SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (1.) Feasibility (2.) Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation
IT Service Management
OSI: Physical Layer
The 7 phases and their order in the SDLC
The Internet Layer in the TCP/IP model
2. The highest number of errors that can exist without a result being materially misstated.
(1.) Polices (2.) Procedures (3.) Standards
Frameworks
Tolerable Error Rate
SDLC Phases
3. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
Advantages of outsourcing
The Business Process Life Cycle
Structural fires and transportation accidents
Antivirus software on the email servers
4. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
Antivirus software on the email servers
The first step in a business impact analysis
Discovery Sampling
A Cold Site
5. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Audit logging
PERT Diagram?
CPU
Compliance Testing
6. A condition often identified as a result of multiple incidents that exhibit common symptoms. Problems can also be identified from a single significant incident for which the impact is significant.
The audit program
ITIL definition of PROBLEM
A Server Cluster
More difficult to perform
7. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
The Steering Committee
Substantive Testing
Antivirus software on the email servers
The 4-item focus of a Balanced Scorecard
8. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
To identify the tasks that are responsible for project delays
Business impact analysis
Audit logging
Service Continuity Management
9. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
OSI: Transport Layer
Personnel involved in the requirements phase of a software development project
Recovery time objective
Entire password for an encryption key
10. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Attribute Sampling
Types of sampling an auditor can perform.
To identify the tasks that are responsible for project delays
Lacks specific expertise or resources to conduct an internal audit
11. (1.) Develop a BC Policy (2.) Conduct BIA (3.) Perform critical analysis (4.) Establish recovery targets (5.) Develop recovery and continuity strategies and plans (6.) Test recovery and continuity plans and procedures Train personnel Maintain strateg
TCP/IP Transport Layer packet delivery
Variable Sampling
The BCP process
Information systems access
12. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
Examples of IT General Controls
Configuration Management
Stay current with technology
WAN Protocols
13. A collection of two or more servers that is designed to appear as a single server.
Employees with excessive privileges
Concentrate on samples known to represent high risk
The Internet Layer in the TCP/IP model
Server cluster
14. Support the functioning of the application controls
General Controls
IT executives and the Board of Directors
Substantive Testing (test of transaction integrity)
Change management
15. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
IT Strategy
Split custody
Sample Standard Deviation
The Release process
16. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
Elements of the COSO pyramid
The 4-item focus of a Balanced Scorecard
Wet pipe fire sprinkler system
Gantt Chart
17. 1.) Executive Support (2.) Well-defined roles and responsibilities.
The typical Configuration Items in Configuration Management
Discovery Sampling
Notify the Audit Committee
Information security policy
18. An audit of a third-party organization that provides services to other organizations.
The Eight Types of Audits
Release management
Structural fires and transportation accidents
A Service Provider audit
19. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
The 5 types of Evidence that the auditor will collect during an audit.
Audit Methodologies
Information systems access
Capability Maturity Model Integration (CMMI)
20. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Sampling
The first step in a business impact analysis
An IS audit
Balanced Scorecard
21. An audit that is performed in support of an anticipated or active legal proceeding.
A Forensic Audit
Precision means
Primary security features of relational databases
Volumes of COSO framework
22. A maturity model that represents the aggregations of other maturity models.
SDLC Phases
Data Link Layer Standards
Compliance Testing
Capability Maturity Model Integration (CMMI)
23. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
The audit program
More difficult to perform
Examples of IT General Controls
Stop-or-go Sampling
24. Contains programs that communicate directly with the end user.
OSI Layer 7: Application
IT Service Management
Input validation checking
Assess the maturity of its business processes
25. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
26. Guide program execution through organization of resources and development of clear project objectives.
Project Management Strategies
Stratified Sampling
OSI: Data Link Layer
Substantive Testing
27. The sum of all samples divided by the number of samples.
A Sample Mean
Inherent Risk
Deming Cycle
Capability Maturity Model
28. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
Transport Layer Protocols
Expected Error Rate
A Financial Audit
Volumes of COSO framework
29. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
An Operational Audit
Gantt Chart
Statement of Impact
Transport Layer Protocols
30. Used to estimate the effort required to develop a software program.
Function Point Analysis
Audit logging
Inform the auditee
A Compliance audit
31. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
Network Layer Protocols
Separate administrative accounts
Formal waterfall
Capability Maturity Model
32. Individual events may often create combined threats to enterprise operations: A tornado might also spawn ____________________.
Foreign Key
Variable Sampling
The Requirements
Structural fires and transportation accidents
33. Concerned with electrical and physical specifications for devices. No frames or packets involved.
Change management
Critical Path Methodology
OSI: Physical Layer
The Steering Committee
34. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
TCP/IP Transport Layer
Examples of Application Controls
A Sample Mean
Statistical Sampling
35. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
Detection Risk
Elements of the COBIT Framework
The Requirements
Compliance Testing
36. (1.) Access controls (2.) Encryption (3.) Audit logging
The typical Configuration Items in Configuration Management
A Service Provider audit
The Software Program Library
Primary security features of relational databases
37. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
The availability of IT systems
Split custody
IT executives and the Board of Directors
OSI Layer 7: Application
38. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.
Personnel involved in the requirements phase of a software development project
Grid Computing
Wet pipe fire sprinkler system
Control Unit
39. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
A Forensic Audit
Formal waterfall
Volumes of COSO framework
BCP Plans
40. A representation of how closely a sample represents an entire population.
Application Controls
The availability of IT systems
Stop-or-go Sampling
Precision means
41. To measure organizational performance and effectiveness against strategic goals.
Geographic location
Variable Sampling
Balanced Scorecard
The Steering Committee
42. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
OSI: Physical Layer
Incident Management
Emergency Changes
The Software Program Library
43. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
The Release process
Assess the maturity of its business processes
TCP/IP Network Model
IT executives and the Board of Directors
44. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
Annualized Loss Expectance (ALE)
Inform the auditee
Change management
Disaster Recovery
45. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
Service Level Management
Application Controls
IT executives and the Board of Directors
Audit logging
46. Delivery of packets from one station to another - on the same network or on different networks.
Deming Cycle
The Internet Layer in the TCP/IP model
Compliance Testing
The Release process
47. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
Current and most up-to-date
Referential Integrity
Audit Methodologies
Data Link Layer Standards
48. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
The audit program
Confidence coefficient
ITIL definition of CHANGE MANAGEMENT
IT executives and the Board of Directors
49. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
Application Layer protocols
The availability of IT systems
PERT Diagram?
The Eight Types of Audits
50. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
OSI: Data Link Layer
Business Continuity
Wet pipe fire sprinkler system
(1.) Polices (2.) Procedures (3.) Standards