SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
Statement of Impact
Sampling Risk
Lacks specific expertise or resources to conduct an internal audit
Referential Integrity
2. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
Input validation checking
Function Point Analysis
Control Risk
Precision means
3. The highest number of errors that can exist without a result being materially misstated.
The 7 phases and their order in the SDLC
Tolerable Error Rate
Security Awareness program
Statement of Impact
4. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
Elements of the COBIT Framework
Configuration Management
Business impact analysis
Emergency Changes
5. A representation of how closely a sample represents an entire population.
Precision means
The Steering Committee
Application Controls
Business Realization
6. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
Critical Path Methodology
Stop-or-go Sampling
Reduced sign-on
A Sample Mean
7. (1.) Objectives (2.) Components (3.) Business Units / Areas
Rating Scale for Process Maturity
Dimensions of the COSO cube
(1.) Man-made (2.) Natural
Types of sampling an auditor can perform.
8. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
IT Strategy
Buffers
Notify the Audit Committee
OSI: Transport Layer
9. (1.) Automatic (2.) Manual
The two Categories of Controls
Lacks specific expertise or resources to conduct an internal audit
Resource details
Buffers
10. During an audit - the auditor should obtain 6 types of documents - (1.) Org charts (2.) ___________ (3.) third-party contracts (4.) policies and procedures (5.) standards (6.) system documentation
Examples of IT General Controls
Registers
Department Charters
Entire password for an encryption key
11. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
Sampling
Expected Error Rate
Release management
Transport Layer Protocols
12. One of a database table's fields - whose value is unique.
Service Level Management
Entire password for an encryption key
A Virtual Server
Database primary key
13. Application controls limit ___________ in three ways: (1.) Point of Entry (Input Controls) (2.) During consumption (process controls) (3.) At the point of expression (Output Controls)
Geographic location
An Administrative
Information systems access
Buffers
14. The risk that an IS auditor will overlook errors or exceptions during an audit.
OSI: Network Layer
Detection Risk
The Requirements
IT Service Management
15. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
Reduced sign-on
WAN Protocols
Insourcing
Categories of risk treatment
16. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Discovery Sampling
Entire password for an encryption key
IT standards are not being reviewed often enough
Elements of the COBIT Framework
17. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
Transport Layer Protocols
Data Link Layer Standards
The appropriate role of an IS auditor in a control self-assessment
Referential Integrity
18. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
Function Point Analysis
OSI: Transport Layer
Detection Risk
A Server Cluster
20. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
Insourcing
Audit logging
To identify the tasks that are responsible for project delays
Expected Error Rate
21. The inventory of all in-scope business processes and systems
The first step in a business impact analysis
A Financial Audit
Controls
Statement of Impact
22. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
Documentation and interview personnel
General Controls
Rating Scale for Process Maturity
Sampling Risk
23. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
A Sample Mean
OSI: Transport Layer
The 4-item focus of a Balanced Scorecard
IT standards are not being reviewed often enough
24. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
ITIL definition of PROBLEM
CPU
Notify the Audit Committee
Transport Layer Protocols
25. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
Split custody
Database primary key
IT Strategy
Capability Maturity Model Integration (CMMI)
26. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
Business Continuity
Information security policy
Organizational culture and maturity
A Financial Audit
27. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
Deming Cycle
The best approach for identifying high risk areas for an audit
A gate process
Transport Layer Protocols
28. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
The Software Program Library
(1.) Polices (2.) Procedures (3.) Standards
Capability Maturity Model Integration (CMMI)
Sample Standard Deviation
29. The portion of IT management that tracks the financial value of IT services that support organizational objectives. It includes 4 activities: (1.) Budgeting (2.) Capital Investment (3.) Expense Management (4.) Project accounting and project ROI (Ret
A Financial Audit
The Eight Types of Audits
IT Services Financial Management
TCP/IP Network Model
30. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Volumes of COSO framework
A Financial Audit
Background checks performed
Database primary key
31. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
Insourcing
Prblem Management
Risk Management
less than 24 hours
32. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
Control Unit
Assess the maturity of its business processes
Project change request
(1.) Man-made (2.) Natural
33. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
TCP/IP Internet Layer
Categories of risk treatment
Formal waterfall
Business Realization
34. Gantt: used to display ______________.
The BCP process
Resource details
TCP/IP Transport Layer
Recovery time objective
35. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
Dimensions of the COSO cube
Department Charters
Notify the Audit Committee
A Financial Audit
36. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
Resource details
Business Continuity
Examples of IT General Controls
The Eight Types of Audits
37. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Sampling
Business impact analysis
Referential Integrity
Precision means
38. The means by which management establishes and measures processes by which organizational objectives are achieved
Statistical Sampling
Geographic location
General Controls
Controls
39. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg
less than 24 hours
IT Service Management
The BCP process
Database primary key
40. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
ISO 20000 Standard:
Disaster Recovery
Project change request
IT standards are not being reviewed often enough
41. A field in a record in one table that can reference a primary key in another table that can reference a primary key in another table.
TCP/IP Link Layer
Employee termination process
Foreign Key
Concentrate on samples known to represent high risk
42. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Examples of IT General Controls
Primary security features of relational databases
Substantive Testing
Reduced sign-on
43. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP
Confidence coefficient
Data Link Layer Standards
Wet pipe fire sprinkler system
Judgmental sampling
44. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
An Operational Audit
OSI: Data Link Layer
Organizational culture and maturity
Gantt Chart
45. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
More difficult to perform
Lacks specific expertise or resources to conduct an internal audit
OSI: Transport Layer
Background checks performed
46. An audit that combines an operational audit and a financial audit.
Security Awareness program
A Server Cluster
A Financial Audit
An Integrated Audit
47. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
Formal waterfall
OSI Layer 5: Session
BCP Plans
OSI: Physical Layer
48. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
Examples of Application Controls
The Release process
Gantt Chart
Judgmental sampling
49. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
objective and unbiased
The Internet Layer in the TCP/IP model
A Compliance audit
Control Risk
50. Individual events may often create combined threats to enterprise operations: A tornado might also spawn ____________________.
Structural fires and transportation accidents
Gantt Chart
The typical Configuration Items in Configuration Management
IT Service Management