SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (1.) Access controls (2.) Encryption (3.) Audit logging
Types of sampling an auditor can perform.
Primary security features of relational databases
A Server Cluster
Statistical Sampling
2. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25
Audit logging
(1.) Man-made (2.) Natural
A Problem
WAN Protocols
3. Subjective sampling is used when the auditor wants to _________________________.
Inherent Risk
Concentrate on samples known to represent high risk
Substantive Testing
Documentation and interview personnel
4. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
Power system controls
Application Controls
TCP/IP Network Model
Risk Management
5. A condition often identified as a result of multiple incidents that exhibit common symptoms. Problems can also be identified from a single significant incident for which the impact is significant.
ITIL definition of PROBLEM
Antivirus software on the email servers
Change management
Release management
6. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
Gantt Chart
Control Unit
Segregation of duties issue in a high value process
Judgmental sampling
7. (1.) General (2.) Application
Security Awareness program
Grid Computing
Organizational culture and maturity
Main types of Controls
8. IT Governance is most concerned with ________.
Foreign Key
Information systems access
Expected Error Rate
IT Strategy
9. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
Structural fires and transportation accidents
Foreign Key
Discovery Sampling
A Financial Audit
10. What type of testing is performed to determine if control procedures have proper design and are operating properly?
Compliance Testing
Blade Computer Architecture
Statement of Impact
Sample Standard Deviation
11. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
Grid Computing
Frameworks
IT Service Management
OSI: Transport Layer
12. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
(1.) Polices (2.) Procedures (3.) Standards
Overall audit risk
Referential Integrity
Vulnerability in the organization's PBX
13. Consists of two main packet transport protocols: TCP and UDP.
(1.) Man-made (2.) Natural
TCP/IP Transport Layer
OSI Layer 6: Presentation
A Compliance audit
14. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
The availability of IT systems
The 5 types of Evidence that the auditor will collect during an audit.
Substantive Testing (test of transaction integrity)
Substantive Testing
15. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
Sample Standard Deviation
A Forensic Audit
A gate process
Substantive Testing
16. An auditor has discovered several errors in user account management: many terminated employees' computer accounts are still active. The best course of action - To improve the _________________ to reduce the number of exceptions. For a time - the proc
Attribute Sampling
The availability of IT systems
Employee termination process
IT Strategy
17. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
Examples of IT General Controls
objective and unbiased
Wet pipe fire sprinkler system
Six steps of the Release Management process
18. ITIL term used to describe the SDLC.
List of systems examined
Release management
Precision means
Inform the auditee
19. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Sampling
Capability Maturity Model
Organizational culture and maturity
Deming Cycle
20. The sum of all samples divided by the number of samples.
Transport Layer Protocols
A Sample Mean
Input validation checking
Application Layer protocols
21. An external IS auditor has discovered a _______________________ - The external auditor can only document the finding in the audit report. An external auditor is not in a position to implement controls.
Service Level Management
OSI: Data Link Layer
Segregation of duties issue in a high value process
Data Link Layer Standards
22. ____________________ of the hot site is most important consideration for site selection. IF they are too close together then a single event may involve both locations
A Cold Site
Deming Cycle
List of systems examined
Geographic location
23. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
Audit Methodologies
objective and unbiased
Substantive Testing
Compliance Testing
24. (1.) Physical (2.) Technical (4.) Administrative
Substantive Testing
Wet pipe fire sprinkler system
Three Types of Controls
Controls
25. A critical application is backed up once per day. The recovery point objective (RPO) for an application that is backed up once per day cannot be ________.
Entire password for an encryption key
Control Unit
Organizational culture and maturity
less than 24 hours
26. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
Incident Management
OSI: Transport Layer
Substantive Testing
Annualized Loss Expectance (ALE)
27. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
Six steps of the Release Management process
Volumes of COSO framework
Critical Path Methodology
ITIL definition of PROBLEM
28. (1.) Link (2.) Internet (3.) Transport (4.) Application
Buffers
Emergency Changes
TCP/IP Network Model
Deming Cycle
29. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
Sampling
Six steps of the Release Management process
WAN Protocols
Concentrate on samples known to represent high risk
30. An audit of a third-party organization that provides services to other organizations.
The Internet Layer in the TCP/IP model
A Compliance audit
A Service Provider audit
Buffers
31. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
IT executives and the Board of Directors
The typical Configuration Items in Configuration Management
The Steering Committee
Discovery Sampling
32. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
The Business Process Life Cycle
Insourcing
Formal waterfall
Security Awareness program
33. A maturity model that represents the aggregations of other maturity models.
Database primary key
Information security policy
The two Categories of Controls
Capability Maturity Model Integration (CMMI)
34. An auditor has discovered that several administrators in an application share an administrative account. The auditor should recommend that - Several __________________ should be used. This will enforce accountability for each administrator's actions.
OSI: Physical Layer
Separate administrative accounts
(1.) Polices (2.) Procedures (3.) Standards
General Controls
35. The memory locations in the CPU where arithmetic values are stored.
Registers
Disaster Recovery
A Cold Site
Project change request
36. The party that performs strategic planning - addresses near-term and long-term requirements aligning business objectives - and technology strategies.
The Steering Committee
A Problem
Concentrate on samples known to represent high risk
Application Layer protocols
37. Used to estimate the effort required to develop a software program.
Function Point Analysis
Tolerable Error Rate
A Sample Mean
The Release process
38. The highest number of errors that can exist without a result being materially misstated.
TCP/IP Transport Layer
Reduced sign-on
Tolerable Error Rate
Registers
39. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
The Internet Layer in the TCP/IP model
Notify the Audit Committee
Stay current with technology
ISO 20000 Standard:
40. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Power system controls
Emergency Changes
Six steps of the Release Management process
IT Service Management
41. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
A Forensic Audit
Inherent Risk
Critical Path Methodology
The appropriate role of an IS auditor in a control self-assessment
42. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
less than 24 hours
A Sample Mean
Background checks performed
43. Handle application processing
Application Controls
Release management
Business Continuity
Capability Maturity Model
44. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.
Power system controls
Variable Sampling
TCP/IP Transport Layer packet delivery
Disaster Recovery
45. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
Elements of the COSO pyramid
Project change request
The Software Program Library
Statistical Sampling
46. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
Organizational culture and maturity
TCP/IP Transport Layer packet delivery
Information security policy
The Eight Types of Audits
47. Outsourcing is an opportunity for the organization to focus on core competencies. When an organization oursources a business function - it no longer needs to be concerned about training employees in that function. Outsources does not always reduce co
Advantages of outsourcing
IT standards are not being reviewed often enough
An IS audit
Criticality analysis
48. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
OSI: Transport Layer
Types of sampling an auditor can perform.
Capability Maturity Model Integration (CMMI)
ITIL - IT Infrastructure Library
49. To measure organizational performance and effectiveness against strategic goals.
Balanced Scorecard
The 4-item focus of a Balanced Scorecard
Notify the Audit Committee
Audit Methodologies
50. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
The Eight Types of Audits
Service Continuity Management
Confidence coefficient
List of systems examined
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests