SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them
Inherent Risk
A Cold Site
Employees with excessive privileges
Control Unit
2. The maximum period of downtime for a process or application
Recovery time objective
OSI Layer 6: Presentation
Tolerable Error Rate
Prblem Management
3. Support the functioning of the application controls
The two Categories of Controls
Audit logging
Sampling Risk
General Controls
4. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
BCP Plans
objective and unbiased
Sample Standard Deviation
Transport Layer Protocols
5. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
Inform the auditee
Vulnerability in the organization's PBX
IT Services Financial Management
The Requirements
6. The risk that an IS auditor will overlook errors or exceptions during an audit.
Entire password for an encryption key
Structural fires and transportation accidents
Control Unit
Detection Risk
7. A sampling technique where at least one exception is sought in a population
Discovery Sampling
A Sample Mean
A Compliance audit
An Administrative
8. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
The typical Configuration Items in Configuration Management
Vulnerability in the organization's PBX
ISO 20000 Standard:
Detection Risk
9. An audit of operational efficiency.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Power system controls
Concentrate on samples known to represent high risk
An Administrative
10. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
Control Unit
Categories of risk treatment
IT Strategy
The 5 types of Evidence that the auditor will collect during an audit.
11. (1.) Objectives (2.) Components (3.) Business Units / Areas
An Integrated Audit
IT executives and the Board of Directors
Dimensions of the COSO cube
Categories of risk treatment
12. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
ITIL definition of CHANGE MANAGEMENT
Configuration Management
Transport Layer Protocols
SDLC Phases
13. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
Resource details
Referential Integrity
A Problem
Data Link Layer Standards
14. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
Discovery Sampling
Formal waterfall
Business Continuity
Control Unit
15. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
A Virtual Server
Transport Layer Protocols
Assess the maturity of its business processes
The Internet Layer in the TCP/IP model
16. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
A gate process
The Release process
Reduced sign-on
Function Point Analysis
17. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
Personnel involved in the requirements phase of a software development project
Project change request
Service Continuity Management
Examples of Application Controls
18. ITIL term used to describe the SDLC.
A Service Provider audit
TCP/IP Transport Layer packet delivery
A Server Cluster
Release management
19. IT Governance is most concerned with ________.
IT Strategy
IT standards are not being reviewed often enough
Concentrate on samples known to represent high risk
Sampling Risk
20. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
Statement of Impact
Dimensions of the COSO cube
Grid Computing
List of systems examined
21. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Frameworks
Overall audit risk
Attribute Sampling
Entire password for an encryption key
22. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
TCP/IP Transport Layer
Data Link Layer Standards
Elements of the COBIT Framework
Background checks performed
23. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
Organizational culture and maturity
An Integrated Audit
Volumes of COSO framework
Referential Integrity
24. Application controls limit ___________ in three ways: (1.) Point of Entry (Input Controls) (2.) During consumption (process controls) (3.) At the point of expression (Output Controls)
The Eight Types of Audits
Structural fires and transportation accidents
Information systems access
Blade Computer Architecture
25. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
The Eight Types of Audits
A Sample Mean
OSI Layer 5: Session
Business Continuity
26. A Fire sprinkler system has water in its pipes - and sprinkler heads emit water only if the ambient temperature reaches 220 deg. F. This is a ________________. The system is charged with water and will discharge water out of any sprinkler head whose
Testing activities
OSI: Data Link Layer
A Cold Site
Wet pipe fire sprinkler system
27. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
Geographic location
A Virtual Server
The Internet Layer in the TCP/IP model
Split custody
28. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
PERT Diagram?
Sample Standard Deviation
Advantages of outsourcing
List of systems examined
29. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Data Link Layer Standards
Incident Management
Notify the Audit Committee
Department Charters
30. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
Wet pipe fire sprinkler system
Elements of the COSO pyramid
Registers
Stop-or-go Sampling
31. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
Variable Sampling
WAN Protocols
Reduced sign-on
BCP Plans
32. Used to determine which business processes are the most critical - by ranking them in order of criticality
Application Layer protocols
Project change request
Attribute Sampling
Criticality analysis
33. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
An Administrative
Elements of the COSO pyramid
IT executives and the Board of Directors
A Virtual Server
34. (1.) General (2.) Application
The audit program
Main types of Controls
Function Point Analysis
Separate administrative accounts
35. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
Audit Methodologies
The typical Configuration Items in Configuration Management
BCP Plans
More difficult to perform
36. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
Discovery Sampling
Referential Integrity
Deming Cycle
PERT Diagram?
37. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
An Administrative
Risk Management
Variable Sampling
Hash
38. Defines internal controls and provides guidance for assessing and improving internal control systems.
Buffers
Input validation checking
Concentrate on samples known to represent high risk
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
39. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
Testing activities
SDLC Phases
Insourcing
The Eight Types of Audits
40. Guide program execution through organization of resources and development of clear project objectives.
The 5 types of Evidence that the auditor will collect during an audit.
IT Service Management
Examples of Application Controls
Project Management Strategies
41. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
ITIL definition of PROBLEM
The Requirements
The Eight Types of Audits
WAN Protocols
42. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Emergency Changes
Transport Layer Protocols
Expected Error Rate
OSI Layer 5: Session
43. Used to estimate the effort required to develop a software program.
Function Point Analysis
OSI: Network Layer
A gate process
Employee termination process
44. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
Six steps of the Release Management process
Antivirus software on the email servers
Prblem Management
Stratified Sampling
45. An audit of a third-party organization that provides services to other organizations.
A Virtual Server
Incident Management
To identify the tasks that are responsible for project delays
A Service Provider audit
46. An audit that is performed in support of an anticipated or active legal proceeding.
ITIL definition of PROBLEM
Variable Sampling
A Forensic Audit
Structural fires and transportation accidents
47. To measure organizational performance and effectiveness against strategic goals.
Confidence coefficient
The availability of IT systems
Balanced Scorecard
objective and unbiased
48. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
Types of sampling an auditor can perform.
(1.) Polices (2.) Procedures (3.) Standards
The BCP process
Frameworks
49. Used to translate or transform data from lower layers into formats that the application layer can work with.
Grid Computing
OSI Layer 6: Presentation
OSI Layer 5: Session
Balanced Scorecard
50. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
SDLC Phases
OSI Layer 5: Session
Entire password for an encryption key
WAN Protocols
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests