SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
Examples of Application Controls
Incident Management
A Virtual Server
Discovery Sampling
2. The highest number of errors that can exist without a result being materially misstated.
Critical Path Methodology
Control Unit
Server cluster
Tolerable Error Rate
3. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
The Internet Layer in the TCP/IP model
Gantt Chart
Change management
The Steering Committee
4. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
The typical Configuration Items in Configuration Management
Types of sampling an auditor can perform.
Separate administrative accounts
The appropriate role of an IS auditor in a control self-assessment
5. Guide program execution through organization of resources and development of clear project objectives.
Inherent Risk
Project Management Strategies
Risk Management
Tolerable Error Rate
6. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
Blade Computer Architecture
Wet pipe fire sprinkler system
ISO 20000 Standard:
BCP Plans
8. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Buffers
IT Service Management
IT executives and the Board of Directors
Notify the Audit Committee
9. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
The audit program
Lacks specific expertise or resources to conduct an internal audit
Elements of the COBIT Framework
More difficult to perform
10. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Structural fires and transportation accidents
The Business Process Life Cycle
Wet pipe fire sprinkler system
Confidence coefficient
11. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Audit logging
Discovery Sampling
Examples of Application Controls
OSI: Transport Layer
12. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
The audit program
Assess the maturity of its business processes
IT standards are not being reviewed often enough
objective and unbiased
13. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Attribute Sampling
Lacks specific expertise or resources to conduct an internal audit
The 5 types of Evidence that the auditor will collect during an audit.
OSI Layer 6: Presentation
14. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
Sampling Risk
Control Unit
A Compliance audit
Volumes of COSO framework
15. Any event which is not part of the standard operation of service and which causes or may cause an interruption to or reduction in quality of that service. Includes THREE incident types: (1.) Service Outage (2.) Service Slowdown (3.) Software Bug
Incident Management
Statement of Impact
Stratified Sampling
Frameworks
16. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.
Testing activities
TCP/IP Internet Layer
Separate administrative accounts
Categories of risk treatment
17. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
objective and unbiased
OSI Layer 5: Session
IT Services Financial Management
Recovery time objective
18. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
Sample Standard Deviation
Information security policy
Stop-or-go Sampling
A Financial Audit
19. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Application Controls
TCP/IP Transport Layer packet delivery
Sample Standard Deviation
Organizational culture and maturity
20. Used to measure the relative maturity of an organization and its processes.
Capability Maturity Model
Disaster Recovery
Release management
Hash
21. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
Primary security features of relational databases
Information systems access
Antivirus software on the email servers
Advantages of outsourcing
22. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
Application Controls
IT executives and the Board of Directors
Notify the Audit Committee
Inform the auditee
23. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Primary security features of relational databases
ISO 20000 Standard:
Options for Risk Treatment
Overall audit risk
24. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
The 4-item focus of a Balanced Scorecard
Categories of risk treatment
The Steering Committee
25. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
Control Unit
Gantt Chart
Formal waterfall
The best approach for identifying high risk areas for an audit
26. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
TCP/IP Link Layer
Current and most up-to-date
The 5 types of Evidence that the auditor will collect during an audit.
Substantive Testing
27. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
IT standards are not being reviewed often enough
SDLC Phases
Application Layer protocols
Information systems access
28. Subjective sampling is used when the auditor wants to _________________________.
Split custody
Information systems access
Concentrate on samples known to represent high risk
Elements of the COSO pyramid
29. Delivery of packets from one station to another - on the same network or on different networks.
The Internet Layer in the TCP/IP model
The typical Configuration Items in Configuration Management
Risk Management
Information security policy
30. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
More difficult to perform
Examples of IT General Controls
Segregation of duties issue in a high value process
The 5 types of Evidence that the auditor will collect during an audit.
31. A sampling technique where items are chosen based upon the auditor's judgment - usually based on risk or materiality.
Lacks specific expertise or resources to conduct an internal audit
A Service Provider audit
Judgmental sampling
Inherent Risk
32. Framework for auditing and measuring IT Service Management Processes.
To identify the tasks that are responsible for project delays
ISO 20000 Standard:
Information security policy
Split custody
33. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
Rating Scale for Process Maturity
Audit Methodologies
Information systems access
OSI: Transport Layer
34. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP
Service Level Management
Data Link Layer Standards
OSI Layer 7: Application
IT Services Financial Management
35. A representation of how closely a sample represents an entire population.
Stop-or-go Sampling
Annualized Loss Expectance (ALE)
Precision means
IT Services Financial Management
36. The inventory of all in-scope business processes and systems
IT Strategy
The first step in a business impact analysis
Data Link Layer Standards
Configuration Management
37. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
Stratified Sampling
Business Realization
Structural fires and transportation accidents
TCP/IP Link Layer
38. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
Six steps of the Release Management process
Personnel involved in the requirements phase of a software development project
IT executives and the Board of Directors
The first step in a business impact analysis
39. An audit that combines an operational audit and a financial audit.
An Integrated Audit
Incident Management
Inherent Risk
Information systems access
40. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
The BCP process
The 7 phases and their order in the SDLC
ITIL definition of CHANGE MANAGEMENT
Judgmental sampling
41. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
Rating Scale for Process Maturity
BCP Plans
Split custody
Inherent Risk
42. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
IT Services Financial Management
Reduced sign-on
Precision means
Six steps of the Release Management process
43. Defines internal controls and provides guidance for assessing and improving internal control systems.
The Eight Types of Audits
The two Categories of Controls
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Current and most up-to-date
44. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
An Operational Audit
Background checks performed
IT standards are not being reviewed often enough
CPU
45. Used to determine which business processes are the most critical - by ranking them in order of criticality
Network Layer Protocols
Referential Integrity
Examples of IT General Controls
Criticality analysis
46. (1.) Access controls (2.) Encryption (3.) Audit logging
Primary security features of relational databases
Wet pipe fire sprinkler system
Cloud computing
Service Continuity Management
47. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
less than 24 hours
Gantt Chart
Release management
The typical Configuration Items in Configuration Management
48. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
(1.) Man-made (2.) Natural
Inherent Risk
Options for Risk Treatment
The Business Process Life Cycle
49. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
Testing activities
IT Service Management
Critical Path Methodology
Dimensions of the COSO cube
50. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
List of systems examined
A Problem
The Steering Committee
Assess the maturity of its business processes
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests