SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used to determine which business processes are the most critical - by ranking them in order of criticality
Criticality analysis
The best approach for identifying high risk areas for an audit
Confidence coefficient
IT Strategy
2. An alternate processing center that contains no information processing equipment.
Sampling Risk
The 4-item focus of a Balanced Scorecard
Configuration Management
A Cold Site
3. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Examples of Application Controls
Cloud computing
Database primary key
ITIL definition of PROBLEM
4. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
Frameworks
The Eight Types of Audits
An Operational Audit
Elements of the COSO pyramid
5. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
Statement of Impact
ITIL definition of PROBLEM
A gate process
Reduced sign-on
6. PERT: shows the ______________ critical path.
Discovery Sampling
Current and most up-to-date
Database primary key
Grid Computing
7. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
OSI: Data Link Layer
Buffers
Gantt Chart
WAN Protocols
8. IT Governance is most concerned with ________.
Risk Management
Transport Layer Protocols
Attribute Sampling
IT Strategy
9. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
Split custody
TCP/IP Transport Layer
The first step in a business impact analysis
Blade Computer Architecture
10. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
Audit Methodologies
An Operational Audit
Power system controls
CPU
11. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
Audit logging
Gantt Chart
WAN Protocols
The 7 phases and their order in the SDLC
12. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Sample Standard Deviation
Inform the auditee
A Server Cluster
OSI Layer 5: Session
13. (1.) Physical (2.) Technical (4.) Administrative
Database primary key
Three Types of Controls
(1.) Man-made (2.) Natural
IT executives and the Board of Directors
14. (1.) Feasibility (2.) Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation
Prblem Management
The 7 phases and their order in the SDLC
Current and most up-to-date
OSI: Transport Layer
15. Describes the effect on the business if a process is incapacitated for any appreciable time
Foreign Key
Statement of Impact
More difficult to perform
IT Strategy
16. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
Release management
BCP Plans
Department Charters
objective and unbiased
17. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
A Server Cluster
A Problem
Audit Methodologies
The typical Configuration Items in Configuration Management
18. The party that performs strategic planning - addresses near-term and long-term requirements aligning business objectives - and technology strategies.
The Steering Committee
Frameworks
Recovery time objective
Risk Management
19. ITIL term used to describe the SDLC.
Rating Scale for Process Maturity
Lacks specific expertise or resources to conduct an internal audit
Release management
CPU
20. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
The BCP process
Background checks performed
IT executives and the Board of Directors
Information security policy
21. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Concentrate on samples known to represent high risk
The Release process
Sampling
Deming Cycle
22. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
Capability Maturity Model Integration (CMMI)
The Release process
Employees with excessive privileges
Information security policy
23. Delivery of packets from one station to another - on the same network or on different networks.
Transport Layer Protocols
OSI Layer 5: Session
Tolerable Error Rate
The Internet Layer in the TCP/IP model
24. Used to translate or transform data from lower layers into formats that the application layer can work with.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
IT Service Management
A gate process
OSI Layer 6: Presentation
25. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
PERT Diagram?
The first step in a business impact analysis
TCP/IP Transport Layer packet delivery
Project change request
26. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
Control Risk
(1.) Polices (2.) Procedures (3.) Standards
Precision means
A Problem
27. Contains programs that communicate directly with the end user.
Segregation of duties issue in a high value process
OSI Layer 7: Application
Frameworks
Blade Computer Architecture
28. An audit that is performed in support of an anticipated or active legal proceeding.
Audit Methodologies
A Forensic Audit
Balanced Scorecard
Stop-or-go Sampling
29. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
The audit program
Inherent Risk
Entire password for an encryption key
SDLC Phases
30. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
Stop-or-go Sampling
Recovery time objective
A gate process
SDLC Phases
31. A collection of two or more servers that is designed to appear as a single server.
IT Strategy
Control Unit
The two Categories of Controls
Server cluster
32. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
Employee termination process
Sampling Risk
OSI Layer 7: Application
Statistical Sampling
33. 1.) Executive Support (2.) Well-defined roles and responsibilities.
IT standards are not being reviewed often enough
Resource details
Audit logging
Information security policy
34. The memory locations in the CPU where arithmetic values are stored.
Registers
List of systems examined
Criticality analysis
A gate process
35. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Control Risk
Three Types of Controls
An IS audit
OSI: Physical Layer
36. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
Business Continuity
To identify the tasks that are responsible for project delays
BCP Plans
SDLC Phases
37. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
OSI Layer 6: Presentation
Split custody
The Business Process Life Cycle
Service Level Management
38. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.
A Cold Site
Service Level Management
Buffers
Detection Risk
39. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
Lacks specific expertise or resources to conduct an internal audit
Prblem Management
TCP/IP Link Layer
The Eight Types of Audits
40. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
The Requirements
Assess the maturity of its business processes
To identify the tasks that are responsible for project delays
Server cluster
41. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
Variable Sampling
Control Risk
Information systems access
Project Management Strategies
42. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
List of systems examined
Detection Risk
To identify the tasks that are responsible for project delays
Personnel involved in the requirements phase of a software development project
44. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
Capability Maturity Model Integration (CMMI)
Service Continuity Management
Sampling Risk
Types of sampling an auditor can perform.
45. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
A Compliance audit
IT Service Management
Wet pipe fire sprinkler system
Variable Sampling
46. Subjective sampling is used when the auditor wants to _________________________.
Advantages of outsourcing
Network Layer Protocols
Formal waterfall
Concentrate on samples known to represent high risk
47. Used to estimate the effort required to develop a software program.
Risk Management
Function Point Analysis
Elements of the COBIT Framework
Project change request
48. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
Six steps of the Release Management process
TCP/IP Internet Layer
The Release process
Control Unit
49. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
Incident Management
The 7 phases and their order in the SDLC
Configuration Management
Service Continuity Management
50. The highest number of errors that can exist without a result being materially misstated.
TCP/IP Network Model
Network Layer Protocols
Tolerable Error Rate
Compliance Testing
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests