SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
Elements of the COSO pyramid
Service Continuity Management
Inform the auditee
Categories of risk treatment
2. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
Reduced sign-on
OSI: Physical Layer
An IS audit
Elements of the COBIT Framework
3. Describes the effect on the business if a process is incapacitated for any appreciable time
IT Services Financial Management
Statement of Impact
Antivirus software on the email servers
General Controls
4. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
Control Unit
Substantive Testing (test of transaction integrity)
A Compliance audit
More difficult to perform
5. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
PERT Diagram?
Substantive Testing (test of transaction integrity)
Information systems access
Grid Computing
6. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
CPU
Sampling Risk
The Software Program Library
Volumes of COSO framework
7. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Control Risk
Employees with excessive privileges
Detection Risk
Disaster Recovery
8. The maximum period of downtime for a process or application
Tolerable Error Rate
Recovery time objective
PERT Diagram?
BCP Plans
9. An audit that is performed in support of an anticipated or active legal proceeding.
Reduced sign-on
OSI: Network Layer
TCP/IP Internet Layer
A Forensic Audit
10. An audit of an IS department's operations and systems.
Sampling
Rating Scale for Process Maturity
An IS audit
Network Layer Protocols
11. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
Capability Maturity Model
Stratified Sampling
The Internet Layer in the TCP/IP model
Incident Management
12. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
SDLC Phases
Reduced sign-on
Substantive Testing (test of transaction integrity)
Types of sampling an auditor can perform.
13. The memory locations in the CPU where arithmetic values are stored.
The typical Configuration Items in Configuration Management
A Forensic Audit
The two Categories of Controls
Registers
14. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Wet pipe fire sprinkler system
Vulnerability in the organization's PBX
A Sample Mean
Entire password for an encryption key
15. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
BCP Plans
Volumes of COSO framework
IT executives and the Board of Directors
Three Types of Controls
16. Defines internal controls and provides guidance for assessing and improving internal control systems.
Application Layer protocols
Balanced Scorecard
TCP/IP Transport Layer
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
17. An audit that combines an operational audit and a financial audit.
The appropriate role of an IS auditor in a control self-assessment
Balanced Scorecard
An Integrated Audit
Advantages of outsourcing
18. The sum of all samples divided by the number of samples.
Inherent Risk
The Release process
ITIL - IT Infrastructure Library
A Sample Mean
19. (1.) TCP (2.) UDP
Frameworks
Information systems access
Transport Layer Protocols
IT Services Financial Management
20. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Lacks specific expertise or resources to conduct an internal audit
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
The 7 phases and their order in the SDLC
Controls
21. A sampling technique where at least one exception is sought in a population
Employee termination process
Discovery Sampling
Control Unit
Substantive Testing (test of transaction integrity)
22. Focuses on: post-event recovery and restoration of services
Reduced sign-on
Elements of the COBIT Framework
Disaster Recovery
Registers
23. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
objective and unbiased
Sampling
Grid Computing
The two Categories of Controls
24. 1.) Executive Support (2.) Well-defined roles and responsibilities.
Registers
Six steps of the Release Management process
Information security policy
Employees with excessive privileges
25. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
A Financial Audit
The Requirements
Sampling
OSI Layer 5: Session
26. (1.) General (2.) Application
Inherent Risk
Main types of Controls
Examples of Application Controls
The BCP process
27. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
Audit Methodologies
A Financial Audit
Business impact analysis
A Service Provider audit
28. An alternate processing center that contains no information processing equipment.
A Cold Site
Referential Integrity
Annualized Loss Expectance (ALE)
Security Awareness program
29. Used to determine which business processes are the most critical - by ranking them in order of criticality
Wet pipe fire sprinkler system
Prblem Management
A Forensic Audit
Criticality analysis
30. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
TCP/IP Internet Layer
Judgmental sampling
A Virtual Server
Formal waterfall
31. The party that performs strategic planning - addresses near-term and long-term requirements aligning business objectives - and technology strategies.
A Cold Site
The Steering Committee
A Virtual Server
The availability of IT systems
32. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
Inform the auditee
PERT Diagram?
The appropriate role of an IS auditor in a control self-assessment
Background checks performed
33. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
Variable Sampling
TCP/IP Transport Layer packet delivery
Geographic location
Application Layer protocols
34. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them
Inherent Risk
Project Management Strategies
(1.) Polices (2.) Procedures (3.) Standards
less than 24 hours
35. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
TCP/IP Internet Layer
BCP Plans
Confidence coefficient
Sampling Risk
36. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
The Business Process Life Cycle
Service Continuity Management
The Requirements
Antivirus software on the email servers
37. Concerned with electrical and physical specifications for devices. No frames or packets involved.
Referential Integrity
OSI: Physical Layer
Project change request
Stop-or-go Sampling
38. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
BCP Plans
An Operational Audit
Information security policy
Testing activities
39. Used to estimate the effort required to develop a software program.
Split custody
Project Management Strategies
The Release process
Function Point Analysis
40. Individual events may often create combined threats to enterprise operations: A tornado might also spawn ____________________.
Network Layer Protocols
Structural fires and transportation accidents
The appropriate role of an IS auditor in a control self-assessment
Statement of Impact
41. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
Vulnerability in the organization's PBX
Application Layer protocols
The Eight Types of Audits
A Compliance audit
42. What type of testing is performed to determine if control procedures have proper design and are operating properly?
Elements of the COBIT Framework
Compliance Testing
Stop-or-go Sampling
To identify the tasks that are responsible for project delays
43. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
Antivirus software on the email servers
Control Risk
A gate process
Tolerable Error Rate
45. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
Project change request
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
More difficult to perform
TCP/IP Transport Layer
46. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
ITIL - IT Infrastructure Library
Business Realization
Audit Methodologies
Antivirus software on the email servers
47. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Segregation of duties issue in a high value process
Network Layer Protocols
Substantive Testing (test of transaction integrity)
The best approach for identifying high risk areas for an audit
48. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
SDLC Phases
IT standards are not being reviewed often enough
Types of sampling an auditor can perform.
OSI: Transport Layer
49. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
Server cluster
IT standards are not being reviewed often enough
Expected Error Rate
Business Continuity
50. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
Employee termination process
Advantages of outsourcing
Network Layer Protocols
The Business Process Life Cycle