SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A sampling technique where items are chosen based upon the auditor's judgment - usually based on risk or materiality.
Organizational culture and maturity
Judgmental sampling
A Server Cluster
Control Risk
2. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
Capability Maturity Model
The Eight Types of Audits
Organizational culture and maturity
The Requirements
3. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Assess the maturity of its business processes
Advantages of outsourcing
Organizational culture and maturity
Variable Sampling
4. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Network Layer Protocols
Elements of the COBIT Framework
Attribute Sampling
The BCP process
5. Handle application processing
Application Controls
OSI Layer 6: Presentation
Rating Scale for Process Maturity
IT standards are not being reviewed often enough
6. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
Application Layer protocols
Wet pipe fire sprinkler system
Volumes of COSO framework
Deming Cycle
7. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
Confidence coefficient
Entire password for an encryption key
Control Unit
WAN Protocols
8. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
Structural fires and transportation accidents
SDLC Phases
Separate administrative accounts
The Release process
9. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
Service Level Management
Critical Path Methodology
Recovery time objective
Database primary key
10. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
BCP Plans
Testing activities
Current and most up-to-date
Judgmental sampling
11. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
The Release process
Lacks specific expertise or resources to conduct an internal audit
IT Services Financial Management
Gantt Chart
12. The first major task in a disaster recovery or business continuity planning project.
Audit Methodologies
Buffers
Business impact analysis
TCP/IP Network Model
13. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
More difficult to perform
Overall audit risk
Grid Computing
The Steering Committee
14. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
Variable Sampling
TCP/IP Network Model
Critical Path Methodology
Split custody
15. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
The BCP process
Application Layer protocols
Statistical Sampling
Release management
16. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
Entire password for an encryption key
Business Realization
OSI: Transport Layer
(1.) Polices (2.) Procedures (3.) Standards
17. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Control Risk
Entire password for an encryption key
OSI: Transport Layer
Discovery Sampling
18. Used to measure the relative maturity of an organization and its processes.
Balanced Scorecard
Geographic location
Capability Maturity Model
OSI: Data Link Layer
19. Guide program execution through organization of resources and development of clear project objectives.
Confidence coefficient
OSI: Network Layer
Project Management Strategies
Options for Risk Treatment
20. The party that performs strategic planning - addresses near-term and long-term requirements aligning business objectives - and technology strategies.
The Steering Committee
Testing activities
Formal waterfall
Structural fires and transportation accidents
21. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
Risk Management
Stay current with technology
The typical Configuration Items in Configuration Management
Confidence coefficient
22. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
Split custody
OSI: Transport Layer
TCP/IP Transport Layer
Geographic location
23. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
A Compliance audit
Employees with excessive privileges
Recovery time objective
Statistical Sampling
24. The maximum period of downtime for a process or application
CPU
Recovery time objective
Balanced Scorecard
Sampling
25. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
Expected Error Rate
An Operational Audit
OSI: Data Link Layer
IT Service Management
26. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
Network Layer Protocols
Examples of Application Controls
Statement of Impact
Business Continuity
27. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.
Configuration Management
Business Realization
The two Categories of Controls
Information security policy
28. IT Service Management is defined in ___________________ framework.
Structural fires and transportation accidents
Variable Sampling
ITIL - IT Infrastructure Library
Cloud computing
29. The means by which management establishes and measures processes by which organizational objectives are achieved
Application Controls
Cloud computing
Controls
OSI Layer 6: Presentation
30. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
Organizational culture and maturity
TCP/IP Transport Layer packet delivery
Reduced sign-on
ITIL - IT Infrastructure Library
31. 1.) Executive Support (2.) Well-defined roles and responsibilities.
WAN Protocols
Vulnerability in the organization's PBX
Information security policy
A gate process
32. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
Capability Maturity Model Integration (CMMI)
Stratified Sampling
A Virtual Server
Disaster Recovery
33. ____________________ of the hot site is most important consideration for site selection. IF they are too close together then a single event may involve both locations
Risk Management
OSI: Physical Layer
The Requirements
Geographic location
34. Disasters are generally grouped in terms of type: ______________.
Substantive Testing
(1.) Man-made (2.) Natural
Confidence coefficient
A Problem
35. The inventory of all in-scope business processes and systems
The Internet Layer in the TCP/IP model
Entire password for an encryption key
The first step in a business impact analysis
Input validation checking
36. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
Rating Scale for Process Maturity
Employee termination process
Sampling Risk
BCP Plans
37. The delivery of messages from one station to another via one or more networks.. Routes packets between networks.
Service Level Management
OSI: Network Layer
PERT Diagram?
Deming Cycle
38. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
Control Unit
Foreign Key
IT Service Management
Personnel involved in the requirements phase of a software development project
39. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
Categories of risk treatment
Registers
Employee termination process
The Internet Layer in the TCP/IP model
40. An external IS auditor has discovered a _______________________ - The external auditor can only document the finding in the audit report. An external auditor is not in a position to implement controls.
Segregation of duties issue in a high value process
The audit program
less than 24 hours
(1.) Man-made (2.) Natural
41. The sum of all samples divided by the number of samples.
Assess the maturity of its business processes
TCP/IP Transport Layer
Tolerable Error Rate
A Sample Mean
42. The risk that an IS auditor will overlook errors or exceptions during an audit.
Risk Management
Statement of Impact
Detection Risk
A Service Provider audit
43. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
Service Continuity Management
OSI Layer 5: Session
(1.) Man-made (2.) Natural
A Problem
44. A condition often identified as a result of multiple incidents that exhibit common symptoms. Problems can also be identified from a single significant incident for which the impact is significant.
The Internet Layer in the TCP/IP model
ITIL definition of PROBLEM
Sampling Risk
Sample Standard Deviation
45. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
BCP Plans
The availability of IT systems
The 4-item focus of a Balanced Scorecard
Lacks specific expertise or resources to conduct an internal audit
46. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
Service Level Management
Blade Computer Architecture
Stratified Sampling
Examples of IT General Controls
47. (1.) General (2.) Application
Compliance Testing
Audit logging
Main types of Controls
CPU
48. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
List of systems examined
Disaster Recovery
Business Realization
Compliance Testing
49. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient
Types of sampling an auditor can perform.
Current and most up-to-date
Sampling Risk
Categories of risk treatment
50. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Application Controls
Categories of risk treatment
Primary security features of relational databases
Control Risk