SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISA: Certified Information Systems Auditor
Start Test
Study First
Subjects
:
certifications
,
cisa
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The risk that there are material weaknesses in existing business processes and no compensating controls to detect or prevent them
Grid Computing
A Forensic Audit
Inherent Risk
Vulnerability in the organization's PBX
2. Defines internal controls and provides guidance for assessing and improving internal control systems.
COSO (Committee of Sponsoring Organizations of the Treadway Commission)
Database primary key
Data Link Layer Standards
Statement of Impact
3. Focuses on: post-event recovery and restoration of services
Elements of the COSO pyramid
Disaster Recovery
Antivirus software on the email servers
OSI: Physical Layer
4. An audit of IS controls - security controls - or business controls to determine control existence and effectiveness.
Frameworks
Server cluster
An Operational Audit
Grid Computing
5. (1.) Authentication (2.) Authorization (3.) Change Management (4.) Completeness checks (5.) Validation checks (6.) Input controls (7.) Output controls (8.) Problem management (9.) Identification/access controls
Expected Error Rate
Function Point Analysis
Examples of Application Controls
PERT Diagram?
6. During the development phase - Developers should only be performing Unit Testing - to verify that the individual sections of code they have written are performing properly.
Testing activities
Examples of Application Controls
TCP/IP Transport Layer
Statement of Impact
7. An audit of a third-party organization that provides services to other organizations.
Department Charters
A Service Provider audit
Notify the Audit Committee
CPU
8. (1.) Requirements (2.) Design (3.) Development (4.) Testing (5.) Release preparation (packaging) (6.) Release Deployment
Department Charters
Attribute Sampling
Six steps of the Release Management process
List of systems examined
9. An organization experiences frequent malware infections on end-user workstations that are received through email - despite the tact that workstations have anti-virus software. To reducing malware - Implementing ________________ will provide an effect
Options for Risk Treatment
Control Unit
Information security policy
Antivirus software on the email servers
10. Used to translate or transform data from lower layers into formats that the application layer can work with.
Elements of the COBIT Framework
Change management
The BCP process
OSI Layer 6: Presentation
11. (1.) Feasibility (2.) Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation
The 7 phases and their order in the SDLC
Documentation and interview personnel
The availability of IT systems
Current and most up-to-date
12. A condition often identified as a result of multiple incidents that exhibit common symptoms. Problems can also be identified from a single significant incident for which the impact is significant.
ITIL definition of PROBLEM
The two Categories of Controls
OSI: Data Link Layer
Audit Methodologies
13. (1.) Objectives (2.) Components (3.) Business Units / Areas
Confidence coefficient
The 4-item focus of a Balanced Scorecard
Dimensions of the COSO cube
Risk Management
14. n audit strategy and plans that include: (1.) Scope (2.) Objectives (3.) Resources (4.) Procedures used to evaluation controls and processes
The Release process
The BCP process
The Eight Types of Audits
The audit program
15. (1.) LAN protocols (2.) 80 (2.) 11 MAC/LLC (WiFi) (3.) Common Carrier packet networks (4.) ARP (5.) PPP and SLIP (6.) Tunneling - PPTP - L2TP
Data Link Layer Standards
Lacks specific expertise or resources to conduct an internal audit
Department Charters
Current and most up-to-date
16. (1.) Statistical (2.) Judgmental (3.) Attribute (4.) Variable (5.) Stop-or-Go (6.) Discovery (7.) Stratified
Employee termination process
Cloud computing
Types of sampling an auditor can perform.
ITIL - IT Infrastructure Library
17. To determine effectiveness of a disaster recovery program - an IT auditor should examine _____________.
Assess the maturity of its business processes
Examples of IT General Controls
Sample Standard Deviation
Documentation and interview personnel
18. The sum of all samples divided by the number of samples.
Categories of risk treatment
Application Controls
Network Layer Protocols
A Sample Mean
19. An auditor has discovered several errors in user account management: many terminated employees' computer accounts are still active. The best course of action - To improve the _________________ to reduce the number of exceptions. For a time - the proc
WAN Protocols
Employee termination process
Tolerable Error Rate
Separate administrative accounts
20. A sampling technique where a population is divided into classes or strata - based upon the value of one of the attributes. Samples are then selected from each class.
Elements of the COSO pyramid
Audit logging
Insourcing
Stratified Sampling
21. (1.) Hardware Complement (physical specifications) (2.) Hardware Configuration (firmware settings) (3.) Operating system version and configuration (4.) Software versions and configuration
The Software Program Library
The typical Configuration Items in Configuration Management
TCP/IP Link Layer
Control Risk
22. An estimate that expresses the percent of errors or exceptions that may exist in an entire population
Control Unit
Tolerable Error Rate
Six steps of the Release Management process
Expected Error Rate
23. IS auditors can _____________________ through the following means: (1.) training courses (2.) webinars (3.) ISACA chapter training events (4.) Industry conferences
Stay current with technology
Inform the auditee
Options for Risk Treatment
Attribute Sampling
24. An IS auditor is examining the IT standards document for an organization that was last reviewed two years earlier. The best course of action for the IS auditor is: Report that the ____________________________. Two years is far too long between revie
(1.) Man-made (2.) Natural
Judgmental sampling
ITIL - IT Infrastructure Library
IT standards are not being reviewed often enough
25. (1.) Executive Summary (2.) Governance and control framework (3.) Control Objectives (4.) Management Guidelines (5.) Implementation Guide (6.) IT Assurance Guide
Wet pipe fire sprinkler system
objective and unbiased
Elements of the COBIT Framework
Notify the Audit Committee
26. The process to ensure that standardized methods and procedures are used for efficient and prompt handling of all changes.
