SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
IT Strategy
Hash
Current and most up-to-date
An IS audit
2. A critical application is backed up once per day. The recovery point objective (RPO) for an application that is backed up once per day cannot be ________.
ITIL definition of PROBLEM
Lacks specific expertise or resources to conduct an internal audit
Antivirus software on the email servers
less than 24 hours
3. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
Stay current with technology
Organizational culture and maturity
Inform the auditee
Confidence coefficient
4. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.
Split custody
TCP/IP Network Model
A Financial Audit
Business Realization
5. Gantt: used to display ______________.
OSI: Transport Layer
Resource details
Organizational culture and maturity
Foreign Key
6. (1.) Link (2.) Internet (3.) Transport (4.) Application
TCP/IP Network Model
Application Controls
TCP/IP Transport Layer packet delivery
IT Services Financial Management
7. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
Project change request
The typical Configuration Items in Configuration Management
Recovery time objective
Input validation checking
8. The means by which management establishes and measures processes by which organizational objectives are achieved
Audit Methodologies
Elements of the COBIT Framework
The Business Process Life Cycle
Controls
9. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
Balanced Scorecard
Elements of the COSO pyramid
Detection Risk
TCP/IP Transport Layer
10. Individual events may often create combined threats to enterprise operations: A tornado might also spawn ____________________.
Incident Management
Structural fires and transportation accidents
Registers
objective and unbiased
11. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
A Service Provider audit
Wet pipe fire sprinkler system
A Financial Audit
Types of sampling an auditor can perform.
12. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
The two Categories of Controls
Testing activities
Blade Computer Architecture
Business impact analysis
13. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
Volumes of COSO framework
IT Service Management
Prblem Management
The first step in a business impact analysis
14. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
Substantive Testing
General Controls
Antivirus software on the email servers
IT Strategy
15. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
A Forensic Audit
Inherent Risk
OSI Layer 6: Presentation
Risk Management
16. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
Blade Computer Architecture
Release management
Gantt Chart
Elements of the COBIT Framework
17. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
Application Layer protocols
The BCP process
Hash
Rating Scale for Process Maturity
18. A sampling technique where at least one exception is sought in a population
A Service Provider audit
A Forensic Audit
Discovery Sampling
Criticality analysis
19. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
The Release process
Database primary key
Annualized Loss Expectance (ALE)
Stratified Sampling
20. An audit that combines an operational audit and a financial audit.
Substantive Testing (test of transaction integrity)
Department Charters
List of systems examined
An Integrated Audit
21. Guide program execution through organization of resources and development of clear project objectives.
Buffers
An Integrated Audit
Project Management Strategies
Concentrate on samples known to represent high risk
22. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
A Sample Mean
IT Strategy
Configuration Management
Attribute Sampling
23. What type of testing is performed to determine if control procedures have proper design and are operating properly?
Information security policy
Attribute Sampling
Compliance Testing
Statement of Impact
24. An external IS auditor has discovered a _______________________ - The external auditor can only document the finding in the audit report. An external auditor is not in a position to implement controls.
Entire password for an encryption key
Segregation of duties issue in a high value process
Examples of IT General Controls
The BCP process
25. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
Buffers
The Steering Committee
Types of sampling an auditor can perform.
TCP/IP Transport Layer packet delivery
26. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
Statistical Sampling
Detection Risk
The first step in a business impact analysis
A Financial Audit
27. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
A Problem
Application Controls
Inform the auditee
The Requirements
28. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient
Elements of the COSO pyramid
Release management
Statement of Impact
Sampling Risk
29. ITIL term used to describe the SDLC.
TCP/IP Link Layer
Grid Computing
Release management
OSI Layer 7: Application
30. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
Six steps of the Release Management process
Dimensions of the COSO cube
Examples of Application Controls
OSI Layer 6: Presentation
31. Framework for auditing and measuring IT Service Management Processes.
Documentation and interview personnel
A Compliance audit
Data Link Layer Standards
ISO 20000 Standard:
32. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
Gantt Chart
Control Risk
Business Continuity
Confidence coefficient
33. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
The Eight Types of Audits
Service Continuity Management
Change management
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
34. Concerns the reliability of data transfer between systems. (1.) Connection Oriented (2.) Guaranteed Delivery (3.) Order of Delivery
Testing activities
OSI: Transport Layer
Categories of risk treatment
Network Layer Protocols
35. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
CPU
Criticality analysis
Server cluster
Lacks specific expertise or resources to conduct an internal audit
36. To measure organizational performance and effectiveness against strategic goals.
IT Services Financial Management
Balanced Scorecard
Wet pipe fire sprinkler system
The audit program
37. The first major task in a disaster recovery or business continuity planning project.
The 5 types of Evidence that the auditor will collect during an audit.
Business impact analysis
TCP/IP Internet Layer
Risk Management
38. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
A Virtual Server
Rating Scale for Process Maturity
Cloud computing
39. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Antivirus software on the email servers
Three Types of Controls
Split custody
An Operational Audit
40. The risk that an IS auditor will overlook errors or exceptions during an audit.
Network Layer Protocols
Detection Risk
IT executives and the Board of Directors
WAN Protocols
41. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
OSI: Physical Layer
An Operational Audit
Function Point Analysis
Sample Standard Deviation
42. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Audit logging
SDLC Phases
Volumes of COSO framework
Stay current with technology
43. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
Precision means
Documentation and interview personnel
Examples of IT General Controls
Audit logging
44. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
List of systems examined
Sampling
Antivirus software on the email servers
Stay current with technology
45. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
Critical Path Methodology
Function Point Analysis
Antivirus software on the email servers
Separate administrative accounts
46. Collections of Controls that work together to achieve an entire range of an organization's objectives.
Frameworks
Concentrate on samples known to represent high risk
Statistical Sampling
Substantive Testing (test of transaction integrity)
47. Contains programs that communicate directly with the end user.
Sampling
Release management
Application Layer protocols
OSI Layer 7: Application
48. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
A Cold Site
The Business Process Life Cycle
TCP/IP Link Layer
Reduced sign-on
49. Lowest layer. Delivers messages (frames) from one station to another vial local network.
Personnel involved in the requirements phase of a software development project
Assess the maturity of its business processes
TCP/IP Link Layer
Examples of IT General Controls
50. Handle application processing
ITIL definition of CHANGE MANAGEMENT
IT Strategy
Application Controls
Overall audit risk
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests