SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An alternate processing center that contains no information processing equipment.
A Virtual Server
Judgmental sampling
A Server Cluster
A Cold Site
2. A representation of how closely a sample represents an entire population.
Precision means
The Software Program Library
The Steering Committee
SDLC Phases
3. The risk that an IS auditor will overlook errors or exceptions during an audit.
Disaster Recovery
The appropriate role of an IS auditor in a control self-assessment
Detection Risk
Entire password for an encryption key
4. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Testing activities
Assess the maturity of its business processes
Organizational culture and maturity
Department Charters
5. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog
ITIL definition of CHANGE MANAGEMENT
Service Continuity Management
Buffers
Assess the maturity of its business processes
6. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
The Software Program Library
Function Point Analysis
Application Layer protocols
TCP/IP Transport Layer packet delivery
7. Application controls limit ___________ in three ways: (1.) Point of Entry (Input Controls) (2.) During consumption (process controls) (3.) At the point of expression (Output Controls)
ISO 20000 Standard:
IT Services Financial Management
OSI Layer 5: Session
Information systems access
8. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
Resource details
Recovery time objective
A gate process
Application Layer protocols
9. Any event which is not part of the standard operation of service and which causes or may cause an interruption to or reduction in quality of that service. Includes THREE incident types: (1.) Service Outage (2.) Service Slowdown (3.) Software Bug
Incident Management
Inherent Risk
The Software Program Library
Categories of risk treatment
10. A sampling technique where items are chosen based upon the auditor's judgment - usually based on risk or materiality.
Judgmental sampling
A Cold Site
objective and unbiased
WAN Protocols
11. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
The 4-item focus of a Balanced Scorecard
Organizational culture and maturity
IT Service Management
Sampling Risk
12. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP
The first step in a business impact analysis
Substantive Testing (test of transaction integrity)
Data Link Layer Standards
Emergency Changes
13. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
Referential Integrity
Structural fires and transportation accidents
List of systems examined
Application Layer protocols
14. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
A Compliance audit
The appropriate role of an IS auditor in a control self-assessment
Documentation and interview personnel
The best approach for identifying high risk areas for an audit
15. A maturity model that represents the aggregations of other maturity models.
Volumes of COSO framework
Capability Maturity Model Integration (CMMI)
Main types of Controls
Concentrate on samples known to represent high risk
16. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
Service Level Management
The first step in a business impact analysis
Rating Scale for Process Maturity
Expected Error Rate
17. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.
Main types of Controls
Service Level Management
Discovery Sampling
TCP/IP Transport Layer packet delivery
18. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
An IS audit
Entire password for an encryption key
The Software Program Library
Substantive Testing (test of transaction integrity)
19. An audit that combines an operational audit and a financial audit.
Gantt Chart
Segregation of duties issue in a high value process
Three Types of Controls
An Integrated Audit
20. 1.) Executive Support (2.) Well-defined roles and responsibilities.
Organizational culture and maturity
OSI: Transport Layer
Information security policy
Tolerable Error Rate
21. Guide program execution through organization of resources and development of clear project objectives.
Project Management Strategies
Application Controls
less than 24 hours
Sampling
22. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
The audit program
Project change request
Application Controls
More difficult to perform
23. The memory locations in the CPU where arithmetic values are stored.
Registers
BCP Plans
The Business Process Life Cycle
Substantive Testing (test of transaction integrity)
24. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Tolerable Error Rate
The Steering Committee
Inform the auditee
Testing activities
25. The delivery of messages from one station to another via one or more networks.. Routes packets between networks.
The appropriate role of an IS auditor in a control self-assessment
TCP/IP Link Layer
OSI: Network Layer
IT Services Financial Management
26. Defines internal controls and provides guidance for assessing and improving internal control systems.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Sampling Risk
Sampling Risk
Emergency Changes
27. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
The Business Process Life Cycle
OSI: Transport Layer
objective and unbiased
Assess the maturity of its business processes
28. An auditor has discovered several errors in user account management: many terminated employees' computer accounts are still active. The best course of action - To improve the _________________ to reduce the number of exceptions. For a time - the proc
The first step in a business impact analysis
Employee termination process
A Problem
Application Controls
29. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Lacks specific expertise or resources to conduct an internal audit
Blade Computer Architecture
Attribute Sampling
Sampling
30. Used to measure the relative maturity of an organization and its processes.
Capability Maturity Model
Registers
Frameworks
Discovery Sampling
31. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
Expected Error Rate
The Release process
A Problem
Incident Management
32. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Referential Integrity
Risk Management
Judgmental sampling
Cloud computing
33. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.
Stratified Sampling
Project Management Strategies
Expected Error Rate
Configuration Management
34. A collection of two or more servers that is designed to appear as a single server.
Server cluster
Power system controls
Personnel involved in the requirements phase of a software development project
(1.) Man-made (2.) Natural
35. To review and approve proposed changes to systems and infrastructure. This helps to reduce the risk of unintended events and unplanned downtime.
Compliance Testing
Change management
Sample Standard Deviation
The best approach for identifying high risk areas for an audit
36. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
A Compliance audit
A Service Provider audit
PERT Diagram?
Business impact analysis
37. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Controls
An Operational Audit
TCP/IP Transport Layer packet delivery
Annualized Loss Expectance (ALE)
38. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
PERT Diagram?
More difficult to perform
Current and most up-to-date
Formal waterfall
39. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Statement of Impact
(1.) Man-made (2.) Natural
Overall audit risk
Formal waterfall
40. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
objective and unbiased
General Controls
Advantages of outsourcing
Frameworks
41. Gantt: used to display ______________.
Emergency Changes
The first step in a business impact analysis
Insourcing
Resource details
42. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
Emergency Changes
An Operational Audit
Wet pipe fire sprinkler system
Separate administrative accounts
43. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
Geographic location
Categories of risk treatment
Hash
TCP/IP Transport Layer packet delivery
44. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
More difficult to perform
Input validation checking
Substantive Testing
Expected Error Rate
45. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
Release management
Antivirus software on the email servers
TCP/IP Internet Layer
Power system controls
46. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
Control Unit
TCP/IP Transport Layer
SDLC Phases
Department Charters
47. (1.) Access controls (2.) Encryption (3.) Audit logging
The Requirements
IT Strategy
The best approach for identifying high risk areas for an audit
Primary security features of relational databases
48. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
BCP Plans
A Server Cluster
Elements of the COBIT Framework
Deming Cycle
49. (1.) TCP (2.) UDP
TCP/IP Link Layer
Transport Layer Protocols
The audit program
ISO 20000 Standard:
50. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Confidence coefficient
ITIL definition of CHANGE MANAGEMENT
An Operational Audit
Capability Maturity Model