SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To review and approve proposed changes to systems and infrastructure. This helps to reduce the risk of unintended events and unplanned downtime.
Referential Integrity
Change management
Balanced Scorecard
Application Controls
2. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
TCP/IP Link Layer
Primary security features of relational databases
Prblem Management
Grid Computing
3. IT Service Management is defined in ___________________ framework.
Employees with excessive privileges
Stratified Sampling
ITIL - IT Infrastructure Library
Power system controls
4. To communication security policies - procedures - and other security-related information to an organization's employees.
A Compliance audit
objective and unbiased
Security Awareness program
Primary security features of relational databases
5. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.
Detection Risk
Service Level Management
ITIL definition of PROBLEM
Testing activities
6. Used to estimate the effort required to develop a software program.
Discovery Sampling
Stay current with technology
Database primary key
Function Point Analysis
7. (1.) General (2.) Application
IT Services Financial Management
Main types of Controls
Lacks specific expertise or resources to conduct an internal audit
Database primary key
8. Disasters are generally grouped in terms of type: ______________.
(1.) Man-made (2.) Natural
Stop-or-go Sampling
Reduced sign-on
The Requirements
9. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
Attribute Sampling
OSI Layer 5: Session
Change management
A Problem
10. The means by which management establishes and measures processes by which organizational objectives are achieved
Controls
Audit Methodologies
less than 24 hours
Dimensions of the COSO cube
11. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Substantive Testing (test of transaction integrity)
Primary security features of relational databases
Application Layer protocols
less than 24 hours
12. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Function Point Analysis
Power system controls
Sampling
Formal waterfall
13. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
Project change request
Balanced Scorecard
Organizational culture and maturity
The best approach for identifying high risk areas for an audit
14. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
OSI Layer 5: Session
Gantt Chart
Vulnerability in the organization's PBX
Entire password for an encryption key
15. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
Statement of Impact
IT standards are not being reviewed often enough
Referential Integrity
Advantages of outsourcing
16. A representation of how closely a sample represents an entire population.
Detection Risk
The 7 phases and their order in the SDLC
Precision means
PERT Diagram?
17. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
Testing activities
Concentrate on samples known to represent high risk
Overall audit risk
Rating Scale for Process Maturity
18. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Substantive Testing
Gantt Chart
Entire password for an encryption key
The 4-item focus of a Balanced Scorecard
19. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
The 7 phases and their order in the SDLC
A Financial Audit
Grid Computing
Information systems access
20. The inventory of all in-scope business processes and systems
The first step in a business impact analysis
Documentation and interview personnel
Compliance Testing
Split custody
21. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
Grid Computing
Formal waterfall
Types of sampling an auditor can perform.
Annualized Loss Expectance (ALE)
22. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
Main types of Controls
To identify the tasks that are responsible for project delays
Input validation checking
The Requirements
23. One of a database table's fields - whose value is unique.
Substantive Testing (test of transaction integrity)
Detection Risk
Attribute Sampling
Database primary key
24. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
Cloud computing
A Compliance audit
To identify the tasks that are responsible for project delays
The two Categories of Controls
25. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
26. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Examples of IT General Controls
Concentrate on samples known to represent high risk
Control Unit
Hash
27. Framework for auditing and measuring IT Service Management Processes.
ISO 20000 Standard:
Blade Computer Architecture
Audit Methodologies
Service Level Management
28. An alternate processing center that contains no information processing equipment.
A Cold Site
TCP/IP Network Model
The Release process
Elements of the COSO pyramid
29. Lowest layer. Delivers messages (frames) from one station to another vial local network.
Categories of risk treatment
Project change request
TCP/IP Link Layer
IT Services Financial Management
30. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
A Problem
A Server Cluster
Grid Computing
SDLC Phases
31. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.
TCP/IP Internet Layer
Organizational culture and maturity
Annualized Loss Expectance (ALE)
Function Point Analysis
32. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
Service Level Management
Compliance Testing
A Problem
The best approach for identifying high risk areas for an audit
33. Concerned with electrical and physical specifications for devices. No frames or packets involved.
A Sample Mean
Deming Cycle
OSI: Physical Layer
Employee termination process
34. (1.) Avoidance (2.) Transfer (3.) Mitigation (4.) Acceptance
Categories of risk treatment
Substantive Testing (test of transaction integrity)
Current and most up-to-date
TCP/IP Internet Layer
35. The highest number of errors that can exist without a result being materially misstated.
Three Types of Controls
Tolerable Error Rate
Buffers
Inherent Risk
36. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient
BCP Plans
An Administrative
The appropriate role of an IS auditor in a control self-assessment
Sampling Risk
37. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
Input validation checking
More difficult to perform
Critical Path Methodology
Server cluster
38. A software developer has informed the project manager that a portion of the application development is going to take five additional days to complete. The project manager make a __________________ to document the reason for the change.
Project change request
Database primary key
Audit Methodologies
Deming Cycle
39. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
A Service Provider audit
An Administrative
Project Management Strategies
Sample Standard Deviation
40. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
Criticality analysis
ISO 20000 Standard:
Types of sampling an auditor can perform.
Precision means
41. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Project Management Strategies
The audit program
The 7 phases and their order in the SDLC
Confidence coefficient
42. (1.) Link (2.) Internet (3.) Transport (4.) Application
Audit logging
Control Risk
TCP/IP Network Model
TCP/IP Transport Layer packet delivery
43. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
The Eight Types of Audits
Main types of Controls
The audit program
Deming Cycle
44. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog
Controls
The first step in a business impact analysis
Buffers
Business Realization
45. Used to measure the relative maturity of an organization and its processes.
The Release process
Balanced Scorecard
Capability Maturity Model
Substantive Testing (test of transaction integrity)
46. ____________________ of the hot site is most important consideration for site selection. IF they are too close together then a single event may involve both locations
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Geographic location
Frameworks
Concentrate on samples known to represent high risk
47. A field in a record in one table that can reference a primary key in another table that can reference a primary key in another table.
An Operational Audit
Foreign Key
IT Services Financial Management
TCP/IP Transport Layer packet delivery
48. A condition often identified as a result of multiple incidents that exhibit common symptoms. Problems can also be identified from a single significant incident for which the impact is significant.
ISO 20000 Standard:
Organizational culture and maturity
To identify the tasks that are responsible for project delays
ITIL definition of PROBLEM
49. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg
Separate administrative accounts
Documentation and interview personnel
The BCP process
The Business Process Life Cycle
50. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
Application Controls
BCP Plans
Advantages of outsourcing
Discovery Sampling