SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
Annualized Loss Expectance (ALE)
Inform the auditee
Split custody
List of systems examined
2. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
Cloud computing
Three Types of Controls
Application Layer protocols
List of systems examined
3. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
Separate administrative accounts
A Server Cluster
Judgmental sampling
A Problem
4. Contains programs that communicate directly with the end user.
Rating Scale for Process Maturity
OSI Layer 7: Application
TCP/IP Internet Layer
Attribute Sampling
5. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
Discovery Sampling
A Problem
IT standards are not being reviewed often enough
Stay current with technology
6. A representation of how closely a sample represents an entire population.
The Requirements
Antivirus software on the email servers
Change management
Precision means
7. The maximum period of downtime for a process or application
BCP Plans
Assess the maturity of its business processes
Audit Methodologies
Recovery time objective
8. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
OSI: Transport Layer
Application Controls
The two Categories of Controls
Deming Cycle
9. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
Risk Management
Lacks specific expertise or resources to conduct an internal audit
Referential Integrity
Prblem Management
10. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
Attribute Sampling
Options for Risk Treatment
OSI: Network Layer
Sampling
11. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
Business Continuity
Service Level Management
Stay current with technology
Elements of the COBIT Framework
12. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
objective and unbiased
Separate administrative accounts
Sample Standard Deviation
Split custody
13. An alternate processing center that contains no information processing equipment.
Judgmental sampling
Rating Scale for Process Maturity
A Cold Site
Volumes of COSO framework
14. (1.) Objectives (2.) Components (3.) Business Units / Areas
Dimensions of the COSO cube
The Internet Layer in the TCP/IP model
WAN Protocols
Sample Standard Deviation
15. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
ITIL - IT Infrastructure Library
TCP/IP Transport Layer packet delivery
Business impact analysis
Information security policy
16. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
List of systems examined
Business Realization
Personnel involved in the requirements phase of a software development project
Vulnerability in the organization's PBX
17. PERT: shows the ______________ critical path.
Input validation checking
Current and most up-to-date
BCP Plans
Database primary key
18. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
Audit logging
Power system controls
Judgmental sampling
Risk Management
19. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.
Sample Standard Deviation
IT Services Financial Management
Configuration Management
The availability of IT systems
20. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
Network Layer Protocols
Notify the Audit Committee
Categories of risk treatment
A Virtual Server
21. To measure organizational performance and effectiveness against strategic goals.
Audit Methodologies
A Problem
Detection Risk
Balanced Scorecard
22. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
Types of sampling an auditor can perform.
Employee termination process
The Steering Committee
Reduced sign-on
23. Used to measure the relative maturity of an organization and its processes.
Capability Maturity Model
Insourcing
Business Realization
Wet pipe fire sprinkler system
24. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
Volumes of COSO framework
The best approach for identifying high risk areas for an audit
Statistical Sampling
Buffers
25. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
The audit program
IT Services Financial Management
Power system controls
Attribute Sampling
26. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
Judgmental sampling
Categories of risk treatment
More difficult to perform
Employees with excessive privileges
27. Framework for auditing and measuring IT Service Management Processes.
Function Point Analysis
Options for Risk Treatment
ISO 20000 Standard:
Criticality analysis
28. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Sample Standard Deviation
The Release process
Deming Cycle
Data Link Layer Standards
29. (1.) Feasibility (2.) Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation
Deming Cycle
Data Link Layer Standards
SDLC Phases
The 7 phases and their order in the SDLC
30. An audit of a third-party organization that provides services to other organizations.
Three Types of Controls
A Service Provider audit
ITIL definition of PROBLEM
(1.) Man-made (2.) Natural
31. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
Inform the auditee
Project change request
OSI: Data Link Layer
Rating Scale for Process Maturity
32. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Notify the Audit Committee
Six steps of the Release Management process
TCP/IP Internet Layer
Application Controls
33. (1.) Access controls (2.) Encryption (3.) Audit logging
Notify the Audit Committee
OSI Layer 7: Application
Expected Error Rate
Primary security features of relational databases
34. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
The Requirements
SDLC Phases
Deming Cycle
ITIL - IT Infrastructure Library
35. A condition often identified as a result of multiple incidents that exhibit common symptoms. Problems can also be identified from a single significant incident for which the impact is significant.
TCP/IP Network Model
A Virtual Server
ITIL definition of PROBLEM
Transport Layer Protocols
36. Describes the effect on the business if a process is incapacitated for any appreciable time
List of systems examined
Statement of Impact
The Internet Layer in the TCP/IP model
Concentrate on samples known to represent high risk
37. Any event which is not part of the standard operation of service and which causes or may cause an interruption to or reduction in quality of that service. Includes THREE incident types: (1.) Service Outage (2.) Service Slowdown (3.) Software Bug
Statement of Impact
Incident Management
Antivirus software on the email servers
Buffers
38. (1.) Authentication (2.) Authorization (3.) Change Management (4.) Completeness checks (5.) Validation checks (6.) Input controls (7.) Output controls (8.) Problem management (9.) Identification/access controls
SDLC Phases
Examples of Application Controls
List of systems examined
OSI Layer 7: Application
39. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Entire password for an encryption key
Business impact analysis
The Release process
A gate process
40. One of a database table's fields - whose value is unique.
Stop-or-go Sampling
Detection Risk
Types of sampling an auditor can perform.
Database primary key
41. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
Stay current with technology
ITIL definition of CHANGE MANAGEMENT
Data Link Layer Standards
Notify the Audit Committee
42. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
The first step in a business impact analysis
Business impact analysis
Stratified Sampling
Disaster Recovery
43. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg
Capability Maturity Model
Network Layer Protocols
Examples of IT General Controls
The BCP process
44. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
Structural fires and transportation accidents
Background checks performed
ISO 20000 Standard:
Annualized Loss Expectance (ALE)
45. A Fire sprinkler system has water in its pipes - and sprinkler heads emit water only if the ambient temperature reaches 220 deg. F. This is a ________________. The system is charged with water and will discharge water out of any sprinkler head whose
Wet pipe fire sprinkler system
Organizational culture and maturity
The typical Configuration Items in Configuration Management
Criticality analysis
46. The risk that an IS auditor will overlook errors or exceptions during an audit.
Geographic location
Detection Risk
The appropriate role of an IS auditor in a control self-assessment
Segregation of duties issue in a high value process
47. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
Compliance Testing
Sampling Risk
A Service Provider audit
The Requirements
48. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Control Risk
Balanced Scorecard
TCP/IP Link Layer
Capability Maturity Model
49. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
Rating Scale for Process Maturity
The Release process
TCP/IP Internet Layer
Precision means
50. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
Control Unit
OSI: Physical Layer
Criticality analysis
Buffers
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests