SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. (1.) Physical (2.) Technical (4.) Administrative
Split custody
Three Types of Controls
A Sample Mean
Department Charters
2. The IS auditor should act as a SME in the control self-assessment - but should not play a major role in the process.
The appropriate role of an IS auditor in a control self-assessment
SDLC Phases
Recovery time objective
TCP/IP Transport Layer packet delivery
3. Risk Mitigation Risk Avoidance Risk Transfer Risk Acceptance
Options for Risk Treatment
Stratified Sampling
TCP/IP Internet Layer
Business impact analysis
4. What type of testing is performed to determine if control procedures have proper design and are operating properly?
ITIL definition of PROBLEM
Compliance Testing
OSI: Transport Layer
The Business Process Life Cycle
5. Collections of Controls that work together to achieve an entire range of an organization's objectives.
(1.) Polices (2.) Procedures (3.) Standards
Frameworks
Foreign Key
List of systems examined
6. Any event which is not part of the standard operation of service and which causes or may cause an interruption to or reduction in quality of that service. Includes THREE incident types: (1.) Service Outage (2.) Service Slowdown (3.) Software Bug
Incident Management
The Business Process Life Cycle
Dimensions of the COSO cube
A Problem
7. In Release Management - _________________ means that each step of the release process undergoes formal review and approval before the next step is allowed to begin.
Structural fires and transportation accidents
Stop-or-go Sampling
A gate process
Database primary key
8. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
Three Types of Controls
Audit Methodologies
The BCP process
Stay current with technology
9. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
A Financial Audit
Balanced Scorecard
Data Link Layer Standards
An Operational Audit
10. A condition that is the result of multiple incidents that exhibit common symptoms e.g. A web application is displaying information incorrectly and many users have contacted the IT service desk.
A Problem
Transport Layer Protocols
Examples of Application Controls
Registers
11. To measure organizational performance and effectiveness against strategic goals.
Service Level Management
A Cold Site
TCP/IP Link Layer
Balanced Scorecard
12. (1.) Monitoring (2.) Control Environment (3.) Risk Assessment and Control (4.) Information and Communication
Elements of the COSO pyramid
Controls
Annualized Loss Expectance (ALE)
Compliance Testing
13. The means by which management establishes and measures processes by which organizational objectives are achieved
Function Point Analysis
Separate administrative accounts
Controls
Categories of risk treatment
14. What three elements allow validation of business practices against acceptable measures of regulatory compliance - performance - and standard operational guidelines.
OSI: Network Layer
Balanced Scorecard
ITIL definition of CHANGE MANAGEMENT
(1.) Polices (2.) Procedures (3.) Standards
15. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
Change management
The audit program
Stay current with technology
A Cold Site
16. Change Management includes a _____________ of six steps: (1.) Proposal or Request (2.) Review (3.) Approval (4.) Implementation (5.) Verification (6.) Post-change Review
Formal waterfall
Overall audit risk
Service Level Management
A Server Cluster
17. (1.) Access Control (2.) Change Management (3.) Security Controls (4.) Incident Management (5.) SDLC (6.) Source code and versioning controls (7.) Monitoring and logging (8.) Event Management
Examples of IT General Controls
(1.) Polices (2.) Procedures (3.) Standards
An Operational Audit
Function Point Analysis
18. Should include 4 steps: (1.) Emergency Approval (2.) Implementation (3.) Verification (4.) Review
WAN Protocols
Audit Methodologies
Emergency Changes
Resource details
19. Handle application processing
Application Controls
Advantages of outsourcing
SDLC Phases
Annualized Loss Expectance (ALE)
20. What type of testing is performed to verify the accuracy and integrity of transactions as they flow through a system?
Examples of IT General Controls
An Operational Audit
Stay current with technology
Substantive Testing
21. PERT: shows the ______________ critical path.
Categories of risk treatment
Current and most up-to-date
The availability of IT systems
Control Unit
22. Used to estimate the effort required to develop a software program.
Input validation checking
Risk Management
Function Point Analysis
Employees with excessive privileges
23. An active - instance of a server operating system running on a machine that is designed to house two or more such virtual servers.
The first step in a business impact analysis
An Integrated Audit
Frameworks
A Virtual Server
24. The main hardware component of a computer system - which executes instructions in computer programs.
ITIL definition of PROBLEM
CPU
IT standards are not being reviewed often enough
The Internet Layer in the TCP/IP model
25. An organization wants to reduce the number of user IDs and passwords that its employees need to remember. The best available solution to this - _______________. This provides a single authentication service (such as LDAP or AD) that many applications
Reduced sign-on
Prblem Management
Hash
Stay current with technology
26. An audit of an accounting system - accounting department processes - and procedures to determine if business controls are sufficient to ensure the integrity of financial statements.
