SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Sample Standard Deviation
WAN Protocols
IT Services Financial Management
Options for Risk Treatment
2. Consists of two main packet transport protocols: TCP and UDP.
The Software Program Library
TCP/IP Transport Layer
ITIL definition of PROBLEM
Substantive Testing
3. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
The 7 phases and their order in the SDLC
OSI Layer 7: Application
Emergency Changes
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
4. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
IT Strategy
Structural fires and transportation accidents
Confidence coefficient
List of systems examined
5. An audit that is performed in support of an anticipated or active legal proceeding.
A Forensic Audit
Resource details
Examples of Application Controls
Cloud computing
6. Handle application processing
Application Controls
The two Categories of Controls
Network Layer Protocols
Reduced sign-on
7. (1.) Automatic (2.) Manual
Formal waterfall
less than 24 hours
The two Categories of Controls
The Business Process Life Cycle
8. (1.) Physical (2.) Technical (4.) Administrative
Criticality analysis
Three Types of Controls
The Steering Committee
Six steps of the Release Management process
9. The risk that an IS auditor will overlook errors or exceptions during an audit.
Detection Risk
Critical Path Methodology
Insourcing
An IS audit
10. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
A Service Provider audit
The Eight Types of Audits
Security Awareness program
A Server Cluster
11. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Assess the maturity of its business processes
Project change request
Criticality analysis
Information systems access
12. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
Stay current with technology
Emergency Changes
A Server Cluster
The first step in a business impact analysis
13. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
14. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
A Problem
OSI Layer 6: Presentation
Geographic location
Structural fires and transportation accidents
15. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Detection Risk
Sampling
Testing activities
Department Charters
16. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
More difficult to perform
Employee termination process
Service Level Management
The audit program
17. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
Compliance Testing
WAN Protocols
Information security policy
OSI Layer 6: Presentation
18. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
Security Awareness program
Deming Cycle
Organizational culture and maturity
Statistical Sampling
19. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
Structural fires and transportation accidents
OSI: Data Link Layer
Statistical Sampling
Insourcing
20. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
OSI: Data Link Layer
A Virtual Server
A Compliance audit
To identify the tasks that are responsible for project delays
21. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
Audit Methodologies
IT Services Financial Management
less than 24 hours
Buffers
22. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
The two Categories of Controls
IT executives and the Board of Directors
Incident Management
Audit logging
23. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
A Server Cluster
PERT Diagram?
OSI: Transport Layer
Balanced Scorecard
24. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
(1.) Man-made (2.) Natural
The Requirements
Frameworks
Elements of the COSO pyramid
25. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
The 7 phases and their order in the SDLC
Database primary key
List of systems examined
Service Level Management
26. What type of testing is performed to determine if control procedures have proper design and are operating properly?
The first step in a business impact analysis
The Release process
Business Continuity
Compliance Testing
27. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
Stratified Sampling
Hash
Capability Maturity Model
Sampling
28. A collection of two or more servers that is designed to appear as a single server.
Service Continuity Management
Server cluster
The first step in a business impact analysis
A Sample Mean
29. 1.) Executive Support (2.) Well-defined roles and responsibilities.
Segregation of duties issue in a high value process
Information security policy
An IS audit
Configuration Management
30. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient
Wet pipe fire sprinkler system
Sampling Risk
Audit Methodologies
Registers
31. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
Statement of Impact
A Virtual Server
Elements of the COSO pyramid
CPU
32. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
Network Layer Protocols
Assess the maturity of its business processes
ISO 20000 Standard:
An Operational Audit
33. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
Six steps of the Release Management process
Formal waterfall
Capability Maturity Model Integration (CMMI)
The Software Program Library
34. Support the functioning of the application controls
Variable Sampling
The two Categories of Controls
General Controls
Insourcing
35. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
OSI Layer 5: Session
Deming Cycle
TCP/IP Network Model
Overall audit risk
36. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
Grid Computing
Antivirus software on the email servers
Six steps of the Release Management process
Types of sampling an auditor can perform.
37. An audit of an IS department's operations and systems.
OSI: Transport Layer
An IS audit
Information security policy
Employees with excessive privileges
38. (1.) Authentication (2.) Authorization (3.) Change Management (4.) Completeness checks (5.) Validation checks (6.) Input controls (7.) Output controls (8.) Problem management (9.) Identification/access controls
Department Charters
ITIL definition of PROBLEM
Examples of Application Controls
PERT Diagram?
39. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Notify the Audit Committee
Advantages of outsourcing
Elements of the COBIT Framework
Attribute Sampling
40. A sampling technique where at least one exception is sought in a population
Discovery Sampling
Grid Computing
Network Layer Protocols
Reduced sign-on
41. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
The best approach for identifying high risk areas for an audit
Risk Management
Reduced sign-on
The two Categories of Controls
42. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
Segregation of duties issue in a high value process
Judgmental sampling
Gantt Chart
Function Point Analysis
43. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog
Buffers
Geographic location
Configuration Management
Volumes of COSO framework
44. Subjective sampling is used when the auditor wants to _________________________.
Concentrate on samples known to represent high risk
Audit logging
ITIL - IT Infrastructure Library
Service Level Management
45. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
Insourcing
OSI: Physical Layer
Separate administrative accounts
OSI: Data Link Layer
46. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
Antivirus software on the email servers
objective and unbiased
Volumes of COSO framework
Data Link Layer Standards
47. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
Types of sampling an auditor can perform.
Sample Standard Deviation
Vulnerability in the organization's PBX
Six steps of the Release Management process
48. The inventory of all in-scope business processes and systems
Stratified Sampling
Referential Integrity
The first step in a business impact analysis
Substantive Testing
49. Defines internal controls and provides guidance for assessing and improving internal control systems.
Security Awareness program
Gantt Chart
Sampling
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
50. (1.) General (2.) Application
Types of sampling an auditor can perform.
Main types of Controls
Entire password for an encryption key
Organizational culture and maturity