SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The risk that an IS auditor will overlook errors or exceptions during an audit.
Controls
Detection Risk
Sampling Risk
ITIL definition of PROBLEM
2. The risk that a material error exists that will not be prevented or detected by the organization's control framework - The possibility that a process or procedure will be unable to prevent or deter serious errors and wrongdoing.
Frameworks
Control Risk
IT standards are not being reviewed often enough
Service Level Management
3. (1.) TCP (2.) UDP
Transport Layer Protocols
ITIL - IT Infrastructure Library
Buffers
Gantt Chart
4. Define 10 elements of an Audit - (1.) Subject of audit (2.) Audit Objective (3.) Type of audit (4.) Audit scope (5.) Pre-audit planning (6.) Audit procedures (7.) Communication plan (8.) Report Preparation (9.) Wrap-up (10.) Post-audit follow-up
The Release process
Audit Methodologies
Emergency Changes
Department Charters
5. A condition often identified as a result of multiple incidents that exhibit common symptoms. Problems can also be identified from a single significant incident for which the impact is significant.
OSI Layer 5: Session
ITIL definition of PROBLEM
Server cluster
Lacks specific expertise or resources to conduct an internal audit
6. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
Testing activities
Critical Path Methodology
(1.) Polices (2.) Procedures (3.) Standards
TCP/IP Link Layer
7. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
Power system controls
SDLC Phases
Overall audit risk
A Financial Audit
8. A field in a record in one table that can reference a primary key in another table that can reference a primary key in another table.
The BCP process
Data Link Layer Standards
Foreign Key
The Release process
9. Used to determine which business processes are the most critical - by ranking them in order of criticality
BCP Plans
Disaster Recovery
Tolerable Error Rate
Criticality analysis
10. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
Sampling
Antivirus software on the email servers
Stop-or-go Sampling
Application Layer protocols
11. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
OSI: Data Link Layer
Examples of IT General Controls
Overall audit risk
Sampling Risk
12. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP
Data Link Layer Standards
Resource details
objective and unbiased
Employees with excessive privileges
13. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices
SDLC Phases
Application Layer protocols
Annualized Loss Expectance (ALE)
BCP Plans
14. Disasters are generally grouped in terms of type: ______________.
Personnel involved in the requirements phase of a software development project
Change management
Service Continuity Management
(1.) Man-made (2.) Natural
15. Gantt: used to display ______________.
Resource details
TCP/IP Internet Layer
SDLC Phases
Foreign Key
16. Collections of Controls that work together to achieve an entire range of an organization's objectives.
Rating Scale for Process Maturity
objective and unbiased
The first step in a business impact analysis
Frameworks
17. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
Options for Risk Treatment
Risk Management
Input validation checking
The Internet Layer in the TCP/IP model
18. Subjective sampling is used when the auditor wants to _________________________.
Concentrate on samples known to represent high risk
A Service Provider audit
Main types of Controls
Six steps of the Release Management process
19. The annual expected loss to an asset. It is calculated as the single loss expectancy (SLE) X the annualized rate of occurrence (ARO.)
Annualized Loss Expectance (ALE)
PERT Diagram?
Information security policy
Change management
20. Describes the effect on the business if a process is incapacitated for any appreciable time
Statement of Impact
An IS audit
OSI: Physical Layer
ITIL definition of PROBLEM
21. To review and approve proposed changes to systems and infrastructure. This helps to reduce the risk of unintended events and unplanned downtime.
Referential Integrity
Change management
Advantages of outsourcing
Variable Sampling
22. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
The Requirements
Insourcing
Control Risk
Change management
23. To ensure that input values are within established ranges - of the correct character types - and free of harmful contents.
The audit program
IT Services Financial Management
Input validation checking
Information security policy
24. Use of a set of monitoring and review activities that confirm whether IS operations is providing service to its customers.