Transport Layer Protocols
A Cold Site
Stop-or-go Sampling
ITIL definition of CHANGE MANAGEMENT
27. Critical Path Methodology helps a project manager determine which activities are on a project's critical list - ________________________.
Frameworks
To identify the tasks that are responsible for project delays
Personnel involved in the requirements phase of a software development project
Formal waterfall
28. Guide program execution through organization of resources and development of clear project objectives.
Project Management Strategies
Input validation checking
Employee termination process
PERT Diagram?
29. A database administrator has been asked to configure a database management system so that it records all changes made by users - The DBA should implement ___________. This will cause the database to record every change that is made to it.
Audit logging
Controls
A Problem
Personnel involved in the requirements phase of a software development project
30. The 5 types of risks that are related to audits include: (1.) Control Risk (2.) Detection Risk (3.) Inherent risk (4.) _____________ (5.) Sampling risk
Information systems access
Application Layer protocols
Recovery time objective
Overall audit risk
31. Contains programs that communicate directly with the end user.
Split custody
More difficult to perform
OSI Layer 7: Application
Concentrate on samples known to represent high risk
32. What activity involves the identification of potential risk and the appropriate response for each threat based on impact assessment using qualitative and/or quantitative measures for an enterprise-wide risk management strategy?
A Server Cluster
Risk Management
Application Layer protocols
Documentation and interview personnel
33. To review and approve proposed changes to systems and infrastructure. This helps to reduce the risk of unintended events and unplanned downtime.
The typical Configuration Items in Configuration Management
Compliance Testing
List of systems examined
Change management
34. Individual events may often create combined threats to enterprise operations: A tornado might also spawn ____________________.
Structural fires and transportation accidents
Overall audit risk
Elements of the COSO pyramid
Configuration Management
35. An audit of operational efficiency.
Controls
An Administrative
Documentation and interview personnel
Six steps of the Release Management process
36. Subjective sampling is used when the auditor wants to _________________________.
Control Unit
A Problem
Dimensions of the COSO cube
Concentrate on samples known to represent high risk
37. The main hardware component of a computer system - which executes instructions in computer programs.
OSI: Data Link Layer
Application Layer protocols
CPU
Buffers
38. To measure organizational performance and effectiveness against strategic goals.
Prblem Management
Substantive Testing (test of transaction integrity)
Balanced Scorecard
Notify the Audit Committee
39. Used for several types of system changes: (1.) Incidents and problem resolution (bug fixes.) (2.) Enhancements (new functionality.) (3.) Subsystem patches and changes (require testing similar to when changes are made to the application itself.)
TCP/IP Transport Layer packet delivery
Project Management Strategies
Structural fires and transportation accidents
The Release process
40. A field in a record in one table that can reference a primary key in another table that can reference a primary key in another table.
Foreign Key
List of systems examined
Project Management Strategies
Examples of IT General Controls
41. An organization is building a data center in an area frequented by power outages. The organization cannot tolerate power outages. The best _________________solution is an electric generator and an uninterruptible power supply. The UPS responds to the
Power system controls
Inform the auditee
Structural fires and transportation accidents
Personnel involved in the requirements phase of a software development project
42. A technique that is used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule.
The BCP process
Critical Path Methodology
Control Risk
Split custody
43. The probability that a sample selected does not represent the entire population. This is usually expressed as a percentage - the numeric inverse of the confidence coefficient
TCP/IP Network Model
Change management
Service Continuity Management
Sampling Risk
44. The risk that an IS auditor will overlook errors or exceptions during an audit.
Referential Integrity
Detection Risk
The Internet Layer in the TCP/IP model
A Service Provider audit
45. External auditors are needed under these conditions: (1.) When the organization ________________________. (2.) Some regulations and standards require external - independent auditors
Insourcing
IT Service Management
Lacks specific expertise or resources to conduct an internal audit
Business Continuity
46. Lowest layer. Delivers messages (frames) from one station to another vial local network.
Segregation of duties issue in a high value process
Examples of IT General Controls
Separate administrative accounts
TCP/IP Link Layer
47. An organization has discovered that some of its employees have criminal records. The best course of action for the organization to take - The organization should have ___________________ on all of its existing employees and also begin instituting bac
Sampling
Background checks performed
Application Layer protocols
Dimensions of the COSO cube
48. A computation of the variance of sample values from the sample mean. This is a measurement of the spread of values in a sample
Variable Sampling
Sample Standard Deviation
ISO 20000 Standard:
Gantt Chart
49. (1.) Feasibility Study (2.) Definition of Requirements (3.) Design (4.) Development (5.) Testing (6.) Implementation (7.) Post-implementation phase
A Virtual Server
Hash
SDLC Phases
Sampling Risk
50. An auditor is examining a key management process and has found that the IT department is not following its split-custody procedure. As a result - Someone may be in possession of the _________________.
Entire password for an encryption key
Six steps of the Release Management process
The Internet Layer in the TCP/IP model
Capability Maturity Model Integration (CMMI)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests