SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. A sampling technique where items are chosen based upon the auditor's judgment - usually based on risk or materiality.
TCP/IP Transport Layer packet delivery
Expected Error Rate
Emergency Changes
Judgmental sampling
3. An auditor has reviewed access privileges of some employees and has discovered that employees with longer terms of service have excessive privileges. This means User privileges are not being removed from their old position when they transfer to a new
Inherent Risk
Employees with excessive privileges
List of systems examined
Application Controls
4. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.
OSI: Transport Layer
Incident Management
PERT Diagram?
Inform the auditee
5. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
The audit program
Attribute Sampling
Entire password for an encryption key
Referential Integrity
6. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Concentrate on samples known to represent high risk
Confidence coefficient
Main types of Controls
Server cluster
7. A representation of how closely a sample represents an entire population.
Expected Error Rate
Testing activities
The typical Configuration Items in Configuration Management
Precision means
8. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
Geographic location
Expected Error Rate
The best approach for identifying high risk areas for an audit
Input validation checking
9. An IS auditor has discovered a high-risk exception during control testing. The best course of action for the IS auditor to take - The IS auditor should immediately ________________ when any high-risk situation is discovered.
Structural fires and transportation accidents
Inform the auditee
Department Charters
Registers
10. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Attribute Sampling
Buffers
Notify the Audit Committee
CPU
11. IT Governance is most concerned with ________.
BCP Plans
Control Unit
(1.) Polices (2.) Procedures (3.) Standards
IT Strategy
12. Application controls limit ___________ in three ways: (1.) Point of Entry (Input Controls) (2.) During consumption (process controls) (3.) At the point of expression (Output Controls)
The first step in a business impact analysis
A Server Cluster
Gantt Chart
Information systems access
13. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
Formal waterfall
A Server Cluster
Change management
Background checks performed
14. (1.) Authentication (2.) Authorization (3.) Change Management (4.) Completeness checks (5.) Validation checks (6.) Input controls (7.) Output controls (8.) Problem management (9.) Identification/access controls
Examples of Application Controls
Sample Standard Deviation
IT Services Financial Management
objective and unbiased
15. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Lacks specific expertise or resources to conduct an internal audit
A gate process
less than 24 hours
Substantive Testing
16. A collection of two or more servers that is designed to appear as a single server.
Server cluster
Options for Risk Treatment
The Requirements
The best approach for identifying high risk areas for an audit
17. Handle application processing
IT Service Management
Sampling
The 4-item focus of a Balanced Scorecard
Application Controls
18. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
The Internet Layer in the TCP/IP model
Antivirus software on the email servers
A Forensic Audit
A Virtual Server
19. The maximum period of downtime for a process or application
Variable Sampling
IT Services Financial Management
ITIL - IT Infrastructure Library
Recovery time objective
20. (1.) TCP (2.) UDP
objective and unbiased
Critical Path Methodology
Function Point Analysis
Transport Layer Protocols
21. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
Control Unit
Stay current with technology
IT Services Financial Management
Department Charters
22. (1.) Link (2.) Internet (3.) Transport (4.) Application
Service Continuity Management
Business impact analysis
OSI: Physical Layer
TCP/IP Network Model
23. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Overall audit risk
Geographic location
The availability of IT systems
Advantages of outsourcing
24. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
Stay current with technology
(1.) Polices (2.) Procedures (3.) Standards
Sampling
Expected Error Rate
25. IT Service Management is defined in ___________________ framework.
ITIL - IT Infrastructure Library
Elements of the COBIT Framework
Lacks specific expertise or resources to conduct an internal audit
A Cold Site
26. To communication security policies - procedures - and other security-related information to an organization's employees.
An IS audit
A Forensic Audit
Security Awareness program
Audit Methodologies
27. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
Options for Risk Treatment
Cloud computing
Gantt Chart
Antivirus software on the email servers
28. 0. No process at all (1.) Process are ad hoc and disorganized (2.) Consistent processes (3.) Documented processes (4.) Measured and managed processes (5.) Processes are continuously improved
Foreign Key
Attribute Sampling
Rating Scale for Process Maturity
A gate process
29. (1.) Access controls (2.) Encryption (3.) Audit logging
OSI: Transport Layer
Primary security features of relational databases
Grid Computing
Configuration Management
30. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
The Release process
Documentation and interview personnel
Personnel involved in the requirements phase of a software development project
The first step in a business impact analysis
31. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
The Requirements
PERT Diagram?
OSI: Transport Layer
Main types of Controls
32. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Audit Methodologies
An Administrative
Elements of the COSO pyramid
Substantive Testing (test of transaction integrity)
33. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
A Sample Mean
A Cold Site
The best approach for identifying high risk areas for an audit
An Operational Audit
34. Framework for auditing and measuring IT Service Management Processes.
Examples of Application Controls
ISO 20000 Standard:
Six steps of the Release Management process
Insourcing
35. A dynamically scalable and usually virtualized computing environment that is provided as a service. Clout computing services may be rented or leased so that an organization can have a scalable application without the need for supporting hardware.
Capability Maturity Model Integration (CMMI)
Cloud computing
Reduced sign-on
The BCP process
36. Support the functioning of the application controls
General Controls
Statement of Impact
List of systems examined
Referential Integrity
37. The first major task in a disaster recovery or business continuity planning project.
Vulnerability in the organization's PBX
Formal waterfall
Business impact analysis
The Internet Layer in the TCP/IP model
38. An alternate processing center that contains no information processing equipment.
Security Awareness program
Stratified Sampling
A Cold Site
Audit logging
39. Guide program execution through organization of resources and development of clear project objectives.
Statistical Sampling
TCP/IP Transport Layer
Project Management Strategies
Volumes of COSO framework
40. 1.) Executive Support (2.) Well-defined roles and responsibilities.
ITIL - IT Infrastructure Library
Information security policy
Assess the maturity of its business processes
Lacks specific expertise or resources to conduct an internal audit
41. Subjective sampling is used when the auditor wants to _________________________.
ITIL definition of CHANGE MANAGEMENT
Elements of the COSO pyramid
Testing activities
Concentrate on samples known to represent high risk
42. The inventory of all in-scope business processes and systems
The first step in a business impact analysis
A Sample Mean
Dimensions of the COSO cube
Substantive Testing (test of transaction integrity)
43. Information is arranged in frames and transported across the medium. Collision detection. Checksum verification of delivery.
OSI: Data Link Layer
Personnel involved in the requirements phase of a software development project
A Service Provider audit
Volumes of COSO framework
44. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
WAN Protocols
Resource details
(1.) Polices (2.) Procedures (3.) Standards
BCP Plans
45. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Judgmental sampling
The Eight Types of Audits
Volumes of COSO framework
Controls
46. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.
Criticality analysis
Statistical Sampling
Configuration Management
Audit Methodologies
47. An audit that is performed in support of an anticipated or active legal proceeding.
Wet pipe fire sprinkler system
A Forensic Audit
Audit logging
less than 24 hours
48. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
Compliance Testing
More difficult to perform
Personnel involved in the requirements phase of a software development project
Power system controls
49. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.
Concentrate on samples known to represent high risk
Recovery time objective
To identify the tasks that are responsible for project delays
Assess the maturity of its business processes
50. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
Resource details
Assess the maturity of its business processes
A Problem
The availability of IT systems