SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Framework for auditing and measuring IT Service Management Processes.
ISO 20000 Standard:
Prblem Management
List of systems examined
Grid Computing
2. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Deming Cycle
Assess the maturity of its business processes
Control Unit
Application Layer protocols
3. Delivery of packets from one station to another - on the same network or on different networks.
The Internet Layer in the TCP/IP model
Application Layer protocols
Insourcing
Sampling Risk
4. Focuses on: post-event recovery and restoration of services
Employees with excessive privileges
Three Types of Controls
Disaster Recovery
Compliance Testing
5. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
less than 24 hours
A Virtual Server
A Compliance audit
Substantive Testing
6. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Attribute Sampling
TCP/IP Transport Layer packet delivery
Balanced Scorecard
Confidence coefficient
7. An audit that is performed in support of an anticipated or active legal proceeding.
A Forensic Audit
List of systems examined
An Administrative
Primary security features of relational databases
8. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
The two Categories of Controls
Rating Scale for Process Maturity
OSI: Data Link Layer
The first step in a business impact analysis
9. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
OSI Layer 5: Session
The 5 types of Evidence that the auditor will collect during an audit.
TCP/IP Network Model
Testing activities
10. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
A Financial Audit
BCP Plans
Primary security features of relational databases
A Problem
11. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
Application Controls
Server cluster
A gate process
Service Level Management
12. Who is responsible for imposing an IT governance model encompassing IT strategy - information security - and formal enterprise architectural mandates?
IT executives and the Board of Directors
SDLC Phases
BCP Plans
Documentation and interview personnel
13. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
PERT Diagram?
Release management
Transport Layer Protocols
Configuration Management
14. (1.) Automatic (2.) Manual
The two Categories of Controls
Prblem Management
To identify the tasks that are responsible for project delays
The Software Program Library
15. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
Recovery time objective
The two Categories of Controls
Registers
Types of sampling an auditor can perform.
16. The main hardware component of a computer system - which executes instructions in computer programs.
CPU
Controls
Disaster Recovery
The first step in a business impact analysis
17. One of a database table's fields - whose value is unique.
IT standards are not being reviewed often enough
Database primary key
Rating Scale for Process Maturity
Six steps of the Release Management process
18. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
Disaster Recovery
ITIL - IT Infrastructure Library
To identify the tasks that are responsible for project delays
Audit Methodologies
19. A collection of two or more servers that is designed to appear as a single server.
Geographic location
Server cluster
Emergency Changes
Cloud computing
20. (1.) Reliable delivery (2.) Connection oriented (persistent connection) (3.) Order of Delivery (4.) Flow Control (transfer rate is throttled) (5.) Port Number
A Cold Site
Lacks specific expertise or resources to conduct an internal audit
TCP/IP Transport Layer packet delivery
Detection Risk
21. An audit of operational efficiency.
Geographic location
An Administrative
Prblem Management
Categories of risk treatment
22. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
Network Layer Protocols
Elements of the COSO pyramid
Capability Maturity Model Integration (CMMI)
Audit Methodologies
23. Describes the effect on the business if a process is incapacitated for any appreciable time
Sampling
Rating Scale for Process Maturity
Main types of Controls
Statement of Impact
24. A maturity model that represents the aggregations of other maturity models.
SDLC Phases
Variable Sampling
Testing activities
Capability Maturity Model Integration (CMMI)
25. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
Organizational culture and maturity
Balanced Scorecard
TCP/IP Transport Layer
A Compliance audit
26. A sampling technique where at least one exception is sought in a population
Disaster Recovery
Testing activities
Discovery Sampling
Application Layer protocols
27. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.
Dimensions of the COSO cube
List of systems examined
Service Level Management
The two Categories of Controls
28. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
Insourcing
ITIL definition of CHANGE MANAGEMENT
Recovery time objective
Project change request
29. (1.) TCP (2.) UDP
A Problem
Inherent Risk
Transport Layer Protocols
Audit logging
30. An audit of an IS department's operations and systems.
An IS audit
IT Services Financial Management
Substantive Testing
The Business Process Life Cycle
31. During an audit - the auditor should obtain 6 types of documents - (1.) Org charts (2.) ___________ (3.) third-party contracts (4.) policies and procedures (5.) standards (6.) system documentation
The BCP process
OSI: Transport Layer
The audit program
Department Charters
32. A facility that is used to store and manage access to an organization's application source and object code. It consists of 5 parts: (1.) Access and authorization controls (2.) Program checkout (3.) Program Check-in (4.) Version Control (5.) Code Ana
The Software Program Library
Primary security features of relational databases
(1.) Polices (2.) Procedures (3.) Standards
Grid Computing
33. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act
Controls
Deming Cycle
Judgmental sampling
Personnel involved in the requirements phase of a software development project
34. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
A Compliance audit
objective and unbiased
Cloud computing
OSI: Physical Layer
35. A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic.
Stratified Sampling
IT executives and the Board of Directors
Sample Standard Deviation
Attribute Sampling
36. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Insourcing
Deming Cycle
PERT Diagram?
Substantive Testing
37. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
OSI: Data Link Layer
Testing activities
The typical Configuration Items in Configuration Management
Rating Scale for Process Maturity
38. An audit that combines an operational audit and a financial audit.
Business Realization
Sampling Risk
An Integrated Audit
To identify the tasks that are responsible for project delays
39. Disasters are generally grouped in terms of type: ______________.
Categories of risk treatment
Blade Computer Architecture
(1.) Man-made (2.) Natural
Release management
40. The maximum period of downtime for a process or application
The Steering Committee
Disaster Recovery
Recovery time objective
The availability of IT systems
41. (1.) General (2.) Application
OSI Layer 7: Application
Main types of Controls
Volumes of COSO framework
OSI: Data Link Layer
42. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
The Business Process Life Cycle
Split custody
Application Controls
An IS audit
43. A quantitative risk analysis is __________________ because: It is difficult to get accurate figures on the frequency of specific threats. It is difficult to determine the probability that a threat will be realized. It is relatively easy to determine
Server cluster
An Integrated Audit
More difficult to perform
Sampling Risk
44. The memory locations in the CPU where arithmetic values are stored.
IT Service Management
Entire password for an encryption key
The audit program
Registers
45. The set of activities that is concerned with the ability of the organization to continue to provide services - primarily in the event that a natural or man made disaster has occurred.
An Integrated Audit
Service Continuity Management
The Steering Committee
Compliance Testing
46. The IS auditor should conduct a risk assessment first to determine which areas have highest risk. She should devote more testing resources to those high-risk areas.
Inform the auditee
The best approach for identifying high risk areas for an audit
Audit logging
Control Risk
47. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom
Inherent Risk
List of systems examined
Detection Risk
A Problem
48. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Criticality analysis
Transport Layer Protocols
The Internet Layer in the TCP/IP model
Notify the Audit Committee
49. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
Risk Management
A Forensic Audit
Testing activities
Emergency Changes
50. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
The Requirements
Antivirus software on the email servers
Compliance Testing
Elements of the COSO pyramid