SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
Elements of the COBIT Framework
The 5 types of Evidence that the auditor will collect during an audit.
TCP/IP Internet Layer
Stratified Sampling
2. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
Information systems access
Primary security features of relational databases
To identify the tasks that are responsible for project delays
The Eight Types of Audits
3. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.
The Business Process Life Cycle
Expected Error Rate
Confidence coefficient
TCP/IP Network Model
4. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
Sampling Risk
Critical Path Methodology
Incident Management
Variable Sampling
5. An organization that has experienced a sudden increase in its long-distance charges has asked an auditor to investigate. The auditor is most likely to suspect that intruders have discovered a ______________________and is committing toll fraud.
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
Capability Maturity Model
Examples of IT General Controls
Split custody
Types of sampling an auditor can perform.
7. (1.) Access controls (2.) Encryption (3.) Audit logging
A Server Cluster
Primary security features of relational databases
Three Types of Controls
Attribute Sampling
8. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
Split custody
Network Layer Protocols
less than 24 hours
PERT Diagram?
9. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
Wet pipe fire sprinkler system
Input validation checking
A gate process
Network Layer Protocols
10. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
Critical Path Methodology
A Service Provider audit
IT Service Management
Employees with excessive privileges
11. To measure organizational performance and effectiveness against strategic goals.
To identify the tasks that are responsible for project delays
Business impact analysis
Capability Maturity Model Integration (CMMI)
Balanced Scorecard
12. A critical application is backed up once per day. The recovery point objective (RPO) for an application that is backed up once per day cannot be ________.
less than 24 hours
Volumes of COSO framework
Information security policy
Examples of IT General Controls
13. A sampling technique where items are chosen based upon the auditor's judgment - usually based on risk or materiality.
The Requirements
Prblem Management
Sampling Risk
Judgmental sampling
14. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Reduced sign-on
Disaster Recovery
Business Continuity
Audit logging
15. A field in a record in one table that can reference a primary key in another table that can reference a primary key in another table.
Information systems access
less than 24 hours
Capability Maturity Model
Foreign Key
16. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
Employees with excessive privileges
Configuration Management
Grid Computing
Antivirus software on the email servers
17. Focuses on: post-event recovery and restoration of services
Control Unit
Disaster Recovery
Control Risk
Volumes of COSO framework
18. ____________________ of the hot site is most important consideration for site selection. IF they are too close together then a single event may involve both locations
Power system controls
Change management
Balanced Scorecard
Geographic location
19. An organization has chosen to open a business office in another country where labor costs are lower and has hired workers to perform business functions there. - The organization is ___________ - while they may have opened the office in a foreign coun
Insourcing
TCP/IP Link Layer
Organizational culture and maturity
Categories of risk treatment
20. A sampling technique where at least one exception is sought in a population
Project Management Strategies
Audit Methodologies
Discovery Sampling
Capability Maturity Model Integration (CMMI)
21. The means by which management establishes and measures processes by which organizational objectives are achieved
Compliance Testing
Controls
Cloud computing
Business Continuity
22. Used to schedule and sequence activities in a waterfall-type representation. Planned activities are shown flowing downward to completion. More simplistic than a PERT Diagram.
IT Strategy
Release management
Geographic location
Gantt Chart
23. A collection of two or more servers that is designed to appear as a single server.
Server cluster
The Steering Committee
The first step in a business impact analysis
Sampling
24. The first major task in a disaster recovery or business continuity planning project.
Business impact analysis
OSI Layer 5: Session
Discovery Sampling
Examples of IT General Controls
25. Contains programs that communicate directly with the end user.
Stay current with technology
Attribute Sampling
Sampling Risk
OSI Layer 7: Application
26. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
IT Strategy
Transport Layer Protocols
Examples of IT General Controls
Organizational culture and maturity
27. Guide program execution through organization of resources and development of clear project objectives.
Project Management Strategies
Stay current with technology
CPU
Business Continuity
28. Application controls limit ___________ in three ways: (1.) Point of Entry (Input Controls) (2.) During consumption (process controls) (3.) At the point of expression (Output Controls)
The Steering Committee
Change management
IT Services Financial Management
Information systems access
29. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog
Foreign Key
Buffers
Variable Sampling
Substantive Testing (test of transaction integrity)
30. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)
More difficult to perform
Application Layer protocols
IT Service Management
Types of sampling an auditor can perform.
31. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
Expected Error Rate
The availability of IT systems
A Server Cluster
ISO 20000 Standard:
32. Used to translate or transform data from lower layers into formats that the application layer can work with.
OSI Layer 6: Presentation
Registers
Controls
Rating Scale for Process Maturity
33. An audit of operational efficiency.
TCP/IP Network Model
An Administrative
Configuration Management
Advantages of outsourcing
34. The inventory of all in-scope business processes and systems
Capability Maturity Model Integration (CMMI)
PERT Diagram?
The first step in a business impact analysis
Balanced Scorecard
35. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Judgmental sampling
An Operational Audit
Department Charters
SDLC Phases
36. A sampling technique used to permit sampling to stop at the earliest possible time. This technique is used when the auditor feels that there is a low risk or low rate of exceptions in the population.
Power system controls
ISO 20000 Standard:
objective and unbiased
Stop-or-go Sampling
37. Defines internal controls and provides guidance for assessing and improving internal control systems.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
SDLC Phases
Sample Standard Deviation
The first step in a business impact analysis
38. One of a database table's fields - whose value is unique.
Release management
The Internet Layer in the TCP/IP model
Database primary key
objective and unbiased
39. A representation of how closely a sample represents an entire population.
Precision means
Personnel involved in the requirements phase of a software development project
Employees with excessive privileges
Compliance Testing
40. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
Examples of Application Controls
Hash
Judgmental sampling
Background checks performed
41. Subjective sampling is used when the auditor wants to _________________________.
Concentrate on samples known to represent high risk
A Cold Site
The best approach for identifying high risk areas for an audit
Disaster Recovery
42. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools
Compliance Testing
Notify the Audit Committee
Volumes of COSO framework
A Financial Audit
43. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
Reduced sign-on
An IS audit
Criticality analysis
TCP/IP Link Layer
44. An IS auditor is auditing the change management process for a financial application. The auditor has two primary pieces of evidence: change logs and a written analysis of the change logs performed by a business analyst. The change log is best because
The audit program
objective and unbiased
Hash
Capability Maturity Model
45. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
Registers
The typical Configuration Items in Configuration Management
Volumes of COSO framework
WAN Protocols
46. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
SDLC Phases
A Sample Mean
Primary security features of relational databases
A Financial Audit
47. The CPU has: (1.) Arithmetic Logic Unit (2.) ______________ (3.) a small amount of memory (usually in to form of registers)
OSI: Transport Layer
Stratified Sampling
Business impact analysis
Control Unit
48. A technique that is used to select a portion of a population when it is not feasible to test an entire population.
Inform the auditee
Power system controls
Sampling
Employees with excessive privileges
49. (1.) Automatic (2.) Manual
OSI: Transport Layer
The Release process
Entire password for an encryption key
The two Categories of Controls
50. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.
Configuration Management
IT Strategy
The 5 types of Evidence that the auditor will collect during an audit.
Incident Management