Test your basic knowledge |

CISA: Certified Information Systems Auditor

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer uses RAM for several purposes: (1.) Operating System - to store info regarding running processes (2.) ____________ - that are used to temporarily store information retrieved from hard disks (3.) Storage of program code (4.) Storage of prog






2. To measure organizational performance and effectiveness against strategic goals.






3. A critical application is backed up once per day. The recovery point objective (RPO) for an application that is backed up once per day cannot be ________.






4. Must be tested to validate effectiveness through: (1.) Document Review (2.) Walkthrough (3.) Simulation (4.) Parallel testing (5.) Cutover testing practices






5. The delivery of messages from one station to another via one or more networks.. Routes packets between networks.






6. Individual events may often create combined threats to enterprise operations: A tornado might also spawn ____________________.






7. Used to illustrate the relationship between planned activities. PERT diagrams show multiple routes through the project activities - as necessary for accomplishing a goal.






8. A condition often identified as a result of multiple incidents that exhibit common symptoms. Problems can also be identified from a single significant incident for which the impact is significant.






9. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.






10. The inventory of all in-scope business processes and systems






11. (1.) Objectives (2.) Components (3.) Business Units / Areas






12. (1.) Access controls (2.) Encryption (3.) Audit logging






13. (1.) Feasibility (2.) Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation






14. A four-step quality control process known as PDSA - or PDCA. Steps: (1.) Plan (2.) Do (3.) Study (4.) Act






15. An audit of operational efficiency.






16. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes






17. Delivery of packets from one station to another - on the same network or on different networks.






18. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.






19. (1.) Link (2.) Internet (3.) Transport (4.) Application






20. An auditor has discovered several errors in user account management: many terminated employees' computer accounts are still active. The best course of action - To improve the _________________ to reduce the number of exceptions. For a time - the proc






21. (1.) Developers (2.) Architects (3.) Analysts (4.) Users






22. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.






23. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - as the numeric inverse of the confidence coefficient.






24. The portion of IT management that tracks the financial value of IT services that support organizational objectives. It includes 4 activities: (1.) Budgeting (2.) Capital Investment (3.) Expense Management (4.) Project accounting and project ROI (Ret






25. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP






26. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them






27. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.






28. PERT: shows the ______________ critical path.






29. An audit report usually includes the following 10 elements: (1.) Cover letter (2.) Introduction (3.) Summary (4.) Audit description (5.) _______________ (6.) Interviewees (7.) Evidence (8.) Explanation of sampling techniques (9.) Findings (10.) Recom






30. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide






31. An audit of an IS department's operations and systems.






32. The result of strategic planning - process development - and systems development - which all contribute towards a launch of business operations to reach a set of business objectives.






33. (1.) Utility (DNS - SNMP - DHCP (2.) Messaging protocols (SMTP) (3.) Data Transfer protocols (NFS - FTP) (4.) Interactive protocols (Telnet)






34. Deliver messages from one station to another on the same network or on different networks. Messaging at this layer is not guaranteed.






35. The probability that a sample selected actually represents the entire population. This is usually expressed as a percentage.






36. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records






37. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the






38. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.






39. A CMM helps an organization to _______________ - which is an important first step to any large-scale process improvement effort.






40. A sampling technique used to study the characteristics of a population to determine the numeric total of a specific attribute from the entire population.






41. The maximum period of downtime for a process or application






42. (1.) Financial (2.) Customer (3.) Internal processes (4.) Innovation / Learning






43. Consists of two main packet transport protocols: TCP and UDP.






44. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review






45. A large number of loosely coupled computers that are used to solve a common task may be in close proximity to each other or scattered over a large geographical area.






46. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.






47. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.






48. (1.) MPLS (2.) SONET (3.) T-Carrier (4.) Frame Relay (5.) ISDN (6.) X.25






49. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.






50. (1.) Executive Summary (2.) Framework (3.) Reporting to External Parties (4.) Evaluation Tools