SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (1.) General (2.) Application
Main types of Controls
Frameworks
IT Strategy
Precision means
2. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
A Service Provider audit
The Business Process Life Cycle
Release management
Deming Cycle
3. Framework for auditing and measuring IT Service Management Processes.
Discovery Sampling
Elements of the COSO pyramid
ISO 20000 Standard:
ITIL - IT Infrastructure Library
4. A collection of two or more servers that is designed to appear as a single server.
Assess the maturity of its business processes
Server cluster
Background checks performed
Employees with excessive privileges
5. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
Notify the Audit Committee
Project Management Strategies
Blade Computer Architecture
The Release process
6. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
Control Risk
Testing activities
Rating Scale for Process Maturity
OSI Layer 5: Session
7. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
Volumes of COSO framework
To identify the tasks that are responsible for project delays
Power system controls
Concentrate on samples known to represent high risk
8. The memory locations in the CPU where arithmetic values are stored.
Judgmental sampling
Precision means
Registers
less than 24 hours
9. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
The best approach for identifying high risk areas for an audit
The Software Program Library
An IS audit
A Financial Audit
10. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
ITIL definition of CHANGE MANAGEMENT
Formal waterfall
Project change request
The 4-item focus of a Balanced Scorecard
11. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Stop-or-go Sampling
Audit logging
The Business Process Life Cycle
Hash
12. An audit of an IS department's operations and systems.
Geographic location
An IS audit
Attribute Sampling
Elements of the COSO pyramid
13. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
The best approach for identifying high risk areas for an audit
An Operational Audit
Blade Computer Architecture
ISO 20000 Standard:
14. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Tolerable Error Rate
List of systems examined
IT Services Financial Management
Inform the auditee
15. Support the functioning of the application controls
BCP Plans
Security Awareness program
Information security policy
General Controls
16. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
OSI: Data Link Layer
Antivirus software on the email servers
IT Services Financial Management
Variable Sampling
17. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
The Software Program Library
Substantive Testing
Separate administrative accounts
Project Management Strategies
18. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
Primary security features of relational databases
A Service Provider audit
Formal waterfall
Examples of Application Controls
19. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
A Forensic Audit
The Release process
Vulnerability in the organization's PBX
Grid Computing
20. ITIL term used to describe the SDLC.
Dimensions of the COSO cube
OSI: Data Link Layer
Release management
A Virtual Server
21. 1.) Executive Support (2.) Well-defined roles and responsibilities.
Insourcing
Information security policy
Referential Integrity
List of systems examined
22. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
Hash
Employee termination process
Main types of Controls
The 5 types of Evidence that the auditor will collect during an audit.
23. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Judgmental sampling
Sample Standard Deviation
The appropriate role of an IS auditor in a control self-assessment
Volumes of COSO framework
24. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
Business impact analysis
OSI Layer 5: Session
Advantages of outsourcing
Options for Risk Treatment
25. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
Resource details
(1.) Polices (2.) Procedures (3.) Standards
objective and unbiased
A Virtual Server
26. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Sampling
IT executives and the Board of Directors
Notify the Audit Committee
Substantive Testing
27. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
A gate process
Sample Standard Deviation
Input validation checking
Service Continuity Management
28. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
Critical Path Methodology
A Problem
Recovery time objective
Variable Sampling
30. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.
TCP/IP Internet Layer
Business Realization
Stop-or-go Sampling
ITIL definition of CHANGE MANAGEMENT
31. Disasters are generally grouped in terms of type: ______________.
objective and unbiased
The first step in a business impact analysis
Prblem Management
(1.) Man-made (2.) Natural
32. Describes the effect on the business if a process is incapacitated for any appreciable time
Statement of Impact
Stratified Sampling
The Software Program Library
A Sample Mean
33. (1.) Authentication (2.) Authorization (3.) Change Management (4.) Completeness checks (5.) Validation checks (6.) Input controls (7.) Output controls (8.) Problem management (9.) Identification/access controls
Input validation checking
Release management
Change management
Examples of Application Controls
34. Used to estimate the effort required to develop a software program.
Function Point Analysis
Sampling Risk
Frameworks
Volumes of COSO framework
35. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
TCP/IP Internet Layer
Split custody
Categories of risk treatment
OSI: Transport Layer
36. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
Segregation of duties issue in a high value process
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Types of sampling an auditor can perform.
BCP Plans
37. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
The audit program
Documentation and interview personnel
Personnel involved in the requirements phase of a software development project
Rating Scale for Process Maturity
38. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
Audit logging
Referential Integrity
Entire password for an encryption key
A Forensic Audit
39. Used to determine which business processes are the most critical - by ranking them in order of criticality
IT Service Management
Criticality analysis
Attribute Sampling
The Internet Layer in the TCP/IP model
40. Concerned with electrical and physical specifications for devices. No frames or packets involved.
Overall audit risk
OSI: Physical Layer
Security Awareness program
The Internet Layer in the TCP/IP model
41. The first major task in a disaster recovery or business continuity planning project.
Business impact analysis
OSI: Transport Layer
The Eight Types of Audits
ISO 20000 Standard:
42. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Information security policy
More difficult to perform
Control Risk
Business Realization
43. One of a database table's fields - whose value is unique.
Database primary key
Precision means
IT Service Management
The 5 types of Evidence that the auditor will collect during an audit.
44. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
Information security policy
Database primary key
Criticality analysis
Network Layer Protocols
45. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
TCP/IP Transport Layer packet delivery
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Examples of IT General Controls
The Internet Layer in the TCP/IP model
46. ____________________ of the hot site is most important consideration for site selection. IF they are too close together then a single event may involve both locations
Network Layer Protocols
OSI: Physical Layer
Geographic location
Audit logging
47. To measure organizational performance and effectiveness against strategic goals.
Disaster Recovery
Options for Risk Treatment
Balanced Scorecard
Release management
48. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
TCP/IP Internet Layer
Capability Maturity Model Integration (CMMI)
The Eight Types of Audits
WAN Protocols
49. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
A Server Cluster
Background checks performed
Stay current with technology
Risk Management
50. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient
Sampling Risk
More difficult to perform
The BCP process
ITIL definition of CHANGE MANAGEMENT