SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
Hash
Foreign Key
The appropriate role of an IS auditor in a control self-assessment
Types of sampling an auditor can perform.
2. An audit of a third-party organization that provides services to other organizations.
OSI Layer 6: Presentation
Statement of Impact
OSI: Network Layer
A Service Provider audit
3. PERT: shows the ______________ critical path.
IT Service Management
Business Realization
The availability of IT systems
Current and most up-to-date
4. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
ITIL definition of PROBLEM
Examples of Application Controls
Inform the auditee
OSI: Network Layer
5. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
SDLC Phases
ITIL - IT Infrastructure Library
Three Types of Controls
Assess the maturity of its business processes
6. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Entire password for an encryption key
Server cluster
Cloud computing
A Financial Audit
7. Used to estimate the effort required to develop a software program.
Balanced Scorecard
Function Point Analysis
Network Layer Protocols
Annualized Loss Expectance (ALE)
8. ____________________ of the hot site is most important consideration for site selection. IF they are too close together then a single event may involve both locations
Geographic location
Entire password for an encryption key
Capability Maturity Model Integration (CMMI)
Employee termination process
9. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
SDLC Phases
A gate process
Prblem Management
Audit Methodologies
10. Consists of two main packet transport protocols: TCP and UDP.
TCP/IP Transport Layer
Categories of risk treatment
Stratified Sampling
The 7 phases and their order in the SDLC
11. Handle application processing
Balanced Scorecard
List of systems examined
Application Controls
Background checks performed
12. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
IT Service Management
Critical Path Methodology
Examples of IT General Controls
TCP/IP Transport Layer
13. Disasters are generally grouped in terms of type: ______________.
Sampling Risk
(1.) Man-made (2.) Natural
The best approach for identifying high risk areas for an audit
An IS audit
14. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
OSI: Data Link Layer
TCP/IP Internet Layer
Personnel involved in the requirements phase of a software development project
Security Awareness program
15. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Geographic location
Testing activities
Six steps of the Release Management process
Notify the Audit Committee
16. Subjective sampling is used when the auditor wants to _________________________.
Concentrate on samples known to represent high risk
Inform the auditee
Department Charters
Database primary key
17. Consists of main chassis component that is equipped with slots are fitted with individual cpu modules. Main advantage is lower cost per unit.
OSI Layer 6: Presentation
Control Risk
Blade Computer Architecture
TCP/IP Internet Layer
18. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
The typical Configuration Items in Configuration Management
Volumes of COSO framework
A Sample Mean
The BCP process
19. Requires that a password be broken into two or more parts - with each part in the possession of a separate person.
Detection Risk
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Split custody
Gantt Chart
20. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
Service Level Management
Deming Cycle
Critical Path Methodology
A Forensic Audit
21. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
Sample Standard Deviation
Reduced sign-on
IT executives and the Board of Directors
TCP/IP Link Layer
22. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
Entire password for an encryption key
Dimensions of the COSO cube
Insourcing
Rating Scale for Process Maturity
23. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
Expected Error Rate
A Compliance audit
Attribute Sampling
Stay current with technology
24. An audit of an IS department's operations and systems.
Organizational culture and maturity
IT Service Management
An IS audit
Balanced Scorecard
25. The delivery of messages from one station to another via one or more networks.. Routes packets between networks.
OSI: Network Layer
Security Awareness program
Volumes of COSO framework
Judgmental sampling
26. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
Entire password for an encryption key
Registers
Grid Computing
Input validation checking
27. To communication security policies - procedures - and other security-related information to an organization's employees.
Incident Management
Security Awareness program
A Problem
Function Point Analysis
28. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
The best approach for identifying high risk areas for an audit
Inherent Risk
Capability Maturity Model
Overall audit risk
29. Used to measure the relative maturity of an organization and its processes.
An Integrated Audit
An Operational Audit
Capability Maturity Model
A Server Cluster
30. Focuses on: maintaining service availability with the least disruption to standard operating parameters during an event
Business Continuity
Substantive Testing (test of transaction integrity)
A Financial Audit
Security Awareness program
31. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Control Risk
ITIL definition of CHANGE MANAGEMENT
Grid Computing
Discovery Sampling
32. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
The Eight Types of Audits
Business Continuity
OSI: Physical Layer
The Software Program Library
33. The risk that an IS auditor will overlook errors or exceptions during an audit.
A gate process
Examples of IT General Controls
Detection Risk
ITIL definition of CHANGE MANAGEMENT
34. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
Assess the maturity of its business processes
Options for Risk Treatment
Statement of Impact
Lacks specific expertise or resources to conduct an internal audit
35. Any event which is not part of the standard operation of service and which causes or may cause an interruption to or reduction in quality of that service. Includes THREE incident types: (1.) Service Outage (2.) Service Slowdown (3.) Software Bug
Statement of Impact
Options for Risk Treatment
Background checks performed
Incident Management
36. A maturity model that represents the aggregations of other maturity models.
Vulnerability in the organization's PBX
Capability Maturity Model Integration (CMMI)
Precision means
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
37. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
Inform the auditee
(1.) Man-made (2.) Natural
A Server Cluster
Advantages of outsourcing
38. IT Governance is most concerned with ________.
IT Strategy
Security Awareness program
Formal waterfall
Examples of Application Controls
39. A Fire sprinkler system has water in its pipes - and sprinkler heads emit water only if the ambient temperature reaches 220 deg. F. This is a ________________. The system is charged with water and will discharge water out of any sprinkler head whose
A Problem
Wet pipe fire sprinkler system
Department Charters
Recovery time objective
40. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
The Business Process Life Cycle
less than 24 hours
Configuration Management
Resource details
41. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
Examples of IT General Controls
The appropriate role of an IS auditor in a control self-assessment
Annualized Loss Expectance (ALE)
Tolerable Error Rate
42. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.
Discovery Sampling
The audit program
Tolerable Error Rate
Sampling Risk
43. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
Deming Cycle
OSI: Transport Layer
Current and most up-to-date
Background checks performed
44. To review and approve proposed changes to systems and infrastructure. This helps to reduce the risk of unintended events and unplanned downtime.
An Operational Audit
Change management
Variable Sampling
Audit logging
45. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
Sampling Risk
Elements of the COBIT Framework
The Requirements
Advantages of outsourcing
46. Guide program execution through organization of resources and development of clear project objectives.
Capability Maturity Model
Project Management Strategies
Judgmental sampling
Application Layer protocols
47. The means by which management establishes and measures processes by which organizational objectives are achieved
Antivirus software on the email servers
Types of sampling an auditor can perform.
Controls
Emergency Changes
48. The highest number of errors that can exist without a result being materially misstated.
IT Services Financial Management
Geographic location
Tolerable Error Rate
Current and most up-to-date
49. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.
Expected Error Rate
Resource details
Configuration Management
Examples of IT General Controls
50. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
Deming Cycle
Configuration Management
IT Strategy
Examples of Application Controls