SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
Notify the Audit Committee
OSI Layer 5: Session
Transport Layer Protocols
TCP/IP Transport Layer packet delivery
2. Contains programs that communicate directly with the end user.
The 4-item focus of a Balanced Scorecard
Testing activities
IT standards are not being reviewed often enough
OSI Layer 7: Application
3. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
Insourcing
The Release process
(1.) Man-made (2.) Natural
Documentation and interview personnel
4. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
objective and unbiased
Control Unit
The 4-item focus of a Balanced Scorecard
Stop-or-go Sampling
5. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
Variable Sampling
Cloud computing
Emergency Changes
The availability of IT systems
6. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
Entire password for an encryption key
Stay current with technology
Expected Error Rate
OSI Layer 5: Session
7. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
Precision means
Buffers
The Business Process Life Cycle
Inform the auditee
8. A representation of how closely a sample represents an entire population.
Application Layer protocols
Registers
Precision means
An Integrated Audit
9. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
The 5 types of Evidence that the auditor will collect during an audit.
Background checks performed
objective and unbiased
Function Point Analysis
10. (1.) Automatic (2.) Manual
Lacks specific expertise or resources to conduct an internal audit
Structural fires and transportation accidents
Insourcing
The two Categories of Controls
11. Application controls limit ___________ in three ways: (1.) Point of Entry (Input Controls) (2.) During consumption (process controls) (3.) At the point of expression (Output Controls)
The 5 types of Evidence that the auditor will collect during an audit.
An Operational Audit
The Requirements
Information systems access
12. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
IT executives and the Board of Directors
WAN Protocols
The Release process
Overall audit risk
13. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
Substantive Testing
Resource details
Insourcing
A Virtual Server
14. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Prblem Management
Precision means
An Integrated Audit
Volumes of COSO framework
15. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
Disaster Recovery
Stop-or-go Sampling
Prblem Management
IT Strategy
16. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
ITIL definition of CHANGE MANAGEMENT
The 5 types of Evidence that the auditor will collect during an audit.
Geographic location
The appropriate role of an IS auditor in a control self-assessment
17. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
The audit program
The availability of IT systems
BCP Plans
Risk Management
18. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Cloud computing
The Internet Layer in the TCP/IP model
Audit logging
Substantive Testing
19. The means by which management establishes and measures processes by which organizational objectives are achieved
Controls
The 7 phases and their order in the SDLC
(1.) Polices (2.) Procedures (3.) Standards
PERT Diagram?
20. Framework for auditing and measuring IT Service Management Processes.
Blade Computer Architecture
ISO 20000 Standard:
Frameworks
Wet pipe fire sprinkler system
21. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Types of sampling an auditor can perform.
Hash
Personnel involved in the requirements phase of a software development project
Buffers
22. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
Business Realization
objective and unbiased
A Problem
Annualized Loss Expectance (ALE)
23. The maximum period of downtime for a process or application
Options for Risk Treatment
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Recovery time objective
Expected Error Rate
24. A field in a record in one table that can reference a primary key in another table that can reference a primary key in another table.
A Compliance audit
Examples of Application Controls
Database primary key
Foreign Key
25. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
OSI: Transport Layer
Control Risk
Rating Scale for Process Maturity
Release management
26. Used to determine which business processes are the most critical - by ranking them in order of criticality
Criticality analysis
The 4-item focus of a Balanced Scorecard
Segregation of duties issue in a high value process
Deming Cycle
27. Used to estimate the effort required to develop a software program.
A Problem
Frameworks
Function Point Analysis
Rating Scale for Process Maturity
28. (1.) General (2.) Application
TCP/IP Transport Layer
Main types of Controls
Change management
A Sample Mean
29. Defines internal controls and provides guidance for assessing and improving internal control systems.
Risk Management
Service Level Management
An Integrated Audit
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
30. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
Registers
Audit logging
Background checks performed
OSI Layer 5: Session
31. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
Sampling
Business Realization
Six steps of the Release Management process
Expected Error Rate
32. (1.) Operational (2.) Financial (3.) Integrated (4.) IS (5.) Administrative (6.) Compliance (7.) Forensic (8.) Service Provider
The Eight Types of Audits
Six steps of the Release Management process
Three Types of Controls
Antivirus software on the email servers
33. (1.) Feasibility (2.) Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation
The 7 phases and their order in the SDLC
Control Risk
Project Management Strategies
The appropriate role of an IS auditor in a control self-assessment
34. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
An IS audit
Employee termination process
Substantive Testing (test of transaction integrity)
List of systems examined
35. Delivery of packets from one station to another - on the same network or on different networks.
Background checks performed
Sample Standard Deviation
The Internet Layer in the TCP/IP model
Attribute Sampling
36. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
Advantages of outsourcing
Precision means
BCP Plans
TCP/IP Internet Layer
37. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
Substantive Testing
Formal waterfall
Grid Computing
OSI Layer 7: Application
38. The party that performs strategic planning - addresses near-term and long-term requirements aligning business objectives - and technology strategies.
Confidence coefficient
Tolerable Error Rate
The Steering Committee
Segregation of duties issue in a high value process
39. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
IT Strategy
WAN Protocols
Reduced sign-on
Security Awareness program
40. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
Lacks specific expertise or resources to conduct an internal audit
Project change request
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
TCP/IP Transport Layer
41. The first major task in a disaster recovery or business continuity planning project.
OSI: Network Layer
Transport Layer Protocols
Statement of Impact
Business impact analysis
42. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Confidence coefficient
Inform the auditee
PERT Diagram?
Elements of the COBIT Framework
43. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
Critical Path Methodology
A Compliance audit
Inform the auditee
Formal waterfall
44. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
Sampling Risk
Release management
The typical Configuration Items in Configuration Management
A Server Cluster
45. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
Split custody
Current and most up-to-date
Statistical Sampling
TCP/IP Network Model
46. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Power system controls
OSI: Transport Layer
Sampling
Department Charters
47. Guide program execution through organization of resources and development of clear project objectives.
BCP Plans
Change management
Capability Maturity Model
Project Management Strategies
48. To measure organizational performance and effectiveness against strategic goals.
Inherent Risk
The Software Program Library
Stop-or-go Sampling
Balanced Scorecard
49. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Project Management Strategies
Inherent Risk
The Software Program Library
Emergency Changes
50. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
Elements of the COBIT Framework
The best approach for identifying high risk areas for an audit
BCP Plans
Annualized Loss Expectance (ALE)