A Financial Audit
Grid Computing
Types of sampling an auditor can perform.
A gate process
27. Describes the effect on the business if a process is incapacitated for any appreciable time
A Sample Mean
Balanced Scorecard
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Statement of Impact
28. Used to measure the relative maturity of an organization and its processes.
IT Service Management
objective and unbiased
Capability Maturity Model
Assess the maturity of its business processes
29. Contains programs that communicate directly with the end user.
Sampling Risk
Vulnerability in the organization's PBX
OSI Layer 7: Application
Gantt Chart
30. (1.) IP (2.) ICMP (3.) RRC (Radio Resource Control) (4.) AppleTalk
Cloud computing
Incident Management
Registers
Network Layer Protocols
31. (1.) Authentication (2.) Authorization (3.) Change Management (4.) Completeness checks (5.) Validation checks (6.) Input controls (7.) Output controls (8.) Problem management (9.) Identification/access controls
The audit program
Disaster Recovery
Advantages of outsourcing
Examples of Application Controls
32. Consists of 11 distinct activities: (1.) Service Desk (2.) Incident Management (3.) Problem Management (4.) Change Management (5.) Configuration Management (6.) Release Management (7.) Service-level Management (8.) Financial Management (9.) Capacity
Configuration Management
Six steps of the Release Management process
OSI: Physical Layer
IT Service Management
33. A database term - which means that the database will not permit a program (or user) to deleted rows from a table if there are records in other tables whose foreign keys reference the row to be deleted.
TCP/IP Internet Layer
The audit program
A Server Cluster
Referential Integrity
34. A maturity model that represents the aggregations of other maturity models.
Recovery time objective
Capability Maturity Model Integration (CMMI)
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
OSI Layer 7: Application
35. An auditor has detected potential fraud while testing a control objective - He should ___________________. Because Audit committee members are generally not involved in business operations - they will be sufficiently remove from the matter - and they
Notify the Audit Committee
Sample Standard Deviation
Recovery time objective
Hash
36. Aids in the coordinating of business processes using a sequence of three events -(1.) Business process creation (2.) Implementation (3.) Maintenance 3a. Benchmarking: Facilitates continuous improvement within the BPLC
List of systems examined
Balanced Scorecard
The Business Process Life Cycle
Detection Risk
37. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Buffers
Expected Error Rate
Overall audit risk
More difficult to perform
38. IT Governance is most concerned with ________.
IT Strategy
Organizational culture and maturity
Hash
Risk Management
39. Framework for auditing and measuring IT Service Management Processes.
The Internet Layer in the TCP/IP model
Insourcing
ISO 20000 Standard:
The Requirements
40. The primary source for test plans in a software development project is: ________________ that are developed for a project should be the primary source for detailed tests.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
To identify the tasks that are responsible for project delays
The Requirements
Blade Computer Architecture
41. The purpose of an auditor doing interviews - To observe personnel to better understand their discipline - as well as ______________.
Structural fires and transportation accidents
Organizational culture and maturity
Types of sampling an auditor can perform.
Transport Layer Protocols
42. (1.) TCP (2.) UDP
Capability Maturity Model
Transport Layer Protocols
Frameworks
A Compliance audit
43. The process of recording the configuration of IT systems. Each configuration setting is known in ITSM parlance as a Configuration Item.
Emergency Changes
The best approach for identifying high risk areas for an audit
ITIL definition of PROBLEM
Configuration Management
44. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
Release management
Statistical Sampling
Background checks performed
Advantages of outsourcing
45. An audit of an IS department's operations and systems.
Department Charters
The BCP process
An IS audit
Release management
46. An external IS auditor has discovered a _______________________ - The external auditor can only document the finding in the audit report. An external auditor is not in a position to implement controls.
Power system controls
Segregation of duties issue in a high value process
IT Services Financial Management
Sampling
47. (1.) Observations (2.) Written Notes (3.) Correspondence (4.) Process and Procedure documentation (5.) Business records
Criticality analysis
Assess the maturity of its business processes
OSI Layer 6: Presentation
The 5 types of Evidence that the auditor will collect during an audit.
48. Used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS
Annualized Loss Expectance (ALE)
Disaster Recovery
OSI Layer 5: Session
Emergency Changes
49. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Hash
Advantages of outsourcing
OSI: Network Layer
Sample Standard Deviation
50. To communication security policies - procedures - and other security-related information to an organization's employees.
(1.) Polices (2.) Procedures (3.) Standards
The Software Program Library
The Requirements
Security Awareness program