SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Background checks performed
Registers
Confidence coefficient
IT Strategy
2. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
The 5 types of Evidence that the auditor will collect during an audit.
Server cluster
Elements of the COBIT Framework
Discovery Sampling
3. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
The audit program
Dimensions of the COSO cube
Organizational culture and maturity
OSI Layer 7: Application
4. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
The availability of IT systems
Project change request
Geographic location
Volumes of COSO framework
5. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
Criticality analysis
PERT Diagram?
Balanced Scorecard
The 5 types of Evidence that the auditor will collect during an audit.
6. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
List of systems examined
Volumes of COSO framework
A Compliance audit
Release management
7. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Lacks specific expertise or resources to conduct an internal audit
A Sample Mean
Criticality analysis
Function Point Analysis
8. Collections of Controls that work together to achieve an entire range of an organization's objectives.
Power system controls
Risk Management
A Sample Mean
Frameworks
9. The first major task in a disaster recovery or business continuity planning project.
Frameworks
The two Categories of Controls
Business impact analysis
Variable Sampling
10. The inventory of all in-scope business processes and systems
IT Strategy
Emergency Changes
Change management
The first step in a business impact analysis
11. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
PERT Diagram?
Input validation checking
Sampling Risk
Current and most up-to-date
12. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
Foreign Key
An Administrative
OSI: Transport Layer
Testing activities
13. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
Rating Scale for Process Maturity
The appropriate role of an IS auditor in a control self-assessment
PERT Diagram?
OSI Layer 7: Application
14. A collection of two or more servers that is designed to appear as a single server.
The Business Process Life Cycle
Annualized Loss Expectance (ALE)
Server cluster
Control Unit
15. To communication security policies - procedures - and other security-related information to an organization's employees.
Inherent Risk
Gantt Chart
Concentrate on samples known to represent high risk
Security Awareness program
16. The party that performs strategic planning - addresses near-term and long-term requirements aligning business objectives - and technology strategies.
Formal waterfall
Application Layer protocols
The Steering Committee
Tolerable Error Rate
17. The means by which management establishes and measures processes by which organizational objectives are achieved
Hash
Assess the maturity of its business processes
Controls
IT Service Management
18. Describes the effect on the business if a process is incapacitated for any appreciable time
Advantages of outsourcing
Segregation of duties issue in a high value process
OSI: Transport Layer
Statement of Impact
19. Guide program execution through organization of resources and development of clear project objectives.
Overall audit risk
Six steps of the Release Management process
Recovery time objective
Project Management Strategies
20. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
Sampling
Current and most up-to-date
Server cluster
Service Continuity Management
21. Support the functioning of the application controls
Attribute Sampling
Server cluster
Control Risk
General Controls
22. A field in a record in one table that can reference a primary key in another table that can reference a primary key in another table.
Capability Maturity Model
Primary security features of relational databases
Business Realization
Foreign Key
23. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Volumes of COSO framework
Discovery Sampling
Assess the maturity of its business processes
Examples of IT General Controls
24. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
Options for Risk Treatment
WAN Protocols
TCP/IP Transport Layer packet delivery
Balanced Scorecard
25. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
Geographic location
Stay current with technology
Background checks performed
WAN Protocols
26. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
Stratified Sampling
Expected Error Rate
Risk Management
Information systems access
27. A Fire sprinkler system has water in its pipes - and sprinkler heads emit water only if the ambient temperature reaches 220 deg. F. This is a ________________. The system is charged with water and will discharge water out of any sprinkler head whose
Incident Management
Elements of the COSO pyramid
Wet pipe fire sprinkler system
A Financial Audit
28. (1.) Access controls (2.) Encryption (3.) Audit logging
A Forensic Audit
Primary security features of relational databases
Elements of the COBIT Framework
Inherent Risk
29. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
Hash
objective and unbiased
BCP Plans
TCP/IP Link Layer
30. An audit of an IS department's operations and systems.
An IS audit
Function Point Analysis
TCP/IP Transport Layer
The availability of IT systems
31. To review and approve proposed changes to systems and infrastructure. This helps to reduce the risk of unintended events and unplanned downtime.
TCP/IP Link Layer
Structural fires and transportation accidents
Assess the maturity of its business processes
Change management
32. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
Variable Sampling
Employees with excessive privileges
Emergency Changes
less than 24 hours
33. Concerned with electrical and physical specifications for devices. No frames or packets involved.
OSI: Physical Layer
Concentrate on samples known to represent high risk
less than 24 hours
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
34. An audit that is performed in support of an anticipated or active legal proceeding.
A Forensic Audit
Database primary key
OSI: Data Link Layer
Network Layer Protocols
35. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
A Server Cluster
Frameworks
Grid Computing
The Internet Layer in the TCP/IP model
36. The memory locations in the CPU where arithmetic values are stored.
An Administrative
OSI Layer 6: Presentation
List of systems examined
Registers
37. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Precision means
An Operational Audit
Stay current with technology
Three Types of Controls
38. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
Assess the maturity of its business processes
General Controls
Formal waterfall
The BCP process
39. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
TCP/IP Internet Layer
Advantages of outsourcing
Reduced sign-on
Service Level Management
40. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
Vulnerability in the organization's PBX
Formal waterfall
TCP/IP Link Layer
The best approach for identifying high risk areas for an audit
41. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Cloud computing
OSI: Transport Layer
Frameworks
The Requirements
42. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
Sampling Risk
The Steering Committee
Documentation and interview personnel
TCP/IP Network Model
43. Delivery of packets from one station to another - on the same network or on different networks.
Examples of Application Controls
Assess the maturity of its business processes
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
The Internet Layer in the TCP/IP model
44. Used to measure the relative maturity of an organization and its processes.
Capability Maturity Model
Project change request
Data Link Layer Standards
Substantive Testing
45. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
Inherent Risk
(1.) Polices (2.) Procedures (3.) Standards
A Server Cluster
IT executives and the Board of Directors
46. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
CPU
A Problem
Controls
The Release process
47. An alternate processing center that contains no information processing equipment.
Capability Maturity Model
Stop-or-go Sampling
A Cold Site
Types of sampling an auditor can perform.
48. Any event which is not part of the standard operation of service and which causes or may cause an interruption to or reduction in quality of that service. Includes THREE incident types: (1.) Service Outage (2.) Service Slowdown (3.) Software Bug
Configuration Management
Incident Management
The Internet Layer in the TCP/IP model
Control Unit
49. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Stratified Sampling
Attribute Sampling
Critical Path Methodology
Inform the auditee
50. A critical application is backed up once per day. The recovery point objective (RPO) for an application that is backed up once per day cannot be ________.
less than 24 hours
Change management
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Assess the maturity of its business processes