance and effectiveness against strategic goals.
Disaster Recovery
Balanced Scorecard
Change management
Registers
30. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
Statistical Sampling
objective and unbiased
Information systems access
Insourcing
31. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
An Integrated Audit
A gate process
Split custody
A Problem
32. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
IT executives and the Board of Directors
Business Realization
Stay current with technology
Network Layer Protocols
33. Delivery of packets from one station to another - on the same network or on different networks.
Hash
PERT Diagram?
The Internet Layer in the TCP/IP model
TCP/IP Internet Layer
34. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
OSI Layer 6: Presentation
Sample Standard Deviation
Business impact analysis
A Compliance audit
35. Subjective sampling is used when the auditor wants to _________________________.
TCP/IP Network Model
Concentrate on samples known to represent high risk
Antivirus software on the email servers
The availability of IT systems
36. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
Three Types of Controls
TCP/IP Transport Layer
OSI Layer 5: Session
Expected Error Rate
37. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
Capability Maturity Model Integration (CMMI)
A Virtual Server
Configuration Management
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
38. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
Sampling Risk
Variable Sampling
Prblem Management
Database primary key
39. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
A Server Cluster
Annualized Loss Expectance (ALE)
Lacks specific expertise or resources to conduct an internal audit
Judgmental sampling
40. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.
Cloud computing
Discovery Sampling
Incident Management
Service Level Management
41. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
Registers
An IS audit
Project change request
A Financial Audit
42. Framework for auditing and measuring IT Service Management Processes.
Current and most up-to-date
ISO 20000 Standard:
Grid Computing
The appropriate role of an IS auditor in a control self-assessment
43. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Types of sampling an auditor can perform.
Rating Scale for Process Maturity
Assess the maturity of its business processes
The Internet Layer in the TCP/IP model
44. Handle application processing
Application Controls
Inherent Risk
Elements of the COBIT Framework
BCP Plans
45. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
Organizational culture and maturity
Lacks specific expertise or resources to conduct an internal audit
Examples of IT General Controls
Sampling Risk
46. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
BCP Plans
Security Awareness program
Detection Risk
Statement of Impact
47. Focuses on: post-event recovery and restoration of services
ITIL definition of CHANGE MANAGEMENT
Release management
Disaster Recovery
Buffers
48. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
ITIL definition of CHANGE MANAGEMENT
Rating Scale for Process Maturity
Data Link Layer Standards
PERT Diagram?
49. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
The Steering Committee
The audit program
OSI Layer 6: Presentation
Project change request
50. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Audit Methodologies
A Forensic Audit
Cloud computing
OSI Layer 6: Presentation