SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog
Business impact analysis
OSI Layer 7: Application
Categories of risk treatment
Buffers
2. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
IT Services Financial Management
Registers
Attribute Sampling
Deming Cycle
3. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning
The typical Configuration Items in Configuration Management
The 4-item focus of a Balanced Scorecard
ISO 20000 Standard:
The Business Process Life Cycle
4. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Personnel involved in the requirements phase of a software development project
Project change request
Volumes of COSO framework
Entire password for an encryption key
5. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
Inherent Risk
Stratified Sampling
Information security policy
Sample Standard Deviation
7. Subjective sampling is used when the auditor wants to _________________________.
The Software Program Library
Substantive Testing (test of transaction integrity)
The availability of IT systems
Concentrate on samples known to represent high risk
8. A maturity model that represents the aggregations of other maturity models.
Split custody
OSI Layer 7: Application
The audit program
Capability Maturity Model Integration (CMMI)
9. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Incident Management
TCP/IP Internet Layer
OSI Layer 6: Presentation
Substantive Testing (test of transaction integrity)
10. An audit of an IS department's operations and systems.
TCP/IP Transport Layer packet delivery
An IS audit
Release management
SDLC Phases
11. (1.) General (2.) Application
Recovery time objective
Discovery Sampling
Main types of Controls
PERT Diagram?
12. To measure organizational performance and effectiveness against strategic goals.
Balanced Scorecard
Six steps of the Release Management process
Judgmental sampling
IT Strategy
13. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
The Release process
The Business Process Life Cycle
Substantive Testing (test of transaction integrity)
The best approach for identifying high risk areas for an audit
14. An external IS auditor has discovered a _______________________ - The external auditor can only document the finding in the audit report. An external auditor is not in a position to implement controls.
Elements of the COBIT Framework
Segregation of duties issue in a high value process
A Compliance audit
TCP/IP Internet Layer
15. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
The Eight Types of Audits
SDLC Phases
TCP/IP Transport Layer packet delivery
Reduced sign-on
16. Consists of two main packet transport protocols: TCP and UDP.
TCP/IP Transport Layer
ISO 20000 Standard:
Advantages of outsourcing
Precision means
17. (1.) Access controls (2.) Encryption (3.) Audit logging
Documentation and interview personnel
Inherent Risk
TCP/IP Transport Layer
Primary security features of relational databases
18. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
A Problem
Notify the Audit Committee
Types of sampling an auditor can perform.
Detection Risk
19. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Capability Maturity Model Integration (CMMI)
The best approach for identifying high risk areas for an audit
Lacks specific expertise or resources to conduct an internal audit
Service Level Management
20. What type of testing is performed to determine if control procedures have proper design and are operating properly?
Registers
Buffers
Compliance Testing
Change management
21. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
TCP/IP Link Layer
A Virtual Server
Server cluster
The Requirements
22. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them
Capability Maturity Model
Inherent Risk
An Administrative
Cloud computing
23. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
Information security policy
IT standards are not being reviewed often enough
ITIL definition of CHANGE MANAGEMENT
OSI: Data Link Layer
24. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
Testing activities
The audit program
PERT Diagram?
Antivirus software on the email servers
25. ____________________ of the hot site is most important consideration for site selection. IF they are too close together then a single event may involve both locations
Geographic location
The best approach for identifying high risk areas for an audit
(1.) Man-made (2.) Natural
The two Categories of Controls
26. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
The Release process
IT executives and the Board of Directors
Sampling Risk
Segregation of duties issue in a high value process
27. The sum of all samples divided by the number of samples.
Balanced Scorecard
A Sample Mean
TCP/IP Link Layer
objective and unbiased
28. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
ISO 20000 Standard:
Registers
A Forensic Audit
Employees with excessive privileges
29. The portion of IT management that tracks the financial value of IT services that support organizational objectives. It includes 4 activities: (1.) Budgeting (2.) Capital Investment (3.) Expense Management (4.) Project accounting and project ROI (Ret
Confidence coefficient
IT Services Financial Management
An Administrative
Foreign Key
30. Support the functioning of the application controls
Service Continuity Management
TCP/IP Transport Layer packet delivery
List of systems examined
General Controls
31. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
Primary security features of relational databases
Control Risk
Database primary key
WAN Protocols
32. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
IT Service Management
Project change request
The Eight Types of Audits
The Internet Layer in the TCP/IP model
33. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
Sampling Risk
Dimensions of the COSO cube
The 4-item focus of a Balanced Scorecard
More difficult to perform
34. IT Governance is most concerned with ________.
Capability Maturity Model Integration (CMMI)
Elements of the COSO pyramid
Dimensions of the COSO cube
IT Strategy
35. The memory locations in the CPU where arithmetic values are stored.
Registers
Annualized Loss Expectance (ALE)
Personnel involved in the requirements phase of a software development project
Database primary key
36. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
Blade Computer Architecture
Stop-or-go Sampling
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
The Internet Layer in the TCP/IP model
37. The means by which management establishes and measures processes by which organizational objectives are achieved
Dimensions of the COSO cube
Buffers
Controls
Discovery Sampling
38. PERT: shows the ______________ critical path.
Function Point Analysis
Current and most up-to-date
Detection Risk
Employee termination process
39. Gantt: used to display ______________.
Information systems access
Resource details
The typical Configuration Items in Configuration Management
Rating Scale for Process Maturity
40. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Assess the maturity of its business processes
Wet pipe fire sprinkler system
ITIL definition of CHANGE MANAGEMENT
A Service Provider audit
41. (1.) Objectives (2.) Components (3.) Business Units / Areas
Annualized Loss Expectance (ALE)
Dimensions of the COSO cube
The availability of IT systems
Attribute Sampling
42. The highest number of errors that can exist without a result being materially misstated.
Geographic location
Tolerable Error Rate
objective and unbiased
A Service Provider audit
43. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Confidence coefficient
Documentation and interview personnel
Geographic location
TCP/IP Internet Layer
44. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
Options for Risk Treatment
Examples of IT General Controls
Application Layer protocols
WAN Protocols
45. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
The first step in a business impact analysis
Security Awareness program
Categories of risk treatment
Gantt Chart
46. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
Business Realization
Service Continuity Management
The Eight Types of Audits
ITIL - IT Infrastructure Library
47. IT Service Management is defined in ___________________ framework.
ITIL - IT Infrastructure Library
The availability of IT systems
Database primary key
The Release process
48. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
ITIL - IT Infrastructure Library
Critical Path Methodology
IT Services Financial Management
Transport Layer Protocols
49. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
Project Management Strategies
Stay current with technology
ITIL definition of CHANGE MANAGEMENT
Input validation checking
50. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
IT Services Financial Management
Annualized Loss Expectance (ALE)
Examples of Application Controls
A Server Cluster