Categories of risk treatment
IT executives and the Board of Directors
Service Level Management
OSI: Data Link Layer
25. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
Confidence coefficient
TCP/IP Internet Layer
Emergency Changes
List of systems examined
26. Governed by: (1.) Effective Change Management (2.) Effective Application Testing (3.) Resilient Architecture (4.) Serviceable Components
Server cluster
Employees with excessive privileges
The availability of IT systems
Service Level Management
27. The portion of IT management that tracks the financial value of IT services that support organizational objectives. It includes 4 activities: (1.) Budgeting (2.) Capital Investment (3.) Expense Management (4.) Project accounting and project ROI (Ret
IT Services Financial Management
SDLC Phases
Elements of the COBIT Framework
An Operational Audit
28. A tightly coupled collection of computers that are used to solve a common task. One or more actively perform tasks - while zero or more may be in a standby state.
Cloud computing
The availability of IT systems
A Server Cluster
Precision means
29. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
IT Service Management
Sample Standard Deviation
A Service Provider audit
Resource details
30. A sampling technique where items are chosen at random; each item has a statistically equal probability of being chosen.
Personnel involved in the requirements phase of a software development project
TCP/IP Transport Layer
Statistical Sampling
A gate process
31. The first major task in a disaster recovery or business continuity planning project.
A Financial Audit
Business impact analysis
BCP Plans
Resource details
32. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
Security Awareness program
Notify the Audit Committee
less than 24 hours
A Virtual Server
33. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
Documentation and interview personnel
A gate process
Resource details
TCP/IP Network Model
34. An audit to determine the level and degree of compliance to a law - regulation - standard - contract provision - or internal control.
Detection Risk
SDLC Phases
Cloud computing
A Compliance audit
35. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Statement of Impact
Options for Risk Treatment
Examples of Application Controls
Sampling
36. An audit that combines an operational audit and a financial audit.
An Integrated Audit
objective and unbiased
A Financial Audit
Foreign Key
37. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
The appropriate role of an IS auditor in a control self-assessment
Detection Risk
Inherent Risk
The 5 types of Evidence that the auditor will collect during an audit.
38. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Information systems access
Primary security features of relational databases
ITIL definition of PROBLEM
An Operational Audit
39. When several incidents have occurred that appear to have the same or a similar root cause - a PROBLEM is occurring.
TCP/IP Transport Layer packet delivery
Sample Standard Deviation
Prblem Management
Wet pipe fire sprinkler system
40. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
ITIL definition of CHANGE MANAGEMENT
The Release process
Data Link Layer Standards
Referential Integrity
41. An IS auditor needs to perform an audit of a financial system and needs to trace individual transactions through the system. What type of testing should the auditor perform?
Primary security features of relational databases
Substantive Testing (test of transaction integrity)
A Sample Mean
ISO 20000 Standard:
42. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
The typical Configuration Items in Configuration Management
Employees with excessive privileges
Release management
Stratified Sampling
43. (1.) Developers (2.) Architects (3.) Analysts (4.) Users
Critical Path Methodology
A Service Provider audit
The Steering Committee
Personnel involved in the requirements phase of a software development project
44. A programmer is updating an application that saves passwords in plaintext. In this case - Passwords should be stored in a _____. This makes it impossible for any person to retrieve a password - which could lead to account compromise.
Gantt Chart
Hash
The two Categories of Controls
OSI Layer 7: Application
45. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
Attribute Sampling
A Problem
IT Services Financial Management
Critical Path Methodology
46. To communication security policies - procedures - and other security-related information to an organization's employees.
Security Awareness program
Geographic location
WAN Protocols
Precision means
47. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
OSI: Transport Layer
Sampling Risk
Security Awareness program
Substantive Testing
48. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Sampling Risk
IT executives and the Board of Directors
Current and most up-to-date
Sample Standard Deviation
49. An audit of an IS department's operations and systems.
Examples of IT General Controls
Foreign Key
An IS audit
Employees with excessive privileges
50. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Examples of Application Controls
Types of sampling an auditor can perform.
Lacks specific expertise or resources to conduct an internal audit
Information systems access
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests