Test your basic knowledge |

CISA: Certified Information Systems Auditor

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.






2. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event






3. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac






4. (1.) Feasibility (2.) Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation






5. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.






6. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample






7. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.






8. An alternate processing center that contains no information processing equipment.






9. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.






10. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun






11. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.






12. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences






13. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.






14. Used to translate or transform data from lower layers into formats that the application layer can work with.






15. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number






16. The party that performs strategic planning - addresses near-term and long-term requirements aligning business objectives - and technology strategies.






17. An external IS auditor has discovered a _______________________ - The external auditor can only document the finding in the audit report. An external auditor is not in a position to implement controls.






18. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient






19. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.






20. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.






21. ____________________ of the hot site is most important consideration for site selection. IF they are too close together then a single event may involve both locations






22. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications






23. A Fire sprinkler system has water in its pipes - and sprinkler heads emit water only if the ambient temperature reaches 220 deg. F. This is a ________________. The system is charged with water and will discharge water out of any sprinkler head whose






24. Subjective sampling is used when the auditor wants to _________________________.






25. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.






26. ITIL term used to describe the SDLC.






27. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.






28. The sum of all samples divided by the number of samples.






29. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.






30. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co






31. Concerned with electrical and physical specifications for devices. No frames or packets involved.






32. (1.) Authentication (2.) Authorization (3.) Change Management (4.) Completeness checks (5.) Validation checks (6.) Input controls (7.) Output controls (8.) Problem management (9.) Identification/access controls






33. (1.) Developers (2.) Architects (3.) Analysts (4.) Users






34. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider






35. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.






36. Used to determine which business processes are the most critical - by ranking them in order of criticality






37. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP






38. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.






39. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes






40. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk






41. IT Governance is most concerned with ________.






42. Defines internal controls and provides guidance for assessing and improving internal control systems.






43. A maturity model that represents the aggregations of other maturity models.






44. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the






45. The means by which management establishes and measures processes by which organizational objectives are achieved






46. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.






47. An audit of operational efficiency.






48. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.






49. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery






50. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.